Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Huawei H13-629_V2.0 Dumps

Page: 1 / 14
Total 363 questions

HCIE-Storage (Written) v2.0 Questions and Answers

Question 1

TheOceanStor 9000 log analysis tool is used to analyze the results of information collected and propose solutions to problems using on-site product maintenance tools. Which of the following statements are wrong regarding the use of log analysis tools? (Multiple choice)

Options:

A.

Log analysis tools can run on any PC, do not need to interoperate with the storage system, the analysis process time according to the amount of the log may be, may it takes a long time

B.

Log Analysis Tools After starting the analysis, the analysis tasks need to be stopped due to other reasons. Click on the analysis tool to abort this analysis

C.

Engineer A deleted the original compression of the results of the collection, then the results will be collected to re-catalog the contents of all documents compressed into zip format for the dayChi analysis tools for analysis

D.

After the analysis is completed, all the problems caused by the log analysis will be presented in the list of problems, and "View Details" contains the approximate cause of the problem and processing advice

Question 2

Which of the following statements are a correct description of the CIFS agreement?(multiple choice)

Options:

A.

CIFS does not allow multiple clients to access

B.

The CIFS client writes the shared file and does not write to the storage system immediately. Instead, the file is saved in the local cache and can be read againImprove read rate, improve performance

C.

CIFS does not support anonymous transmission and shared authentication access

D.

CIFS supports a variety of character sets to ensure CIFS can be used in all language systems

Question 3

In a media application scenario, large files is an important application feature. Huawei OceanStor 9000 can allocate different configurations according to different users. This avoids some of the unimportant data transition overhead, which of thefollowing description of the quota is correct?

Options:

A.

The types of quotas include capacity quota and file quota.

B.

Quota methods include calculating quotas, soft quotas and mandatory quotas.

C.

The system pre-allocates quotas for files before writing the file. When the user cancels the writing of the file being written, the system does not release a pre-allocated quota.

D.

When the user continues to write data, the quota information has been used in the InfoAllocator interface real-time updates.

Question 4

When the storage controller BBU is damaged, the controller automatically sets the IO write policy to transparent and is locked to ensure data reliability. Before the fault is recovered, it can be forced to write back.

Options:

A.

True

B.

False

Question 5

In a client application scenario, IO business model for the random read, the IO size is about 100K, and the depth of the storage array LUN stripe set to______.

Options:

A.

8K

B.

16K

C.

64K

D.

128K

Question 6

The RMAN command dbms-rcvcat in the three PL / SQLpackages is used to query the recovery catalog and target database control files, such as the list, report commands or a call to the package.

Options:

A.

True

B.

False

Question 7

The figure shows an N8500 (V200R001) NAS engine chassis. The two NAS engine nodes in the chassis form a two-node N8500 NAS cluster. Which description of the front-end and back-end network planning of the cluster is correct. (Multiple choice.)

Options:

A.

On the slots of the same position on both nodes, such as A3 and B3, you must insert the same type of interface card.

B.

A5 and B5, A6 and B6 can be chosen to be networked, the key is howto make the network connections.

C.

If the back end of the engine cluster is to be directly connected to four control enclosures, add one FC HBA card in slots A2 and B2 for the controller enclosure of direct connection.

D.

A2, A3, A4 and B2, B3, B4 can beplugged into a 1Gb iSCSI or 8Gb FC interface module to connect with the business network.

Question 8

What kind of technology in an active-active disaster recovery solution can realize the traffic distribution between servers in different regions on the wide area network(including the Internet), keeping access quality with the best server from your nearest customer?

Options:

A.

GSLB

B.

VIP

C.

SLB

D.

GLB

Question 9

True or False, the SESparse virtual disk is a virtual disk format that reclaims space after the virtual machine's operating system has expired data or deleted data.

Options:

A.

True

B.

False

Question 10

A RedHat Linux 6 system includes a specific file folder read and write errors, the file system needs to be modified after the diagnosis. Which of the following is the correct repair operations?

Options:

A.

Direct use of the root user, in the case of the file system is mounted fsck repair

B.

Using the owner of the user data file, perform an fsck fix if the file system is mounted

C.

Use the owner of the user data file to perform a fsck fix on the device ifthe file system is unmounted

D.

Using the root user, perform a fsck fix on the device while the file system is unmounted

Question 11

In an active-active disaster recovery solutionconfigured with inter-site FC switch connection. When the distance between sites exceeds _____ km, you need to configure long-distance transmission.

Options:

A.

1KM

B.

10KM

C.

25KM

D.

