ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 114 - H13-629 discussion

Report
Export

Which of the following description of the infoLocker feature of Huawei's Ocenastor 9000 is incorrect?

A.
To prevent changes in the directory or file protection time because of the changes in cluster time, a directory or file is configured with WORM attributes. After the directory or file will use the WORM clock to time, set the WORM clock.When the system will be based on the clock, user's file will not be modified over the protection period.
Answers
A.
To prevent changes in the directory or file protection time because of the changes in cluster time, a directory or file is configured with WORM attributes. After the directory or file will use the WORM clock to time, set the WORM clock.When the system will be based on the clock, user's file will not be modified over the protection period.
B.
If the cluster time is earlier than the WORM clock, the WORM clock will be chased every hour for up to 138 seconds to adjust. If the cluster is after the WORM clock, the WORM clock adjusts to the cluster time.
Answers
B.
If the cluster time is earlier than the WORM clock, the WORM clock will be chased every hour for up to 138 seconds to adjust. If the cluster is after the WORM clock, the WORM clock adjusts to the cluster time.
C.
When a directory is configured as a WORM root directory, all subdirectories, new directories and new files in the directory automatically get the parent directory of WORM attributes. These attribute parameters can only be configuredwhen the WORM root directory is set. Only then the user's view can not be modified.
Answers
C.
When a directory is configured as a WORM root directory, all subdirectories, new directories and new files in the directory automatically get the parent directory of WORM attributes. These attribute parameters can only be configuredwhen the WORM root directory is set. Only then the user's view can not be modified.
D.
WORM logs are used to record the logs related to WORM operations and record them according to the time. The monthly log is a file that can be modified and can delete the file.
Answers
D.
WORM logs are used to record the logs related to WORM operations and record them according to the time. The monthly log is a file that can be modified and can delete the file.
Suggested answer: D
asked 18/09/2024
Oliver Mark
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first