Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H13-611_V4.5 Exam Dumps - HCIA-Storage V4.5

Question # 4

During data center construction, a media company purchased storage devices from multiple vendors. The CTO wants to centrally manage these devices through storage virtualization. Which function is NOT provided by storage virtualization?

A.

Reducing the limitations of physical storage capacity

B.

Hiding the complexity of physical devices

C.

Enabling servers to directly access storage hardware

D.

Supporting unified deployment and management

Full Access
Question # 5

What are the challenges facing traditional data centers? (Multiple choice)

A.

Traditional data centers only monitor but not manage

B.

Capacity expansion of traditional data centers in units of nodes

C.

Traditional data center has low cooling efficiency

D.

Traditional data center maintenance costs are high

Full Access
Question # 6

Which of the following is the most widely used FC topologies?

A.

Point-to-Point.

B.

FC Switched Network.

C.

Arbitration Loop

D.

FC Direct Connection.

Full Access
Question # 7

A reliable ICT infrastructure, to avoid a single point of equipment failure, or even a single point of personnel problems.

A.

TRUE

B.

FALSE

Full Access
Question # 8

Which of the following descriptions of refactoring is incorrect?

A, RAID 0,1,3,5,6 and 10 support reconstruction

B. Reconfiguration does not necessarily require hot spare disks

C, reconstruction has an impact on RAID performance

D. Reconstruction will not interrupt RAID business

Full Access
Question # 9

What is the correct description of RAID 5 as follows? (Multiple choice)

A.

RAID 5 has a fixed check disk

B.

RAID 5 is verified by XOR algorithm

C.

RAID 5 uses striping to write data

D.

RAID 5 allows up to two member disks to fail simultaneously without data loss

Full Access
Question # 10

A company purchases storage devices for new services. The new services do not require high access speed of storage devices. In this scenario, the IP SAN can be used for networking deployment.

A.

False

B.

True

Full Access
Question # 11

86. When using the NFS protocol, adding clients and setting read and write permissions have an impact on performance.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Regarding the benefits and necessity of enterprises doing disaster recovery system construction, is the following statement wrong?

A.

Can avoid major losses and reduce corporate risks

B.

Comply with policies and regulations to meet industry regulatory requirements

C.

Can simplify the operation and maintenance work, avoid the impact of emergencies

D.

In areas where fewer natural disasters occur, consider reducing the disaster recovery level

Full Access
Question # 13

The following statement is wrong: (multiple choice)

A.

Backup cannot solve the recovery of data corruption

B.

backup to solve the recovery of data loss

C.

Backup cannot solve the retrieval of historical data

D.

Backup can directly take over the business

Full Access
Question # 14

In a Linux system, if the representation of a SCSI target is: 2:1:0:3, the following description is correct: (this question For multiple choice questions)

A.

The device LUN ID is 3

B.

The bus ID is 0

C.

The target ID is 3

D.

LUN ID is 0

Full Access
Question # 15

A company is mainly used for file system sharing in Linux, UNIX, Mac OS and VMware operating system environments.

Which of the following file access protocols is suitable for this company?

A.

NFS

B.

CIFS

C.

Telnet

D.

HTTP

Full Access
Question # 16

Which of the following is NOT a port name in Fibre Channel.

A.

FL_Port

B.

E_Port

C.

TX_Port

D.

U_Port

Full Access
Question # 17

Which of the following statements is NOT true? (Multiple Choice)

A.

CIFS is a network-based sharing protocol. It has high demands on network transmission reliability, so it usually uses TCP/IP.

B.

One disadvantage of CIFS is that Windows clients must be equipped with dedicated software.

C.

NFS is a stateless protocol while CIFS is a stateful protocol. NFS can be automatically recovered from a fault while CIFS cannot

D.

Both the CIFS as well as the NFS protocol requires file format conversion.

Full Access
Question # 18

What applies to unstructured data? (Multiple Choice)

A.

After being written, the data is not often modified.

B.

Uncertain value.

C.

Large capacity, rapid growth.

D.

Long-term storage required.

Full Access
Question # 19

In a good Disaster Recovery Plan there are no single points of failure, not even with any single person.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Which statement about SCSI is false?

A.

SCSI stands for "Small Computer System Interface". It is a protocol system

B.

SCSI supports communication between different devices.

C.

The latest protocol is SCSI-3, which provides a transmission speed of up to 1 GB/s

D.

The evolution is SCSI-1 > SCSI-2 > SCSI-3.

Full Access
Question # 21

NAS provides file sharing services through protocols such as NFS and CIFS.

A.

False

B.

True

Full Access
Question # 22

Which of the following is not an IP SAN component?

A.

Storage device with iSCSI interface

B.

twisted pair

C.

NIC

D.

FC switch

Full Access
Question # 23

Regarding data-level, application-level and business-level disaster recovery, is the following statement correct?

A.

