You are asked to help a customer architect a private cloud solution using a tightly integrated converged infrastructure that can be managed by the vendor. You decide to present FlexPod Managed Private Cloud as a solution.
In this scenario, what are three results of this solution? (Choose three.)
While creating a Cloud Volumes ONTAP cluster in Amazon Web Service (AWS) in Cloud Manager, you receive the message shown in the exhibit.
What is the root cause of this problem?
You have virtual desktops that are hosted in both AWS and Azure. The desktops need to connect to your on- premises database by using Azure ExpressRoute and AWS Direct Connect.
In this scenario, which routing protocol supports this connectivity?
Your manager has informed you that any new solutions that you deploy must support SnapMirror technology for replicating data back to your main data center, where a large ONTAP cluster provides data protection.
In this scenario, which two solutions satisfy this requirement? (Choose two.)
A software development team wants to adopt a new business process that allows a choice of coding language and does not require capital expenditure.
In this scenario, which two cloud classifications would satisfy these conditions? (Choose two.)
You are creating an Ansible playbook to create a new NFS export.
In which order do you need to execute the module tasks in your playbook?
Your development team wants to create a separate workspace for staging within your NetApp Cloud Central account. Appropriate user rights for this workspace must be assigned to one developer on the team.
In this scenario, which role would you assign to this developer?
You are writing a script to verify, update and display discrepancies of IT assets in the corporate content management database (CMDB). You must use the RESTful API to interface with the CMDB server.
What are two common formats for the RESTful API responses? (Choose two.)
Which three automation frameworks provide the ability to configure a desired state? (Choose three.)
A customer requires WORM storage in the cloud.
In this scenario, which two combined NetApp technologies support this requirement? (Choose two.)
You are sending API commands to NetApp Cloud Manager.
In this scenario, which type of authorization is used?
After a ransomware attack, you are asked to block known ransomware file extensions and to recover encrypted files.
In this scenario, which two native NetApp Cloud Volumes ONTAP technologies will remediate the attack? (Choose two.)