OceanStor 18000 hot backup strategy is set to high, all using 1TB hard drive when the hard disk domain, respectively, eight hard drives, 80 hard drives, 180 Hard disk, 280 hard disk, the system will be assigned how much hot spare space, in Terabytes?
Backup strategy development principles is based on which of the following (multiple choice)
To cluster the server's public IP address in an Oracle RAC deployment process, a private IP address is written to the / etc / hosts file, along with the Virtual IP address,cluster unique access IP address and public IP. Which of the following configuration is correct? (all subnet masks are 255.255.255.0)
Which of the following statements are a correct description of the CIFS agreement? (multiple choice)
There are many services in the 8500 clustered NAS system that support system functions, such as NFS and CIFS basic service groups. Each service group is a collection of resources, each resource has an agent responsible for managing these resources, the availability of these resources directly or indirectly affect the status of the service.
Which of the following is not an NFS service group resource agent?
In an active-active disaster recovery solution configured with inter-site FC switch connection. When the distance between sites exceeds _____ km, you need toconfigure long-distance transmission.
Which of the followingdescription for Thin LUNs and Thick LUNs for OceaStor V3 storage is true?
OceanStor V3 storage resources are mapped to the bare devices on the host. The host creates a dedicated file system on the host. The testtool is used in the file system. The system produces a large number of 13KB size files, you randomly read these files to test the response time. Changing the prefetch length of 16KB can improve system performance in this case.
A research unit purchased a Huawei Oceanstor 9000 storage products, the main configuration products: 8 * Oceanstor 9000 C node, the front end 10GE * 2, CE6850 switch * 2, S5700 switch * 1, cables, lighting and other accessories are fully furnished, households communication deployment program, prepared in advance a list of IP planning programs and IP requirements. Which of the following IP address is needed? (Multiple choice.)
Huawei two nodesStandard Edition N8500, opened the CIFS service. Which of the following CIFS parameters prevents users from seeing other users in the table of Contents?
True of False, N8500 volume mirroring functionsynchronization can be understood as a file system to do RAID 1 to achieve image protection This protection is done in two ways:
One Species is the mirror roll between showrooms, the display level of protection, a display failure, the business is notaffected; the other is the mirror image display within the exhibition.
RAID level protection, a RAID group failure, the business will not be affected.
Trueor False, in a Huawei Oceanstro V3 smartVirtualization, eDevLUN and external LUNs are a one-to-one correspondence
In a clustered environment, data is placed on the shared storage, and identities between peers are equal and have the same access to the data. It is required that the clusterware have a control mechanism for concurrent access to such peer permissions. In Oracle RAC, you use the _____ mechanism to do multiple node-to-node collisions control of access.
In acustomer environment with SuSE 10SP3, HBA QLogic QLE2562, using the operating system comes with HBA card driver. The storage array is Huawei OceanStor V3 storage. When storing the FC host port on the system and the HBA on the host. When the card port modeis inconsistent, it is usually recommended to modify the FC host port mode on the storage side to solve the problem.
Existing set customer of database uses a raw device, due to the large amount of data inthe database. The customer plans to replace the old storage with new storage devices.
In the process of environmental inspection lvcb engineers found the following:
#getlvcb -TA sjklv
Intrapolicy =
copies = 0
interpolicy =
lvid =
lvname =
label =
machine id =
number Ips = 0
relocatable =
strict =
stripe width = 0
stripe size in exponent = 0
type =
upperbound = 0
fs =
time created = time modified =
As the vg is too large, the expansion of vg is impossible. As the service window is very short, and customersdo not want to avoid the risk of large adjustments of the whole original environment, what is the recommended approach?
The OceanStor 18000 system used by a client businessapplication has a total of three pools, each of which is a 9-disk RAID5. Someday analyzing the log of business interruption, we found that there are some scenarios in the system that caused the failure. What will cause the host access to the stored business in the following scenario? (Multiple choice.)
When Replication Director creates a protection group to protect LUNs, you can see that there is no LUN on the interface. Which of the following may be the cause?
SQL Server database administrator found that SQL Server is running out of space, you want to delete unnecessary databases to get more space.
Which of the following databases will be deleted once the database engine is abnormal or the upper business interruption?
If you need to automate the DR protection of an Oracle database in Replication Director, theconfiguration flow is:
A user configures Huawei OceanStor 9000 as follows:
1. Create a user group group01, group01 in the directory / home / group01 configuration like:
Recommended threshold: 10GB, software threshold: 15GB, grace period 10 days hard threshold 20GB
2. Create useruser01 in the user group group01. The configuration of the user user01 in the directory / home / group01 is as follows:
The recommended threshold is 8GB
Software threshold 18GB
Grace period of 15 days
Hard threshold 25GB
The quota that user01 is in the directory / home / group01 is:
In a Huawei disaster preparedness plan using production site deployment with an oracle RAC cluster, to ensure that the disaster recovery database provides normal service should the production site fail, which of the following statements is correct?
Simpana client failed to the perform backup task. When you view the task status, it reports the following error: libary mediaagent drive pool media
[]: Mount path is offlline advice: please check if the mount path is online and accessible "
What can cause this?
