Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

H13-629_V2.0 Sample Questions Answers

Questions 4

True of False, N8500 volume mirroring function synchronization can be understood as a file system to do RAID 1 to achieve image protection This protection is done in two ways:

One Species is the mirror roll between showrooms, the display level of protection, a display failure, the business is not affected; the other is the mirror imagedisplay within the exhibition.

RAID level protection, a RAID group failure, the business will not be affected.

Options:

A.

True

B.

False

Buy Now
Questions 5

Which of the following are correct regarding a Storage Array RAID 2.0 Typical Application Performance Tuning? (multiple choice)

Options:

A.

Scenario: Sequencing large IO services, especially 1M IO scenarios, with the phenomenon thatthe back-end read bandwidth is much larger than the front-end read bandwidthTuning: Turn off the corresponding LUN prefetch policy

B.

scene: the order of pressure reading and writing business conditions, high utilization of hard drivesTuning means: increase the unplug-thresh device hard disk device

C.

Scenario: Oracle database in the operation of data backup, the data on the LUN bandwidth does not meet the requirements and accompanied by high utilization of hard diskTuning means: the formal creation of POOLto increase the depth of the points

D.

Scenario: In the case of single concurrent or low concurrent read service, the delay is found to be largeTuning means: change disk unplug 8 Modify unplug - thresh increased from 4 to 8

Buy Now
Questions 6

Which of the following statement regarding the Huawei disaster recoverysolution on the implementation of disaster recovery exercise is wrong?

Options:

A.

The disaster recovery walkthrough automatically stops the production application and unproduces the production to production host mapping on the deviceManager

B.

The application ofdisaster recovery drill is mainly about the production system to switch to disaster recovery operation, exercise disaster recovery environment is correct

C.

After the disaster recovery drills are executed, the replication relationship will be split, and the disaster recovery end will take over the production system running service

D.

The Drill process can be normal in the production side to stop the business, a quick move to a disaster recovery operation

Buy Now
Questions 7

Which of the following features is supported by OceanStor V3 Thin Lun? (Multiple choice)

Options:

A.

smart Erase

B.

smart Dedupe

C.

smart Compression

D.

Volume mirror

Buy Now
Questions 8

Which statement is true about RAID 2.0+?

Options:

A.

Chunks in a CKG may come from different types of disks.

B.

A LUN consists of extents or grains.

C.

Chunks in a CKG may come from the same disk.

D.

Chunks in a CKG may come from different storage pools.

Buy Now
Questions 9

The OceanStor V3 storage smart patition can allocate independent cache space for different LUNs. The capacity of the cache space is shared by both read and write operations.

Options:

A.

True

B.

False

Buy Now
Questions 10

When cache mirroring is enabled for the two controllers of an OceanStor V3 storage system, the two controllers have identical cache data and the failure of eithercontroller does not affect system services.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

Which ofthe following is correct about Huawei OceanStor v3 unified storage system? (Multiple choice.)

Options:

A.

Standalone SAN engine and stand-alone file engine

B.

Parallel dual-stack by way of parallel support (SAN) and file system (NAS)

C.

Use unified storage pool technology

D.

file system can achieve deduplication data compression function

Buy Now
Questions 12

In preparation for disaster recovery design, which of the following is correct?

Options:

A.

Use the same type of disk as the master

B.

Raid should be set the same as the master

C.

The capacity of Lun and primary LUN is the same

D.

Use the same number of disks as the master

Buy Now
Questions 13

In the scenario of protecting the database, the slave uses the virtual snapshot method to verify the services of the production end and the DR-sideand discover the data of the DR on the disaster recovery end. What are the possible reasons that the library can not start normally? (Multiple choice.)

Options:

A.

After a snapshot of the LUN of the redundancy site is created, the snapshot is not activated at thesame time.

B.

Disaster recovery side of the data stored in the cache, not yet written to the hard disk.

C.

When creating a snapshot on the disaster recovery end LUN, the production end is copying data to the disaster recovery end.

D.

The production end and disaster recovery end adopt the disaster recovery solution of incremental LUN copy, and the incremental data link is abnormal during the synchronization.

Buy Now
Questions 14

A customer deploys a set of OceanStor V3 storage in two cities and adopts asynchronous remote replication networking between the two storage arrays. Which of the following statement is correct? (Multiple choice.)

Options:

A.

The automatically created Asynchronous Remote Copy snapshot can either be a private quick pick or a public one.

B.

In a DR scenario, it is recommended to create a virtual snapshot of the secondary LUN and map it to the host for access.

C.

In remote replication link networking, parallel networking is better than crossover networking.

