Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H13-629_V2.0 Questions and Answers

Note! Following H13-629_V2.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H13-629_V2.5

H13-629_V2.0 Questions and Answers

Question # 6

True or False, Info Replicator supports copying the data at the same time. The basic attributes of the home directory, extended attributes, ACL (access control list).

WORM (write-once-read-many) and CIFS / NFS share configuration information is known as a wealth island from the end. When a disaster occurs, master and slave sites can quickly take over the business after the switch.

A.

True

B.

False

Full Access
Question # 7

Huawei Oceanstor 9000 provides a single file system to the outside through the unified file system namespace management. Which of the following description is correct? (Multiple choice.)

A.

The namespace isautomatically created when HUAWEI OceanStor 9000 is started with the same name as the system namespace.

B.

Namespaces as the root directory of the entire system can not be shared and visited, only if ask the subdirectories below it can be shared and visited.

C.

A unified namespace provide users with a unified storage resource pool to achieve the centralized management of storage space and distribution.

D.

Each file share directory is a subdirectory of the namespace.

Full Access
Question # 8

Which of the following copy is supported by OceanStor V3 remote file system?

A.

Synchronous and asynchronous replication

B.

Simultaneous replication

C.

Asynchronous replication

D.

support multiple file system consistency replication

Full Access
Question # 9

The Redhat Linux Enterprise 6 cp command is used to complete the operating system data migration. What steps are needed to verify the transfer? (Multiple choice.)

A.

Check if the size of the migrated file is the same as the original data.

B.

Check if the number of documents corresponds to the original data

C.

Check if each file with read and write permissions corresponds to the original data

D.

Whether the time for reviewing the case file corresponds to the original data.

Full Access
Question # 10

The iSCSI protocol is mapped on the TCP protocol. For a TCP encapsulation of the iSCSI protocol packet, which of the following parts are not included?

A.

TCP Header

B.

IP Header

C.

ISCSI Header

D.

ISCSI data

Full Access
Question # 11

In a A VTL6900-I system, the backup server connected to it is the Linux operating system. The backup server and the VTL6900-I system are directly connected through the FC.

The server identifies the device information as shown below. After the backup server is configured as a backup client for the VTL6900-I system and the backup VTL system on the server virtual library process, which the following operation and description is correct:

(Multiple choice.)

A.

When configuring thebackup client on the VTL side, you need to know that the WWPN of the FC port that connects the VTL to the VTL is available on the server in the sys /class / fc_host directory and subdirectory to the corresponding WWPN port.

B.

Server-side identification has been detected with the library device command is cat / proc / scsi / scsi.

C.

As shown in the figure, among the devices identified on the server side, the device labeled 1 is the scanned library.

D.

As shown in the figure, of the devices identified on the server side, the device labeled 2 is the information for the scanned tape.

Full Access
Question # 12

Which of the following statementsabout multi-plane system design of the Huawei Oceanstor unified storage system is correct?

A.

The service plane uses GE channels for data transmission.

B.

The service plane connects the host IO channel, disk IO channel and GE switching channel.

C.

Plane redundancy between each other, when the business plane fails, allowing the use of control plane transmission services.

D.

When the GE switch channel fails, you can use the PCIe switch channel as a backup data transmission channel.

Full Access
Question # 13

Customers use Redhat Linux enterprise 6 LVM to manage user data disks in the cluster. When using pvmove data migration you can not enforce OK. What is a possible reason for this.

A.

Pvmove command does not support Linux cluster.

B.

Redhat Linux enterprise 6 version of lvm does not support the pvmove command.

C.

You need to install the cmirror package and run it on the cluster server.

D.

Need to lvm version down to 1.0 before using pvmove migration data.

Full Access
Question # 14

An Engineer installed a OceanStor 9000 for a customer (a total of 5 OceanStor 9000 C Node, front and rear endsare 10GE TOE networking, on-site installation TOE network card). Then connected the signal lines, power lines, and debugged the software. During the installation there were issues. Which of the following description of these issues are correct? (Multiplechoice.)

A.

5 devices TOE NIC A0, B1, and A0, B3 inserted into the PCIe slot will not affect the system. Deployment will not affect the network bandwidth, so it cannot be adjusted.

B.

