Exam 11: HCIE-Storage

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not a disaster recovery manual restart configuration necessary to restore the production system (Multiple choice.)

(Multiple Choice)
4.8/5
(30)

When planning a dual-active disaster recovery solution, the business end adopts the cluster application. Which of the following cluster applications can support the AA working mode?

(Multiple Choice)
4.8/5
(36)

Backup strategy development principles are based on which of the following (multiple choice)

(Multiple Choice)
4.8/5
(36)

In preparation for disaster recovery design, what is the description of the right side.

(Multiple Choice)
4.8/5
(42)

When the database is protected and the virtual snapshots are used from the end to verify LUN data consistency on the production end and the disaster recovery end. However, the disaster recovery end of the LUNd database can not be started normally. What is the possible reason? (Multiple choice.)

(Multiple Choice)
4.9/5
(32)

In a Huawei OceanStor 18000 the engine, SVP, disk enclosure, and PCIe switch interconnections must be in accordance with certain rules and order. Which of the following statement is incorrect?

(Multiple Choice)
4.8/5
(33)

In an HPUX system, you use the lv image lvreduce or lvsplit command / dev / vg01 / lv - test within a mirror.  Which command will test the implementation of the following command lvsplist / dev / vg01 / lv -, using vgdisplay-v system to see what the lv is.

(Multiple Choice)
4.9/5
(25)

VxVM (veritas volume manager) in the N8500 clustered NAS system is located between the operating system and the data management system. The operating system provides an excuse service to access the disk, the physical storage device connected to the host and the level of the data management system provides a logical device. The Layers of logical devices are called VxVM volumes.

(True/False)
4.8/5
(41)

Huawei two nodes Standard Edition N8500, opened the CIFS service. Which of the following CIFS parameters prevents users from seeing other users in the table of Contents?

(Multiple Choice)
4.8/5
(38)

Which command will modify vg01 into vg - app without affecting the HPUX 11.31 system volume group?

(Multiple Choice)
4.8/5
(37)

In the OceanStor 18000 storage system, a 15K RPM SAS disk is used. Assuming that the average seek latency of this type of disk is 6 ms. which type of disk can provide a single disk IOPS?

(Multiple Choice)
4.8/5
(35)

OceanStor V3 does not start up normally within 15 minutes after the system is powered on. What can you use to log in to the storage system in order to locate this fault? (Multiple choice.)

(Multiple Choice)
4.9/5
(42)

Which of the following is not part of the storage troubleshooting process?

(Multiple Choice)
4.9/5
(41)

Which of the following are the basic principles of storage troubleshooting? (multiple choice)

(Multiple Choice)
4.8/5
(35)

Disaster recovery project information research mainly includes information about who, what, and why. What is the following information background? (multiple choice)

(Multiple Choice)
4.9/5
(36)

all OceanStor Unified Storage Array disks have the ability to store dirty data after a sudden power failure

(True/False)
4.9/5
(35)

When one of the nodes in the Huawei N8000 cluster fails, the service IP address of the node cannot be accessed. Which of the following methods can recover the affected services?

(Multiple Choice)
4.7/5
(40)

Database applications are one of the important applications supporting storage arrays. Different application configurations and parameter settings may affect the service performance. In order to store arrays (such as OceanStor V3 series storage) with SQL server applications with the best performance, which of the following statements is wrong:

(Multiple Choice)
4.9/5
(39)

What is correct about the reconstruction of the Huawei OceanStor V3 storage system? (Multiple choice.)

(Multiple Choice)
4.9/5
(38)

Erasure code redundancy technology is a data file is divided into ODC (M logo) equal length data blocks, generated by encoding RDC. Any of the RDC fragments can be restored out of the original file, which can tolerate up to ODC node failure, to achieve the purpose of data protection.

(True/False)
4.9/5
(35)
Showing 261 - 280 of 472
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)