D.

The number of LUNs in the consistency group should be as small as possible, and only the LUNs that have write dependencies on the same application are placed in a consistency group.

Buy Now
Questions 15

The iSCSI protocol is mapped on the TCP protocol. For a TCP encapsulation of the iSCSI protocol packet, which of the following parts are not included?

Options:

A.

TCP Header

B.

IP Header

C.

ISCSI Header

D.

ISCSI data

Buy Now
Questions 16

Which of the following statement about RAID 2.0 is correct?(Multiple choice.)

Options:

A.

The hard disk is divided into chunks.

B.

Lun consists of extend or grain

C.

A CKG chunk may come from the same hard disk.

D.

Chunk in a CKG may come from a different storage pool.

Buy Now
Questions 17

Which ofthe following is the wrong mode of operation when checking on a problem with the VMFS datastore for ESXi5.5 using the VMware ondisk metadata analyzer (VOMA)? (Assume the LUN NAA ID is naa.60022a110009a8a800042e1800000000: 1).

Options:

A.

Turn off the power of allrunning virtual machines or migrate these virtual machines to another data store

B.

Use the esxcli storage vmfs extent list command to obtain the name and partition of the vmfs data store to be backed up after the provision of number of the supported devices.

C.

voma -m vmfs -f check -d /vmfs/devices/disks/naa.60022a110009a8a800042e1800000000:1

D.

voma -m vmfs -f check -d naa.60022a110009a8a800042e1800000000: 1

Buy Now
Questions 18

Users use vsphere 5.5 to build business virtualization. In the course of the operation it was found that a host was using too many SCSI reservations, leading to vmfsperformance degradation. What method can be used to eliminate the root cause of SCSI reservation conflicts? (Multiple choice.)

Options:

A.

Reduce the number of snapshots.

B.

Reduce the number of virtual machines per LUN.

C.

Increase the number of LUNs and limit the number of hosts accessing the same LUN.

D.

Change the type of virtual disk created.

Buy Now
Questions 19

True or False, the Huawei Oceanstor backup solution integration program is one machine.

Options:

A.

True

B.

False

Buy Now
Questions 20

What are the ways of load balancing cluster softwar on Oracle rac? (Multiple choice.)

Options:

A.

ClientBalance

B.

Cluster nodes balanced

C.

Service layer balance

D.

Instance load

Buy Now
Questions 21

Which of thefollowing are correct regarding the Huawei Oceanstro 9000 V100R001C30 products for video monitoring services? (multiple choice)

Options:

A.

To improve the reliability of the video data storage device, the user turns on the securevideo feature of the data disk using a 4 + 1 protection level

B.

The user turns on the securevideo feature, with two data corruptions if the data disk uses a 4 + 1 protection level and only 3 for a write operation

C.

Users open the securevideo feature data consistency scanning, the system does not complete the data files, will be cleaned up

D.

After the user turns on the securevideo feature, the file corruption event has been reported while reading and writing files, and the data recovery failure alarm is no longer reported

Buy Now
Questions 22

Which of the following describes the correct steps of an Oracle database backup?

1, backup oralce controlfile

2, backup oracle archive log

3, oralce placed in backup mode

4, oracle placed in normal mode

5, backup oracle data files

Options:

A.

3,5,2,1,4

B.

3,1,5,4,2

C.

3,5,2,4,1

D.

3,5,1,2,4

Buy Now
Questions 23

At thebeginning of the VTL6900 system input, you need to prepare the physical device. As shown in the figure, the VTL6900 is the cut-off point of a physical device node on the VTL console. On the physical equipment to prepare this step, which description is correct? (multiple choice)

Options:

A.

The equipment in the picture has completed the equipment preparation step

B.

The corresponding LUN in the figure is a LUN created on the service hard disk of the engine

C.

Change the equipment status is normal

D.

The process of preparing a physical device is the process of virtualizing a LUN mapped from an array, similar to a quick format

Buy Now
Questions 24

The water level refers to the percentage of total space used in the node pool, including the high water mark and read-only waterlevel. When the Huawei OceanStor 9000 passes the water level threshold to limit the file storage and migration, which of the following description is wrong:

Options:

A.

When the used space of the node pool reaches a high water level, the system reports an insufficient capacity alarm. By default, the alarm recovery threshold is 5% lower than the water level. That is, when the used space recovers below 80%, the alarm of insufficient capacity alarm recovery, the alarm threshold and the alarm recovery threshold can bemanually modified

B.

When the node pool's used space reaches high water level and spill over is selected, the pool of nodes forbids writing data to any other node pool or specified node pool to write data

C.