About RTO, data level

B.

About RTO, data level

C.

About TCO, data level

D.

About TCO, business level

Full Access
Question # 24

The following two descriptions are correct:

Description 1: The maintenance cost of traditional PC is usually lower than that of desktop cloud.

Description 2: In cloud computing, data is stored and managed centrally.

A.

Descriptions 1 and 2 are correct

B.

Description 1 is correct, description 2 is incorrect

C.

Description 1 is wrong, description 2 is correct

D.

Both descriptions 1 and 2 are incorrect

Full Access
Question # 25

Description 1: FC protocol and FCoE protocol have different operating environments, different operating channels, and the same protocol stack.

Description 2: FCoE can only run on 10GE, which solves the problems of short FC transmission distance and packet loss in IP networks.

A.

Description 1 is correct, description 2 is correct

B.

Description 1 is correct, description 2 is incorrect

C.

Description 1 is wrong, description 2 is correct

D.

Description 1 error, description 2 error

Full Access
Question # 26

In Huawei storage systems that use RAID 2.0+ technology, a hard disk domain can only contain one type of hard disk.

A.

TRUE

B.

FALSE

Full Access
Question # 27

If the disaster recovery center in the same city fails, the production center in cascading networking mode will lose all its backup sites.

A.

TRUE

B.

FALSE

Full Access
Question # 28

Which of the following options is narrowly stored?

A.

Disk

B.

Disk array

C.

Disk cabinet

D.

Tape library

Full Access
Question # 29

An e-commerce website usually has a relatively stable business volume, so I purchased the server and built a private cloud operation

During the Double Eleven promotion, the business volume is very large, so we rent the server from the operator's public cloud to share the festival's burden

Netherlands, this cloud computing deployment model belongs to?

A.

Public cloud

B.

Private cloud

C.

Hybrid cloud

D.

Community Cloud

Full Access
Question # 30

Regarding the traditional model and cloud computing model, high reliability in the data center and cross-data center disaster recovery methods, the following says

What is wrong?

A.

In the traditional mode, the data center relies on component redundancy to achieve high reliability

B.

In the cloud computing mode, the data center relies on component redundancy to achieve high reliability

C.

In the traditional model, cross-data center disaster recovery is mainly based on copying business data, and the recovery process is complicated and the recovery period is long

D.

In the cloud computing mode, cross-data center disaster recovery is the replication of all data in the business data and operating environment.

Simple recovery process and short recovery period

Full Access
Question # 31

What is wrong about the relationship between FC protocol and SCSI protocol?

A.

FC can transmit SCSI commands, data and status information units by constructing frames

B.

FC or iSCSI protocol is used to carry the SCSI protocol, is an extension of the SCSI protocol

C.

SCSI is the upper layer protocol of FC4, SCSI is a subset of FC protocol

D.

FC is an alternative to SCSI

Full Access
Question # 32

Which of the following three disaster recovery technologies are commonly used? (Multiple choice)

A.

Disaster recovery based on the host layer

B.

Disaster recovery based on the network layer

C.

Array-based disaster recovery

D.

Disaster recovery based on application layer

Full Access
Question # 33

Is the following description of cloud computing correct? (Multiple choice)

A.

Cloud computing is dynamically scalable

B.

End users of cloud computing need to understand how cloud computing works

C.

Cloud computing can provide virtual disk space

D.

Cloud computing is usually used in business systems that require high performance and high response speed

Full Access
Question # 34

Xiao Wang, an employee of a company, did the following in the company's storage system: 9:00 Take a snapshot of LUN A and activate it

Alive, all the data of the snapshot LUN and the source LUN were modified at 10:00, and the snapshot was rolled back at 11:00.

The following instructions are correct? (Multiple choice)

A.

The data in the copy space before COW is 9:00 LUN A

B.

The data in the copy space before COW is 10:00 LUN A data

C.

The data of the source LUN is the modified data at 10:00

D.

After the snapshot is rolled back, the data of the source LUN becomes the data of the modified snapshot LUN at 10:00

Full Access
Question # 35

What is the correct sequence of the overall reconstruction process?

1. Query all CKGs with CK falling on the faulty disk

2. Assign hot spare CK to all these CKGs

3. Update CKG information and release the reconstructed CK

4. Write the reconstructed data to the hot standby CK

5. Through the RAID algorithm, calculate the data on the failed disk based on the data on the normal disk and the check disk

A.

1->2->5->4->3

B.

1->2->3->5->4

C.

5->1->2->3->4

D.

5->2->1->4->3

Full Access
Question # 36

What three stages do storage systems need to go through to realize SmartTier? (Multiple choice)

A.

Initial capacity allocation

B.

Data layout analysis

C.

Data migration

D.

I/O monitoring

Full Access
Question # 37

Which statements are true about the functions of HyperClone? (Select All that Apply)

A.