The signal cables are long and need to be strapped to the cabinet or placed on the bottom tray.

C.

Label NODE 01 A0-0 The signal cable is inserted in the network port A0-1. The signal cable labeled NODE01 B3-1 is inserted in the network position B3-0, due to the same network card two network port peer, you can place the wrongline, you cannot adjust.

D.

CE6850 switch connected to two stacked copper cables, one of which is needed to post-cold more cold, because it does not affect the network interoperability. You can base this software debugging.

Full Access
Question # 15

True or False, the disaster recovery plan ofHuawei means that when the production site fails, the production business is automatically switched to run the disaster recovery site.

A.

True

B.

False

Full Access
Question # 16

During the migration of SANstorage by LVM from AIX, the data migration designer is in a very important stage. Prior to accessing new devices, there are a number of issues that needs to be considered to help with data migration design, including: (Multiple choice.)

A.

This device can not / should not be connected to an existing SAN.

B.

AIX system how to connect to the new storage device.

C.

How AIX systems and data can be migrated from the old disk to the new disk.

D.

The format of the file system, whether the file group is compatible with the new device volume.

Full Access
Question # 17

Assuming a site data volume of 600GB, A, B site replication bandwidth between 40% of GE network resources, and asynchronous remote replication synchronization. If the synchronization time is 180 minutes and begins at 9:00 AM, when will the next synchronization start?

A.

10:25

B.

12:00

C.

15:00

D.

15:20

Full Access
Question # 18

True or False, the Huawei Oceanstor backup solution integration program is one machine.

A.

True

B.

False

Full Access
Question # 19

Huawei OceanStor storage controller BBUs are both in a fault alarm. Which description is correct for the upper application?

A.

System does not work.

B.

If the device is powered offunexpectedly, some of the business data will be lost.

C.

Business performance is not affected.

D.

Upper business IO read and write will not have any impact.

Full Access
Question # 20

Huawei Standard Edition N8500 has two nodes named Pubeth1 and Pubeth4. It opened the NFS service. NFS server accepts recovery after NFS guest.

However, the client mount point can not be accessed into the directory for a long time without echo. What do you need to do to fix it?

A.

Restart the NFS server of the N8500

B.

Restart the client's NFS service

C.

Reseat the NFS client network cable

D.

Forcibly unmount the NFS client mount point and mount it again

Full Access
Question # 21

The user backup client has sufficient resources and the production network resources arerelatively tight. The amount of data scheduled to be backed up weekly is 1-2T. The backup window is 3 hours, using source-side de-duplication, deduplication ratio of 3, the bandwidth utilization value of 0.8. Based on this, what kind of networking can meetthe backup business needs and investment least?

A.

GE LAN-free

B.

10GE LAN-free

C.

FC LAN-free

D.

server-free

Full Access
Question # 22

The customer online database runs on an OceanStor S5500T storage system. The database uses a total of 6 LUNs. Now it's time to put the number on the S5500T. Which of the following statemetns are correct regarding the use of array-side functions to complete the data migration? (multiple choice)

A.

Multiple LUNs for Customer Business. When implementing data migrationusing remote replication, you need to add multiple remote replication tasks to a consistency group

B.

Use remote replication to complete online data migration

C.

LUN copy or remote replication. After the migration is complete, you do not need to do any configuration on the host to start the service

D.

LUN copy data migration. During the copy process, you can dynamically change the migration rate

Full Access
Question # 23

The backup back-end capacity is derived from the initial capacity and data increment.

A.

True

B.

False

Full Access
Question # 24

Customers need to migrate 10TB service data from a manufacturer's mid-tier storage to Huawei OceanStor S5600T (V100R005), storage array, A total of 120 LUN carrying oracle, ESXI virtual machine business plans to use VIS6000T local image data migration. Based on this, which of the following is incorrect?

A.

Check the compatibility list of the VIS 6000T to determineif all the storage devices are compatible with the VIS6000T

B.

Check the number of fiber switch ports to ensure that each node and switch VIS6000T redundant links

C.

Check if there is enough room for DCO configuration

D.

Confirm that heterogeneous common storage multipathing software and Ultrapath multipathing must be compatible

Full Access
Question # 25

A client has 1100GB of data, including a backup window of 3 hours. The customer network uses GE networking. In order to meet customer backup requirements, you can only choose LAN free backup networking.

