Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

H13-611_V4.5 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H13-611_V4.5 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HCIA-Storage V4.5
  • Last Update: Sep 12, 2025
  • Questions and Answers: 536
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H13-611_V4.5 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H13-611_V4.5 Practice Exam Questions with Answers HCIA-Storage V4.5 Certification

Question # 6

The following different types of SSD disks have the lowest unit capacity price:

A, SLC

B, eMLC

C, cMLC

D, TLC

Full Access
Question # 7

The following description of NAS is correct:

Description 1: NAS is always based on file sharing.

Description 2: The distance of the network connection affects the performance of the NAS.

A, Description 1 and Description 2 are correct.

B. Description 1 is correct, description 2 is incorrect

C. Description 1 is wrong, description 2 is correct

D, description 1 and description 2 are wrong

Full Access
Question # 8

What is the correct description of the advantages of Huawei RAID 2.0+?

A.

The data is automatically and evenly distributed on the hard disks in the storage pool to avoid uneven heating and cooling of the hard disk, thereby reducing the storage system

Overall failure rate

B.

Overcome the performance bottleneck of the traditional RAID reconstruction target disk (hot spare disk), making the reconstruction bandwidth write bandwidth no longer

It becomes the bottleneck of the reconstruction speed, which greatly improves the reconstruction speed, reduces the probability of double-disk failure, and improves the storage system.

Reliability.

C.

There is no write penalty in RAID2.0+, which overcomes the write penalty in RAID 5 and RAID 6 levels in traditional RAID technology

The impact of the penalty on the write performance of the LUN has greatly improved the performance of the LUN

D.

The data on a single LUN is distributed to many different hard disks, avoiding hard disk hot spots, making single LUN performance and

The capacity has been greatly improved

Full Access
Question # 9

Which of the following three disaster recovery technologies are commonly used? (Multiple choice)

A.

Disaster recovery based on the host layer

B.

Disaster recovery based on the network layer

C.

Array-based disaster recovery

D.

Disaster recovery based on application layer

Full Access
Question # 10

The following description of common storage protocols is correct?

A.

The ATA protocol uses a parallel interface, which can only be built-in and requires cable length

B.

The SCSI protocol does not support hot swap

C.

A SAS domain can connect 15 devices

D.

FC protocol has good compatibility and long transmission distance

Full Access
Question # 11

IP drift supports drifting between different types of interface modules.

A.

TRUE

B.

FALSE

Full Access
Question # 12

According to the changes in the amount of backup data, the types of backup can be divided into:

A.

Real-time backup

B.

full backup

C.

incremental backup

D.

differential backup

Full Access
Question # 13

In a traditional RAID group, when a certain number of hard drives fail, the entire RAID group can prevent data loss, and

The data recovery process has not been started. What is the status?

A.

Normal work

B.

Downgrade

C.

invalid

D.

Refactoring

Full Access
Question # 14

What is wrong with the following description of DAS?

A, DAS refers to the storage device is directly connected to the server through a SCSI cable or Fibre Channel

B. The data in DAS mode is still scattered, and each application has a set of storage devices. Management is decentralized and cannot be centralized

C. When the server and the storage device are directly connected, new application requirements arise, only for the newly added server

Separate storage device configuration, resulting in repeated investment

D, DAS storage space can be fully utilized, storage devices that can be shared by different application servers, fully

Leverage idle storage space

Full Access
Question # 15

SAN network-based data replication technology is a storage area network between front-end application servers and back-end storage systems

Network (SAN), adding a layer of intelligent switches, the front end is connected to the server host, and the back end is connected to the storage device.

A.

TRUE

B.

FALSE

Full Access
Question # 16

What is the infrastructure of the data center? (Multiple choice)

A.

Fire protection system

B.

Power supply system

C.

Cabinet system

D.

Comprehensive wiring

Full Access
Question # 17

According to the physical location of the NAS engine and storage device, the NAS is divided into: (multiple choices)

A.

Internal NAS

B.

External NAS

C.

Unified NAS

D.

Gateway NAS

Full Access
Question # 18

With the advent of the era of big data, the corresponding storage technology is also undergoing changes.

Is the following statement correct? (Multiple choice)

A.

The file system develops from a local file system to a cluster file system and a distributed file system

B.

Traditional NAS, facing PB-level data, complex volume management and unbalanced system capacity allocation, will result in waste of resources

C.

The mass storage system is characterized by a more complicated file system and more complicated management

D.

Having large-scale expansion capability is the characteristic of mass storage system

Full Access
Question # 19

For a system with high business continuity to find that, the characteristics of RPO and RTO values ??should be:

A, RPO is higher, RTO is lower

B. RPO is lower, RTO is higher

C, RPO and RTO are lower

D, RPO and RTO are higher

Full Access
Question # 20

Bank's bill imaging system often stores structured data on a SAN array, and unstructured data

On the NAS array.

A.

TRUE

B.

FALSE

Full Access
Question # 21

In the FC protocol, which of the following layers is responsible for encoding and decoding?

A, FC-0

B, FC-1

C, FC-2

D, FC-3

Full Access
Question # 22

Distributed object storage has a unified namespace, and supports online expansion.

A.

TRUE

B.

FALSE

Full Access
Question # 23

After employee A of a company logs into the storage device of the company system, he finds that he has certain control rights. But not repairable

If the system time is changed, user management cannot be performed. May I ask which of the following roles does Employee A have?

A.

Super administrator

B.

Administrator

C.

ordinary users

D.

Read-only users

Full Access
Question # 24

CKG is composed of multiple CKs on different hard disks of different types in the hard disk domain.

A.

TRUE

B.

FALSE

Full Access
Question # 25

In Huawei storage systems that use RAID 2.0+ technology, a hard disk domain can only contain one type of hard disk.

A.

TRUE

B.

FALSE

Full Access
Question # 26

Which of the following is not a backup type?

A.

Full backup

B.

Cumulative incremental backup

C.

Differential incremental backup

D.

real-time backup

Full Access
Question # 27

A reliable ICT infrastructure, to avoid a single point of equipment failure, or even a single point of personnel problems.

A.

TRUE

B.

FALSE

Full Access
Question # 28

In the HUAWEI OceanStor storage system, which protocol is used for the mirror channel between the controllers?

A.

IB

B.

PCI-E

C.

FCoE

D.

iSCSI

Full Access
Question # 29

Xiao Wang, an employee of a small business, accessed the CIFS protocol on a Linux application server supported by his company's storage system

Ask about shared files.

A.

TRUE

B.

FALSE

Full Access
Question # 30

Regarding OceanStor V3 LUN deletion, what is wrong in the following description?

A.

The deduplication function is used together with SmartCache to accelerate performance

B.

The taken-over heterogeneous array LUN supports block-level deduplication

C.

Deduplication and remote replication cannot coexist on the same LUN

D.

When the LUN is created, the deduplicated LUN is selected and cannot be restored to the state without deduplication.

Full Access
Question # 31

When the Windows copy program copies local files to the file system, the file system block size of the HUAWEI OceanStor storage system is the default, which ensures the full use of storage space.

A, right B, wrong answer: B

The SmartCache feature in HUAWEI OceanStor series products can only improve read performance, not write performance.

A.

right

B.

FALSE

Full Access
Question # 32

The port selected by the IP drift strategy has nothing to do with the port rate, only related to the location of the port, the order of selecting the port

Yes?

1. Port at the same position of the remote controller

2. Ports at other locations of the peer controller

3. The port of the local controller

A.

1->2->3

B.

2->1->3

C.

3->1->2

D.

2->3->1

Full Access
Question # 33

Description 1: When Windows mounts a CIFS share with the same IP address (domain name or machine name), the same user can

You can mount one or more shares at the same time, but you cannot use different users to mount the same or different shares.

Description 2: Windows cannot share multiple Homedir shares with the same IP address (domain name or machine name)

The user mounts multiple shares.

A.

Description 1 is correct, description 2 is correct

B.

Description 1 is correct, description 2 is incorrect

C.

Description 1 is wrong, description 2 is correct

D.

Description 1 error, description 2 error

Full Access
Question # 34

The following description of the characteristics of the LAN-FREE backup method is incorrect:

A.

The backup data stream does not occupy LAN resources

B.

The backup proxy does not affect the performance of the application server

C.

Backup performance is usually higher than LAN-BASED

D.

Does not affect user network performance

Full Access
Question # 35

The advantages and disadvantages of the disaster recovery technology of the host layer, network layer and array layer, the following statement is correct? (Multiple choice)

A.

For host layer disaster recovery, host layer replication will occupy certain host resources, which will affect the application system

B.

The initial construction cost of network layer disaster recovery is relatively low, and many manufacturers can provide solutions

C.

Array layer disaster recovery, the arrays at both ends must be products of the same manufacturer, unable to solve the heterogeneous problem

D.

Host layer disaster recovery is implemented on the host side, without considering the compatibility between the underlying devices

Full Access
Question # 36

An enterprise adopts cloud-level primary and backup data-level disaster tolerance. During business planning, two types of storage can be divided according to actual needs.

LUN: Protected LUN and unprotected LUN, create VMs that need disaster recovery on the protected LUN, and configure only the protected LUN

Set up array replication to save the storage space requirements of the disaster recovery center.

A.

TRUE

B.

FALSE

Full Access
Question # 37

What technology is used to convert Thick LUN and Thin LUN?

A.

clone

B.

LUN migration

C.

LUN copy

D.

Volume mirroring

Full Access
Question # 38

Two CKs in a CKG of RAID2.0+ can come from the same hard disk.

A.

TRUE

B.

FALSE

Full Access
Question # 39

Regarding the characteristics of the four disaster recovery modes of active-active, hot standby, warm standby, and cold standby, what is wrong in the following statement?

A.

The data center using cold standby mode has a long RTO and is unpredictable

B.

The data center adopting the HyperMetro mode has the shortest RTO time

C.

When a data center failure causes the service to become unavailable, the hot standby and active-active modes can be automatically switched by software

Services, while the warm standby mode requires manual intervention, and the cold standby mode requires manual intervention

D.

Hot standby mode requires the highest software cost

Full Access
Question # 40

Regarding data-level, application-level and business-level disaster recovery, is the following statement correct?

A.

About RTO, data level

B.

About RTO, data level

C.

About TCO, data level

D.

About TCO, business level

Full Access
Question # 41

In the Huawei storage system using RAID2.0+ technology, regarding the difference between Thick LUN and Thin LUN, the following

Which description is correct? (Multiple choices)

A.

Allocate storage capacity when Thick LUN is created

B.

The storage capacity is not allocated by default when the Thin LUN is created, and the storage capacity is allocated when data is written

C.

Thin LUN is more flexible than Thick LUN, and has better performance during sequential read and write of large IO

D.

Thin LUN makes the entire storage space utilization rate higher

Full Access
Question # 42

A device can only have one WWPN, but it can have multiple WWNNs.

A.

TRUE

B.

FALSE

Full Access
Question # 43

An e-commerce website usually has a relatively stable business volume, so I purchased the server and built a private cloud operation

During the Double Eleven promotion, the business volume is very large, so we rent the server from the operator's public cloud to share the festival's burden

Netherlands, this cloud computing deployment model belongs to?

A.

Public cloud

B.

Private cloud

C.

Hybrid cloud

D.

Community Cloud

Full Access
Question # 44

What is wrong with the following statement about disaster recovery drills? ,

A.

Perform exercises in accordance with the actual disaster recovery steps

B.

Familiarize yourself with the disaster recovery process through disaster recovery, and exercise business recovery capabilities for disaster

C.

Through disaster recovery exercises, the integrity of the business cannot be checked

D.

Disaster recovery exercises are verification and the most effective means to prove system availability

Full Access
Question # 45

Use the CIFS protocol to access the share. When the share name and the user name are the same, the shared order of access is:

A.

Query the CIFS share first, if there is no matching share information, then query the Homedir share

B.

Query CIFS share, if there is no query, it will return failure

C.

Query Homedir share first, if there is no matching share information, then query CIFS share

D.

Query Homedir share, if there is no query, it returns failure

Full Access
Question # 46

When a company's customers need to complete data migration between devices, what features can be used to complete? (Multiple choices)

A.

Remote replication

B.

LUN copy

C.

SmartMigration

D.

clone

Full Access
Question # 47

Backup is concerned with data recoverability, and disaster recovery is concerned with business continuity.

A.

TRUE

B.

FALSE

Full Access
Question # 48

Description 1: The file system of the NAS is managed by a storage or server that provides resources.

Description 2: The file system of the SAN is managed by the host itself.

A.

Description 1 is correct, description 2 is correct

B.

Description 1 is correct, description 2 is incorrect

C.

Description 1 is wrong, description 2 is correct

D.

Description 1 error, description 2 error

Full Access
Question # 49

The following statement is wrong: (multiple choice)

A.

Backup cannot solve the recovery of data corruption

B.

backup to solve the recovery of data loss

C.

Backup cannot solve the retrieval of historical data

D.

Backup can directly take over the business

Full Access
Question # 50

Snapshots used for backup purposes should be set to read-only to prevent modification by other applications and affect the backup data

consistency.

A.

TRUE

B.

FALSE

Full Access
Question # 51

The SATA connector can support both SATA and SAS hard drives.

A.

TRUE

B.

FALSE

Full Access
Question # 52

The initial capacity allocation strategy of HUAWEI OceanStor storage system defaults to automatic allocation.

A.

TRUE

B.

FALSE

Full Access
Question # 53

When does data become information?

A.

When it has been stored in the correct file format

B.

When the data has been stored in digital form

C.

When the enterprise understands the meaning of data and extracts the content needed for decision-making

D.

When the data is verified to be correct

Full Access
Question # 54

Can the following transmission protocols not use switches?

A.

iSCSI protocol

B.

SCSI protocol

C.

FC agreement

D.

FCoE agreement

Full Access
Question # 55

The SmartTier intelligent data grading feature requires three types of hard drives in the storage pool.

A.

TRUE

B.

FALSE

Full Access
Question # 56

In the HUAWEI OceanStor storage system, a customer plans to deploy 3 sets of systems, a set of business systems, to run

Oracle database, which requires high random read and write performance; a mail system for daily mail processing; a video system

System to save long-term archived videos. When creating LUNs for each system separately, the following about SmartTier policy settings

the correct one is? (Multiple choice)

A.

Business system:

1. Initial capacity allocation: priority allocation from the performance layer

2. Data migration strategy: move to the low-performance layer

B.

Mail system:

1. Initial capacity allocation: automatic allocation

2. Data migration strategy: automatic migration

C.

Video system:

1. Initial capacity allocation: priority allocation from capacity tier

2. Data migration strategy: automatic migration

D.

Video system:

1. Initial capacity allocation: priority allocation from capacity tier

2. Data migration strategy: move to the low-performance layer

Full Access
Question # 57

The data backed up by the differential backup is relative to the data added and modified after the last full backup.

A.

TRUE

B.

FALSE

Full Access
Question # 58

The OceanStor 6800 V3 frame itself can be configured with four controllers or only two controllers. If configured as dual control

The power supply and BBU are fully configured, and the interface cards and controllers are all arranged in the upper row.

A.

TRUE

B.

FALSE

Full Access
Question # 59

What are the characteristics of big data? (Multiple choice)

A.

Write once, modify many times

B.

The value of data is uncertain

C.

Large capacity and fast growth rate

D.

Long storage time

Full Access
Question # 60

Semi-structured data is generally self-describing, and the structure and content of the data are mixed and there is no obvious distinction.

A.

TRUE

B.

FALSE

Full Access
Question # 61

What are the following types of disaster recovery at the host layer? (Multiple choice)

A.

application level

B.

database level

C.

array level

D.

logical volume level

Full Access
Question # 62

Among the components of the mechanical disk, the parts responsible for reading and writing data are:

A.

Disc

B.

Read/write head

C.

Magnetic head arm

D.

Spindle

Full Access
Question # 63

The following description is correct: (multiple choice)

A.

OceanStor V3 series products support 8 controllers, and the switching plane between the controllers is IP-based Scale-out interconnection

B.

When the control frame of OCeanStor 5300 V3 is expanded from 2 to 4 controls, it can be directly connected or

Networking with switches

C.

In the OceanStor V3 series of new-generation storage products, the back-end loops of the same SAS interface card can be mixed and connected

Ordinary disk enclosure and high-density disk enclosure

D.

OceanStor V3 mid-range storage arrays use IP switches for interconnection, which has cost advantages. PCIe switches are dedicated

Switching, the cost is relatively high, mainly used in high-end storage

Full Access
Question # 64

When the disk is not accessible, what kind of reconstruction method is used when writing to the disk?

A.

Total reconstruction

B.

Local reconstruction

C, recovery and reconstruction

C.

Local reconstruction

Full Access
Question # 65

What are the three data centers in the disaster recovery plan that 3DC refers to? (Multiple choices)

A.

Production center

B.

The same city disaster recovery center

C.

Remote disaster recovery center

D.

Data center

Full Access
Question # 66

The FCoE protocol refers to encapsulating the FC protocol into a TCP/IP protocol package and transmitting it on Ethernet.

A.

TRUE

B.

FALSE

Full Access
Question # 67

What is wrong about the relationship between FC protocol and SCSI protocol?

A.

FC can transmit SCSI commands, data and status information units by constructing frames

B.

FC or iSCSI protocol is used to carry the SCSI protocol, is an extension of the SCSI protocol

C.

SCSI is the upper layer protocol of FC4, SCSI is a subset of FC protocol

D.

FC is an alternative to SCSI

Full Access
Question # 68

What is the role of multi-path software? (Multiple choice)

A.

Fault path switching

B.

Load balancing of IO traffic

C, fault path recovery

C.

Data recovery

Full Access
Question # 69

Description 1: The data recovery of the snapshot depends on the source data. If the source data is physically damaged, it cannot be recovered. and

In this case, the clone can still restore the source data.

Description 2: After the source data is damaged, the LUN copy must completely copy the backup data to restore the source data. And clone only

Damaged data needs to be recovered, which greatly reduces the recovery time.

A, description 1 is correct, description 2 is correct

B. Description 1 is right, description 2 is wrong

C, description 1 is wrong, description 2 is right

D. Description 1 is wrong, description 2 is wrong

Full Access
Question # 70

What are the maintenance items of the data center storage administrator? (Multiple choices)

A.

The first maintenance project

B.

Weekly maintenance projects

C.

Daily regular maintenance projects

D.

Real-time maintenance project

Full Access
Question # 71

If a company’s business is to write large-scale data randomly into the LUN, which capacity initial allocation strategy and which

Kind of data migration strategy?

A.

Automatic allocation: migration to the low-performance layer

B.

Priority allocation from high-performance layer: migration to low-performance layer

C.

Priority allocation from low-performance layer: migration to high-performance layer

D.

Priority allocation from the capacity layer: automatic migration

Full Access
Question # 72

The SCSI protocol is the basic protocol for host and disk communication. It is operated by the SCSI controller, the controller is equivalent

For a small CPU, it has its own command set and cache.

A.

TRUE

B.

FALSE

Full Access
Question # 73

There are two descriptions about backups:

Description 1: You can use the data backed up on the tape for data recovery at any time, but you can only recover to the backup moment

Historical data, not the data at the time of failure.

Description 2: Using tape as the backup medium is the highest RTO backup method.

A.

description 1 is correct, description 2 is correct

B.

Description 1 is right, description 2 is wrong

C.

description 1 is wrong, description 2 is right

D.

Description 1 is wrong, description 2 is wrong

Full Access
Question # 74

Which of the following statements about Huawei RAID 2.0+ are correct? (Multiple choice)

A.

Hot spare space cannot cross engine

B.

RAID 2.0+ uses an independent hot spare disk

C.

Chunk size and Extent size are not adjustable

D.

Automatically reserve a certain amount of hot spare space in the hard disk domain according to the hot spare strategy

Full Access
Question # 75

In RAID 2.0+, the administrator needs to manually set which hard drives are designated as hot spares.

A.

TRUE

B.

FALSE

Full Access
Question # 76

SCSI communication is initiated by the initiator and received and processed by the target. When the host and the storage device communicate, the storage device

The side assumes the role of initiator.

A.

TRUE

B.

FALSE

Full Access
Question # 77

The QoS of the file system supports IO priority configuration and policy configuration.

A.

TRUE

B.

FALSE

Full Access
Question # 78

Regarding the traditional model and cloud computing model, high reliability in the data center and cross-data center disaster recovery methods, the following says

What is wrong?

A.

In the traditional mode, the data center relies on component redundancy to achieve high reliability

B.

In the cloud computing mode, the data center relies on component redundancy to achieve high reliability

C.

In the traditional model, cross-data center disaster recovery is mainly based on copying business data, and the recovery process is complicated and the recovery period is long

D.

In the cloud computing mode, cross-data center disaster recovery is the replication of all data in the business data and operating environment.

Simple recovery process and short recovery period

Full Access
Question # 79

OceanStor 5300 V3 is a dual-controller converged storage product, which must ensure the working controller and attribution control of the LUN

The controller is consistent.

A.

TRUE

B.

FALSE

Full Access
Question # 80

A government unit adopts Huawei’s two-site, three-center solution for disaster recovery construction, and its business is mainly concentrated from 8:00 to 18:00.

What is wrong with the following approach?

A.

Production centers and remote disaster recovery centers should use synchronous remote replication

B.

The time period for data synchronization between the production center and the disaster recovery center should be selected when the business volume at night is small

C.

When doing remote replication, a consistency group should be created according to the business of the unit, and related businesses are placed in a consistents

D.

You can use the BCManager software to set the data synchronization period

Full Access
Question # 81

Which of the following is the most widely used FC topologies?

A.

Point-to-Point.

B.

FC Switched Network.

C.

Arbitration Loop

D.

FC Direct Connection.

Full Access
Question # 82

What are the main functions of the business continuity solution? (Select All that Apply)

A.

Minimize the impact on the business service.

B.

Predict the disaster occurrence accurately.

C.

Zero data loss and zero service interruption.

D.

Improve the utilization rate of the disaster recovery equipment

Full Access
Question # 83

Regarding the common components of ICT, is the following statement correct?

A.

Common components of ICT include host, storage array, switch, and network

B.

The mainframe is also called a server, referring to some computers with higher specifications in some enterprises

C.

Storage array usually refers to equipment that provides data storage

D.

The switch is also called a switching hub, which mainly works on a three-layer network

Full Access
Question # 84

A device has only one WWNN number, but it can have multiple WWPN numbers.

A.

TRUE

B.

FALSE

Full Access
Question # 85

The following describes RAID 10, which are correct? (Multiple choice)

A.

RAID 10 is used in scenarios with high requirements for speed and fault tolerance

B.

RAID 10 requires at least 4 member disks

C.

In RAID 10, if two member disks in a subgroup fail, the data is read normally

D.

In RAID 10, the data is first mirrored and then striped

Full Access
Question # 86

Which of the following statements correctly describe the improvements of SAS technology compared to SCSI? Select All that Apply.

A.

Lower cost than SCSI

B.

Full duplex transmission of data.

C.

Half duplex transmission of data

D.

Higher throughput.

Full Access
Question # 87

FTP is a very secure protocol with no security risks.

A.

TRUE

B.

FALSE

Full Access
Question # 88

What are the advantages of SSDs over HDDs? (Select All that Apply)

A.

Larger capacity

B.

Better environmental adaptability

C.

Faster read/write speed for random access

D.

Longer service life

Full Access
Question # 89

Which of the following is not one of the working principles of QoS?

A.

I/O Priority Scheduling.

B.

I/O Performance Assurance.

C.

I/O Flow Control

D.

I/O Latency Burst.

Full Access
Question # 90

Which of the following cannot be configured with a quota?

A.

User

B.

User Group.

C.

Volume

D.

Directory.

Full Access
Question # 91

DAS is a storage architecture without scalability.

A.

TRUE

B.

FALSE

Full Access
Question # 92

When configuring Thin LUN, not all configured storage space is allocated upon creation. The storage space for Thin LUN will only be allocated when it is used.

A.

False

B.

True

Full Access
Question # 93

An Internet company plans to purchase a storage device to store archived service data and online transaction data. SSDs are expensive and HDDs cannot meet the performance requirements of online services. Which features CANNOT solve this problem? (Select All that Apply)

A.

SmartMigration

B.

HyperMetro

C.

SmartTier

D.

HyperClone

Full Access
Question # 94

Which size of HDDs is used by Huawei storage products?

A.

5.25-inch

B.

3.5-inch

C.

1.8-inch

D.

8-inch

Full Access
Question # 95

In Huawei storage systems, which feature can be used to periodically detect and migrate hot data from the capacity tier to the high-performance tier?

A.

SmartQuota

B.

SmartMigration

C.

SmartMotion

D.

SmartTier

Full Access
Question # 96

Which of the following best describes the relationship between the storage and host in DAS?

A.

One-to-Many.

B.

Many to One.

C.

One-to-one

D.

Many-to-Many.

Full Access
Question # 97

For the data stored on the medium, there is no need to physically crush or sell it as the data recorded on the paper

Ruined situation.

A.

TRUE

B.

FALSE

Full Access
Question # 98

All components of storage devices use the redundancy design to ensure system reliability. Redundant modules include controller modules, management modules, BBU modules, interface modules, power modules, and fan modules

A.

False

B.

True

Full Access
Question # 99

A single-platter or multi-platter disk allows only one head to read and write data at a time.

A.

False

B.

True

Full Access
Question # 100

The following are the characteristics of the clustered NAS storage architecture: (multiple choice)

A.

Unified namespace, shared globally

B.

High performance, multiple arrays concurrent I/O

C.

Online expansion

D.

can provide block-level storage

Full Access
Question # 101

What is required to add additional controllers to an existing HUAWEI OceanStor system?

A.

SAS cabling

B.

56 Gb Infiniband module

C.

Smart I/O card

D.

FC or iSCSI Host Bus Adapter

Full Access
Question # 102

Which statements are true about RAID 2.0+? (Select All that Apply)

A.

An extent is a block of a fixed size in a chunk group (4 KB by default).

B.

A chunk group is a logical set of chunks on different disks.

C.

Chunks, which are blocks obtained by dividing each disk at a fixed size, are basic units of a RAID group

D.

A chunk group is the minimum unit for applying for and releasing space in a storage pool

Full Access
Question # 103

The following two descriptions are correct:

Description 1: Synchronous remote replication, when the primary storage fails, the amount of data lost can be 0.

Description 2: When the host is a Linux-based file system, asynchronous remote replication must be used.

A.

description 1 and description 2 are correct

B.

Description 1 pair, description 2 wrong

C.

Description 1 wrong, description 2 pairs

D.

description 1 and description 2 are wrong

Full Access
Question # 104

Deduplication and compression can only be enabled for Thin LUNs.

A.

TRUE

B.

FALSE

Full Access
Question # 105

If a disk domain has multiple disk types, the storage pools in that disk domain MUST have multiple disk types in them.

A.

False

B.

True

Full Access
Question # 106

Which statements are true about the ports of a Huawei OceanStor all-flash storage device? (Select All that Apply)

A.

Bond ports, VLANs, and logical ports are created based on available Ethernet ports

B.

The networks and services between VLANs are physically isolated, which improves the security and reliability of service data.

C.

Multiple Ethernet ports of the same controller are bonded to form a bond port to increase the bandwidth

D.

Multiple logical ports can be created for a bond port, but only one logical port can be created for an Ethernet port

Full Access
Question # 107

The following two descriptions are correct:

Description 1: The maintenance cost of traditional PC is usually lower than that of desktop cloud.

Description 2: In cloud computing, data is stored and managed centrally.

A.

Descriptions 1 and 2 are correct

B.

Description 1 is correct, description 2 is incorrect

C.

Description 1 is wrong, description 2 is correct

D.

Both descriptions 1 and 2 are incorrect

Full Access
Question # 108

What versions of the NFS protocol are there? (Multiple choice)

A.

NFS V1

B.

NFS V2

C.

NFS V3

D.

NFS V4

Full Access
Question # 109

NAS provides file sharing services through protocols such as NFS and CIFS.

A.

False

B.

True

Full Access
Question # 110

A bank purchases a new storage device. During the RAID level configuration, the bank requires that data reliability be improved and parity data be stored on different disks. Which RAID levels can meet the requirements? (Select All that Apply)

A.

RAID 0

B.

RAID 5

C.

RAID 3

D.

RAID 6

Full Access
Question # 111

Which is the correct order for evolution of mid-range storage architectures?

1) Fixed storage system configuration

2) Dual-controller active-active redundancy configuration

3) Flexible hardware component configuration

4) Flexible software function configuration

A.

4321

B.

1342

C.

2143

D.

1234

Full Access
Question # 112

In the scenario where only 2 disks are in the RAID group, which one of the following uses data striping?

A.

RAID 0

B.

RAID 5

C.

RAID 1

D.

RAID 6

Full Access
Question # 113

Which statements are true about the functions of HyperClone? (Select All that Apply)

A.

When the source LUN fails, service data can be recovered from any point in time before the fault occurred using the data backed up through HyperClone.

B.

If a disk failure occurs on the source LUN of HyperClone, you can split the target LUN from the source LUN to continue providing services.

C.

If a logical fault occurs on the source LUN, data can be reversely synchronized from the target LUN to the source LUN to recover services on the source LUN.

D.

Multiple target LUNs can be created through HyperClone to provide the service data on the source LUN for multiple applications.

Full Access
Question # 114

Which of the following technology segregates the nodes in the SAN fabric into multiple networks and allows access control of the members?

A.

Subnet.

B.

VLAN.

C.

Quarantine.

D.

Zoning.

Full Access
Question # 115

What three stages do storage systems need to go through to realize SmartTier? (Multiple choice)

A.

Initial capacity allocation

B.

Data layout analysis

C.

Data migration

D.

I/O monitoring

Full Access
Question # 116

Create a Thin LUN on HUAWEI OceanStor with a capacity of 100G and an initial allocated capacity of 10G, then

After mapping this LUN to the Windows 2012 host, the corresponding disk scanned on the host, the disk shows

The capacity should be 10G.

A.

TRUE

B.

FALSE

Full Access
Question # 117

Which statements are true about HyperMetro? (Select All that Apply)

A.

The local and remote sites can run services at the same time

B.

A quorum server must be configured.

C.

HyperClone can be configured only for storage devices of the same model and version

D.

Automatic switchover upon storage faults is supported.

Full Access
Question # 118

Which statement about SCSI is false?

A.

SCSI stands for "Small Computer System Interface". It is a protocol system

B.

SCSI supports communication between different devices.

C.

The latest protocol is SCSI-3, which provides a transmission speed of up to 1 GB/s

D.

The evolution is SCSI-1 > SCSI-2 > SCSI-3.

Full Access
Question # 119

Huawei OceanStor hybrid flash storage is used as an example. Which statements are true about IP address failover? (Select All that Apply)

A.

IP address failover applies only to IP SAN and does not apply to other storage network architectures

B.

A failover group is a combination of ports that are used for IP address failover in a storage system.

C.

Fallback means that the faulty port takes over services again after it recovers

D.

IP address failover ensures service continuity and improves the reliability of paths for accessing file systems

Full Access
Question # 120

Which ports in the FC switch can communicate with each other is determined by the zone.

A.

TRUE

B.

FALSE

Full Access
Question # 121

Which of the following statements about storage file systems is incorrect?

A.

NAS file systems include CIFS and NFS.

B.

NAS file systems allow multiple servers running different operating systems to share files stored on public storage media.

C.

CIFS provides a way for NAS storage devices to share files in the UNIX environment.

D.

NFS provides a way for NAS storage devices to share files in the Linux environment.

Full Access
Question # 122

Which of the following system model is a direct representation of the SCSI connection between the SCSI Initiator and Target?

A.

Serverless Architecture.

B.

Peer to Peer Architecture.

C.

Browser/Client Architecture.

D.

Client/Server Architecture.

Full Access
Question # 123

Cloud computing business models are: (multiple choices)

A.

IaaS

B.

PaaS

C.

SaaS

D.

MaaS

Full Access
Question # 124

Which is NOT the limitation of DAS, compared with SAN?

A.

Poor scalability

B.

Large investment

C.

Difficult resource sharing

D.

Decentralized management

Full Access
Question # 125

Description 1: HyperMirror has a LUN failure, the host service is not interrupted, the HyperClone primary LUN fails, and the host service is interrupted.

Description 2: HyperMirror supports dual copies, HyperClone supports a maximum of 1 master LUN: 16 slave LUN mode.

A.

description 1 is correct, description 2 is correct

B.

description 1 is correct, description 2 is wrong

C.

description 1 is wrong, description 2 is correct

D.

description 1 is wrong, description 2 is wrong

Full Access
Question # 126

What statement is true?

A.

IT managers should determine the retention period for data.

B.

Information Life Cycle management must be based on the costs for the storage hardware.

C.

Storing a lot of random, unstructured data can become a management problem for many companies.

D.

Technology is the main factor that decides which disaster recovery method will be implemented.

Full Access
Question # 127

Huawei V3 series storage system hardware includes controller enclosures and disk enclosures. Which of the following statements about controller enclosures is correct?

A.

When the external power supply fails, BBU modules provide backup power for all disks.

B.

When the external power supply fails, BBUs can supply power to enable data synchronization from the cache to disks in disk enclosures.

C.

If BBUs become faulty, the service system will be interrupted.

D.

When the power input is normal, BBUs are in the standby state.

Full Access
Question # 128

A differential backup holds all changes that were made since the last successful full backup.

A.

TRUE

B.

FALSE

Full Access
Question # 129

In order to make full use of storage resources, on which tier are SSDs usually configured in a tiered storage system?

A.

Capacity tier

B.

Performance tier

C.

High-performance tier

D.

Offline storage

Full Access
Question # 130

Match the operating system with the protocol. The operating systems include:1.Windows 2.Linux 3.Apple OSX; The protocols incude: A-NFS B - CIFS C - SMB

A.

1-A; 2-C; 3-A.

B.

1 - B+C; 2 - A ; 3 - A .

C.

1 - A+D; 2 - A+B; 3 - A .

D.

1 - C ; 2 - A+D; 3 - A.

Full Access
Question # 131

The mount command is used in Linux-based clients to connect the client to the NFS share.

A.

TRUE

B.

FALSE

Full Access
Question # 132

What applies to unstructured data? (Multiple Choice)

A.

After being written, the data is not often modified.

B.

Uncertain value.

C.

Large capacity, rapid growth.

D.

Long-term storage required.

Full Access
Question # 133

Clustered NAS can provide concurrent multi-node access of data to hosts.

A.

TRUE

B.

FALSE

Full Access
Question # 134

A backup set is a group of data that is backed up in a batch. A backup set can be used for either full backup or incremental backup.

A.

TRUE

B.

FALSE

Full Access
Question # 135

Which of the following statements is NOT true? (Multiple Choice)

A.

CIFS is a network-based sharing protocol. It has high demands on network transmission reliability, so it usually uses TCP/IP.

B.

One disadvantage of CIFS is that Windows clients must be equipped with dedicated software.

C.

NFS is a stateless protocol while CIFS is a stateful protocol. NFS can be automatically recovered from a fault while CIFS cannot

D.

Both the CIFS as well as the NFS protocol requires file format conversion.

Full Access
Question # 136

Storage cache can optimize the speed of the storage system.

A.

TRUE

B.

FALSE

Full Access
Question # 137

HyperReplication for HUAWEI OceanStor can use FC links the data centers. ISCSI links are not supported.

A.

TRUE

B.

FALSE

Full Access
Question # 138

About HUAWEI OceanStor, the following 2 statements:

Statement 1: With the SmartTier feature the SSD disks are in the Performance Tier.

