ExamGecko
Home Home / Huawei / H13-624

Huawei H13-624 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











Huawei Oceanstor 9000 storage system adopts hierarchical security maintenance. What is not the security content of the application layer?

A.
Password system
A.
Password system
Answers
B.
Authorization and authentication mechanism
B.
Authorization and authentication mechanism
Answers
C.
Use SSH/SFTP methods to avoid insecure network communication
C.
Use SSH/SFTP methods to avoid insecure network communication
Answers
D.
Activity record
D.
Activity record
Answers
Suggested answer: C

What sub-functions does the InfoProtecor of Oceanstor 9000 include? (Multiple choice)

A.
Protection of file data
A.
Protection of file data
Answers
B.
Snapshot
B.
Snapshot
Answers
C.
worm settings
C.
worm settings
Answers
D.
Protection of metadata
D.
Protection of metadata
Answers
E.
Data Recovery
E.
Data Recovery
Answers
F.
Physical sub-domain
F.
Physical sub-domain
Answers
Suggested answer: A, D, E, F

In the Huawei 0ceanstor 9000 software architecture, the distributed object storage layer is built on the basis of the distributed file storage layer.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

In scenarios where customers have high requirements for file read and write performance, if the performance calculation application scenario, the backend of Oceanstor 9000 has been With 10GE networking, what type of network should customers recommend for the front-end business network? (Multiple choice)

A.
0GE networking
A.
0GE networking
Answers
B.
Old network
B.
Old network
Answers
C.
GE networking
C.
GE networking
Answers
D.
FC networking
D.
FC networking
Answers
Suggested answer: A, B

Regarding the Huawei Oceanstor 9000 software version upgrade, the correct statement is: (multiple choice)

A.
In order to ensure uninterrupted business, the online upgrade needs to be upgraded node by node, so the cluster upgrade time is related to the number of nodes in the cluster.
A.
In order to ensure uninterrupted business, the online upgrade needs to be upgraded node by node, so the cluster upgrade time is related to the number of nodes in the cluster.
Answers
B.
There are multiple nodes in a cluster. After a node is successfully upgraded, Users can use the functions of this new upgraded version.
B.
There are multiple nodes in a cluster. After a node is successfully upgraded, Users can use the functions of this new upgraded version.
Answers
C.
When upgrading a node, if other nodes fail, some business data may be inaccessible
C.
When upgrading a node, if other nodes fail, some business data may be inaccessible
Answers
D.
Online upgrade can perform upgrade operations on all nodes in the cluster at the same time
D.
Online upgrade can perform upgrade operations on all nodes in the cluster at the same time
Answers
Suggested answer: A, C

A customer uses Huawei Oceanstor 9000 to store its massive files. In order to facilitate sharing among multiple departments, a Dedicated catalog. After running for a period of time, the storage resources became tense, analyze the reason is that some departments are overused 0ceanstor9000, so the customer can limit the use of space by setting quotas on the directories of these departments To ensure that other departments can use 0ceanstor 9000 storage resources normally

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

IDC's description of the characteristics of big data, which items are correct of? (Multiple choice)

A.
Volume-huge amount
A.
Volume-huge amount
Answers
B.
Variety-Diversity
B.
Variety-Diversity
Answers
C.
Value-value density
C.
Value-value density
Answers
D.
Variety-speed
D.
Variety-speed
Answers
Suggested answer: A, B, C, D

The Wushan file system in Oceanstor 9000 uses an object storage method, but only uses object storage for data.

Storage, object storage is not used for metadata

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Erasure Code N+M implemented in Oceanstor 9000

The principle of redundancy technology, which one is wrong in the following description?

A.
Oceanstor 9000 system can configure different data protection levels for different directories/files
A.
Oceanstor 9000 system can configure different data protection levels for different directories/files
Answers
B.
The data written into the Oceanstor 9000 system will be divided into chunks according to the size.
B.
The data written into the Oceanstor 9000 system will be divided into chunks according to the size.
Answers
C.
For every N chunks, calculate the check blocks of M chunks according to the ErasureCode algorithm
C.
For every N chunks, calculate the check blocks of M chunks according to the ErasureCode algorithm
Answers
D.
The utilization of the protected data space is about N/(N+M), and the reliability of the data is determined by the value of M. The larger the M, the higher the reliability
D.
The utilization of the protected data space is about N/(N+M), and the reliability of the data is determined by the value of M. The larger the M, the higher the reliability
Answers
Suggested answer: C

The correct statement about the Huawei Oceanstor 9000lnfoTier node pool is: (multiple choice)

A.
The node types in the node pool must be the same
A.
The node types in the node pool must be the same
Answers
B.
If it is an OPS intensive application scenario, it is better to configure P nodes in the node pool
B.
If it is an OPS intensive application scenario, it is better to configure P nodes in the node pool
Answers
C.
When the node pool is composed of P nodes, a node pool contains at least 3 nodes
C.
When the node pool is composed of P nodes, a node pool contains at least 3 nodes
Answers
Suggested answer: A, B, C
Total 731 questions
Go to page: of 74