A.

True

B.

False

Full Access
Question # 26

In a synchronous replication scenario, an application's peak write throughput is 16 MB/s, average write throughput is 500 KB/s, average write 1/0 size is 8 KB, privateinformation overhead is about 11%, and the FC network bandwidth utilization rate is 70%. The throughput of the disaster recovery network must be at least ( ).

A.

206 Mbit/s

B.

23 MB/s

C.

16 MB/s

D.

800 KB/s

Full Access
Question # 27

Because the first three nodes of Huawei OceanStor 9000 form an ISM cluster, you need to connect NIC0 of the first three storage nodes to the management switch.

A.

True

B.

False

Full Access
Question # 28

On the command line of the N8500 (V200R001) clustered NAS system, you run the NFS> share add rw, no_root_squas / vx / xscmfs command. Which of the following is correct regarding this?

A.

The client can modify the file system when it accesses it

B.

It allows asynchronous writes to the file system and writes to the disk of the file system when the operation request is not responding

C.

It sets the client's root user does not have root privileges to access the NFS shared file system

D.

NFS shares created can be accessed by all clients

Full Access
Question # 29

Two Standard Edition N8500 nodes created two file systems, namely fs01 and fs02 and the file systems are online. If the two file systems are set, then which of the following will appear?

A.

The file system is automatically offline and can not be pulled manually

B.

The file system is automatically offline, but it is also manually pulled

C.

file system will not automatically offline, but if you manually offline it and then try it offline

D.

The file system does not automatically offline, but it will succeed if you manually try to bring it offline again

Full Access
Question # 30

An MSCS Two-Node Cluster Interconnects with Disk Arrays via the iSCSI Protocol in a Multipathing Environment and Multipathing Software installed on Each Node. You build the cluster configuration using the wizard and part of the description shows that the quorum disk and resource disk can not be online. The following statement is correct regarding this scenario:

A.

The shared disk file system uses the GPT format that caused the quorum diskto fail Online

B.

The quorum disk can not be online due to the cluster feature that does not enable multipathing software

C.

The MSCS Cluster service does not bring the volume resource online. The resource disk can not be online

D.

Heartbeat network timeout causes arbitration disk and resource disk probability online

Full Access
Question # 31

A file system in a clustered NAS systemperforms heartbeat synchronization between nodes. When the heartbeat is interrupted, the N8000 cluster is split into multiple small groups, resulting in data loss. The N8000 provides a fencing function to avoid the occurrence of the split-brain issue. Which of the following descriptions of the role of fencing correct?

A.

Monitor GAB and check for changes in cluster members

B.

Guarantee a single view of the members of the cluster

C.

In the absence of a single cluster control, to prevent multiple nodes withVolume Manager to access shared storage

D.

cluster abnormal recovery automatically master node

Full Access
Question # 32

Users use storage foundation HA cluster software and two Huawei bladeservers to build a highly available environment for enterprises to provide important business 7 * 24 hour service. One day due to an abnormal power failure one of the servers can not start normally. When the cluster server is in a wait state what command should be issued?

A.

hacf -verify

B.

hastart -all

C.

net start vcscomms

D.

gabconfig -cx

Full Access
Question # 33

VMware cluster high availability technology enables proxies and Vcenter servers on each physical virtualization host to perform proxy communications. Vcenter retry and arbitration can be used to determine if there is a failure of this host

A.

True

B.

False

Full Access
Question # 34

As shown in the figure, the main features of this backup network mode are:

(Multiple Choice)

A.

Backup tasks will consume a lot of LAN resources.

B.

Backup tasks will consume few LANresources.

C.

Backup tasks will consume a lot of CPU resources of the production system.

D.

Backup tasks will consume few CPU resources of the production system.

Full Access
Question # 35

Which of the following is a description of the WORM feature of OceanStor V3: (Multiple choice)

A.

When the file is locked, the file protection time can be extended or shortened by manual operation

B.

Locked file system WORM clock is greater than the file atime value, the file will be in an expired state

C.

When the file is in an append state, after the legal clock of the WORM file system exceeds the file expiration time,the file is movedMoved to expired status

D.

