ExamGecko
Home Home / Huawei / H13-624

Huawei H13-624 Practice Test - Questions Answers, Page 24

Question list
Search
Search

Related questions











Which of the following is the correct power-on sequence of the Huawei distributed storage system?

A.
Cabinet-->Switch-->Node---KVM
A.
Cabinet-->Switch-->Node---KVM
Answers
B.
Cabinet-->KVM--Switch--->Node
B.
Cabinet-->KVM--Switch--->Node
Answers
C.
Cabinet-->Node-->KVM---Switch
C.
Cabinet-->Node-->KVM---Switch
Answers
D.
Cabinet-->Switch-->KVM-->Node
D.
Cabinet-->Switch-->KVM-->Node
Answers
Suggested answer: D

When planning and designing storage projects, which of the following are more basic stages ()

A.
Outline design stage
A.
Outline design stage
Answers
B.
Conceptual design stage
B.
Conceptual design stage
Answers
C.
Research phase
C.
Research phase
Answers
D.
Physical design stage
D.
Physical design stage
Answers
Suggested answer: A, B, C, D

In the synchronous remote replication of Huawei hybrid flash storage, the primary LU and the secondary LUN can be in the same array.

Column.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Regarding the HyperMetro static priority arbitration mode, the correct one is:

A.
The static priority mode has higher reliability than the quorum server mode.
A.
The static priority mode has higher reliability than the quorum server mode.
Answers
B.
When an inter-array link failure occurs, or a non-priority site fails, the LUN on the priority site continues Services will continue to be provided, and LUNs at non-priority sites will cease to provide services.
B.
When an inter-array link failure occurs, or a non-priority site fails, the LUN on the priority site continues Services will continue to be provided, and LUNs at non-priority sites will cease to provide services.
Answers
C.
When the priority site array is powered off for maintenance, the non-priority site array immediately takes over all active-active businesses The business will not be interrupted.
C.
When the priority site array is powered off for maintenance, the non-priority site array immediately takes over all active-active businesses The business will not be interrupted.
Answers
D.
When the priority site array fails, the non-priority site will automatically take over the activeactive service.
D.
When the priority site array fails, the non-priority site will automatically take over the activeactive service.
Answers
Suggested answer: B, C, D

What is wrong about the AK/SK authentication process among the following options:

A.
After single-selecting OceanStor9000 to retrieve SK, use the MD5 algorithm to request the content of Zhang He Encrypt and generate a signature.
A.
After single-selecting OceanStor9000 to retrieve SK, use the MD5 algorithm to request the content of Zhang He Encrypt and generate a signature.
Answers
B.
When the user initiates a data request, the SK and the requested content are encrypted using the IAC algorithm, and a signature is generated. name.
B.
When the user initiates a data request, the SK and the requested content are encrypted using the IAC algorithm, and a signature is generated. name.
Answers
C.
After OceanStor9000 receives the request and signature, it will check SK according to AK.
C.
After OceanStor9000 receives the request and signature, it will check SK according to AK.
Answers
D.
OceanStor9000 will compare the received signature with the signature calculated by the corresponding system.If yes, the authentication is passed.
D.
OceanStor9000 will compare the received signature with the signature calculated by the corresponding system.If yes, the authentication is passed.
Answers
Suggested answer: A

Huawei Distributed Storage Object Service provides finely controlled Qos capabilities, providing tenants, buckets Other TPS and bandwidth granular service quality control can precisely control which operations ()

A.
DELETEB. GET
A.
DELETEB. GET
Answers
B.
PUT
B.
PUT
Answers
C.
LIST
C.
LIST
Answers
Suggested answer: A, B, C

In the following options, the description of the bucket (Bucket) is incorrect.

A.
Bucket lifecycle management refers to the configuration of rules to realize that the bucket will be automatically deleted after a certain period of time The function of the object without client intervention.
A.
Bucket lifecycle management refers to the configuration of rules to realize that the bucket will be automatically deleted after a certain period of time The function of the object without client intervention.
Answers
B.
Buckets and Containers have similar functions, and both can be accessed through the network.
B.
Buckets and Containers have similar functions, and both can be accessed through the network.
Answers
C.
Buckets support nesting, thus avoiding a hierarchical container structure.
C.
Buckets support nesting, thus avoiding a hierarchical container structure.
Answers
D.
Bucket is a kind of container used to store objects. It can be regarded as a directory that can be accessed through the Internet.
D.
Bucket is a kind of container used to store objects. It can be regarded as a directory that can be accessed through the Internet.
Answers
Suggested answer: C

Regarding the application of the InfoStamper feature, which of the following multiple options are correct ()

A.
The anti-virus server reads files through snapshots, checks and kills viruses, and isolates them
A.
The anti-virus server reads files through snapshots, checks and kills viruses, and isolates them
Answers
B.
Snapshot avoids data loss caused by 2 failures, and supports fault-tolerant processing of comprehensive failure sub-health disks
B.
Snapshot avoids data loss caused by 2 failures, and supports fault-tolerant processing of comprehensive failure sub-health disks
Answers
C.
When the file data in the source directory is accidentally deleted, overwritten or invaded by a virus or other non-physical media When it is damaged, it can be restored through the files in the snapshot directory before the time of the failure.
C.
When the file data in the source directory is accidentally deleted, overwritten or invaded by a virus or other non-physical media When it is damaged, it can be restored through the files in the snapshot directory before the time of the failure.
Answers
D.
After the remote replication task is started, snapshots are created regularly at the set time interval, and then the snapshot time The data is synchronized to the slave, and only the incremental data between the current snapshot and the previous snapshot needs to be copied each time
D.
After the remote replication task is started, snapshots are created regularly at the set time interval, and then the snapshot time The data is synchronized to the slave, and only the incremental data between the current snapshot and the previous snapshot needs to be copied each time
Answers
Suggested answer: A, B, C

When deploying Huawei distributed storage, you can import the licenses of different service The type of service provided by the group (block, file, big data, object).

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Operation and maintenance engineer A consults the Huawei All-Flash Storage Manual about the process of hardware trusted and safe boot, The following sequence is correct () ?Verify Grub's signature public key ?Verify the status of the software signature certificate ?Verify and load Grub?Verify And load the OS

A.
????
A.
????
Answers
B.
????
B.
????
Answers
C.
????
C.
????
Answers
D.
????
D.
????
Answers
Suggested answer: D
Total 731 questions
Go to page: of 74