ExamGecko
Home Home / Huawei / H13-624

Huawei H13-624 Practice Test - Questions Answers, Page 35

Question list
Search
Search

Related questions











In the era of big data, you should also have big data thinking. Which one of the following statements is incorrect?

A.
In the era of big data, data processing and analysis no longer rely on random samples
A.
In the era of big data, data processing and analysis no longer rely on random samples
Answers
B.
In the era of big data, we should be keen to pursue data accuracy. C. In the era of big data, the processing and analysis of big data is more inclined to predict what will happen.
B.
In the era of big data, we should be keen to pursue data accuracy. C. In the era of big data, the processing and analysis of big data is more inclined to predict what will happen.
Answers
Suggested answer: B

In the Huawei Oceanstor 9000 system, a file pool refers to a collection of files that meet certain characteristics. The file pool policy defines The rules of how the file pool is stored in the node pool.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

In a 0ceanstor 9000 system, the total number of nodes is 10, and the data protection level that can be configured for it can be: (multiple choice)

A.
4+5
A.
4+5
Answers
B.
6+3
B.
6+3
Answers
C.
6+4
C.
6+4
Answers
D.
6+5
D.
6+5
Answers
Suggested answer: B, C

Which of the following descriptions of the software components of the Huawei 0 ceanstor 9000 product is correct?

A.
NDMP backup requires license support
A.
NDMP backup requires license support
Answers
B.
InfoStamper supports creating a snapshot of the root directoryThe C.ceanstor9000 system defaults to load in a round-robin manner
B.
InfoStamper supports creating a snapshot of the root directoryThe C.ceanstor9000 system defaults to load in a round-robin manner
Answers
C.
InfoAllocator controls the user's use of storage space by capacity or number of files
C.
InfoAllocator controls the user's use of storage space by capacity or number of files
Answers
Suggested answer: C

For the NDMP feature of 0ceanstor9000 product, which of the following Is the description of each option incorrect?

A.
The NDMP protocol supported by Oceanstor 9000 is V4
A.
The NDMP protocol supported by Oceanstor 9000 is V4
Answers
B.
NDMP backup features need to be purchased and can be used
B.
NDMP backup features need to be purchased and can be used
Answers
C.
The NDMP feature of Oceanstor 9000 uses snapshot-based backup by default
C.
The NDMP feature of Oceanstor 9000 uses snapshot-based backup by default
Answers
D.
In data protection scenarios and archiving scenarios, NDMP features can be used
D.
In data protection scenarios and archiving scenarios, NDMP features can be used
Answers
Suggested answer: B

Which one of the following options incorrectly describes the Huawei Oceanstor 9000 file pool strategy?

A.
create strategy is used to determine the initial placement location of the file when creating a file system file. The conditions of this type of strategy include storage path, file File name, UID/GID
A.
create strategy is used to determine the initial placement location of the file when creating a file system file. The conditions of this type of strategy include storage path, file File name, UID/GID
Answers
B.
Nodes can be classified as required, and the load balancing system for each partition supports the configuration of independent load strategies and independent access domains. First name
B.
Nodes can be classified as required, and the load balancing system for each partition supports the configuration of independent load strategies and independent access domains. First name
Answers
C.
Load balancing strategy can be based on: CPU, memory, bandwidth, number of network connections, node capacity value
C.
Load balancing strategy can be based on: CPU, memory, bandwidth, number of network connections, node capacity value
Answers
D.
Oceanstor 9000's load balancing service support; round robin
D.
Oceanstor 9000's load balancing service support; round robin
Answers
Suggested answer: B

What is wrong about the AK/SK authentication process among the following options:

A.
After single-selecting OceanStor9000 to retrieve SK, use the MD5 algorithm to request the content of Zhang He Encrypt and generate a signature.
A.
After single-selecting OceanStor9000 to retrieve SK, use the MD5 algorithm to request the content of Zhang He Encrypt and generate a signature.
Answers
B.
When the user initiates a data request, the SK and the requested content are encrypted using the IAC algorithm, and a signature is generated name.
B.
When the user initiates a data request, the SK and the requested content are encrypted using the IAC algorithm, and a signature is generated name.
Answers
C.
After OceanStor9000 receives the request and signature, it will check SK according to AK.
C.
After OceanStor9000 receives the request and signature, it will check SK according to AK.
Answers
D.
OceanStor9000 will compare the received signature with the signature calculated by the corresponding system.If yes, the authentication is passed.Formula, CPU used, number of node connections
D.
OceanStor9000 will compare the received signature with the signature calculated by the corresponding system.If yes, the authentication is passed.Formula, CPU used, number of node connections
Answers
Suggested answer: A

In Oceanstor 9000, if the data protection level is set to 4+2, the corresponding metadata will generate 3 copies of the same Of the mirror.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Single choice In Oceanstor 9000, what is the wrong understanding of WushanFS global cache technology?

A.
Global Cache in wushanFS will all storage servers
A.
Global Cache in wushanFS will all storage servers
Answers
B.
The data in the cache of a node cannot be hit by the read and write services of other nodes
B.
The data in the cache of a node cannot be hit by the read and write services of other nodes
Answers
C.
Global cache technology helps to improve node memory resource sharing
C.
Global cache technology helps to improve node memory resource sharing
Answers
D.
wushanFS uses distributed locks to realize global cache data management. The same business data is only cached in one node. When other nodes When you need to access the data, obtain the cached data by applying for a lock
D.
wushanFS uses distributed locks to realize global cache data management. The same business data is only cached in one node. When other nodes When you need to access the data, obtain the cached data by applying for a lock
Answers
Suggested answer: B

What are the necessary components included in the architecture of the N80OONAS system?

(multiple choice)

A.
Disk array
A.
Disk array
Answers
B.
NAS engine
B.
NAS engine
Answers
C.
Data sharing network equipment
C.
Data sharing network equipment
Answers
D.
FC switch
D.
FC switch
Answers
Suggested answer: A, B, C
Total 731 questions
Go to page: of 74