ExamGecko
Home / Huawei / H13-611 / List of questions
Ask Question

Huawei H13-611 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

Which of the following is the end that receives and processes the SCSI commands?

LUN.
LUN.
Storage.
Storage.
Target.
Target.
Initiator.
Initiator.
Suggested answer: C
asked 18/09/2024
Casie Clements
41 questions

Question 92

Report Export Collapse

Dual-switch networking is widely applied in Fibre Channel SANs. Which of the following are its characteristics? (Multiple Choice)

Two Fibre Channel switches are deployed in a SAN for connecting to the two controllers of a storage device.
Two Fibre Channel switches are deployed in a SAN for connecting to the two controllers of a storage device.
Per host two fibre channel ports should be available. The two Fibre Channel ports connect to two Fibre Channel switches.
Per host two fibre channel ports should be available. The two Fibre Channel ports connect to two Fibre Channel switches.
The ports on the two Fibre Channel switches connecting to the hosts and storage device must reside in the same zone.
The ports on the two Fibre Channel switches connecting to the hosts and storage device must reside in the same zone.
As multiple paths exist, the dual switch networking mode supports link redundancy but does not support load balancing.
As multiple paths exist, the dual switch networking mode supports link redundancy but does not support load balancing.
Suggested answer: A, B, C
asked 18/09/2024
Corey Rivers
45 questions

Question 93

Report Export Collapse

Which of the following is a valid iSCSI name that can be used to set up the iSCSI connection between the initiator and target? (Multiple Choice)

iqn.1998-01.com.huawei.:namel
iqn.1998-01.com.huawei.:namel
iqn. 1998-01. com. huawei.iscshnamel
iqn. 1998-01. com. huawei.iscshnamel
eui.l2345678ABC
eui.l2345678ABC
eui.0123456789ABCDEF
eui.0123456789ABCDEF
Suggested answer: B, D
asked 18/09/2024
Nickolas Abbas
56 questions

Question 94

Report Export Collapse

Given this scenario. A company wants replication of data between two data centers that are 2000 km apart. Which replication method is most recommended?

Asynchronous
Asynchronous
Synchronous
Synchronous
Both Asynchronous and Synchronous will work.
Both Asynchronous and Synchronous will work.
Synchronous but ONLY if the link is a high speed 8 Gb/s fiber optical connection.
Synchronous but ONLY if the link is a high speed 8 Gb/s fiber optical connection.
Suggested answer: A
asked 18/09/2024
Ricardo de SÑ Carvalho
45 questions

Question 95

Report Export Collapse

Which of the following would best describe a virus?

When an employee goes against the company's ICY code of practice e.g. leaving workstation logged on.
When an employee goes against the company's ICY code of practice e.g. leaving workstation logged on.
A piece of malicious code that is written by programmers and is used to corrupt data and systems.
A piece of malicious code that is written by programmers and is used to corrupt data and systems.
When individuals or organizations break the law through using computers illegally access a computer system.
When individuals or organizations break the law through using computers illegally access a computer system.
Misuse of information provided by ICT systems for personal or malicious intentions.
Misuse of information provided by ICT systems for personal or malicious intentions.
Suggested answer: B
asked 18/09/2024
Jay Fletcher
54 questions

Question 96

Report Export Collapse

Multipathing software is only needed in SAN solutions with just a single switch.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
John Ordonez
33 questions

Question 97

Report Export Collapse

In high end storage systems, what is the main function of the service processor?

To manage the I/O commands and complete disk operations.
To manage the I/O commands and complete disk operations.
To process the network service.
To process the network service.
To maintain the interconnection of disk drives within the enclosures.
To maintain the interconnection of disk drives within the enclosures.
To optimize the speed of I/O operations.
To optimize the speed of I/O operations.
Suggested answer: A
asked 18/09/2024
CLINTON PLESS
45 questions

Question 98

Report Export Collapse

A differential backup holds all changes that were made since the last successful full backup.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Michael Amann
42 questions

Question 99

Report Export Collapse

In which stage of the lifecycle management of information and data, does the data management operation such as copying and backup occurs?

Generation.
Generation.
Transmission.
Transmission.
Maintenance.
Maintenance.
Usage.
Usage.
Suggested answer: C
asked 18/09/2024
Petros Kapouleas
50 questions

Question 100

Report Export Collapse

Match the operating system with the protocol. The operating systems include:1.Windows 2.Linux 3.Apple OSX; The protocols incude: A-NFS B - CIFS C - SMB

1-A; 2-C; 3-A.
1-A; 2-C; 3-A.
1 - B+C; 2 - A ; 3 - A .
1 - B+C; 2 - A ; 3 - A .
1 - A+D; 2 - A+B; 3 - A .
1 - A+D; 2 - A+B; 3 - A .
1 - C ; 2 - A+D; 3 - A.
1 - C ; 2 - A+D; 3 - A.
Suggested answer: B
asked 18/09/2024
Jonathan Correa
48 questions
Total 536 questions
Go to page: of 54