ExamGecko
Home Home / Huawei / H13-629

Huawei H13-629 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











In a media application scenario, large files is an important application feature. Huawei OceanStor 9000 can allocate different configurations according to different users. This avoids some of the unimportant data transition overhead, which of the following description of the quota is correct?

A.
The types of quotas include capacity quota and file quota.
A.
The types of quotas include capacity quota and file quota.
Answers
B.
Quota methods include calculating quotas, soft quotas and mandatory quotas.
B.
Quota methods include calculating quotas, soft quotas and mandatory quotas.
Answers
C.
The system pre-allocates quotas for files before writing the file. When the user cancels the writing of the file being written, the system does not release a pre-allocated quota.
C.
The system pre-allocates quotas for files before writing the file. When the user cancels the writing of the file being written, the system does not release a pre-allocated quota.
Answers
D.
When the user continues to write data, the quota information has been used in the InfoAllocator interface real-time updates.
D.
When the user continues to write data, the quota information has been used in the InfoAllocator interface real-time updates.
Answers
Suggested answer: A

Set the soft quota and hard quota using the OceanStor V3 file system quota feature. During each IO writing operation, consumption of space capacity, if the number of files exceeds the soft quota is the first to be checked.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

When Replication Director creates a protection group to protect LUNs, you can see that there is no LUN on the interface. Which of the following may be the cause?

A.
There is a problem with the storage initiator configuration.
A.
There is a problem with the storage initiator configuration.
Answers
B.
There is a problem with the storage LUN configuration.
B.
There is a problem with the storage LUN configuration.
Answers
C.
There is a problem with the RD software configuration.
C.
There is a problem with the RD software configuration.
Answers
D.
There is a problem with the remote replication configuration.
D.
There is a problem with the remote replication configuration.
Answers
Suggested answer: D

Which of the following description of the infoLocker feature of Huawei's Ocenastor 9000 is incorrect?

A.
To prevent changes in the directory or file protection time because of the changes in cluster time, a directory or file is configured with WORM attributes. After the directory or file will use the WORM clock to time, set the WORM clock.When the system will be based on the clock, user's file will not be modified over the protection period.
A.
To prevent changes in the directory or file protection time because of the changes in cluster time, a directory or file is configured with WORM attributes. After the directory or file will use the WORM clock to time, set the WORM clock.When the system will be based on the clock, user's file will not be modified over the protection period.
Answers
B.
If the cluster time is earlier than the WORM clock, the WORM clock will be chased every hour for up to 138 seconds to adjust. If the cluster is after the WORM clock, the WORM clock adjusts to the cluster time.
B.
If the cluster time is earlier than the WORM clock, the WORM clock will be chased every hour for up to 138 seconds to adjust. If the cluster is after the WORM clock, the WORM clock adjusts to the cluster time.
Answers
C.
When a directory is configured as a WORM root directory, all subdirectories, new directories and new files in the directory automatically get the parent directory of WORM attributes. These attribute parameters can only be configuredwhen the WORM root directory is set. Only then the user's view can not be modified.
C.
When a directory is configured as a WORM root directory, all subdirectories, new directories and new files in the directory automatically get the parent directory of WORM attributes. These attribute parameters can only be configuredwhen the WORM root directory is set. Only then the user's view can not be modified.
Answers
D.
WORM logs are used to record the logs related to WORM operations and record them according to the time. The monthly log is a file that can be modified and can delete the file.
D.
WORM logs are used to record the logs related to WORM operations and record them according to the time. The monthly log is a file that can be modified and can delete the file.
Answers
Suggested answer: D

VxVM (veritas volume manager) in the N8500 clustered NAS system is located between the operating system and the data management system. The operating system provides an excuse service to access the disk, the physical storage device connected to the host and the level of the data management system provides a logical device. The Layers of logical devices are called VxVM volumes.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following description of the storage protocol is correct? (Multiple choice.)

