New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H13-611_V4.5 Exam Dumps - HCIA-Storage V4.5

Go to page:
Question # 41

Which of the following is the advantage of object storage? (Multiple choice)

A.

Object interface, flexible data segmentation

B.

External SCSI or file interface

C.

Flat objects, easy to access and expand

D.

Improve data integrity and security

Full Access
Question # 42

When the disk is not accessible, what kind of reconstruction method is used when writing to the disk?

A.

Total reconstruction

B.

Local reconstruction

C, recovery and reconstruction

C.

Local reconstruction

Full Access
Question # 43

Suppose, for cost control reasons, a startup company can acquire only one storage device to provide services. However, its services require high hardware reliability, so an engineer recommended a Huawei OceanStor all-flash storage system. Which statements describe the high reliability of the storage system? (Select All that Apply)

A.

It supports clusters consisting of multiple controller enclosures to improve the availability of the storage system

B.

Interconnect I/O modules shorten failover time when a controller fails to provide better reliability, as compared with common I/O modules.

C.

Standard I/O modules shorten failover time when a controller fails to provide better reliability, as compared with interconnect I/O modules.

D.

When a controller fails, l/Os of the faulty controller are redirected to another controller The host is unaware of the fault and services remain running properly.

Full Access
Question # 44

If a disk is faulty, what is the process of recovering data on the faulty disk?

A.

Replication

B.

Compression

C.

Reconstruction

D.

Deduplication

Full Access
Question # 45

Which of the following describes the file access protocol correctly? (Multiple choice)

A.

CIFS protocol is used in Linux and UNIX environments

B.

The NFS protocol is used in the Windows environment

C.

CIFS protocol, NFS protocol and FTP protocol work in C/S architecture

D.

The working method of HTTP protocol is B/S architecture

Full Access
Question # 46

Which of the following cannot be configured with a quota?

A.

User

B.

User Group.

C.

Volume

D.

Directory.

Full Access
Question # 47

Which of the following is incorrect regarding the differences of IP SAN and FC SAN?

A.

IP SAN uses iSCSI protocol for data transmission.

B.

IP SAN can connect to FC SAN without any additional protocols.

C.

FC SAN uses FC protocol for data transmission

D.

Both encapsulates the SCSI command with their underlying protocol before transmission

Full Access
Question # 48

Which statements are true about RAID 2.0+? (Select All that Apply)

A.

An extent is a block of a fixed size in a chunk group (4 KB by default).

B.

A chunk group is a logical set of chunks on different disks.

C.

Chunks, which are blocks obtained by dividing each disk at a fixed size, are basic units of a RAID group

D.

A chunk group is the minimum unit for applying for and releasing space in a storage pool

Full Access
Go to page: