Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Huawei H13-629 Dumps Questions Answers

Page: 1 / 14
Total 364 questions

HCIE-Storage (Written) Questions and Answers

Question 1

OceanStor 18000 hot backup strategy is set to high, all using 1TB hard drive when the hard disk domain, respectively, eight hard drives, 80 hard drives, 180 Hard disk, 280 hard disk, the system will be assigned how much hot spare space, in Terabytes?

Options:

A.

1,7,8,9

B.

1,7,15,24

C.

1,4,8,9

D.

1,5,7,9

Buy Now
Question 2

Backup strategy development principles is based on which of the following (multiple choice)

Options:

A.

According to the importance of datameasurement data backup frequency

B.

Measure the backup window based on changes

C.

According to the size of the data to measure the data retention period

D.

According to measure the backup bandwidth

Question 3

To cluster the server's public IP address in an Oracle RAC deployment process, a private IP address is written to the / etc / hosts file, along with the Virtual IP address,cluster unique access IP address and public IP. Which of the following configuration is correct? (all subnet masks are 255.255.255.0)

Options:

A.

127.0.0.1 localhost129.22.221.200 cluster-scan129.22.221.201 node1129.22.221.211 node1-vip192.168.222.211 node1-priv129.22.221.202 node2129.22.221.212 node2-vip192.168.222.212 node2-priv

B.

127.0.0.1 localhost129.22.221.200 cluster-scan129.22.221.201 node1129.22.221.211 node1-vip192.168.222.211 node1-priv129.22.221.202 node2129.22.221.212 node2-vip192.168.221.212 node2-priv

C.

127.0.0.1 localhost129.22.222.200 cluster-scan129.22.221.201 node1129.22.221.211 node1-vip192.168.222.211 node1-priv129.22.221.202 node2129.22.221.212 node2-vip192.168.222.212 node2-priv

D.

127.0.0.1 localhost129.22.221.200 cluster-scan129.22.222.201node1129.22.221.211 node1-vip192.168.222.211 node1-priv129.22.221.202 node2129.22.221.212 node2-vip192.168.222.212 node2-priv

Question 4

Which of the following statements are a correct description of the CIFS agreement? (multiple choice)

Options:

A.

CIFS does not allow multiple clients to access

B.

The CIFS client writes the shared file anddoes not write to the storage system immediately. Instead, the file is saved in the local cache and can be read againImprove read rate, improve performance

C.

CIFS does not support anonymous transmission and shared authentication access

D.

CIFS supports avariety of character sets to ensure CIFS can be used in all language systems

Question 5

There are many services in the 8500 clustered NAS system that support system functions, such as NFS and CIFS basic service groups. Each service group is a collection of resources, each resource has an agent responsible for managing these resources, the availability of these resources directly or indirectly affect the status of the service.

Which of the following is not an NFS service group resource agent?

Options:

A.

NIC

B.

HASHAdow

C.

disk

D.

IP

Question 6

In an active-active disaster recovery solution configured with inter-site FC switch connection. When the distance between sites exceeds _____ km, you need toconfigure long-distance transmission.

Options:

A.

1KM

B.

10KM

C.

25KM

D.

50KM

Question 7

Which of the followingdescription for Thin LUNs and Thick LUNs for OceaStor V3 storage is true?

Options:

A.

Thin LUN and thick LUN can be configured with the same capacity.

B.

Both thin LUN and thick LUN can make initial capacity allocations.

C.

The maximum capacity of thin LUNs and thick LUNs can be greater than or equal to the available capacity of the storage pool where they reside.

D.

Both thin LUNs and thick LUNs can be created in bulk.

Question 8

OceanStor V3 storage resources are mapped to the bare devices on the host. The host creates a dedicated file system on the host. The testtool is used in the file system. The system produces a large number of 13KB size files, you randomly read these files to test the response time. Changing the prefetch length of 16KB can improve system performance in this case.

Options:

A.

True

B.

False

Question 9

A research unit purchased a Huawei Oceanstor 9000 storage products, the main configuration products: 8 * Oceanstor 9000 C node, the front end 10GE * 2, CE6850 switch * 2, S5700 switch * 1, cables, lighting and other accessories are fully furnished, households communication deployment program, prepared in advance a list of IP planning programs and IP requirements. Which of the following IP address is needed? (Multiple choice.)

Options:

A.

The customer needs to provide 16 IP addresses for Oceanstor 9000 system back-end IP and need to provide a gateway.

B.

Customers need to provide nine management network IP addresses, of which eight for IPMI management, one for OM management.

C.

The customer management network must be interoperable with the OceanStor 9000 InfoEqualize DNS IP to access the OceanStor 9000 storage.

D.

The client needs to provide 49 IP addresses that can interoperate with client applications, 16 for the static front end, 32 for the dynamic front end, 1 for InfoWqualizer DNS IP.

Question 10

Huawei two nodesStandard Edition N8500, opened the CIFS service. Which of the following CIFS parameters prevents users from seeing other users in the table of Contents?

Options:

A.

oplock

B.

noguest

C.

fs-mode

D.

hide-unreadable

Question 11

True of False, N8500 volume mirroring functionsynchronization can be understood as a file system to do RAID 1 to achieve image protection This protection is done in two ways:

One Species is the mirror roll between showrooms, the display level of protection, a display failure, the business is notaffected; the other is the mirror image display within the exhibition.

RAID level protection, a RAID group failure, the business will not be affected.

Options:

A.

True

B.

False

Question 12

Trueor False, in a Huawei Oceanstro V3 smartVirtualization, eDevLUN and external LUNs are a one-to-one correspondence

Options:

A.

True

B.

False

Question 13

In a clustered environment, data is placed on the shared storage, and identities between peers are equal and have the same access to the data. It is required that the clusterware have a control mechanism for concurrent access to such peer permissions. In Oracle RAC, you use the _____ mechanism to do multiple node-to-node collisions control of access.

Options:

A.

vip

B.

ocr

C.

dlm

D.

asm

Question 14

In acustomer environment with SuSE 10SP3, HBA QLogic QLE2562, using the operating system comes with HBA card driver. The storage array is Huawei OceanStor V3 storage. When storing the FC host port on the system and the HBA on the host. When the card port modeis inconsistent, it is usually recommended to modify the FC host port mode on the storage side to solve the problem.

Options:

A.

True

B.

False

Question 15

Existing set customer of database uses a raw device, due to the large amount of data inthe database. The customer plans to replace the old storage with new storage devices.

In the process of environmental inspection lvcb engineers found the following:

#getlvcb -TA sjklv

Intrapolicy =

copies = 0

interpolicy =

lvid =

lvname =

label =

machine id =

number Ips = 0

relocatable =

strict =

stripe width = 0

stripe size in exponent = 0

type =

upperbound = 0

fs =

time created = time modified =

As the vg is too large, the expansion of vg is impossible. As the service window is very short, and customersdo not want to avoid the risk of large adjustments of the whole original environment, what is the recommended approach?

Options:

A.

Based on lvcb offset reconstruction nude equipment, and the database level 0 backup import

B.

Use the dd command for data migration

C.

Use the cplv command for data migration

D.

Use migratepv for data migration

Question 16

The OceanStor 18000 system used by a client businessapplication has a total of three pools, each of which is a 9-disk RAID5. Someday analyzing the log of business interruption, we found that there are some scenarios in the system that caused the failure. What will cause the host access to the stored business in the following scenario? (Multiple choice.)

Options:

A.

In the fully redundant group environment, occurred the master reset.

B.

With the BST (bad track) feature turned off, a BST bad track appears on the LUN.

C.

The POOL where the business is located is allthin LUN and not a snapshot. LUN copy, clone and copy services are configured in the log POOL, which is a space full of print information.

D.

Log in the following print:2014-01-19 08:04:40} {Receive a disk-fault event of the disk (328) of pool (2) from ctrl.}2014-01-19 08:40:35} {Receive a disk-fault event of the disk (613) of pool (3) from ctrl.}

Question 17

When Replication Director creates a protection group to protect LUNs, you can see that there is no LUN on the interface. Which of the following may be the cause?

Options:

A.

There is a problem with the storage initiator configuration.

B.

There is a problem with the storage LUN configuration.

C.

There is a problem with the RD software configuration.

D.

There is a problem with the remotereplication configuration.

Question 18

SQL Server database administrator found that SQL Server is running out of space, you want to delete unnecessary databases to get more space.

Which of the following databases will be deleted once the database engine is abnormal or the upper business interruption?

Options:

A.

pubs

B.

master

C.

msdb

D.

tempdb

Question 19

If you need to automate the DR protection of an Oracle database in Replication Director, theconfiguration flow is:

Options:

A.

Create a site discovery store, find the host registration store, register the host to create a protection policy.

B.

Discovery Store, Discovery Host Registration Store, Register Host Create Site Registration Store Create Protection Group Create Protection Policy.

C.

Found storage, found that the host to create a site registration store, register the host to create a protection group to create a protection strategy.

D.