When the size of the file is 0 bytes, the lock state can be migrated to the additional state

Full Access
Question # 36

In the mirroring scenario of OceanStor VIS6600T, an engineer detected an abnormal mirroring alarm on the VIS6600T. When you login to the ISM interface, you can view the mirror status of the volume in the corresponding logical disk group based on the alarm and find that the status of a volume in the mirror is NODEVICE.

The reason may be: (multiple choice)

A.

The disk on the array on which the failed mirrored volume failed

B.

Array where the failed mirrored volume is powered down

C.

The RAIDarray is degraded on the array where the failed mirrored volume is residing, and the hot spare is being rebuilt

D.

All optical links between the VIS 6600T and the array in which the failed mirror volume is located have failed

Full Access
Question # 37

Which of the following are Oracle11g logical backup methods?

(Multiple choice)

A.

EXP

B.

RMAN

C.

EXPdp

D.

imp

Full Access
Question # 38

With Redhat linux enterprise 6 system the df and du commands allowyou to see the mnt capacity, as shown below. What causes the capacity shown to not be the same?

redhat: ~ # df -h / mnt

Filesystem Size Used Avail Use% Mounted on

/ dev / sdb 1008M 514M 443M 54% / mnt

redhat: ~ # du -hs / mnt

40k / mnt

A.

The mntdirectory mounted block device is abnormal

B.

The mnt directory is also mounted another block device and some files that are currently open.

C.

The mnt directory have been deleted

D.

This is a bug of the known du and df commands that need to be upgraded tothe latest version

Full Access
Question # 39

Customers purchased 3 RH228H v2 hosts (with LPE12002-AP_8G HBA with 2 FC ports), 2 Oceanstor VIS6600T (a total of eight four-port 8G FC interface card, two 4-port 1GE interface card, two8-port 1GE switch module), two Huawei OCeanStor S6800T, and 2 Brocade 300 switches to build VIS6600T 4-node cluster and pass two S6800Ts.

The VIS600T cluster is mirrored. Each of the three hosts needs a standard dual-switch redundancy network connected tothe VIS6600T4 node. Each Brocade 300 Fiber Channel switches need to use which number of FC ports?

A.

15

B.

19

C.

21

D.

17

Full Access
Question # 40

Which remote replication description about the OceanStor V3 file system is correct? (Multiple choice.)

A.

Theobject-based approach to data replication.

B.

ROW snapshots based on the cyclical manner of data replication.

C.

The user can trigger manually or system timing synchronization.

D.

Support dequota quota information of the main file system to theslave, no need for the slave to configure quota.

Full Access
Question # 41

When the N8500 (V200R001)clustered NAS operating system is archived as a banknote imaging platform, the information about storage units and networks is set. Choose the correct statement.

A.

When the access to the N8500 is all on the intranet, and the client traffic is not equal,it is recommended to configure the "balance-alb" mode (that is, bond 6 mode).

B.

When creating a LUN, write business for a long time, the stripe depth recommended 512KB.

C.

If the RAID group is configured as RAID 6, the number of member disks isrecommended to be 9 disks, and it is not recommended to configure the RAID group.

D.

Fencing LUN should be placed in the same RAID group.

Full Access
Question # 42

VMware's storage resources can be provided through VMFS, native direct-attached storage via ESXi host-FC /FCOE or iSCSI link of the shared storage. You can also share the file system over the NFS network to support third-party NAS storage.

A.

True

B.

False

Full Access
Question # 43

You are building out a large-scale FC storage network where all switches are cascaded. When multipleFC switches are cascaded, which of the following scenarios will cause the switch to isolate E_prot port? (multiple choice)

A.

FC switch Zone conflict

B.

FC switch IP address conflict

C.

FC Switch Switch Name conflict

D.

FC switch domain ID conflict

Full Access
Question # 44

Which of the following statements are a correct description of the CIFS agreement?(multiple choice)

A.

CIFS does not allow multiple clients to access

B.

The CIFS client writes the shared file and does not write to the storage system immediately. Instead, the file is saved in the local cache and can be read againImprove read rate, improve performance

C.

CIFS does not support anonymous transmission and shared authentication access

D.

CIFS supports a variety of character sets to ensure CIFS can be used in all language systems

Full Access
Question # 45

Which of the following is correct about the OLAP business load characteristics? (multiple choice)

A.

