New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H13-611_V4.5 Questions and Answers

Question # 6

What kind of technology does the OceanStor 5300 V3 expansion controller belong to?

A.

Scale-out

B.

Scale-up

C.

Scale-in

D.

Scale-deep

Full Access
Question # 7

OceanStor V3 series storage can only support iSCSI or FC host links separately, not both

Connect to the network.

A.

TRUE

B.

FALSE

Full Access
Question # 8

86. When using the NFS protocol, adding clients and setting read and write permissions have an impact on performance.

A.

TRUE

B.

FALSE

Full Access
Question # 9

The data backed up by the differential backup is relative to the data added and modified after the last full backup.

A.

TRUE

B.

FALSE

Full Access
Question # 10

What is the correct description of RAID 5 as follows? (Multiple choice)

A.

RAID 5 has a fixed check disk

B.

RAID 5 is verified by XOR algorithm

C.

RAID 5 uses striping to write data

D.

RAID 5 allows up to two member disks to fail simultaneously without data loss

Full Access
Question # 11

Which of the following descriptions of refactoring is incorrect?

A, RAID 0,1,3,5,6 and 10 support reconstruction

B. Reconfiguration does not necessarily require hot spare disks

C, reconstruction has an impact on RAID performance

D. Reconstruction will not interrupt RAID business

Full Access
Question # 12

When deploying random small IO-based database services on storage, which RAID type should be appropriate? for

what?

A.

RAID 10, no write penalty

B.

RAID 5, no write penalty

C.

RAID 10, no read penalty

D.

RAID 5, no read penalty

Full Access
Question # 13

An enterprise adopts cloud-level primary and backup data-level disaster tolerance. During business planning, two types of storage can be divided according to actual needs.

LUN: Protected LUN and unprotected LUN, create VMs that need disaster recovery on the protected LUN, and configure only the protected LUN

Set up array replication to save the storage space requirements of the disaster recovery center.

A.

TRUE

B.

FALSE

Full Access
Question # 14

Data and Information are the same thing.

A.

TRUE

B.

FALSE

Full Access
Question # 15

What is the purpose of context for data?

A.

Context gives meaning to the data collected. Without context the data is meaningless.

B.

Context gives comparison between data and information.

C.

Context is only found in data and not in information.

D.

Context is optional when collecting and analyzing data.

Full Access
Question # 16

In a good Disaster Recovery Plan there are no single points of failure, not even with any single person.

A.

TRUE

B.

FALSE

Full Access
Question # 17

The OceanStor 6800 V3 frame itself can be configured with four controllers or only two controllers. If configured as dual control

The power supply and BBU are fully configured, and the interface cards and controllers are all arranged in the upper row.

A.

TRUE

B.

FALSE

Full Access
Question # 18

The data center is an infrastructure built for accessing and carrying server services. According to the business, the data center can be

Divided into: (multiple choices)

A.

Cloud data center

B.

Enterprise data center

C.

Carrier data center

D.

Internet Data Center

Full Access
Question # 19

LAN Free and Server Free are backup networking methods that have little impact on host performance.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Regarding the steps of SAN synchronous replication, what is the correct order?

(1) The production storage receives the host write request. HyperReplication logs the request. Only the place is recorded in the log

Address information, without recording data content.

(2) HyperReplication waits for both the primary LUN and secondary LUN write processing results to be returned. If both are written successfully, clear

Log; otherwise keep the log, enter the abnormal disconnection state, and then copy the corresponding number of the log address again when starting synchronization

According to the block.

(3) Write the request to the master LUN and slave LUN. Normally, the LUN is in the write-back state, and the data will be written

Cache.

(4) Return the processing result of the host write request, which is subject to the processing result of the write master LUN.

A.

(1) (3) (2) (4)

B.

(1) (2) (3) (4)

C.

(2) (1) (3) (4)

D.

(4) (2) (3) (1)

Full Access
Question # 21

Which of the following statements about the coffer disks of the HUAWEI V3 series storage systems are correct?

(Multiple Choice)

A.

Coffer disks store cache data to prevent data loss after a power failure.

B.

BBUs supply power to cache and coffer disks in the event of unexpected power failure.

C.