A.
FC InfiniBand SAS PCI-edouble can be a carrier of the SCSI protocol
A.
FC InfiniBand SAS PCI-edouble can be a carrier of the SCSI protocol
Answers
B.
InfiniBand Transmission Speed "FC Transmission Speed" iSCSI transmission speed
B.
InfiniBand Transmission Speed "FC Transmission Speed" iSCSI transmission speed
Answers
C.
FCoE technology for GE and 10GE Ethernet
C.
FCoE technology for GE and 10GE Ethernet
Answers
D.
FCoE SAS InfiniBand has its own switch product
D.
FCoE SAS InfiniBand has its own switch product
Answers
Suggested answer: A, D

Customers in the process of using Simpana software, CS for some reason can not start normally. You need to restore the CS. Which of the following situations will cause the restoration to fail?

A.
The backup server and the ring server can not communicate properly
A.
The backup server and the ring server can not communicate properly
Answers
B.
The link between the backup server and the media server is faulty
B.
The link between the backup server and the media server is faulty
Answers
C.
Backup server SQL database failure
C.
Backup server SQL database failure
Answers
D.
DDB is abnormal
D.
DDB is abnormal
Answers
Suggested answer: C

Dual-live solution: the optical fiber link between two data centers in the same city needs to be deployed with a wavelength division device.

A.
10
A.
10
Answers
B.
25
B.
25
Answers
C.
50
C.
50
Answers
D.
100
D.
100
Answers
Suggested answer: B

The OceanStor 18000 system used by a client business application has a total of three pools, each of which is a 9-disk RAID5. Someday analyzing the log of business interruption, we found that there are some scenarios in the system that caused the failure. What will cause the host access to the stored business in the following scenario? (Multiple choice.)

A.
In the fully redundant group environment, occurred the master reset.
A.
In the fully redundant group environment, occurred the master reset.
Answers
B.
With the BST (bad track) feature turned off, a BST bad track appears on the LUN.
B.
With the BST (bad track) feature turned off, a BST bad track appears on the LUN.
Answers
C.
The POOL where the business is located is all thin LUN and not a snapshot. LUN copy, clone and copy services are configured in the log POOL, which is a space full of print information.
C.
The POOL where the business is located is all thin LUN and not a snapshot. LUN copy, clone and copy services are configured in the log POOL, which is a space full of print information.
Answers
D.
Log in the following print:2014-01-19 08:04:40} {Receive a disk-fault event of the disk (328) of pool (2) from ctrl.} 2014-01-19 08:40:35} {Receive a disk-fault event of the disk (613) of pool (3) from ctrl.}
D.
Log in the following print:2014-01-19 08:04:40} {Receive a disk-fault event of the disk (328) of pool (2) from ctrl.} 2014-01-19 08:40:35} {Receive a disk-fault event of the disk (613) of pool (3) from ctrl.}
Answers
Suggested answer: B, C

When the N8500 (V200R001) clustered NAS operating system is archived as a banknote imaging platform, the information about storage units and networks is set. Choose the correct statement.

A.
When the access to the N8500 is all on the intranet, and the client traffic is not equal, it is recommended to configure the "balance-alb" mode (that is, bond 6 mode).
A.
When the access to the N8500 is all on the intranet, and the client traffic is not equal, it is recommended to configure the "balance-alb" mode (that is, bond 6 mode).
Answers
B.
When creating a LUN, write business for a long time, the stripe depth recommended 512KB.
B.
When creating a LUN, write business for a long time, the stripe depth recommended 512KB.
Answers
C.
If the RAID group is configured as RAID 6, the number of member disks is recommended to be 9 disks, and it is not recommended to configure the RAID group.
C.
If the RAID group is configured as RAID 6, the number of member disks is recommended to be 9 disks, and it is not recommended to configure the RAID group.
Answers
D.
Fencing LUN should be placed in the same RAID group.
D.
Fencing LUN should be placed in the same RAID group.
Answers
Suggested answer: A
Total 364 questions
Go to page: of 37