Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H13-624_V5.5 Exam Dumps - HCIP-Storage V5.5

Go to page:
Question # 4

In Huawei container storage solution, CSI is short for Container Storage Interface. Which of the following statements is false about Huawei CSI?

A.

CSI Driver developed by Huawei is mainly used to implement the call initiated by sidecar on Huawei storage.

B.

Huawei storage and Huawei CSI driver need to communicate with each other through RESTful to provide NAS/SAN storage resources.

C.

CSI Controller runs independently on a worker node on the Pod in StatefulSet mode and is used to interact with the storage and create and delete resources on the storage side.

D.

CSI Node runs on each worker node of Kubernetes on the Pod in DaemonSet mode and can be used to mount and unmount related storage resources.

Full Access
Question # 5

A financial customer has purchased several Huawei OceanStor Pacific 9550 storage systems. When configuring basic object services on the storage systems, an engineer discovers that the object service cannot be enabled for storage nodes. Which of the following is not a possible cause?

A.

The engineer has manually adjusted the time of the cluster nodes. As a result, the conflict handling is different.

B.

NTP synchronization is not configured for the cluster, and different NTP time sources are used.

C.

Namespaces with the same name have been created under the same account.

D.

The Network Time Protocol (NTP) clock in the storage cluster is inconsistent with the clock of the client that accesses object services.

Full Access
Question # 6

During routine inspection, engineers find that several faults occur on Huawei all-flash storage and need to rectify the faults. Which of the following is not a basic troubleshooting principle for storage systems?

A.

Analyze network alarms before NE alarms.

B.

Analyze general alarms before specific alarms.

C.

Analyze alarms of higher severities before those of lower severities.

D.

Analyze external factors before internal factors.

Full Access
Question # 7

When delivering a Huawei OceanStor Pacific storage project, a Huawei engineer vigorously promoted the SmartEncryption feature of scale-out storage to customers. Which of the following statements is false about this feature?

A.

When the data is read using the DPC or NFS protocol, the SED obtains the identity authentication key from the key management server, reads and decrypts the ciphertext data, and then returns the plaintext data to the protocol layer. The protocol layer returns the plaintext data to client applications.

B.

This feature supports encrypted data write using NFS, CIFS, HDFS, or S3. Data is decrypted and read using NFS, CIFS, HDFS, or S3.

C.

The file service client can write plaintext data through the NFS/CIFS/DPC protocol.

D.

Huawei OceanStor Pacific series scale-out storage supports disk encryption. All data delivered by services is stored on self-encrypting disks (SEDs).

Full Access
Question # 8

During the use of Huawei flash storage, an engineer wants to calculate the valid write bandwidth of disks. Which of the following formulas can calculate disk valid write bandwidth?

A.

Valid read bandwidth of disks = Read bandwidth of a single disk x Number of disks x (Number of system disks / Total number of disks)

B.

Valid write bandwidth of disks = Write bandwidth of a single disk x Number of disks

C.

Valid write bandwidth of disks = Write bandwidth of a single disk x Number of disks x (Number of data disks / Total number of disks)

D.

Valid write bandwidth of disks = Bandwidth of a single port x Number of ports

Full Access
Go to page: