ExamGecko
Home Home / Huawei / H13-611

Huawei H13-611 Practice Test - Questions Answers, Page 10

Question list
Search
Search

Which of the following is the end that receives and processes the SCSI commands?

A.
LUN.
A.
LUN.
Answers
B.
Storage.
B.
Storage.
Answers
C.
Target.
C.
Target.
Answers
D.
Initiator.
D.
Initiator.
Answers
Suggested answer: C

Dual-switch networking is widely applied in Fibre Channel SANs. Which of the following are its characteristics? (Multiple Choice)

A.
Two Fibre Channel switches are deployed in a SAN for connecting to the two controllers of a storage device.
A.
Two Fibre Channel switches are deployed in a SAN for connecting to the two controllers of a storage device.
Answers
B.
Per host two fibre channel ports should be available. The two Fibre Channel ports connect to two Fibre Channel switches.
B.
Per host two fibre channel ports should be available. The two Fibre Channel ports connect to two Fibre Channel switches.
Answers
C.
The ports on the two Fibre Channel switches connecting to the hosts and storage device must reside in the same zone.
C.
The ports on the two Fibre Channel switches connecting to the hosts and storage device must reside in the same zone.
Answers
D.
As multiple paths exist, the dual switch networking mode supports link redundancy but does not support load balancing.
D.
As multiple paths exist, the dual switch networking mode supports link redundancy but does not support load balancing.
Answers
Suggested answer: A, B, C

Which of the following is a valid iSCSI name that can be used to set up the iSCSI connection between the initiator and target? (Multiple Choice)

A.
iqn.1998-01.com.huawei.:namel
A.
iqn.1998-01.com.huawei.:namel
Answers
B.
iqn. 1998-01. com. huawei.iscshnamel
B.
iqn. 1998-01. com. huawei.iscshnamel
Answers
C.
eui.l2345678ABC
C.
eui.l2345678ABC
Answers
D.
eui.0123456789ABCDEF
D.
eui.0123456789ABCDEF
Answers
Suggested answer: B, D

Given this scenario. A company wants replication of data between two data centers that are 2000 km apart. Which replication method is most recommended?

A.
Asynchronous
A.
Asynchronous
Answers
B.
Synchronous
B.
Synchronous
Answers
C.
Both Asynchronous and Synchronous will work.
C.
Both Asynchronous and Synchronous will work.
Answers
D.
Synchronous but ONLY if the link is a high speed 8 Gb/s fiber optical connection.
D.
Synchronous but ONLY if the link is a high speed 8 Gb/s fiber optical connection.
Answers
Suggested answer: A

Which of the following would best describe a virus?

A.
When an employee goes against the company's ICY code of practice e.g. leaving workstation logged on.
A.
When an employee goes against the company's ICY code of practice e.g. leaving workstation logged on.
Answers
B.
A piece of malicious code that is written by programmers and is used to corrupt data and systems.
B.
A piece of malicious code that is written by programmers and is used to corrupt data and systems.
Answers
C.
When individuals or organizations break the law through using computers illegally access a computer system.
C.
When individuals or organizations break the law through using computers illegally access a computer system.
Answers
D.
Misuse of information provided by ICT systems for personal or malicious intentions.
D.
Misuse of information provided by ICT systems for personal or malicious intentions.
Answers
Suggested answer: B

Multipathing software is only needed in SAN solutions with just a single switch.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

In high end storage systems, what is the main function of the service processor?

A.
To manage the I/O commands and complete disk operations.
A.
To manage the I/O commands and complete disk operations.
Answers
B.
To process the network service.
B.
To process the network service.
Answers
C.
To maintain the interconnection of disk drives within the enclosures.
C.
To maintain the interconnection of disk drives within the enclosures.
Answers
D.
To optimize the speed of I/O operations.
D.
To optimize the speed of I/O operations.
Answers
Suggested answer: A

A differential backup holds all changes that were made since the last successful full backup.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

In which stage of the lifecycle management of information and data, does the data management operation such as copying and backup occurs?

A.
Generation.
A.
Generation.
Answers
B.
Transmission.
B.
Transmission.
Answers
C.
Maintenance.
C.
Maintenance.
Answers
D.
Usage.
D.
Usage.
Answers
Suggested answer: C

Match the operating system with the protocol. The operating systems include:1.Windows 2.Linux 3.Apple OSX; The protocols incude: A-NFS B - CIFS C - SMB

A.
1-A; 2-C; 3-A.
A.
1-A; 2-C; 3-A.
Answers
B.
1 - B+C; 2 - A ; 3 - A .
B.
1 - B+C; 2 - A ; 3 - A .
Answers
C.
1 - A+D; 2 - A+B; 3 - A .
C.
1 - A+D; 2 - A+B; 3 - A .
Answers
D.
1 - C ; 2 - A+D; 3 - A.
D.
1 - C ; 2 - A+D; 3 - A.
Answers
Suggested answer: B
Total 536 questions
Go to page: of 54