Coffer disks cannot be used to save service data.

D.

The first 2 disks in a controller enclosure are coffer disks.

Full Access
Question # 22

The synchronous remote copy management module RM is software.

A.

TRUE

B.

FALSE

Full Access
Question # 23

Which of the following descriptions of RAID 1 is incorrect?

A.

RAID 1 writes data to each member disk, the data on each member disk is the same

B.

RAID 1 is verified by XOR algorithm

C.

Normally, RAID 1 reads data from data disk and mirror disk

D.

When the data of some member disks is damaged, RAID 1 allows it to quickly recover data from other member disks

Full Access
Question # 24

RTO=0 and RPO=0 in the disaster recovery center of the same city.

A.

TRUE

B.

FALSE

Full Access
Question # 25

The SATA connector can support both SATA and SAS hard drives.

A.

TRUE

B.

FALSE

Full Access
Question # 26

In the HUAWEI OceanStor storage system, which of the following descriptions about SmartThin LUN is correct?

A.

When creating a thin LUN, it cannot be allocated a larger capacity than the available free space in the storage pool

B.

Thin LUN cannot be converted into Thick LUN

C.

When creating a thin LUN, the initial allocated capacity can be used without specifying

D.

The types of LUNs on a storage pool must be the same, either all are Thin LUNs or all are Thick LUNs

Full Access
Question # 27

Which of the following descriptions of RAID technology are correct? (Multiple choice)

A.

Not every RAID technology can improve write performance

B.

In RAID 0, multiple hard drives are accessed simultaneously (parallel access), speeding up data access performance

C.

The current RAID technology only uses the parity mechanism to protect the data

D.

The performance of all RAID levels increases linearly with the increase in the number of member disks

Full Access
Question # 28

When UltraPath is installed on the application server, the operating system can automatically identify the LUN mapped to the host, and

There is no need to restart the host.

A.

TRUE

B.

FALSE

Cisco, Huawei, Oracle, Microsoft, Red Hat, National Soft Test and other certification exam services QQ 89246365

Taobao transaction test payment http://certpass.taobao.

Full Access
Question # 29

The FCoE protocol refers to encapsulating the FC protocol into a TCP/IP protocol package and transmitting it on Ethernet.

A.

TRUE

B.

FALSE

Full Access
Question # 30

In the Huawei storage system, which of the following is true about the characteristics of virtual snapshot LUNs?

A.

The storage system can generate a snapshot in seconds

B.

The snapshot LUN cannot be mapped to the host

C.

Complete data copying is unnecessary

D.

data use mapping table lookup

Full Access
Question # 31

When the disk is not accessible, what kind of reconstruction method is used when writing to the disk?

A.

Total reconstruction

B.

Local reconstruction

C, recovery and reconstruction

C.

Local reconstruction

Full Access
Question # 32

What are the application scenarios of the SAN solution? (Multiple choice)

A.

Data sharing

B.

Storage sharing

C.

Data backup

D.

Disaster recovery

Full Access
Question # 33

Huawei focuses on IT infrastructure in the ICT field.

A.

TRUE

B.

FALSE

Full Access
Question # 34

What are the advantages of SSDs over HDDs? (Select All that Apply)

A.

Larger capacity

B.

Better environmental adaptability

C.

Faster read/write speed for random access

D.

Longer service life

Full Access
Question # 35

Which statements are true about HyperMetro? (Select All that Apply)

A.

The local and remote sites can run services at the same time

B.

A quorum server must be configured.

C.

HyperClone can be configured only for storage devices of the same model and version

D.

Automatic switchover upon storage faults is supported.

Full Access
Question # 36

A company purchases storage devices for new services. The new services do not require high access speed of storage devices. In this scenario, the IP SAN can be used for networking deployment.

A.

False

B.

True

Full Access
Question # 37

Which of the following cannot be configured with a quota?

A.

User

B.

User Group.

C.

Volume

D.

Directory.

Full Access
Question # 38

Which of the following operating systems can access CIFS shares without installing additional software?

A.

Win7

B.

Solaris

C.

FreeBSD

D.

AIX

Full Access
Question # 39

What is the function of hot spare in storage?

A.

Additional space for usage when storage resource is low

B.

Used as cache to increase the performance of disks.

C.

Spare disk space for storing metadata

D.

Spare disk space used for disk data reconstruction when disks are faulty.

Full Access
Question # 40

Which statements are true about RAID 2.0+? (Select All that Apply)

A.

An extent is a block of a fixed size in a chunk group (4 KB by default).

B.

A chunk group is a logical set of chunks on different disks.

C.

Chunks, which are blocks obtained by dividing each disk at a fixed size, are basic units of a RAID group

D.

A chunk group is the minimum unit for applying for and releasing space in a storage pool

Full Access
Question # 41

A backup set is a group of data that is backed up in a batch. A backup set can be used for either full backup or incremental backup.

A.

TRUE

B.

FALSE

Full Access
Question # 42

What is the main purpose of hot swapping technology in disk enclosures?

A.

To swap out the hard disks after proper shutdown of storage system

B.

To swap out the hard disks without turning off the storage system.

C.

To be able to swap out the disks when the temperature is too hot.

D.

Maintain the temperature of the disks to prevent overheating.

Full Access
Question # 43

What are components of an ICT infrastructure? (Choose all that apply.)

A.

Software

B.

Hosts and Servers

C.

Backup Devices

D.

Network switches

Full Access
Question # 44

When does data become information?

A.

When it has been stored in the correct file format

B.

When the data has been stored in digital form

C.

When the enterprise understands the meaning of data and extracts the content needed for decision-making

D.

When the data is verified to be correct

Full Access
Question # 45

Description 1: The file system of the NAS is managed by a storage or server that provides resources.

Description 2: The file system of the SAN is managed by the host itself.

A.

Description 1 is correct, description 2 is correct

B.

Description 1 is correct, description 2 is incorrect

C.

Description 1 is wrong, description 2 is correct

D.

Description 1 error, description 2 error

Full Access
Question # 46

The number of erasable times of the storage medium cell of the SSD disk is limited. Multiple erasing causes the wear of the SSD, which also makes the SSD

Has a limited period of use, which is related to the number of specific erasures.

A, yes

B, wrong

Full Access
Question # 47

SCSI communication is initiated by the initiator and received and processed by the target. When the host and the storage device communicate, the storage device

The side assumes the role of initiator.

A.

TRUE

B.

FALSE

Full Access
Question # 48

The following statement is wrong: (multiple choice)

A.

Backup cannot solve the recovery of data corruption

B.

backup to solve the recovery of data loss

C.

Backup cannot solve the retrieval of historical data

D.

Backup can directly take over the business

Full Access
Question # 49

What versions of the NFS protocol are there? (Multiple choice)

A.

NFS V1

B.

NFS V2

C.

NFS V3

D.

NFS V4

Full Access
Question # 50

NAS provides file sharing services through protocols such as NFS and CIFS.

A.

False

B.

True

Full Access
Question # 51

The storage system compresses data based on the user-defined compression policy. Which compression policies are supported by Huawei storage systems? (Select All that Apply)

A.

Inline compression before data is written to disks

B.

Inline compression and data read when the system is idle

C.

Post-process compression, where data is first written to disks and then read and compressed when the system is idle

D.

Inline compression after data is written to disks

Full Access
Question # 52

In the scenario where only 2 disks are in the RAID group, which one of the following uses data striping?

A.

RAID 0

B.

RAID 5

C.

RAID 1

D.

RAID 6

Full Access
Question # 53

Which of the following statements about SAS is false?

A.

SAS is a point-to-point, full-duplex, and dual-port interface,

B.

SAS drivers are incompatible with SATA controllers.

C.

SAS features high performance and high reliability compared with SCSI.

D.

SAS offers powerful scalability compared to SATA.

Full Access
Question # 54

Which of the following statements about RAID 10 are correct?

(Multiple Choice)

A.

RAID 10 applies to scenarios with demanding requirements for speed and fault tolerance.

B.

RAID 10 requires at least four member disks.

C.

In RAID 10, if two member disks in the RAID 1 group fail, data read proceeds normally.

D.

Data is mirrored and then striped in RAID 10.

Full Access
Question # 55

Which of the following dimensions are often used to express the data used in Big Data scenarios? (Multiple Choice)

A.

Variety

B.

Volume

C.

Velocity

D.

Verticality

Full Access
Question # 56

Statement 1: A Solid State Disk drive can withstand strong vibrations.

Statement 2: A Solid State Disk drive has only a few mechanical parts.

A.

Statement 1 and 2 are true

B.

Statement 1 is true; Statement 2 is false

C.

Statement 1 is false; Statement 2 is true

D.

Statement 1 and 2 are false

Full Access
Question # 57

Select the correct statements that describes the properties of bus technology in ICT architecture. (Choose all that apply.)

A.

Bus technology are only available in serial form.

B.

Bus can be divided into internal bus and external bus.

C.

The CPU needs to go through the memory to directly access the Bus.

D.

Bus is a communication system that transfers data between internal components and external components.

Full Access
Question # 58

A user is having intermittent problems connecting to their shared network storage, A network technician is able to determine that there is a problem within the network cabling in between the workstation and the switch. All other users are able to connect successfully to the network. Which of the following is the MOST likely cause?

A.

Patch cable is a crossover cable instead of straight-through.

B.

Cable has been cut somewhere within the wall.

C.

Crosstalk and interference are occurring.

D.

Cable is not connected at the patch panel.

Full Access
Question # 59

You are tasked to setup a SAN storage system that has the following requirements: (1) To minimize the workload on server resources. (2) Optimize the capabilities on storage system for deduplication. Select the following options that fits the scenario above.

(Multiple Choice)

A.

Use NIC instead of HBA cards to minimize the host resource consumption during I/O operations.

B.

Offload the storage processing tasks to the server to optimize the data deduplication.

C.

Usage of TCP/IP offload engine technology to do processing on HBA cards on the server to minimize the usage of server resources.

D.

Adding hardware acceleration module to the storage system to optimize the performance of data deduplication.

Full Access
Question # 60

Which of the following statements about Disaster Recovery is NOT true?

A.

Some data loss must be accepted.

B.

After a disaster access to the data, on the remote site, can be immediate.

C.

Applications to work with the recovered data is in place.

D.

There are still traditional backup strategies in place.

Full Access
Question # 61

What is typical for a DAS solution?

(Multiple Choice)

A.

More scaleable in capacity than a SAN solution

B.

Consists of a server/host with its locally connected disk drives

C.

Sharing of files between DAS solutions is possible via the network.

D.

Backups are centrally made on a special backup server.

Full Access
Question # 62

Based on the new industrial revolution, what are the changes in the trend of ICT? (Multiple Choice)

A.

ICT trend is changing slowly with little significant changes.

B.

The initial phases of ICT focuses on office automation but slowly changed towards changing business flows.

C.

ICT is slowly being replaced by other new technologies such as IT and CT.

D.

ICT has become the core in the production systems in the recent years.

Full Access
Question # 63

What are the advantages of SSDs over HDDs?

(Multiple Choice)

A.

Larger capacity

B.

Faster read/write speed for random access

C.

Better environmental adaptability

D.

Longer service life

Full Access
Question # 64

Currently all OceanStor V3 devices support SAS at 12 Gb/s.

A.

TRUE

B.

FALSE

Full Access
Question # 65

Huawei V3 series storage system hardware includes controller enclosures and disk enclosures. Which of the following statements about controller enclosures is correct?

A.

When the external power supply fails, BBU modules provide backup power for all disks.

B.

When the external power supply fails, BBUs can supply power to enable data synchronization from the cache to disks in disk enclosures.

C.

If BBUs become faulty, the service system will be interrupted.

D.

When the power input is normal, BBUs are in the standby state.

Full Access
Question # 66

For the data stored on the medium, there is no need to physically crush or sell it as the data recorded on the paper

Ruined situation.

A.

TRUE

B.

FALSE

Full Access
Question # 67

What is required to add additional controllers to an existing HUAWEI OceanStor system?

A.

SAS cabling

B.

56 Gb Infiniband module

C.

Smart I/O card

D.

FC or iSCSI Host Bus Adapter

Full Access
Question # 68

Which statements are true about a dual-controller storage system? (Select All that Apply)

A.

