ExamGecko
Home Home / Huawei / H13-624

Huawei H13-624 Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

Related questions











During the maintenance of the Huawei Oceanstor 9000 system, a dedicated person is required to keep the system root password. Pay attention to the password when passing the password.

Try to avoid sending passwords via email.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The authentication methods supported by Huawei Oceanstor 9000CIFS sharing include: (multiple choice)

A.
Local user authentication
A.
Local user authentication
Answers
B.
AD domain user authentication
B.
AD domain user authentication
Answers
C.
NIS domain authentication
C.
NIS domain authentication
Answers
D.
LDAP authentication
D.
LDAP authentication
Answers
Suggested answer: A, B

Among the node types of Oceanstor 9000, there is no need to consider that the node of the singleselect IPMI management network is the C72 node.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

When a user uses Systemreporter to analyze his production equipment and selects Oceanstor 9000, he finds some nodes in a certain partition The CPU utilization rate exceeds 80%, but the average CPU utilization rate is about 50%. In addition, it is found that the read and write bandwidth of a node has always been kept at a constant level.

More than 80% of the performance specifications, while other nodes are below 60%. In this scenario, which load balancing strategy is recommended?

A.
Round Robin
A.
Round Robin
Answers
B.
By CPU utilization
B.
By CPU utilization
Answers
C.
By node throughput
C.
By node throughput
Answers
D.
Comprehensive negative answer by node
D.
Comprehensive negative answer by node
Answers
Suggested answer: D

In the era of big data, various industries will encounter challenges in the process of data processing.

What challenges will the public security criminal investigation industry encounter? (multiple choices)

A.
The number of videos is large and the manual operation is time-consuming.
A.
The number of videos is large and the manual operation is time-consuming.
Answers
B.
Poor real-time analysis ability, which affects the speed of solving crimes
B.
Poor real-time analysis ability, which affects the speed of solving crimes
Answers
C.
The image format is not uniform and the query efficiency is low
C.
The image format is not uniform and the query efficiency is low
Answers
D.
Data fragmentation, lack of effective data sharing
D.
Data fragmentation, lack of effective data sharing
Answers
Suggested answer: A, B, C, D

Which of the following types of nodes provided by Huawei Oceanstor 9000 include? (Multiple choices)

A.
High-performance storage nodes
A.
High-performance storage nodes
Answers
B.
Large-capacity archive node
B.
Large-capacity archive node
Answers
C.
Data storage node D.Data processing node Answer
C.
Data storage node D.Data processing node Answer
Answers
Suggested answer: A, B

Scale-out is an architecture for horizontal expansion. This architecture mainly responds to the needs of rapid data growth and complex changes.

And challenges. Which of the following options are included in the characteristics of the Scale-out architecture? (multiple choice)

A.
Distributed processing
A.
Distributed processing
Answers
B.
Online expansion
B.
Online expansion
Answers
C.
Data sharing
C.
Data sharing
Answers
D.
Clustering
D.
Clustering
Answers
Suggested answer: A, B, C, D

In the Oceanstor 9000 system, if a node is offline for 2 days due to a power module failure, it returns to normal again.

If the administrator does not manually restore the data of the node, the system will automatically update the data that has changed during the offline period to this node.

Restore the normal node.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The first description of the following commands for network detection on the switch side: The display Inter command can be used to view interface statistics.

Check whether the switch records packet loss on the interface. The second description: display logbuf, if discarding, pay attention to the back-end networking Whether there is a loop.

A.
Both descriptions are correct
A.
Both descriptions are correct
Answers
B.
The first one is correct, the second one is wrong
B.
The first one is correct, the second one is wrong
Answers
C.
The first one is wrong, the second one is correct
C.
The first one is wrong, the second one is correct
Answers
D.
Both are wrong
D.
Both are wrong
Answers
Suggested answer: A

Which of the following technologies can be used to manage secure access to the N8500 NFS share?

(multiple choice)

A.
AD
A.
AD
Answers
B.
NIS
B.
NIS
Answers
C.
LDAP
C.
LDAP
Answers
D.
Homedir
D.
Homedir
Answers
Suggested answer: B, C
Total 731 questions
Go to page: of 74