Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H13-624_V5.5 Exam Dumps - HCIP-Storage V5.5

Go to page:
Question # 9

Similar to the alarm analysis method, the replacement method can be used to locate and rectify any type of faults for Huawei converged storage, and has no special requirement for maintenance personnel.

A.

TRUE

B.

FALSE

Full Access
Question # 10

During routine management of Huawei flash storage, an engineer can use the "show license_active" command to query information about activated licenses.

A.

TRUE

B.

FALSE

Full Access
Question # 11

If Huawei scale-out storage software is installed in low level design (LLD) mode, engineers need to use the ________ installation and deployment tool to plan nodes, networks, and clusters and export the configuration file for subsequent installation and deployment.

Full Access
Question # 12

During flash storage initialization, an administrator needs to change the IP address of a management network port. Which statements about the change are false?

A.

To change the IP address of the management network port on the CLI, log in to the CLI and run the "change system management_ip" command.

B.

The IP addresses of the management and maintenance network ports must be in different network segments; otherwise, there will be a route conflict.

C.

The administrator needs to apply for and activate a license before changing the IP address of the management network port.

D.

To change the IP address of the management network port on the command-line interface (CLI), the IP address of the maintenance terminal and the default IP address of the storage management network port must be in the same network segment if the administrator logs in to the system through a serial port.

Full Access
Question # 13

A bank customer purchases several Huawei flash storage devices to store upper-layer Oracle database service data. If an Oracle database fault occurs, engineers need to collect Oracle alert log files to locate the fault. Which of the following commands cannot be used to query the alert log path?

A.

ioscan -funC disk > /home/pvlinks_disk

B.

CRS_HOME/bin/diagcollection.sh

C.

show parameter background_dump_dest

D.

db2support outpath -d db_name -c

Full Access
Question # 14

As a next-generation storage system, Huawei OceanStor Dorado series can focus on core enterprise services and meet enterprises’ service requirements. Which of the following statements are false about Huawei OceanStor Dorado series storage systems?

A.

The back-end shared interface module of OceanStor Dorado 18000 is inserted into the enclosure. The disk enclosure connected to the interface module can be accessed by controllers in the engine at the same time.

B.

Dorado V6 series and new converged storage products use the PCIe Scale-Out architecture.

C.

OceanStor Dorado 18000 uses 200 Gbit/s RDMA shared interface modules for cross-engine expansion, implementing full interconnection between 8, 12, and 16 controllers.

D.

OceanStor Dorado 18000 supports a maximum of 28 interface modules and implements intra-engine mirroring and cross-engine interconnection through the 100 Gbit/s RDMA network.

Full Access
Question # 15

Assume a financial customer purchased multiple Huawei OceanStor Dorado 18000 storage devices to carry service data. A Fibre Channel link exception occurred in the storage environment. Which of the following are possible causes for this exception?

A.

When a switch network is used, the configured rate of the Fibre Channel host port does not match that of the switch.

B.

The optical fiber is poorly connected or faulty.

C.

The optical module rate of host ports does not match that of front-end storage ports.

D.

The IP address of the service network port on the application server is incorrectly set.

Full Access
Question # 16

When delivering a flash storage project, Huawei engineers introduced the multi-tenant feature of flash storage to the customer. This feature isolates service data. Although different tenants cannot access each other’s LUNs, they can access each other’s file system.

A.

TRUE

B.

FALSE

Full Access
Go to page: