ExamGecko
Home Home / Huawei / H13-629

Huawei H13-629 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











SQL Server database administrator found that SQL Server is running out of space, you want to delete unnecessary databases to get more space. Which of the following databases will be deleted once the database engine is abnormal or the upper business interruption?

A.
pubs
A.
pubs
Answers
B.
master
B.
master
Answers
C.
msdb
C.
msdb
Answers
D.
tempdb
D.
tempdb
Answers
Suggested answer: A, B, D

OceanStor V 3 storage SmartPatition can allocate independent cache space for different LUNs. The capacity of the cache space is read and write. use.

A.
Correct
A.
Correct
Answers
B.
mistakes
B.
mistakes
Answers
Suggested answer: B

Which of the following is incorrect regarding the VTL6900 data deduplication featuree?

A.
The SIR cluster of the VTL6900 supports global deduplication
A.
The SIR cluster of the VTL6900 supports global deduplication
Answers
B.
The deduplication start time of the VTL6900 can be controlled automatically according to the policy
B.
The deduplication start time of the VTL6900 can be controlled automatically according to the policy
Answers
C.
VTL6900 on the specified tape deduplication and remote replication is recommended at the same time
C.
VTL6900 on the specified tape deduplication and remote replication is recommended at the same time
Answers
D.
VTL6900 deduplicated tape to do data archiving, the physical tape library in the NC is still non-deduplicated data
D.
VTL6900 deduplicated tape to do data archiving, the physical tape library in the NC is still non-deduplicated data
Answers
Suggested answer: C

You are building out a large-scale FC storage network where all switches are cascaded. When multiple FC switches are cascaded, which of the following scenarios will cause the switch to isolate E_prot port? (multiple choice)

A.
FC switch Zone conflict
A.
FC switch Zone conflict
Answers
B.
FC switch IP address conflict
B.
FC switch IP address conflict
Answers
C.
FC Switch Switch Name conflict
C.
FC Switch Switch Name conflict
Answers
D.
FC switch domain ID conflict
D.
FC switch domain ID conflict
Answers
Suggested answer: A, C, D

Using Oracle backup, which must be backed?(multiple choice)

A.
Data files
A.
Data files
Answers
B.
archive log
B.
archive log
Answers
C.
Control Documents
C.
Control Documents
Answers
D.
operating environment (listener tns pfile or spfil, etc.)
D.
operating environment (listener tns pfile or spfil, etc.)
Answers
Suggested answer: A, B, C

The OceanStor 9000 log analysis tool is used to analyze the results of information collected and propose solutions to problems using on-site product maintenance tools. Which of the following statements are wrong regarding the use of log analysis tools? (Multiple choice)

A.
Log analysis tools can run on any PC, do not need to interoperate with the storage system, the analysis process time according to the amount of the log may be, may it takes a long time
A.
Log analysis tools can run on any PC, do not need to interoperate with the storage system, the analysis process time according to the amount of the log may be, may it takes a long time
Answers
B.
Log Analysis Tools After starting the analysis, the analysis tasks need to be stopped due to other reasons. Click on the analysis tool to abort this analysis
B.
Log Analysis Tools After starting the analysis, the analysis tasks need to be stopped due to other reasons. Click on the analysis tool to abort this analysis
Answers
C.
Engineer A deleted the original compression of the results of the collection, then the results will be collected to re-catalog the contents of all documents compressed into zip format for the dayChi analysis tools for analysis
C.
Engineer A deleted the original compression of the results of the collection, then the results will be collected to re-catalog the contents of all documents compressed into zip format for the dayChi analysis tools for analysis
Answers
D.
After the analysis is completed, all the problems caused by the log analysis will be presented in the list of problems, and "View Details" contains the approximate cause of the problem and processing advice
D.
After the analysis is completed, all the problems caused by the log analysis will be presented in the list of problems, and "View Details" contains the approximate cause of the problem and processing advice
Answers
Suggested answer: C, D

The system status indicator on controller B of an OceanStor V3 storage system is steady red. Which is the correct way to handle the fault?

A.
Log in to the management software or CLI and check whether controller B is online. If controller B is offline, restart it on the CLI. Observe the startup status on the CLI and record the startup exception page and error.
A.
Log in to the management software or CLI and check whether controller B is online. If controller B is offline, restart it on the CLI. Observe the startup status on the CLI and record the startup exception page and error.
Answers
B.
Log in to the management software or CLI and check whether controller B is online. If controller B is offline, reinsert it. Observe the startup status on the CLI and record the startup exception page and error.
B.
Log in to the management software or CLI and check whether controller B is online. If controller B is offline, reinsert it. Observe the startup status on the CLI and record the startup exception page and error.
Answers
C.
Connect to the serial port of controllerB. If port COM1 does not respond, controller B is faulty and needs to be replaced.
C.
Connect to the serial port of controllerB. If port COM1 does not respond, controller B is faulty and needs to be replaced.
Answers
D.
Log in to the management software or CLI and check whether controller B is online. If controller B is offline, run the resetsys command to restart controllerB.Observe the startup status on the CLI and record the startup exception pageand error.
D.
Log in to the management software or CLI and check whether controller B is online. If controller B is offline, run the resetsys command to restart controllerB.Observe the startup status on the CLI and record the startup exception pageand error.
Answers
Suggested answer: A

Which of the following statements about the Oceanstor V3 file system deduplication features are correct? (multiple choice)

A.
can only be opened when creating a file object, business can not be opened or closed during data deduplication and compression function
A.
can only be opened when creating a file object, business can not be opened or closed during data deduplication and compression function
Answers
B.
Using online processing to deduplicate data before it is written to disk
B.
Using online processing to deduplicate data before it is written to disk
Answers
C.
When both deduplication and compression are turned on, the data will be deduplicated and then compressed
C.
When both deduplication and compression are turned on, the data will be deduplicated and then compressed
Answers
D.
Use smart cache can accelerate the search performance of fingerprints deleted
D.
Use smart cache can accelerate the search performance of fingerprints deleted
Answers
Suggested answer: B, C

What kind of technology in an active-active disaster recovery solution can realize the traffic distribution between servers in different regions on the wide area network (including the Internet), keeping access quality with the best server from your nearest customer?

A.
GSLB
A.
GSLB
Answers
B.
VIP
B.
VIP
Answers
C.
SLB
C.
SLB
Answers
D.
GLB
D.
GLB
Answers
Suggested answer: A

Which of the following statements are a correct description of the CIFS agreement? (multiple choice)

A.
CIFS does not allow multiple clients to access
A.
CIFS does not allow multiple clients to access
Answers
B.
The CIFS client writes the shared file and does not write to the storage system immediately. Instead, the file is saved in the local cache and can be read again Improve read rate, improve performance
B.
The CIFS client writes the shared file and does not write to the storage system immediately. Instead, the file is saved in the local cache and can be read again Improve read rate, improve performance
Answers
C.
CIFS does not support anonymous transmission and shared authentication access
C.
CIFS does not support anonymous transmission and shared authentication access
Answers
D.
CIFS supports a variety of character sets to ensure CIFS can be used in all language systems
D.
CIFS supports a variety of character sets to ensure CIFS can be used in all language systems
Answers
Suggested answer: B, D
Total 364 questions
Go to page: of 37