When the node pool's used space reacheshigh water level and no spill over is selected, the pool of nodes forbids writing data, and does not write data like other node pools

D.

When the used space of the node pool reaches the read-only watermark, the system reports an alarm. The alarm recovery threshold defaults to 0% lower than the low watermark, read-only reportPolice recovery.

Buy Now
Questions 25

While migrating data to HUAWEI Storage, SmartVirtualization- and SmartMigration-based migration includes the following steps: a. Changing mappings for the source storage; b. Stopping services; c. Taking over the source storage; d. Migrating data; e. Recovering services and applications. Which sequence correctly describes an online migration procedure?

Options:

A.

acbde

B.

baced

C.

abcde

D.

eacbd

Buy Now
Questions 26

Enable SmartMigration on OceanStor V3 and start a migration task with SmartMigration. Before migration, suppose the LUN ID and the data volume ID of the source LUN are 1 and 2 respectively while the LUN ID and the data volume ID of the destination LUN are 3 and 4 respectively, what are they after migration?

Options:

A.

Source LUN: 1 and 3Destination LUN: 2 and 4

B.

Source LUN: 1 and 4Destination LUN: 3 and 2

C.

Source LUN: 3 and 1Destination LUN: 4 and 2

D.

Source LUN: 2 and 4Destination LUN: 1 and 3

Buy Now
Questions 27

True or false, with RedHat 6 using the storage array Huawei S5500T, when the storage array and the host are directly connected, the storage array host port can select a P2Pnetwork topology.

Options:

A.

Correct

B.

mistakes

Buy Now
Questions 28

Client A is installed on the Oracle client, and now it has to visit the remote database host B. Whatshould you modify on the host A or B for this? (Multiple choice)

Options:

A.

listener.ora

B.

oracle user's profile file

C.

tnsnames.ora

D.

pfile parameter file

Buy Now
Questions 29

Which of the following about the multi-channel usage of Huawei OceanStor 9000 to SMB3 is correct? (multiple choice)

Options:

A.

The client must also support the SMB3.0 protocol

B.

Ifthe client has only one network port, you can not use the SMB3 function

C.

If the client has a GE network port with the same type and number of ports, when the client uses SMB3 to access Huawei OceanStor 900, the client will establish multiple connection channels with Huawei OceanStor 9000

D.

If the client has two or more GE and 10GE IB ports of the same type, after the SMB3 is applied, when one of them is disconnected from the network port, business will be interrupted.

Buy Now
Questions 30

In the mirroring scenario of OceanStor VIS6600T, an engineer detected an abnormal mirroring alarm on the VIS6600T. When you login to the ISM interface, you can view the mirror status of the volume in the corresponding logical disk group based on the alarm and find that the status of a volume in the mirror is NODEVICE.

The reason may be: (multiple choice)

Options:

A.

The disk on the array on which the failed mirrored volume failed

B.

Array where the failed mirrored volume is powered down

C.

The RAIDarray is degraded on the array where the failed mirrored volume is residing, and the hot spare is being rebuilt

D.

All optical links between the VIS 6600T and the array in which the failed mirror volume is located have failed

Buy Now
Questions 31

Which of the following statements replacing the storage array controller is wrong?

Options:

A.

Before plugging and unplugging the controller, make sure that the service is stopped or has switched to the peer controller

B.

Before switching services to the peer controller, check that the multipathing software in the system is installed and effective on the host.

C.

Confirm Cache dirty data has been saved

D.

Master-slave controller must be switched to be replaced controller for backup

Buy Now
Questions 32

Which of the following statemetns is correct about RAID10 and RAID5performance? (multiple choice)

Options:

A.

With continuous random read: RAID 5 performance is superior to RIAD10

B.

With sequential read and write, RAID 5 performance are better than RAID10

C.

With sequential write, RAID10 better than RAID5 performance

D.

With continuous random read, RAID 5 and RAID 10 performance is equal.

Buy Now
Questions 33

When using OceanStor V3, you need to mount the file system snapshot to access the snapshot data.

Options:

A.

True

B.

False

Buy Now
Questions 34

To cluster theserver's public IP address in an Oracle RAC deployment process, a private IP address is written to the / etc / hosts file, along with the Virtual IP address, cluster unique access IP address and public IP. Which of the following configuration is correct? (all subnet masks are 255.255.255.0)

Options:

A.

127.0.0.1 localhost129.22.221.200 cluster-scan129.22.221.201 node1129.22.221.211 node1-vip192.168.222.211 node1-priv129.22.221.202 node2129.22.221.212 node2-vip192.168.222.212 node2-priv

B.