Statement 2: No more than 3 tiers can exist in the OceanStor V3 storage arrays.

A.

Statement 1 and 2 are true.

B.

Statement 1 is true; Statement 2 is false.

C.

Statement 1 is false; Statement 2 is true.

D.

Statement 1 and 2 are false.

Full Access
Question # 139

A bank will launch a business system, which has very high performance and security requirements, and the database uses Oracle data

Database and plan to deploy the Oracle database to a storage system, then create a RAID group for the Oracle database

At this time, the optimal RAID strategy should be:

A.

RAID 1

B.

RAID 5

C.

RAID 6

D.

RAID 10

Full Access
Question # 140

What is the main purpose of backup battery units (BBU) in storage controllers?

A.

To maintain the power for clock synchronization.

B.

To power the interface modules.

C.

To provide additional power to storage controller to speed up the I/O.

D.

To ensure that the non completed I/O is not lost during power outage.

Full Access
Question # 141

When does data become information?

A.

When it has been stored in the right file format.

B.

When it has been stored in a digital form.

C.

When the company understands the data and learns from it

D.

AH of the above.

Full Access
Question # 142

When the RPO is minutes instead of hours the best backup method is traditional Tape backup.

A.

TRUE

B.

FALSE

Full Access
Question # 143

What does the term RPO mean?

A.

Return Purchase Order

B.

Recover Plan Objective

C.

Restore Point Objective

D.

Recovery Point Objective

Full Access
Question # 144

In the backup system, the data that needs to be backed up must go through the media server before being stored in the backup medium.

A.

right

B.

FALSE

Full Access
Question # 145

The failure of an SSD is more predictable than that of other disk technologies.

A.

TRUE

B.

FALSE

Full Access
Question # 146

Many companies gather so much data that they cannot extract the right information from the data,

A.

TRUE

B.

FALSE

Full Access
Question # 147

For random access to mechanical disks, the most significant impact on the time it takes to complete an IO is:

A.

Seeking time

B.

Rotation delay

C.

Data transfer time

Full Access
Question # 148

If no data migration plan is set, with SmartTier enabled, there will be no data movement at al between tiers.

A.

TRUE

B.

FALSE

Full Access
Question # 149

Storage array is a network device used to switching network signals or data. It can provide a dedicated communication channel between any 2 nodes in the network that is connected.

A.

TRUE

B.

FALSE

Full Access
Question # 150

The restore time objective (RTO) specifies the time needed to recover the data and servers after after a disaster has occured,

A.

TRUE

B.

FALSE

Full Access
Question # 151

Which of the following statements about RAID 5 are correct? (Multiple Choice)

A.

RAID 5 has fixed parity disks,

B.

RAID 5 uses the XOR algorithm for parity,

C.

RAID 5 writes data by stripes.

D.

RAID 5 tolerates the failure of a maximum of two member disks without losing data.

Full Access
Question # 152

Which of the following is not a characteristic of the Cloud?

A.

Ubiquitous Access.

B.

Shared pool of configurable resources.

C.

On Demand Self Service.

D.

Quick analysis of vast amount of data.

Full Access
Question # 153

Which of the following statements are characteristics of pre-copy technology?

(Multiple Choice)

A.

Migrates data from a suspected faulty disk to a hot spare disk immediately after the error count of the suspected faulty disk exceeds the preset threshold.

B.

Reduces the occurrence of reconstruction.

C.

Improves system reliability.

D.

Reduces system performance.

Full Access
Question # 154

Which of the following dimensions are often used to express the data used in Big Data scenarios? (Multiple Choice)

A.

Variety

B.

Volume

C.

Velocity

D.

Verticality

Full Access
Question # 155

What is best described as: the time it takes for the desired data to be beneath the read head when the head is on the correct track?

A.

Rotational latency

B.

Rotational speed

C.

Seek time

D.

Throughput

Full Access
Question # 156

Which of the following statements about LAN-free backup is incorrect?

A.

Backup data flows do not consume LAN resources.

B.

The backup agent does not affect the performance of application servers.

C.

Backup performance is improved compared to LAN- based backups.

D.

Network performance is not affected.

Full Access
Question # 157

You are the storage administrator of a media company that stores a lot of media files such as videos. You are asked to propose a proper storage architecture for a new storage system that stores all the video and graphic files of the company. The requirement is that it could run on commodity hardware in a distributed manner for unstructured data. Choose which one of the following architecture would be the better option.

A.

Block Storage Architecture.

B.

Clustered NAS Storage Architecture.

C.

Distributed Storage Architecture.

D.

Distributed Object Storage Architecture.

Full Access
Question # 158

Which of the following statements is incorrect?

A.

A RAID group is like a physical volume that consists of multiple disks.

B.

One logical volume can be created on a physical volume.

C.

Multiple logical volumes can be created on a physical volume.

D.

A LUN can reside on multiple RAID groups.The

Full Access
Question # 159

Currently all OceanStor V3 devices support SAS at 12 Gb/s.

A.

TRUE

B.

FALSE

Full Access
Question # 160

The only cable type that can be used to connect disk enclosures is the mini SAS cable.

A.

FALSE

B.

TRUE

Full Access