Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H13-629_V2.5 Exam Dumps - HCIE-Storage V2.5

Question # 4

The Redhat Linux Enterprise 6 cp command is used to complete the operating system data migration. What steps are needed to verify the transfer? (Multiple choice.)

A.

Check if the size of the migrated file is the same as the original data.

B.

Check if the number of documents corresponds to the original data

C.

Check if each file with read and write permissions corresponds to the original data

D.

Whether the time for reviewing the case file corresponds to the original data.

Full Access
Question # 5

Database applications are one of the important applications supporting storage arrays.

Different application configurations and parameter settings may affect the service performance. In order to store arrays (such as OceanStor V3 series storage) with SQL server applications with the best performance, which of the following statements is wrong:

A.

OLTP database generally have a large number of random write, it is recommended to choose RAID 10 to store data.

B.

In order to improve write performance, all SQL server database data stored in the LUN write strategy is configured to "write back the image".

C.

Because the size of the SQL server page is 8K, in order to ensure the best performance of the database, NTFS allocated block size should not be less than 8KB.

D.

SQL Server database instance memory size and recovery mode of choice has no effect on the performance of the database.

Full Access
Question # 6

Oracle database normally starts the opening state of the process. Which files must it read? (Multiple choice.)

A.

Parameter file

B.

Control Documents

C.

Archive log file

D.

Data files

Full Access
Question # 7

What are the recovery mode drills of the Huawei Replication Director disaster recovery?

(Multiple choice.)

A.

Planned Migration

B.

Failover

C.

Business Recovery

D.

fault recovery

Full Access
Question # 8

Users use vsphere 5.5 to build business virtualization. In the course of the operation it was found that a host was using too many SCSI reservations, leading to vmfs performance degradation. What method can be used to eliminate the root cause of SCSI reservation conflicts? (Multiple choice.)

A.

Reduce the number of snapshots.

B.

Reduce the number of virtual machines per LUN.

C.

Increase the number of LUNs and limit the number of hosts accessing the same LUN.

D.

Change the type of virtual disk created.

Full Access
Question # 9

Which of the OceanStor V3 file system remote replication descriptions are correct? (Multiple choice.)

A.

It is an object-based approach to data replication

B.

ROW snapshots are based on the cyclical manner of data replication

C.

It can be manually set off by the user or system timing synchronization starting

D.

It supports the Quota quota information of the main file system to the slave, no need to configure the quota.

Full Access
Question # 10

True or False, the disaster recovery plan of Huawei means that when the production site fails, the production business is automatically switched to run the disaster recovery site.

A.

True

B.

False

Full Access
Question # 11

In the scenario of protecting the database, the slave uses the virtual snapshot method to verify the services of the production end and the DR-side and discover the data of the DR on the disaster recovery end. What are the possible reasons that the library can not start normally? (Multiple choice.)

A.

After a snapshot of the LUN of the redundancy site is created, the snapshot is not activated at the same time.

B.

Disaster recovery side of the data stored in the cache, not yet written to the hard disk.

C.

When creating a snapshot on the disaster recovery end LUN, the production end is copying data to the disaster recovery end.

D.

The production end and disaster recovery end adopt the disaster recovery solution of incremental LUN copy, and the incremental data link is abnormal during the synchronization.

Full Access
Question # 12

For commonly used SQL server 2005 and 2008, users can connect to a specific service through the SQL server management studio tool database engine. T login there are two ways to authenticate. Which mode is needed for the client application connection?

A.

sql server authentication

B.

Windows authentication

C.

Log in as super user

D.

Other ways when landing

Full Access
Question # 13

If you need to automate the DR protection of an Oracle database in Replication Director, the configuration flow is:

A.

Create a site discovery store, find the host registration store, register the host to create a protection policy.

B.

Discovery Store, Discovery Host Registration Store, Register Host Create Site Registration Store Create Protection Group Create Protection Policy.

C.

Found storage, found that the host to create a site registration store, register the host to create a protection group to create a protection strategy.

D.

Create a site registration store, register the host to create a protection group to create a protection policy.

Full Access
Question # 14

Huawei OceanStor storage controller BBUs are both in a fault alarm. Which description is correct for the upper application?

A.

System does not work.

B.

If the device is powered off unexpectedly, some of the business data will be lost.

C.

Business performance is not affected.

D.

Upper business IO read and write will not have any impact.

Full Access
Question # 15

The iSCSI protocol is mapped on the TCP protocol. For a TCP encapsulation of the iSCSI protocol packet, which of the following parts are not included?

A.

TCP Header

B.

IP Header

C.

ISCSI Header

D.

ISCSI data

Full Access
Question # 16

Choose the correct statement regarding the N8000 clustered NAS system that provides file system sharing services, surface VxFS file system, and roll features.