There are two working modes: active-standby and active-active.

B.

In active-standby mode, if one controller is faulty, services are not affected

C.

When one controller is faulty, the service failover in active-active mode is more efficient than that in active-stand by mode

D.

In active-standby mode, only one controller works at a time.

Full Access
Question # 69

DAS is a storage architecture without scalability.

A.

TRUE

B.

FALSE

Full Access
Question # 70

If a disk is faulty, what is the process of recovering data on the faulty disk?

A.

Replication

B.

Compression

C.

Reconstruction

D.

Deduplication

Full Access
Question # 71

FTP is a very secure protocol with no security risks.

A.

TRUE

B.

FALSE

Full Access
Question # 72

As the new storage administrator, you are tasked with the procurement of a new batch of SSD drives to replace the older drives that has reached the end of life. You have the option of SLC, MLC and TLC SSD. Which of the following will be your choice with a limited budget and medium level of reliability concerns? (Select All that Apply)

A.

Purchasing all SLC SSD drives for maximum savings on cost regardless of reliability.

B.

Purchasing all TLC SSD drives for the storage system for the best reliability and performance.

C.

Purchasing the MLC SSD if within budget range for core applications and services for better performance and reliability.

D.

Purchasing SLC SSD drives that has lowest cost and reliability for storage purposes of non critical applications

Full Access
Question # 73

SmartKit is an O&M tool that integrates cloud computing, server, and storage. It cannot be used to monitor third-party devices.

A.

True

B.

False

Full Access
Question # 74

Which of the following technology segregates the nodes in the SAN fabric into multiple networks and allows access control of the members?

A.

Subnet.

B.

VLAN.

C.

Quarantine.

D.

Zoning.

Full Access
Question # 75

Which of the following statements about RAID 5 and RAID 10 are correct?

A.

The sequential read performance of RAID 5 is lower than RAID 10

B.

If the front-end pressure is sufficient, the sequential write performance of RAID 5 is higher than that of RAID 10.

C.

The random read performance of RAID 5 is lower than RAID 10

D.

The random write performance of RAID 5 is higher than RAID 10

Full Access
Question # 76

When the Windows copy program copies local files to the file system, the file system block size of the HUAWEI OceanStor storage system is the default, which ensures the full use of storage space.

A, right B, wrong answer: B

The SmartCache feature in HUAWEI OceanStor series products can only improve read performance, not write performance.

A.

right

B.

FALSE

Full Access
Question # 77

In the Huawei storage system using RAID2.0+ technology, regarding the difference between Thick LUN and Thin LUN, the following

Which description is correct? (Multiple choices)

A.

Allocate storage capacity when Thick LUN is created

B.

The storage capacity is not allocated by default when the Thin LUN is created, and the storage capacity is allocated when data is written

C.

Thin LUN is more flexible than Thick LUN, and has better performance during sequential read and write of large IO

D.

Thin LUN makes the entire storage space utilization rate higher

Full Access
Question # 78

The server with Linux operating system installed accesses the disk array based on the RAID 5 strategy.

The order is:

A.

File system->Application system->Volume->I/O subsystem->RAID controller->Disk

B.

Application System->File System->Volume->I/O Subsystem->RAID Controller->Disk

C.

Application system->File system->I/O subsystem->Volume->RAID controller->Disk

D、Application system->File system->Volume->RAID controller->I/O subsystem->Disk

Full Access
Question # 79

Use the CIFS protocol to access the share. When the share name and the user name are the same, the shared order of access is:

A.

Query the CIFS share first, if there is no matching share information, then query the Homedir share

B.

Query CIFS share, if there is no query, it will return failure

C.

Query Homedir share first, if there is no matching share information, then query CIFS share

D.

Query Homedir share, if there is no query, it returns failure

Full Access
Question # 80

There are two descriptions about backups, the correct ones are:

Description 1: The disaster recovery solution does not need to consider whether it is backed up on tape or hard disk.

Description 2: The backup plan should consider the worst case.

A.

Descriptions 1 and 2 are both correct

B.

Description 1 is right, description 2 is wrong

C, description 1 is wrong, description 2 is right

C.

Descriptions 1 and 2 are wrong

Full Access