Read operation for sequential read

B.

A single IO is large, thetypical value of 64KB ~ 1MB

C.

No IO write operation

D.

Usually data is not overwritten by the cycle or days to measure

Full Access
Question # 46

When using lvm to create a mirrored logical volume, you should choose what kind of log file to save inorder not to impact performance and quickly recover from a single drive failure?

A.

store the log in memory

B.

Store the log in any one of the two PVs

C.

Store the log in the third PV of the current VG

D.

Save the log in another VG pv

Full Access
Question # 47

OceanStor 18000 hot backup strategy is set to high, all using 1TB hard drive when the hard disk domain, respectively, eight hard drives, 80 hard drives, 180 Hard disk, 280 hard disk, the system will be assigned how much hot spare space, in Terabytes?

A.

1,7,8,9

B.

1,7,15,24

C.

1,4,8,9

D.

1,5,7,9

Full Access
Question # 48

Existing set customer of database uses a raw device, due to thelarge amount of data in the database. The customer plans to replace the old storage with new storage devices.

In the process of environmental inspection lvcb engineers found the following:

#getlvcb -TA sjklv

Intrapolicy =

copies = 0

interpolicy =

lvid =

lvname =

label =

machine id =

number Ips = 0

relocatable =

strict =

stripe width = 0

stripe size in exponent = 0

type =

upperbound = 0

fs =

time created = time modified =

As the vg is too large, the expansion of vg is impossible. As the service window isvery short, and customers do not want to avoid the risk of large adjustments of the whole original environment, what is the recommended approach?

A.

Based on lvcb offset reconstruction nude equipment, and the database level 0 backup import

B.

Use the dd command for data migration

C.

Use the cplv command for data migration

D.

Use migratepv for data migration

Full Access
Question # 49

What is the error in the Oracle ASM description?

A.

ASM directly manages the hard disk, not the files, the files are evenly distributed across all the disks.

B.

ASM instance SGA includes buffer pool share pool larger pool and so on.

C.

ASM instances can be synchronized and data instances started and synchronized, and must be closed later than the database instance.

D.

ASM is an oracle-based storage solution similar to RDMS, consisting of instances and files, maintained by the sql plus tool.

Full Access
Question # 50

In the case of the Oceastor VIS6600T with dual switch redundancynetworking, log in to the Windows machine connected to the VIS6600T and configure the set of multi-path software Ultrapath control interface to see the number of physical path than the planned network computing path less, the possibility of this phenomenon.

What is the reason for this? (Multiple choice.)

A.

Host to the optical switch connection is abnormal.

B.

When configuring the zone on the switch, configure the FC port and the host port that works in the working mode of the VIS6600T as a target in one zone.

C.

The working mode of the VIS6600T is abnormal because the initiator's FC port is connected to the optical switch.

D.

In the working mode of VIS 6600T, the connection between the FC port of the target device and the optical switch is abnormal.

Full Access
Question # 51

The figure shows an N8500 (V200R001) NAS engine chassis. The two NAS engine nodes in the chassis form a two-node N8500 NAS cluster. Which description of the front-end and back-end network planning of the cluster is correct. (Multiple choice.)

A.

On the slots of the same position on both nodes, such as A3 and B3, you must insert the same type of interface card.

B.

A5 and B5, A6 and B6 can be chosen to be networked, the key is howto make the network connections.

C.

If the back end of the engine cluster is to be directly connected to four control enclosures, add one FC HBA card in slots A2 and B2 for the controller enclosure of direct connection.

D.

A2, A3, A4 and B2, B3, B4 can beplugged into a 1Gb iSCSI or 8Gb FC interface module to connect with the business network.

Full Access
Question # 52

True or False, all OceanStorUnified Storage Array disks have the ability to store dirty data after a sudden power failure

A.

True

B.

False

Full Access
Question # 53

The RMAN command dbms-rcvcat in the three PL / SQLpackages is used to query the recovery catalog and target database control files, such as the list, report commands or a call to the package.

A.

True

B.

False

Full Access
Question # 54

WMware backup transfer mode NBD SSL refers to the backup agent through the TCP / IP network to read the backup data, VSA and ESX between encrypted transmission.

A.

True

B.

False

Full Access