In simpana backup software, incremental backup means_______.
Which of thefollowing statement about RAID 2.0 is correct? (Multiple choice.)
Which of the following is the wrong mode of operation when checking on a problem with the VMFS datastore for ESXi5.5 using the VMware ondisk metadata analyzer (VOMA)? (Assume the LUN NAA ID is naa.60022a110009a8a800042e1800000000: 1).
Disaster recovery project information research mainly includes information about who, what, and why. What is the following information background? (multiple choice)
Database applications are one of the important applications supporting storage arrays.
Different application configurations and parametersettings may affect the service performance. In order to store arrays (such as OceanStor V3 series storage) with SQL server applications with the best performance, which of the following statements is wrong:
Which of the following copy is supported by OceanStor V3 remote file system?
In the OceanStor 18000 storage system, a 15K RPM SAS disk is used. Assuming that the averageseek latency of this type of disk is 6 ms. which type of disk can provide a single disk IOPS?
For commonly used SQL Server 2005 and 2008, users can connect to the specified server through the SQL Server Management Studio tool Database Engine. There are two connections in the connection group authentication method. Which client application connection method can provide the required landing User ID and password?
What are the common high-riskoperations with Linux? (Multiple choice.)
Using non-deduplication storage based on the disk library strategy, data recovery fails after the data life of the backup has expired. What is areason for this?
The Redhat Linux Enterprise 6 cp command is used to complete the operating system data migration. What steps are needed to verify the transfer? (Multiple choice.)
The client environment is the HP-UX11i v2 operating system, the HBA is the AD193A, and the operating system comes with the driver. The storage array is Huawei OceanStor V3. When the LUN mapping between HP-UX and the storage system is completed, you can not change the topology mode of the FC host interface card on the storage system.
During the migration of SAN storage by LVM from AIX, the data migration designer is in a very important stage. Prior to accessing new devices, there are a number of issues that needs to be considered to help with data migration design, including: (Multiple choice.)
Choose the correct statement regarding the N8000 clustered NAS system that provides file system sharing services, surface VxFS file system, and roll features.
Using Simpana for backup, you set this policy as follows: The retention period of data is 15 days and 2 periods, once every 10 days. How many days will data be retained after the failure?
A company’s daily real-time online transaction data is about 500G and 30G daily new data, the new data is frequently called within a week after the production.
The company employees 80people, each person's mailbox space is 5G, and the average space utilization rate is 60%. For a six months demand, A company should configure which of the following?
Huawei HyperMetro active-active disaster recovery supports heterogeneous storage. Therefore, an OceanStor V3 storage system and a Huawei certified third-party storage system can work in active-active mode based on HyperMetro.
VIPs inOracle a RAC systems are created by VIPca scripts during the final stages of installing clusterware and are registered as CRS resources and bind to the public network card for each node.
A customer requires 60 TB of storage space available on an OceanStor V3 storage system to store service data. How many disks will be used if the customer installs 600 GB 15K RPM SAS disks and creates a pool with RAID 5 (8D+1P) using a low hot spare policy? (Select the closest number without considering the required data protection space.)
Erasure code redundancy technology is a data file is divided into ODC (M logo) equal length data blocks, generated by encoding RDC. Any ofthe RDC fragments can be restored out of the original file, which can tolerate up to ODC node failure, to achieve the purpose of data protection.
What are the precautions for VTL6900 product division? (Multiple choice)
Which documents must beread for an Oralce database normal start? (Multiple choice)
When configuring the protection level of Huawei OceanStor 9000 directory, if the data protection level is set to 4 + 2, the corresponding metadata will generate 3 copies of the same mirror.
Mainstream virtualization technologies include hardware virtualization (Hypervisors) and operating system virtualization (Containers). Which are key characteristics of hardware virtualization?
(Multiple Choice)
In a Huawei OceanStor 9000 V100R001C30, in order to experiment with the video surveillance functions of multiple Huawei OceanStor 9000 product you need to install UniformView software. Which ofthe following statements is wrong?
Which statements are true about Huawei OceanStor V3 HyperMirror feature? (Multiple Choice)
In the same operating system environment, what is the order to restore the oracle database through RMAN?
A file system in a clustered NAS system performs heartbeat synchronization between nodes. When the heartbeat is interrupted, the N8000 cluster is split intomultiple small groups, resulting in data loss. The N8000 provides a fencing function to avoid the occurrence of the split-brain issue. Which of the following descriptions of the role of fencing correct?
After the Cache mirror function between two controllers in the Ocenanstro T series storage array is enabled, the data of the two controllers and the cache are completely the same and a single controller failure does not affect data availability.
The following description of the AIX system command is incorrect:
Info Replication supports copying the data at the same time using the home directory, extended attributes, ACL (access control list), WORM, and CIFS. NFS configuration information is also copied to the slave. When a disaster occurs, the master and slave stations can quickly take over after the switchover.
Zone change on a FC switch will send the switch to send RSCN to the device in a Zone. Which fabric service is responsible for collecting the status of the fabric change information?