A.

VxFS is a non-log file system that can support more than 2T files.

B.

File system snapshot using copy-on-write (copy-on-write technology) and other files together, share partition or volume storage space.

C.

Provide file system-level snapshots, copy.

D.

File System Snapshots, Scenarios, Replication, etc. Features are based on Storage Checkpoint.

Full Access
Question # 17

Which of the following commands will test the heartbeat disk connectivity?

A.

Run / usr / bin / readvgcla-V dhbvg -F status on node A and run / usr / bin / putvgda_V dhbvg -a on node B.status = 1

B.

Run / usr / sbin / rsct / bin / dhb_transmit hdisk8 on Node A and run / usr / sbin / rsct / bin / dhb_receive on Node Bhdisk8

C.

Run / usr / sbin / rsct / bin / dhb_read-p hdisk8 -r on node A, / usr / sbin / rsct / bin / dhb_read-p hdisk8 -t

D.

Run echo 1 | / usr / bin / dd of = / dev / rhdisk10 bs = 4k skip = 2 count = 1 on Node A and run on Node Bcommand / usr / bin / dd if = / dev / rhdisk10 bs = 4k skip = 2 count = 1

Full Access
Question # 18

What are the precautions for VTL6900 product division? (Multiple choice)

A.

The size of the LUN provided by the VTL back-end storage does not exceed 4TB. The default configuration is write-back, mirroring, and the depth of the slice is 64KB

B.

SIR data The number of LUNs is 2's power of N

C.

SIR index LUN size is at least 4% of SIR data LUN size

D.

It is not recommended to divide RAID across frames

Full Access
Question # 19

Using Simpana to achieve a complete Exchange backup requires at least which of the following components? (Multiple choice)

A.

offline mining

B.

database

C.

mailbox

D.

public folder

Full Access
Question # 20

True or False, The smart Matrix architecture is a multi-control interconnected system architecture designed by Huawei for the core storage system of an enterprise data center. Based on the smart matrix principle, Huawei OceanStor 18000 supports up to 16 engines (32 controllers) cluster.

A.

True

B.

False

Full Access
Question # 21

When you install the Simpana backup client on a virtual machine and perform a backup, the backup job status becomes pending and reports an error message "Cannot decode packet header: invalid start signature ", which of the following may be the cause of this problem?

A.

VM NIC adapter error

B.

The media server backup service is abnormal

C.

The backup client service is abnormal

D.

Virtual machine disk class behavior IDE

Full Access
Question # 22

Customers plan to use the intelligent partition feature of the OceanStor 18800 to implement LUN isolation and ensure the cache capacity of some special LUNs Volume. To do this, you must create smart partition meeting which of the following prerequisites? (Multiple choice)

A.

All controller nodes are in normal state

B.

The number of partitions created has not reached the limit

C.

Engine remaining cache of not less than 256M

D.

Create a partition read and write cache the same size

Full Access
Question # 23

Which statements are true about Huawei OceanStor V3 WORM feature? (Multiple Choice)

A.

When a file is in the locked state, the file protection duration can be manually prolonged or shortened.

B.

A locked file will shift to the expired state if the file system WORM clock value is greater than the file atime value.

C.

After the WORM file system compliance clock has exceeded the file expiration time, an appending file will shift from the appending state to the expired state.

D.

Only files of 0 byte can shift from the locked state to the appending state.

Full Access
Question # 24

At the beginning of the VTL6900 system input, you need to prepare the physical device. As shown in the figure, the VTL6900 is the cut-off point of a physical device node on the VTL console. On the physical equipment to prepare this step, which description is correct? (multiple choice)

A.

The equipment in the picture has completed the equipment preparation step

B.

The corresponding LUN in the figure is a LUN created on the service hard disk of the engine

C.

Change the equipment status is normal

D.

The process of preparing a physical device is the process of virtualizing a LUN mapped from an array, similar to a quick format

Full Access
Question # 25

Which of the following describes the correct steps of an Oracle database backup?

1, backup oralce control file

2, backup oracle archive log

3, oralce placed in backup mode

4, oracle placed in normal mode

5, backup oracle data files

A.

3,5,2,1,4

B.

3,1,5,4,2

C.

3,5,2,4,1

D.

3,5,1,2,4

Full Access
Question # 26

In a disaster recovery plan design, RTO and RPO are the most basic standards. For example, you need to start recovery within half a day after a disaster and the RTO value is twelve hours.

A.

True

B.

False

Full Access
Question # 27

The user backup client has sufficient resources and the production network resources are relatively tight. The amount of data scheduled to be backed up weekly is 1-2T. The backup window is 3 hours, using source-side de-duplication, deduplication ratio of 3, the bandwidth utilization value of 0.8. Based on this, what kind of networking can meet the backup business needs and investment least?