50KM

Question 12

Customers using 5 ESXI 5.5 hosts and configured DRS / HA, are seeing the error "HA insufficient resources" when the administrator starts the DB virtual machine. Using the HA configuration shown in the figure select the correct solution. (multiple choice)

Options:

A.

Stop one or more virtual machines

B.

Suspend one or more virtual machines

C.

Set the virtual machine restart priority

D.

Set host isolation response

Question 13

When theoracle database is in an open state, which of the following is the correct oracle database recovery action?

Options:

A.

Restore the entire data file

B.

roll back to the Council before crying to a certain point in time

C.

Recovery control file

D.

open state cannot be restored action

Question 14

Which of the following are Oracle11g logical backup methods?

(Multiple choice)

Options:

A.

EXP

B.

RMAN

C.

EXPdp

D.

imp

Question 15

What is shown in the main group?

Options:

A.

The production system equipment network card occupancy rate is high.

B.

The production system equipment network card occupancy rate is low.

C.

The production system equipment CPU occupancy rate.

D.

The production system equipment CPU occupancy rate is low.

Question 16

True or False, The smart Matrix architecture is a multi-control interconnected system architecture designed by Huawei for the core storage system of an enterprise data center. Based on the smart matrix principle, Huawei OceanStor 18000 supports up to 16 engines (32 controllers) cluster.

Options:

A.

True

B.

False

Question 17

Which of the following is not anauthentication method supported by the OceanStor 9000 NFS protocol?

Options:

A.

LDAP authentication

B.

WSSE certification

C.

NIS certification

D.

AD domain certification

Question 18

VxVM (veritas volume manager) in the N8500 clustered NAS system is located between the operating system and thedata management system. The operating system provides an excuse service to access the disk, the physical storage device connected to the host and the level of the data management system provides a logical device. The Layers of logical devices are called VxVM volumes.

Options:

A.

True

B.

False

Question 19

Which of the following is NOT correct regarding the backup RMAN?

Options:

A.

Backup slice size is unlimited, but its size can be set by maxpiecesize

B.

The backup piece is a binary file used to store the backup set information

C.

One or more backup pieces form a backupset

D.

A backup piece corresponds to a separate input output file

Question 20

Which of the following functions in VMware leverages content-based read cache (CBRC) of ESXi hosts as shown in the figure to ease the pressure of partial storms in VDI?

Options:

A.

Linked Clone

B.

VSA

C.

SE Sparse

D.

User Data Management

Question 21

When using OceanStor V3, you need to mount the file system snapshot to access the snapshot data.

Options:

A.

True

B.

False

Question 22

NTFS (new technology file system) is a windwos NT environment file system, on the NTFS file system, which of the following arguments is not correct?

Options:

A.

NFS design ideas include stability, security, support for large-capacity storage devices

B.

NTFS will all the data is a file, the file system metadata is also stored as ordinary files

C.

Each directory and file attribute information is included in the MFT, MFT records the name of the file and directory, size, data storage location information

D.

NTFS file space allocation unit is the sector, the default is 512 bytes

Question 23

DAV (Distributed Authoring and Versioning) can solve issues that the HTTP protocol can not such as? (multiple choice)

Options:

A.

Rewrite the protection

B.

Resource Management

C.

Document Properties

D.

document encryption

Question 24

In the main backup and disaster recovery solution of Huawei a VIS6600T 4-node local high-availability cluster is deplyed. Inthe production site networking, each node of the VIS6000T needs to cooperate with at least how many connections each FC switch

Options:

A.

1

B.

2

C.

3

D.

4

Question 25

Which of the following are characteristics of the SmartVirtualization-based Data Migration Solution?

(Multiple Choice)

Options:

A.

It does not consume any host resources.

B.

It is lower in migration cost than gateway-layer solutions such as those based IBM SVC, and EMC VPLEX.

C.

It requires services to stop only once, and the service stopping occurs after the migration.

D.

It delivers higher migration speed than host-layer solutions.

Question 26

The storage array provides the device LUN to the database. This LUN does not need to be labeled after being recognized by the host for the first time.

Options:

A.

True

B.

False

Question 27

Which of the followingstatements regarding the Huawei Oceanstor V3 hierarchical storage and Smart Cache is correct?

Options:

A.

A client business IO load random read that accounts for more than 60% using SATA, SAS for staging storage, use SSD to do cache, so it will effectively reducecosts and improve random performance indicators

B.

If hot spot data is scattered and changing rapidly, it is recommended to use tiered storage

C.

If there are many SSDs and hotspots, Smart Cache is the best choice

D.

If you have a small amount of SSD data,use a tiered storage disk for more utilization

Question 28

In thescenario of database protection, when the slave uses the virtual snapshot to verify LUN data consistency on the production end and the DR end and the disaster recovery end LUN database can not be started normally. Which of the following are the possible reasons for this? (multiple choice)

Options:

A.

After a snapshot of the LUN of the redundancy site is created, the snapshot is not activated at the same time

B.

Disaster recovery data stored in the Cache, not yet written to the hard disk

C.

When creating a snapshoton the disaster recovery end LUN The production end is copying data to the disaster recovery end

D.

The production end and disaster recovery end adopt the disaster recovery solution of incremental LUN copy. The incremental data is abnormally interrupted during the synchronization process and has not been recovered

Question 29

Which of the following statemetns is correct about RAID10 and RAID5performance? (multiple choice)

Options:

A.

With continuous random read: RAID 5 performance is superior to RIAD10

B.

With sequential read and write, RAID 5 performance are better than RAID10

C.

With sequential write, RAID10 better than RAID5 performance

D.

With continuous random read, RAID 5 and RAID 10 performance is equal.

Question 30

When you create a LUN on the OceanStor T system V200R002 storage system, after the initial allocation policy is set to Automatically assigned LUN1 iscreated, you confirm 80% of LUN1's space is in the capacity layer. When you continue creating LUN2 in the same storage pool, the ratio of its space to the performance layer must be 0%.

Options:

A.

True

B.

False

Question 31

Whatare the precautions for VTL6900 product division? (Multiple choice)

Options:

A.

The size of the LUN provided by the VTL back-end storage does not exceed 4TB. The default configuration is write-back, mirroring, and the depth of the slice is 64KB

B.

SIR data The number of LUNs is 2's power of N

C.

SIR index LUN size is at least 4% of SIR data LUN size

D.

It is not recommended to divide RAID across frames

Question 32

In Huawei FusionSphere, which are typical application scenarios of the snapshot function?

(Multiple Choice)

Options:

A.

Data backup

B.

Data restoration

C.

Data copy

D.

Data deletion

Question 33

Huawei HyperMetro active-active disaster recovery supports heterogeneous storage. Therefore, an OceanStor V3 storage system and a Huawei certified third-party storage system can work inactive-active mode based on HyperMetro.

Options:

A.

TRUE

B.

FALSE

Question 34

The customer online database runs on an OceanStor S5500T storage system. The database uses a total of 6 LUNs. Now it's time to put the number on the S5500T. Which of the following statemetns are correct regarding the use of array-side functions to complete the data migration? (multiple choice)

Options:

A.

Multiple LUNs for Customer Business. When implementing data migrationusing remote replication, you need to add multiple remote replication tasks to a consistency group

B.

Use remote replication to complete online data migration

C.

LUN copy or remote replication. After the migration is complete, you do not need to do any configuration on the host to start the service

D.

LUN copy data migration. During the copy process, you can dynamically change the migration rate

Question 35

On the command line of the N8500 (V200R001) clustered NAS system, you run the NFS> share add / vx / xs-cmfs 100.43.13.210 command.

One system that is used NFS sharing has IP address 100.43.13.11. If the client operating system is Suse Linux, which of the following access to the description of the file system is correct: (multiple choice)

Options:

A.

Not just the host with IP 100.43.13.210 can access this NFS share

B.

Toquery the client for all the NFS shares on the service IP, use the command: showmount -e 100.43.13.11

C.

Mount the NFS shared file system locally and execute: mount -t nfs 100.43.13.11:xs-cmfs / mnt

D.

Verify that NFS shared file system has been mounted locally, executable: mount

Question 36

Which of the following is correct regarding the ext3 file system fault repair?

Options:

A.

Use the mount command to view the file system mount status is read-only

B.

mount the damaged file system, the direct implementation of fsck to repair

C.

should not be arbitrary on the normal operation of the fsck file system

D.

By collecting, var / log / message host log information to locate file system failure

Question 37

A hospital bought a Huawei OceanStor 9000V100R001C30 storage device for storing business data. According to the relevant laws andregulations, which of the following descriptions of data loss prevention is wrong?:

Options:

A.

The engineer has set the WORM root directory according to the hospital's requirements, and all the subdirectories under this directory have the WORMattribute.

B.

During the file protection period, no one can delete the protected file.

C.

Protected Documents are Protected for a Period of 70 Years on Huawei OceanStor 9000 Storage Device.

D.

WORM log save root, quota and WORM protection period cannot beset.

Question 38

An Engineer installed a OceanStor 9000 for a customer (a total of 5 OceanStor 9000 C Node, front and rear endsare 10GE TOE networking, on-site installation TOE network card). Then connected the signal lines, power lines, and debugged the software. During the installation there were issues. Which of the following description of these issues are correct? (Multiplechoice.)

Options:

A.

5 devices TOE NIC A0, B1, and A0, B3 inserted into the PCIe slot will not affect the system. Deployment will not affect the network bandwidth, so it cannot be adjusted.

B.

The signal cables are long and need to be strapped to the cabinet or placed on the bottom tray.

C.

Label NODE 01 A0-0 The signal cable is inserted in the network port A0-1. The signal cable labeled NODE01 B3-1 is inserted in the network position B3-0, due to the same network card two network port peer, you can place the wrongline, you cannot adjust.

D.

CE6850 switch connected to two stacked copper cables, one of which is needed to post-cold more cold, because it does not affect the network interoperability. You can base this software debugging.

Question 39

The client environment is the HP-UX11i v2 operating system, the HBAis the AD193A, and the operating system comes with the driver. The storage array is Huawei OceanStor V3. When the LUN mapping between HP-UX and the storage system is completed, you can not change the topology mode of the FC host interface card on the storage system.

Options:

A.

True

B.

False

Question 40

When a customer uses simpana software, CS can not start normally and you need to recover the CS. Which of the following situations will cause the restoration to fail?

Options:

A.

The backup server and the media server can not communicate properly.

B.

The link between the backup media and the media server is down.

C.

Backup server SQL database failure.

D.

DDB is abnormal.

Question 41

Customers use Redhat Linux enterprise 6 LVM to manage user data disks in the cluster. When using pvmove data migration you can not enforce OK. What is a possible reason for this.

Options:

A.

Pvmove command does not support Linux cluster.

B.

Redhat Linux enterprise 6 version of lvm does not support the pvmove command.

C.

You need to install the cmirror package and run it on the cluster server.

D.

Need to lvm version down to 1.0 before using pvmove migration data.

Question 42

When the database is protected and the virtual snapshots are used from the end to verify LUN data consistency on the production end and the disaster recovery end. However, the disaster recovery end of the LUNd database can not be started normally. What is the possible reason? (Multiple choice.)

Options:

A.

After a snapshot of the LUN of the redundancy site is created, the snapshot is not activated at the same time.

B.

Disaster recovery storage side of thedatabase resides in the cache has not been written to the hard disk.

C.

When creating a snapshot on the disaster recovery end LUN, the production end is copying data to the disaster recovery end.

D.

The production end and disaster recovery end adopt the disaster recovery solution of incremental LUN copy. The incremental data is abnormally interrupted during the synchronization process and has not been repaired.

Question 43

A user configures Huawei OceanStor 9000 as follows:

1. Create a user group group01, group01 in the directory / home / group01 configuration like:

Recommended threshold: 10GB, software threshold: 15GB, grace period 10 days hard threshold 20GB

2. Create user user01 in the user group group01. The configuration of the user user01 in the directory / home / group01 is as follows:

The recommended threshold is 8GB

Software threshold 18GB

Grace period of 15 days

Hard threshold 25GB

The quota that user01 is in the directory / home / group01 is:

Options:

A.

Recommended threshold 10GBSoftware threshold 15GBGrace time 10 daysHard threshold 20GB

B.

Recommended threshold10GBSoftware threshold 18GBGrace time 10 daysHard threshold 20GB

C.

Recommended threshold 10GBSoftware threshold 15GBGrace time 15 daysHard threshold 20GB

D.

Recommended threshold 8GBSoftware threshold 15GBGrace time 10 daysHard threshold 20GB

Question 44

Oracle database normally starts the opening state of the process. Which files must it read? (Multiple choice.)

Options:

A.

Parameter file

B.

Control Documents

C.

Archive log file

D.

Data files

Question 45

Which of the following VMWARE virtual machine scenarios can use VADP backup?

Options:

A.

The storage is connected directly to the virtual machine, including RDMs, directly to iSCSI or NFS.

B.

Virtual machines contain large databases.

C.

The virtual machine is deployed in the AIX operating system.

D.

Virtual machines contain non-Microsoft family applications.

Question 46

What commands are used forviewing SCSI controller information on Linux systems with Qlogic HBAs?

Options:

A.

lspci | grep SCSI

B.

cat / proc / scsi / scsi

C.

cat / proc / scsi / qla2300 / 1 | grep port

D.

lspci | grep Ethernet

Question 47

Which technology enhances the performance of the Huawei OceanStor 9000 application? (Multiple choice.)

