Practice Free H13-624_V5.5-ENU Exam Online Questions
When delivering a flash storage project, Huawei engineers introduced the multi-tenant feature of flash storage to the customer. This feature isolates service data. Although different tenants cannot access each other’s LUNs, they can access each other’s file system.
- A . TRUE
- B . FALSE
Which of the following descriptions of the SmartIndexing feature of Huawei OceanStorPacific series products are correct? (Multiple choice)
- A . Supports expansion of metadata retrieval clusters, but does not support reduction
- B . Support precise query and fuzzy prefix query
- C . After configuring remote replication, only the primary storage system supports enabling the metadata retrieval function, while the secondary storage system does not support enabling the metadata retrieval function.
- D . Files/objects in the HDFS recycle bin and namespace recycle bin support metadata retrieval
If you want to analyze disk performance, you can first use free, top, vmstat, pidstat and other tools that support more indicators, and then confirm the IO source, analyze the file system, process IO, etc.
- A . True
- B . False
When configuring the block service of distributed storage, in the () protocol scenario, it is necessary to create the initiator and host, and then map the volume and host.
A financial customer purchased a Huawei Oceanstor Darado series storage for business deployment. During an operation and maintenance process, the administrator found that the DeviceManager page loading was abnormal. Please analyze which of the following is not a possible cause of this abnormal phenomenon?
- A . Network issues lead to abnormal page loading
- B . Browser compatibility issues lead to abnormal page loading
- C . The FC switch is faulty, causing page loading abnormality
- D . Browser cache data is abnormal
For device reliability purposes, during the quick Installation of OceanStor Pacific 9550, engineers need to connect power cables on the storage device supplied by two power modules to separate power distribution units (PDUs).
- A . TRUE
- B . FALSE
The scale-out storage system supports cabinet-level security. That is, N data blocks and M parity blocks are stored in different cabinets. If M nodes or M disks are faulty, the system can still read and write data without service interruption or data loss. If M cabinets are faulty, services may be interrupted.
- A . TRUE
- B . FALSE
While troubleshooting bandwidth bottlenecks in network performance, which of the following should engineers consider? (Multiple choice)
- A . Backend hard disk bandwidth
- B . Controller supported bandwidth
- C . iBMC supported bandwidth
- D . Front-end link bandwidth
A financial customer purchased several Huawei OceanStorPacific 9950 storages for business deployment. After the hardware installation is completed, the engineer needs to install the DPC scenario software.
Which of the following related installation and deployment operations of the engineer are correct? (Multiple choice)
- A . Before engineers add data cluster modules, the storage system needs to obtain and load the license.
- B . During the LID configuration process, engineers must use the Smartkit tool to initialize the node, upgrade the firmware, and install the OS.
- C . During the wizard configuration process, engineers need to configure the IP address of the data cluster module and the IP address of the node iBMC
- D . Engineers must install the IPI framework before adding the data cluster module
An industry customer purchased a Huawei OceanStor Dorado6800 storage system for business data deployment. To improve data reliability and security, engineers configured the HyperDetect feature on the storage system for data protection.
Which of the following descriptions of the technical characteristics is wrong?
- A . This feature can realize intelligent ransomware detection. For known ransomware, it can detect whether the snapshot is infected by ransomware through two types of features: extension name and ransom email.
- B . This feature provides the ability to intercept ransomware files. You can update the ransomware file extension by importing the detection model.
- C . In the detection of data change behaviors of snapshots before and after, if a snapshot is judged to be suspicious, it is necessary to further extract the full change features of the suspicious snapshot and use machine learning algorithms to detect whether the snapshot is infected by ransomware.
- D . This feature can realize real-time ransomware detection, that is, through the combination of rapid screening of abnormal I/O behavior and deep detection of underlying block device damage, detect whether the data is being extorted by ransomware