127.0.0.1 localhost129.22.221.200 cluster-scan129.22.221.201 node1129.22.221.211 node1-vip192.168.222.211 node1-priv129.22.221.202 node2129.22.221.212 node2-vip192.168.221.212 node2-priv

C.

127.0.0.1 localhost129.22.222.200 cluster-scan129.22.221.201 node1129.22.221.211 node1-vip192.168.222.211 node1-priv129.22.221.202 node2129.22.221.212 node2-vip192.168.222.212 node2-priv

D.

127.0.0.1 localhost129.22.221.200 cluster-scan129.22.222.201 node1129.22.221.211 node1-vip192.168.222.211 node1-priv129.22.221.202 node2129.22.221.212 node2-vip192.168.222.212 node2-priv

Buy Now
Questions 35

TheOceanStor 9000 log analysis tool is used to analyze the results of information collected and propose solutions to problems using on-site product maintenance tools. Which of the following statements are wrong regarding the use of log analysis tools? (Multiple choice)

Options:

A.

Log analysis tools can run on any PC, do not need to interoperate with the storage system, the analysis process time according to the amount of the log may be, may it takes a long time

B.

Log Analysis Tools After starting the analysis, the analysis tasks need to be stopped due to other reasons. Click on the analysis tool to abort this analysis

C.

Engineer A deleted the original compression of the results of the collection, then the results will be collected to re-catalog the contents of all documents compressed into zip format for the dayChi analysis tools for analysis

D.

After the analysis is completed, all the problems caused by the log analysis will be presented in the list of problems, and "View Details" contains the approximate cause of the problem and processing advice

Buy Now
Questions 36

Which of the following are false about OceanStor V3 LUN copy and clone: (multiple choice)

Options:

A.

LUN copies and clones have the data of the original volume at the moment when the original data is initiated (or started) for the backup of the original data

B.

LUN copies and clones need to stop the host business during execution

C.

LUN copies andclones can both be executed in the same display

D.

Both LUN copies and clones can be incrementally synchronized

Buy Now
Questions 37

What kind of technology in an active-active disaster recovery solution can realize the traffic distribution between servers in different regions on the wide area network(including the Internet), keeping access quality with the best server from your nearest customer?

Options:

A.

GSLB

B.

VIP

C.

SLB

D.

GLB

Buy Now
Questions 38

True or False, all OceanStorUnified Storage Array disks have the ability to store dirty data after a sudden power failure

Options:

A.

True

B.

False

Buy Now
Questions 39

A research unit purchased a Huawei Oceanstor 9000 storage products, the mainconfiguration products: 8 * Oceanstor 9000 C node, the front end 10GE * 2, CE6850 switch * 2, S5700 switch * 1, cables, lighting and other accessories are fully furnished, households communication deployment program, prepared in advance a list of IP planning programs and IP requirements. Which of the following IP address is needed? (Multiple choice.)

Options:

A.

The customer needs to provide 16 IP addresses for Oceanstor 9000 system back-end IP and need to provide a gateway.

B.

Customers need to provide nine management network IP addresses, of which eight for IPMI management, one for OM management.

C.

The customer management network must be interoperable with the OceanStor 9000 InfoEqualize DNS IP to access the OceanStor 9000 storage.

D.

The client needs to provide49 IP addresses that can interoperate with client applications, 16 for the static front end, 32 for the dynamic front end, 1 for InfoWqualizer DNS IP.

Buy Now
Questions 40

Which of the following is incorrect regarding the VTL6900 data deduplication featuree?

Options:

A.

TheSIR cluster of the VTL6900 supports global deduplication

B.

The deduplication start time of the VTL6900 can be controlled automatically according to the policy

C.

VTL6900 on the specified tape deduplication and remote replication is recommended at the sametime

D.

VTL6900 deduplicated tape to do data archiving, the physical tape library in the NC is still non-deduplicated data

Buy Now
Questions 41

VxVM (veritas volume manager) in the N8500 clustered NAS system is located between the operating system and thedata management system. The operating system provides an excuse service to access the disk, the physical storage device connected to the host and the level of the data management system provides a logical device. The Layers of logical devices are called VxVM volumes.

Options:

A.

True

B.

False

Buy Now
Questions 42

An administrator creates two libraries (Library # 1, Library # 2) in the Consoleinterface and creates a storage policy using Library # 1, Policy # 1. The administrator wants the storage policy to be able to save the backup jobs in two libraries in turn. How the storage policy should be set?

(Multiple choice.)

Options:

A.

Add Library # 2 pathfor Policy # 1

B.