Options:

A.

Support for SMB3 multichannel features that take full advantage of client-side multi-core CPUs and bandwidth resources to dramatically improve performance.

B.

When a hard drive has multiple objects at the same time to write requests, support merged into a large continuous IO, significantly improve system performance.

C.

Internal file system replication, without having to go through the client directly in the system to complete high-speed

D.

Supports 10GE and PCIE networking, providing high performance through high-speed inter-node interconnection and reducing system internal delay.

Question 48

Huawei Standard Edition N8500 has two nodes named Pubeth1 and Pubeth4. It opened the NFS service. NFS server accepts recovery after NFS guest.

However, the client mount point can not be accessed into the directory for a long time without echo. What do you need to do to fix it?

Options:

A.

Restart the NFS server of the N8500

B.

Restart the client's NFS service

C.

Reseat the NFS client network cable

D.

Forcibly unmount the NFS client mount point and mount it again

Question 49

Which of the following IO model characteristics belong to random small IO? (Multiple choice.)

Options:

A.

OLTP

B.

OLAP

C.

VDI

D.

SPC-1

Question 50

Which of the following description is correct about simpana backup software snapshot? (Multiple choice.)

Options:

A.

Pause the app before the snapshot, go to the hardware storage snapshot to trigger a common snapshot with application consistency.

B.

Backup software snapshot function can automatically find the storage volumeof the file system, database, mail system.

C.

Background snapshots can be indexed to ensure application recovery and small particle recovery.

D.

Snapshots backup can be offline, the backup server almost has no impact.

Question 51

Huawei Oceanstor 900 adopts erasure code technology to protect the data. If an office has six nodes, and the customer wants to have one office, what redundancy model protection level can be used? (Multiple choice.)

Options:

A.

4 + 3: 1

B.

6 + 3

C.

4 + 2

D.

12 + 3: 1

Question 52

Which statement about the RMAN restore andrecovery is wrong?

Options:

A.

Restore (restore) refers to the previously generated backup set, get one or more objects, and then set to restore these objects.

B.

Recovery (recovery) is a database that is consistent with the given point in time to ensure that thisdatabase can be opened.

C.

Usually restored content lags behind the latest database SCN, so you need to ensure consistency through the restoration of the database.

D.

The restored data files can use archived logs and online logs to complete the recovery.

Question 53

In a A VTL6900-I system, the backup server connected to it is the Linux operating system. The backup server and the VTL6900-I system are directly connected through the FC.

The server identifies the device information as shown below. After the backup server is configured as a backup client for the VTL6900-I system and the backup VTL system on the server virtual library process, which the following operation and description is correct:

(Multiple choice.)

Options:

A.

When configuring thebackup client on the VTL side, you need to know that the WWPN of the FC port that connects the VTL to the VTL is available on the server in the sys /class / fc_host directory and subdirectory to the corresponding WWPN port.

B.

Server-side identification has been detected with the library device command is cat / proc / scsi / scsi.

C.

As shown in the figure, among the devices identified on the server side, the device labeled 1 is the scanned library.

D.

As shown in the figure, of the devices identified on the server side, the device labeled 2 is the information for the scanned tape.

Question 54

A N8500 (V200R001) clustered NAS system with a set of storage units at the back end. Three RAID Groups, respectively named RG1, RG2, RG3 have been created on the storage unit. There are two LUNs under each RAID group, the capacity of each LUN is 12G.

The names are RG1-LUN1, RG1-LUN2, RG2-LUN1,RG2-LUN2, RG3-LUN1, RG3-LUN2, and all LUNs are added to one in storage pool. The purpose is to create a file system based on these LUNs. What of the following will certainly create a failure?

Options:

A.

fs create striped fs01 10g 3 RG1-LUN1, RG2-LUN1, RG3-LUN1 stripeunit = 2048 blksize = 8192

B.

fs create mirrored fs02 10g 2 RG1-LUN2, RG2-LUN2 stripeunit = 2048 blksize = 8192

C.

fs create mirrored-stripe fs03 10g 2 2 RG1-LUn1, RG2-LUN1 protection = disk stripeunit = 2048 blksize = 8192

D.

fs create striped-miiro fs04 20g 2 3 RG1-LUn1, RG1-LUN2, RG2-LUN1, RG2-LUN2, RG3-LUN1, RG3-LUN2 protection = disk stripeunit = 512 blksize = 1024

Page: 1 / 14
Total 363 questions