Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H13-623 Questions and Answers

Note! Following H13-623 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H13-623 Questions and Answers

Question # 6

In the Huawei DR Solution, at which layers can be data replication performed? (Multiple Choice)

A.

Host layer

B.

Network layer

C.

Storage layer

D.

File system layer

Full Access
Question # 7

During the CommServe installation, if the CS resides in the same network segment as Agent, there is no need to configure the hosts file.

A.

TRUE

B.

FALSE

Full Access
Question # 8

Which of the following is the correct DR solution delivery process?

A.

Calculate storage capacity and bandwidth.

B.

Analyze the solution feasibility.

C.

Confirm the compatibility.

D.

Plan services.

E.

Design the networking.

F.

A>B>C>D>E

G.

B>C>A>E>D

Full Access
Question # 9

In the HyperMetro active-active data center solution, if a member LUN has bad blocks, which of the following statements is false?

A.

Before repairing bad blocks, the read permission must be obtained and the local read permission for active-active pairs must be confirmed.

B.

If irreparable bad blocks are read from a local LUN, a read error message is returned to the host.

C.

If repairable bad blocks are read from a local LUN, data is returned to the host, ensuring fast host response.

D.

If irreparable bad blocks are read from a local LUN, the system uses data stored on the remote LUN to repair these bad blocks.

Full Access
Question # 10

The hardware-based snapshot of the OceanStor Backup Solution supports storage devices of al storage vendors.

A.

TRUE

B.

FALSE

Full Access
Question # 11

In OceanStor backup solution, iDA types include basic module (file system), online application backup module (including Oracle and SQL) and index cache.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Active-Active Solution is implemented based on HyperMetro.

A.

TRUE

B.

FALSE

Full Access
Question # 13

What operating systems are supported by OceanStor BCManager eRepIication? (Multiple Choice)

A.

Windows

B.

Linux

C.

Aix

D.

hp-ux

E.

Solaris

Full Access
Question # 14

In OceanStor V3 storage systems, remote replication allows a user to perform a primary/secondary switchover when the secondary LUN is in which data statuses? (Multiple Choice)

A.

Consistent

B.

Synchronized

C.

Initially synchronizing

D.

Synchronizing

Full Access
Question # 15

File-level deduplication is also known as single instance storage (SIS). Based on indexes, file-level deduplication checks and compares the attributes of a file that needs to be stored with those of files that have been stored. If the file has not been stored, file-level deduplication stores the file and updates indexes. Otherwise, file-level deduplication only stores the pointers that point to the existing file.

A.

TRUE

B.

FALSE

Full Access
Question # 16

Before deploying Huawei's active-active disaster recovery solution information about the customer's network environment must be collected, including: (Multiple Choice)

A.

Information about the physical environment

B.

Information about business systems

C.

Network information

D.

Amount of data

Full Access
Question # 17

Huawei storage products implement the active/passive data center solution based on HyperMetro. Applications are categorized so that some applications are running in data center A and hot backed up in data center B while other applications are running in data center B and hot backed up in data center A, thereby achieving the active-active effect.

A.

TRUE

B.

FALSE

Full Access
Question # 18

What are the application maintenance principles of OceanStor backup solution?

A.

Ensure that the database archive mode is enabled

B.

Ensure that users' system space is sufficient

C.

Ensure that users' application environment information is correctly typed

D.

Ensure that users' applications meet interoperability matrix requirements

E.

Prevent DNS or Hosts file inconsistency

Full Access
Question # 19

The peak write bandwidth of an application is 10 MB/s, the average write bandwidth is 200 KB/s, and the average write 10 size is 4 KB. The overhead of private information is about 11%, and the bandwidth utilization rate is 70%. The network employs FC, and the synchronous remote replication mode (considering the overhead of private information) is enabled. Then, which is the required network bandwidth?

A.

Not lower than 128.4 Mbit/s

B.

Equal to 128.4 Mbit/s

C.

Lower than 128.4 Mbit/s

D.

Not lower than 64.2 Mbit/s

Full Access
Question # 20

Which of the following statements about client deduplication is false?

A.

At the source end, hash comparison and deduplication are implemented for the data blocks to be transmitted to the target end.

B.

Compared with media deduplication, client deduplication can save the transmission bandwidth.

C.

Resources at the source end are consumed to implement deduplication.

D.

Only new data blocks need to be transmitted to the target end. Information related to old data blocks does not need to be transmitted.

Full Access
Question # 21

In the Huawei Active-Active DC Solution, Oracle RAC can provide services concurrently at both sites,

A.

TRUE

B.

FALSE

Full Access
Question # 22

Which of the following components are required for the Huawei Active-Active DR Solution? (Multiple Choice)

A.

HyperMirror

B.

Quorum server

C.

Ultra Path

D.

HyperMetro

Full Access
Question # 23

Huawei 3DC DR management network consists of the DR management network and production management network. The two networks must be separately deployed.

A.

TRUE

B.

FALSE

Full Access
Question # 24

Huawei's end-to-end active-active data center solution is divided six layers, including:

A.

Storage layer, session layer, application layer, network layer, transfer layer, and physical layer

B.

Storage layer, session layer, application layer, network layer, transfer layer, and security layer

C.

Storage layer, computing layer, application layer, network layer, transfer layer, and security layer

D.

Storage layer, computing layer, application layer, network layer, transfer layer, and physical layer

Full Access