Configure the data path to "Use Alternate Data Paths" mode

C.

Set the data path to Round-Robin between Data Paths

D.

Configure the data path to "Use preferred Data Path" mode

Buy Now
Questions 43

Backup strategy development principles is based on which of the following (multiple choice)

Options:

A.

According to the importance of data measurement data backup frequency

B.

Measure the backup window based on changes

C.

According to the size of the data to measure the data retention period

D.

Accordingto measure the backup bandwidth

Buy Now
Questions 44

In a client application scenario, IO business model for the random read, the IO size is about 100K, and the depth of the storage array LUN stripe set to______.

Options:

A.

8K

B.

16K

C.

64K

D.

128K

Buy Now
Questions 45

When the storage controller BBU is damaged, the controller automatically sets the IO write policy to transparent and is locked to ensure data reliability. Before the fault is recovered, it can be forced to write back.

Options:

A.

True

B.

False

Buy Now
Questions 46

There are many services in the 8500 clustered NAS system that support system functions, such as NFS and CIFS basic service groups. Each service group is a collection ofresources, each resource has an agent responsible for managing these resources, the availability of these resources directly or indirectly affect the status of the service.

Which of the following is not an NFS service group resource agent?

Options:

A.

NIC

B.

HASHAdow

C.

disk

D.

IP

Buy Now
Questions 47

In the simpana-based backup solution, where can you the normal service log?

Options:

A.

CVMA. log

B.

CVNetcheck. log

C.

CVService. log

D.

CVD. Log

Buy Now
Questions 48

What are the commonhigh-risk operations with Linux? (Multiple choice.)

Options:

A.

rm delete file operation

B.

mkfs. ext3 format file system operation

C.

dd command

D.

Continue to write new data to the file system after the file system is damaged

Buy Now
Questions 49

Customers use Redhat Linux enterprise 6 LVM to manage user data disks in the cluster. When using pvmove data migration you can not enforce OK. What is a possible reason for this.

Options:

A.

Pvmove command does not support Linux cluster.

B.

Redhat Linux enterprise 6 version of lvm does not support the pvmove command.

C.

You need to install the cmirror package and run it on the cluster server.

D.

Need to lvm version down to 1.0 before using pvmove migration data.

Buy Now
Questions 50

Huawei Oceanstor 900 adopts erasure code technology to protect the data. If an office has six nodes, and the customer wants to have one office, what redundancy model protection level can be used? (Multiple choice.)

Options:

A.

4 + 3: 1

B.

6 + 3

C.

4 + 2

D.

12 + 3: 1

Buy Now
Questions 51

Simpana client failed to the perform backup task. When you view the task status, it reports the following error: libary mediaagent drive pool media

[]: Mount path is offlline advice: please check if the mount path is online and accessible "

What can cause this?

Options:

A.

Client offline

B.

Media Server Offline

C.

The client can not resolve the media server host name

D.

backup media failure

Buy Now
Questions 52

Assuming a customer's initial backup capacity of 1TB, theaverage daily data increment of 10G, with a backup strategy of once a week for all the equipment once a day from Tuesday to Sunday.

All reserve and additional backup data are stored for 4 weeks, regardless of deduplication / redundancy ratio / replication,etc. Calculate the required back-end.

The capacity should not be less than ______. This 1TB is calculated according to 1000G.

Options:

A.

4940G

B.

4280G

C.

5940G

D.

5280G

Buy Now
Questions 53

In a manual recoveryprocess, which of the following operations is not required? (Multiple choice.)

Options:

A.

Stop the current production business, delete the host mapping.

B.

Adding the remote device to the original production side array.

C.

With the disaster recovery array as themaster LUN and the original production array as the slave LUN, create the remote replication relationship between the DR and the production end and wait for the initial synchronization to be completed.

D.

Make an incremental synchronization.

E.

Delete theoriginal production array consistency group.

Buy Now
Questions 54

Which of the following statementsabout multi-plane system design of the Huawei Oceanstor unified storage system is correct?

Options:

A.

The service plane uses GE channels for data transmission.

B.

The service plane connects the host IO channel, disk IO channel and GE switching channel.

C.

Plane redundancy between each other, when the business plane fails, allowing the use of control plane transmission services.

D.

When the GE switch channel fails, you can use the PCIe switch channel as a backup data transmission channel.

Buy Now
Status:
Expired , and Replaced By
Exam Code: H13-629_V2.0
Exam Name: HCIE-Storage (Written)v2.0
Last Update: Apr 14, 2023
Questions: 363
$64  $159.99
$48  $119.99
$40  $99.99
buy now H13-629_V2.0