A.

GE LAN-free

B.

10GE LAN-free

C.

FC LAN-free

D.

server-free

Full Access
Question # 28

When the data migration solution based on remote replication is used, services must be suspended at least once.

A.

TRUE

B.

FALSE

Full Access
Question # 29

The OceanStor V3 storage smart patition can allocate independent cache space for different LUNs. The capacity of the cache space is shared by both read and write operations.

A.

True

B.

False

Full Access
Question # 30

An MSCS Two-Node Cluster Interconnects with Disk Arrays via the iSCSI Protocol in a Multipathing Environment and Multipathing Software installed on Each Node. You build the cluster configuration using the wizard and part of the description shows that the quorum disk and resource disk can not be online. The following statement is correct regarding this scenario:

A.

The shared disk file system uses the GPT format that caused the quorum disk to fail Online

B.

The quorum disk can not be online due to the cluster feature that does not enable multipathing software

C.

The MSCS Cluster service does not bring the volume resource online. The resource disk can not be online

D.

Heartbeat network timeout causes arbitration disk and resource disk probability online

Full Access
Question # 31

Which of the following is incorrect regarding the Sompana oracle backup configuration?

A.

In the backup parameter settings "max open files" parameter defines the maximum number of files to be read in parallel per channel, which is the RMAN MAXOPENFILES parameter

B.

"Command line backup" and "Log Backup" select the storage strategy for the database and archive logs, both need to choose the same storage strategy

C.

The "data files per BFS" parameter in the backup parameter settings specifies the number of data files that can be simultaneously written to the same Back Set number

D.

To achieve Oracle RAC table-level recovery, the backup parameter settings must be in the "option" tab check the "enable table browse "option

Full Access
Question # 32

In the scenario of database protection, when the slave uses the virtual snapshot to verify LUN data consistency on the production end and the DR end and the disaster recovery end LUN database can not be started normally. Which of the following are the possible reasons for this? (multiple choice)

A.

After a snapshot of the LUN of the redundancy site is created, the snapshot is not activated at the same time

B.

Disaster recovery data stored in the Cache, not yet written to the hard disk

C.

When creating a snapshot on the disaster recovery end LUN The production end is copying data to the disaster recovery end

D.

The production end and disaster recovery end adopt the disaster recovery solution of incremental LUN copy. The incremental data is abnormally interrupted during the synchronization process and has not been recovered

Full Access
Question # 33

The CIFS share cifs_share_001 is configured through the OceanStor deviceManager management interface of OceanStor 9000, and the configured share properties are as follows:

(1) share named cifs_dir_001

(2) read-only access

(3) Using local authentication user mode, user name cifsuser001, password Password @ 123;

One of the front-end IP addresses of the OceanStor 9000 storage system is 96.69.35.7.

Which of the following descriptions is correct?

A.

Enter the windows 7 PC \\ 96.69.35.7, prompted to enter the user name password, see the shared path name ing into cifs_share_001

B.

directly in the address bar enter \\ 96.69.35.7 \ cifs_dir_001 and enter the user name password, you can open the shared path, you can browse this totalEnjoy the file under the path

C.

In the address bar, type \\ 96.69.35.7 \ cifs_dir_001 \ a.txt, follow the prompts to enter the user name password, you can not open the a.txt file

D.

in the address bar enter \\ 96.69.35.7 \ cifs_dir_001, you can create a new file in this path B.doc

Full Access
Question # 34

HPUX operating system Mirrordisk / UX software must be installed before it can be mirrored by LVM.

A.

True

B.

False

Full Access
Question # 35

After the Cache mirror function between two controllers in the Ocenanstro T series storage array is enabled, the data of the two controllers and the cache are completely the same and a single controller failure does not affect data availability.

A.

True

B.

False

Full Access
Question # 36

VTL 6900 engines A and B nodes form a cluster, on the A, B node between the business bearer and the fault automatically switch, which of the following description is correct? (Multiple choice)

A.

When the node a is found through the sms -v command, the status of the IPStor Authentication Module is FAIL. The service of the node A will be from Move to Node B.

B.

unplug the A node power supply, A node's business will automatically switch to the B node

C.

unplug the A node and the backup server network connection, the A node's business will automatically switch to the B node

D.

A, B nodes can work in Active-Active mode, but can only manually achieve the backup service load balancing between A and B nodes

Full Access
Question # 37

Which of the following statements are a correct description of the CIFS agreement? (multiple choice)

A.

CIFS does not allow multiple clients to access

B.

The CIFS client writes the shared file and does not write to the storage system immediately. Instead, the file is saved in the local cache and can be read againImprove read rate, improve performance

C.

CIFS does not support anonymous transmission and shared authentication access

D.

CIFS supports a variety of character sets to ensure CIFS can be used in all language systems

Full Access
Question # 38

RAC is a typical "multi-instance, single-database" architecture that is shared by all nodes, accessed in parallel, including database data files, control files, parameter files, online reorganization log files, and even archived log files are placed on shared storage and guaranteed to be simultaneously accessible by all nodes

A.

Correct

B.

mistakes

Full Access
Question # 39

True or False, all OceanStor Unified Storage Array disks have the ability to store dirty data after a sudden power failure

A.

True

B.

False

Full Access
Question # 40

How can you view the WWN HBA card that is in a Windows2008 R2 system?

A.

In Device Manager, right-click of the HBA card to see its properties

B.

View in Storage Explorer Manager

C.

View using the FC Info tool

D.

CMD command line, enter the diskpart

Full Access
Question # 41

Simpana storage strategy is an important parameter is data retention rules to determine the need to back up the contents of the backup time and backup methods. Each copy has an independent data retention period, each copy can be set using______. (Multiple choice.)

A.

Basic rules of retention

B.

Advanced retention rules

C.

Extended retention rules

D.

Special retention rules

Full Access
Question # 42

SQL Server database administrator found that SQL Server is running out of space, you want to delete unnecessary databases to get more space.

Which of the following databases will be deleted once the database engine is abnormal or the upper business interruption?

A.

pubs

B.

master

C.

msdb

D.

tempdb

Full Access
Question # 43

EXT3 is the third-generation extended file system commonly used in the Linux operating system. Which of the following statements is correct regarding the EXT3 file system?

A.

block is composed of a number of consecutive areas, block number starting from 1, the overall number, grouping

B.

Each i node corresponds to a 1GE file or folder, which stores the description file size, file storage location and other information

C.

The block group consists of a number of consecutive blocks, the number within the block group is determined by the block size

D.

The superblock stores the basic information about the EXT3 file system

Full Access
Question # 44

When the storage controller BBU is damaged, the controller automatically sets the IO write policy to transparent and is locked to ensure data reliability. Before the fault is recovered, it can be forced to write back.

A.

True

B.

False

Full Access
Question # 45

Which of the following description for Thin LUNs and Thick LUNs for OceaStor V3 storage is true?

A.

Thin LUN and thick LUN can be configured with the same capacity.

B.

Both thin LUN and thick LUN can make initial capacity allocations.

C.

The maximum capacity of thin LUNs and thick LUNs can be greater than or equal to the available capacity of the storage pool where they reside.

D.

Both thin LUNs and thick LUNs can be created in bulk.

Full Access
Question # 46

When the oracle database is in an open state, which of the following is the correct oracle database recovery action?

A.

Restore the entire data file

B.

roll back to the Council before crying to a certain point in time

C.

Recovery control file

D.

open state can not be restored action

Full Access
Question # 47

Which of the following scenarios is most suitable for enabling OceanStor V3 deduplication?

A.

VDI application

B.

Database

C.

Mail Service

D.

Seismic geological data

Full Access
Question # 48

Which of the following is correct regarding FTP passive transmission mode:

A.

The server initiates the establishment of a data connection request

B.

The FTP client uses the pasv command to tell the FTP server its own IP and port number

C.

FTP server uses the pasv command to tell the FTP client's own IP and port number

D.

The target port number that initiated the data connection request may be 29999

Full Access
Question # 49

Which of the following is incorrect regarding the VTL6900 data deduplication featuree?

A.

The SIR cluster of the VTL6900 supports global deduplication

B.

The deduplication start time of the VTL6900 can be controlled automatically according to the policy

C.

VTL6900 on the specified tape deduplication and remote replication is recommended at the same time

D.

VTL6900 deduplicated tape to do data archiving, the physical tape library in the NC is still non-deduplicated data

Full Access
Question # 50

Which description of OceanStor V3 storage system tuning process is incorrect?

A.

Need to understand the business (applications and data, etc.), clear the goal of tuning.

B.

After tuning all the system configuration parameters related to performance bottlenecks, judge whether the tuning goal is completed.

C.

Back up business systems and data before tuning.

D.

Monitor and analyze performance data by business processes, identify performance bottlenecks and analyze root cause.

Full Access
Question # 51

Which description of the N8000 Clustered NAS file system snapshot features and their application is wrong?

A.

Snapshot file system can be dedicated as a separate space to the client.

B.

For a file system can create multiple snapshots, support snapshots of the snapshot

C.

Snapshot file system provides only read-only access to external, it cannot provide write operations

D.

File System Snapshot Instantly copy the source file system completely available copy, when due to viruses or man-made misuse and other causes of the original file system is not available, the rollback of the snapshot can restore the original file system.

Full Access