Create a site registration store, register the host to create aprotection group to create a protection policy.

Question 20

A user configures Huawei OceanStor 9000 as follows:

1. Create a user group group01, group01 in the directory / home / group01 configuration like:

Recommended threshold: 10GB, software threshold: 15GB, grace period 10 days hard threshold 20GB

2. Create useruser01 in the user group group01. The configuration of the user user01 in the directory / home / group01 is as follows:

The recommended threshold is 8GB

Software threshold 18GB

Grace period of 15 days

Hard threshold 25GB

The quota that user01 is in the directory / home / group01 is:

Options:

A.

Recommended threshold 10GBSoftware threshold 15GBGrace time 10 daysHard threshold 20GB

B.

Recommended threshold 10GBSoftware threshold 18GBGrace time 10 daysHard threshold 20GB

C.

Recommended threshold10GBSoftware threshold 15GBGrace time 15 daysHard threshold 20GB

D.

Recommended threshold 8GBSoftware threshold 15GBGrace time 10 daysHard threshold 20GB

Question 21

In a Huawei disaster preparedness plan using production site deployment with an oracle RAC cluster, to ensure that the disaster recovery database provides normal service should the production site fail, which of the following statements is correct?

Options:

A.

Disaster recovery end must be deployed, oracle rac cluster can not deploy oracle single node.

B.

Oracle RAC grid production side of the file must be copied to the disaster recovery side.

C.

Unable to copy the production sideof the FRA file will be able to guarantee the normal provision of services at the northern end.

D.

Production end of the oracle data files and log files can not be placed in the same consistency group.

Question 22

Simpana client failed to the perform backup task. When you view the task status, it reports the following error: libary mediaagent drive pool media

[]: Mount path is offlline advice: please check if the mount path is online and accessible "

What can cause this?

Options:

A.

Client offline

B.

Media Server Offline

C.

The client can not resolve the media server host name

D.

backup media failure

Question 23

In simpana backup software, incremental backup means_______.

Options:

A.

The data that has changed since the last backup is backed up.

B.

Changed data backup since last full backup.

C.

Full backup of all data.

D.

After the initial backup data backup of all data.

Question 24

Which of thefollowing statement about RAID 2.0 is correct? (Multiple choice.)

Options:

A.

The hard disk is divided into chunks.

B.

Lun consists of extend or grain

C.

A CKG chunk may come from the same hard disk.

D.

Chunk in a CKG may come from a different storage pool.

Question 25

Which of the following is the wrong mode of operation when checking on a problem with the VMFS datastore for ESXi5.5 using the VMware ondisk metadata analyzer (VOMA)? (Assume the LUN NAA ID is naa.60022a110009a8a800042e1800000000: 1).

Options:

A.

Turn off the power of all running virtual machines or migrate these virtual machines to another data store

B.

Use the esxcli storage vmfs extent list command to obtain the name and partition of the vmfs data store tobe backed up after the provision of number of the supported devices.

C.

voma -m vmfs -f check -d /vmfs/devices/disks/naa.60022a110009a8a800042e1800000000:1

D.

voma -m vmfs -f check -d naa.60022a110009a8a800042e1800000000: 1

Question 26

Disaster recovery project information research mainly includes information about who, what, and why. What is the following information background? (multiple choice)

Options:

A.

A bank has more than XXcustomers and XX corporate customers.

B.

Data loss will be huge and business disruption may result in significant financial loss.

C.

Business interruption has a huge impact, and the interruption time in business deployment is less than 2 hours.

D.

Clientswant to build two live-action data centers in the same city to realize the key business activities such as RTO 2.

Question 27

Database applications are one of the important applications supporting storage arrays.

Different application configurations and parametersettings may affect the service performance. In order to store arrays (such as OceanStor V3 series storage) with SQL server applications with the best performance, which of the following statements is wrong:

Options:

A.

OLTP database generally have a large numberof random write, it is recommended to choose RAID 10 to store data.

B.

In order to improve write performance, all SQL server database data stored in the LUN write strategy is configured to "write back the image".

C.

Because the size of the SQL server pageis 8K, in order to ensure the best performance of the database, NTFS allocated block size should not be less than 8KB.

D.

SQL Server database instance memory size and recovery mode of choice has no effect on the performance of the database.

Question 28

Which of the following copy is supported by OceanStor V3 remote file system?

Options:

A.

Synchronous and asynchronous replication

B.

Simultaneous replication

C.

Asynchronous replication

D.

support multiple file system consistency replication

Question 29

In the OceanStor 18000 storage system, a 15K RPM SAS disk is used. Assuming that the averageseek latency of this type of disk is 6 ms. which type of disk can provide a single disk IOPS?

Options:

A.

100

B.

150

C.

125

D.

167

Question 30

For commonly used SQL Server 2005 and 2008, users can connect to the specified server through the SQL Server Management Studio tool Database Engine. There are two connections in the connection group authentication method. Which client application connection method can provide the required landing User ID and password?

Options:

A.

SQL Server Authentication

B.

Windows authentication

C.

Log in as superuser

D.

Other ways when landing

Question 31

What are the common high-riskoperations with Linux? (Multiple choice.)

Options:

A.

rm delete file operation

B.

mkfs. ext3 format file system operation

C.

dd command

D.

Continue to write new data to the file system after the file system is damaged

Question 32

Using non-deduplication storage based on the disk library strategy, data recovery fails after the data life of the backup has expired. What is areason for this?

Options:

A.

Client corresponding partition insufficient space

B.

Client One or more simpana services are not started

C.

The storage policy checked enable managed disk space for disk library option, leading to the disk's thresholds from the effectively managed disk space.

D.

The client is abnormal with cs or MA communication.

Question 33

The Redhat Linux Enterprise 6 cp command is used to complete the operating system data migration. What steps are needed to verify the transfer? (Multiple choice.)

Options:

A.

Check if the size of the migrated file is the same as the original data.

B.

Check if the number of documents corresponds to the original data

C.

Check if each file with read and write permissions corresponds to the original data

D.

Whether the time for reviewing the case file corresponds to the original data.

Question 34

The client environment is the HP-UX11i v2 operating system, the HBA is the AD193A, and the operating system comes with the driver. The storage array is Huawei OceanStor V3. When the LUN mapping between HP-UX and the storage system is completed, you can not change the topology mode of the FC host interface card on the storage system.

Options:

A.

True

B.

False

Question 35

During the migration of SAN storage by LVM from AIX, the data migration designer is in a very important stage. Prior to accessing new devices, there are a number of issues that needs to be considered to help with data migration design, including: (Multiple choice.)

Options:

A.

This device can not / should not be connected to an existing SAN.

B.

AIX system how to connect to the new storage device.

C.

How AIXsystems and data can be migrated from the old disk to the new disk.

D.

The format of the file system, whether the file group is compatible with the new device volume.

Question 36

Choose the correct statement regarding the N8000 clustered NAS system that provides file system sharing services, surface VxFS file system, and roll features.

Options:

A.

VxFS is a non-log file system that can support morethan 2T files.

B.

File system snapshot using copy-on-write (copy-on-write technology) and other files together, share partition or volume storage space.

C.

Provide file system-level snapshots, copy.

D.

File System Snapshots, Scenarios, Replication, etc. Features are based on Storage Checkpoint.

Question 37

Using Simpana for backup, you set this policy as follows: The retention period of data is 15 days and 2 periods, once every 10 days. How many days will data be retained after the failure?

Options:

A.

15

B.

20

C.

25

D.

30

Question 38

A company’s daily real-time online transaction data is about 500G and 30G daily new data, the new data is frequently called within a week after the production.

The company employees 80people, each person's mailbox space is 5G, and the average space utilization rate is 60%. For a six months demand, A company should configure which of the following?

Options:

A.

High-performance layer 550G, performance layer 250G; capacity layer 6T

B.

High-performance layer 400G, performance layer 250G; capacity layer 7T

C.

High-performance layer 800G, performance layer 400G; capacity layer 6T

D.

high-performance layer 600G, performance layer 300G; capacity layer 7T

Question 39

Huawei HyperMetro active-active disaster recovery supports heterogeneous storage. Therefore, an OceanStor V3 storage system and a Huawei certified third-party storage system can work in active-active mode based on HyperMetro.

Options:

A.

TRUE

B.

FALSE

Question 40

VIPs inOracle a RAC systems are created by VIPca scripts during the final stages of installing clusterware and are registered as CRS resources and bind to the public network card for each node.

Options:

A.

True

B.

False

Question 41

A customer requires 60 TB of storage space available on an OceanStor V3 storage system to store service data. How many disks will be used if the customer installs 600 GB 15K RPM SAS disks and creates a pool with RAID 5 (8D+1P) using a low hot spare policy? (Select the closest number without considering the required data protection space.)

Options:

A.

100

B.

120

C.

140

D.

180

Question 42

Erasure code redundancy technology is a data file is divided into ODC (M logo) equal length data blocks, generated by encoding RDC. Any ofthe RDC fragments can be restored out of the original file, which can tolerate up to ODC node failure, to achieve the purpose of data protection.

Options:

A.

True

B.

False

Question 43

What are the precautions for VTL6900 product division? (Multiple choice)

Options:

A.

The size of the LUN provided by the VTL back-end storage does not exceed 4TB. The default configuration is write-back, mirroring, and the depth of the slice is 64KB

B.

SIR data The number of LUNs is 2's power of N

C.

SIR index LUN size is at least 4% of SIR data LUN size

D.

It is not recommended to divide RAID across frames

Question 44

Which documents must beread for an Oralce database normal start? (Multiple choice)

Options:

A.

Parameter file

B.

Control Documents

C.

archive log file

D.

Data files

Question 45

When configuring the protection level of Huawei OceanStor 9000 directory, if the data protection level is set to 4 + 2, the corresponding metadata will generate 3 copies of the same mirror.

Options:

A.

True

B.

False

Question 46

Mainstream virtualization technologies include hardware virtualization (Hypervisors) and operating system virtualization (Containers). Which are key characteristics of hardware virtualization?

(Multiple Choice)

Options:

A.

Multiple VMs simultaneously run on a single physical server.

B.

VMs on the same server are isolated from each other.

C.

A VM encapsulates the entire system into one or more files.

D.

A VM on one server can run on another server without any modification.

Question 47

In a Huawei OceanStor 9000 V100R001C30, in order to experiment with the video surveillance functions of multiple Huawei OceanStor 9000 product you need to install UniformView software. Which ofthe following statements is wrong?

Options:

A.

UniformView software installed by the user can specify a directory, create a UniformView directory in this directory as a mounted root table of Contents

B.

The administrator performs a mount command on theUniformView client to mount a different storage domain with the cluster ID and the static IP address

C.

UniformView Resolve mount command, in the mount root directory, followed by the creation of a cluster ID name of the directory

D.

Using the NFS protocol, mount the specified shared directory to the cluster ID directory read-only using the management IP address

Question 48

Which statements are true about Huawei OceanStor V3 HyperMirror feature? (Multiple Choice)

Options:

A.

Create a mirror LUN for a common LUN. Due to internal information exchange, the LUN ID for hosts’ read and write I/Os changes based on the information exchange result.

B.

A LUN stores 2 GB of data. Create a mirror LUN for this LUN. During the creation, the system automatically generates a copy. The total data amount of the copy and mirror LUN is 4 GB.

C.

HyperMirror can be configured for external LUNs, and external LUNs can be configured as HyperMirror copies.

D.

When configuring HyperMirror, its copies must come from different disk domains.

Question 49

In the same operating system environment, what is the order to restore the oracle database through RMAN?

Options:

A.

controlfile, datafile, pfile

B.

pfile, datafile, controlfile

C.

datafile, pfile, controlfile

D.

pfile, controlfile, datafile

Question 50

A file system in a clustered NAS system performs heartbeat synchronization between nodes. When the heartbeat is interrupted, the N8000 cluster is split intomultiple small groups, resulting in data loss. The N8000 provides a fencing function to avoid the occurrence of the split-brain issue. Which of the following descriptions of the role of fencing correct?

Options:

A.

Monitor GAB and check for changes in cluster members

B.

Guarantee a single view of the members of the cluster

C.

In the absence of a single cluster control, to prevent multiple nodes with Volume Manager to access shared storage

D.

cluster abnormal recovery automatically master node

Question 51

After the Cache mirror function between two controllers in the Ocenanstro T series storage array is enabled, the data of the two controllers and the cache are completely the same and a single controller failure does not affect data availability.

Options:

A.

True

B.

False

Question 52

The following description of the AIX system command is incorrect:

Options:

A.

Toc heck whether the UltraPath is installed successfully:#lslpp -l UPforAIX *

B.

To check the disk is recognizedcorrectly:# lsdev-Cc disk

C.

To check the WWN number of the HBA:#lscfg -pvl fcs0

D.

To modify the network card IP address:#lsdev -Cc if

Question 53

Info Replication supports copying the data at the same time using the home directory, extended attributes, ACL (access control list), WORM, and CIFS. NFS configuration information is also copied to the slave. When a disaster occurs, the master and slave stations can quickly take over after the switchover.

Options:

A.

True

B.

False

Question 54

Zone change on a FC switch will send the switch to send RSCN to the device in a Zone. Which fabric service is responsible for collecting the status of the fabric change information?

Options:

A.

Fabric Server

B.

Fabric Controller server

C.

Name Server

D.

Management Server

Page: 1 / 14
Total 364 questions