01. Which ONTAP authentication option allows administrators to enforce password complexity rules for local accounts?
a) RBAC role mapping
b) Volume encryption
c) Password quality enforcement
d) SnapMirror policies
02. Why should an organization implement encryption across its storage infrastructure?
(Choose two)
a) To meet regulatory requirements for data confidentiality
b) To protect data at rest from unauthorized access
c) To increase storage efficiency through compression
d) To eliminate the need for Snapshot copies
03. What is a critical consideration when restoring from a Snapshot copy after a ransomware event?
a) Restoring from the most recent Snapshot copy, even if compromised
b) Identifying the last known good Snapshot copy prior to encryption
c) Deleting all existing Snapshot copies before restoration
d) Running deduplication before restoring to minimize storage impact
04. How can administrators ensure compliance when managing encryption keys in a regulated environment?
(Choose two)
a) Use an external KMS that is FIPS 140-2 certified
b) Rotate encryption keys at regular intervals
c) Disable ARP anomaly detection to reduce overhead
d) Allow multiple admins to share the same encryption credentials
05. Who is responsible for approving the use of Secure Purge in environments with strict compliance requirements?
a) Any storage administrator
b) A compliance or security officer
c) An application developer
d) A system end user
06. When configuring Autonomous Ransomware Protection (ARP) in ONTAP, which component provides anomaly detection using workload baselines?
a) NetApp Cloud Manager
b) Active IQ Unified Manager
c) SnapCenter Plug-in for VMware vSphere
d) The ARP machine learning engine within ONTAP
07. In a cyber resiliency design, what is a key requirement of a cyber vault compared to a standard DR site?
a) Faster RTO than SnapMirror
b) Physical or logical isolation from production
c) Lower storage efficiency overhead
d) Use of unencrypted volumes for speed
08. Who should be responsible for reviewing CVEs identified by Active IQ and ensuring remediation in a production environment?
a) The end users of the storage system
b) The compliance team only
c) The storage or security administrators
d) The application development team
09. What action should administrators take when Active IQ identifies a critical CVE affecting their ONTAP version?
a) Immediately apply the vendor-provided patch or workaround
b) Wait for the next scheduled upgrade cycle
c) Disable syslog monitoring to prevent alerts
d) Migrate data to a new cluster before remediation
10. Which three encryption technologies can be configured in ONTAP to protect data at rest?
(Choose three)
a) NetApp Volume Encryption (NVE)
b) NetApp Aggregate Encryption (NAE)
c) NetApp Storage Encryption (NSE)
d) Secure Purge
e) FabricPool caching