When the source LUN fails, service data can be recovered from any point in time before the fault occurred using the data backed up through HyperClone.

B.

If a disk failure occurs on the source LUN of HyperClone, you can split the target LUN from the source LUN to continue providing services.

C.

If a logical fault occurs on the source LUN, data can be reversely synchronized from the target LUN to the source LUN to recover services on the source LUN.

D.

Multiple target LUNs can be created through HyperClone to provide the service data on the source LUN for multiple applications.

Full Access
Question # 38

Which of these are O&M standard systems? (Select All that Apply)

A.

International Organization for Standardization 2000 (ISO2000)

B.

Institute of Electrical and Electronics Engineers (IEEE)

C.

Information Technology Infrastructure Library (ITIL)

D.

Storage Networking Industry Association (SNIA)

Full Access
Question # 39

The FCoE protocol refers to encapsulating the FC protocol into a TCP/IP protocol package and transmitting it on Ethernet.

A.

TRUE

B.

FALSE

Full Access
Question # 40

Which statements are true about HyperMetro? (Select All that Apply)

A.

The local and remote sites can run services at the same time

B.

A quorum server must be configured.

C.

HyperClone can be configured only for storage devices of the same model and version

D.

Automatic switchover upon storage faults is supported.

Full Access
Question # 41

Which of the following is the advantage of object storage? (Multiple choice)

A.

Object interface, flexible data segmentation

B.

External SCSI or file interface

C.

Flat objects, easy to access and expand

D.

Improve data integrity and security

Full Access
Question # 42

When the disk is not accessible, what kind of reconstruction method is used when writing to the disk?

A.

Total reconstruction

B.

Local reconstruction

C, recovery and reconstruction

C.

Local reconstruction

Full Access
Question # 43

Suppose, for cost control reasons, a startup company can acquire only one storage device to provide services. However, its services require high hardware reliability, so an engineer recommended a Huawei OceanStor all-flash storage system. Which statements describe the high reliability of the storage system? (Select All that Apply)

A.

It supports clusters consisting of multiple controller enclosures to improve the availability of the storage system

B.

Interconnect I/O modules shorten failover time when a controller fails to provide better reliability, as compared with common I/O modules.

C.

Standard I/O modules shorten failover time when a controller fails to provide better reliability, as compared with interconnect I/O modules.

D.

When a controller fails, l/Os of the faulty controller are redirected to another controller The host is unaware of the fault and services remain running properly.

Full Access
Question # 44

If a disk is faulty, what is the process of recovering data on the faulty disk?

A.

Replication

B.

Compression

C.

Reconstruction

D.

Deduplication

Full Access
Question # 45

Which of the following describes the file access protocol correctly? (Multiple choice)

A.

CIFS protocol is used in Linux and UNIX environments

B.

The NFS protocol is used in the Windows environment

C.

CIFS protocol, NFS protocol and FTP protocol work in C/S architecture

D.

The working method of HTTP protocol is B/S architecture

Full Access
Question # 46

Which of the following cannot be configured with a quota?

A.

User

B.

User Group.

C.

Volume

D.

Directory.

Full Access
Question # 47

Which of the following is incorrect regarding the differences of IP SAN and FC SAN?

A.

IP SAN uses iSCSI protocol for data transmission.

B.

IP SAN can connect to FC SAN without any additional protocols.

C.

FC SAN uses FC protocol for data transmission

D.

Both encapsulates the SCSI command with their underlying protocol before transmission

Full Access
Question # 48

Which statements are true about RAID 2.0+? (Select All that Apply)

A.

An extent is a block of a fixed size in a chunk group (4 KB by default).

B.

A chunk group is a logical set of chunks on different disks.

C.

Chunks, which are blocks obtained by dividing each disk at a fixed size, are basic units of a RAID group

D.

A chunk group is the minimum unit for applying for and releasing space in a storage pool

Full Access
Question # 49

Which of the following operating systems can access CIFS shares without installing additional software?

A.

Win7

B.

Solaris

C.

FreeBSD

D.

AIX

Full Access
Question # 50

The dual switch network design is widely used in the FC SAN environment. The following description of the dual switch network redundancy design,

Which ones are correct? (Multiple choice)

A.

Deploy two FC switches in a SAN environment to cross connect to the two controllers of the storage device

B.

Each host requires 2 available FC ports, and connects the two ports to different switches

C.

The host port and storage device port on the switch that need to communicate must be in the same zone

D.

Although there are multiple paths, the dual-switch network only supports link redundancy and does not support load balancing

Full Access
Question # 51

Which of the following is the correct configuration process for HUAWEI OceanStor storage system?

A.

Create storage pool -> create LUN -> add mapping

B.

Create storage pool -> add mapping -> create LUN

C.

Create LUN->Create storage pool->Add mapping

D.

Create LUN->Add Mapping->Create Storage Pool

Full Access
Question # 52

In the following backup media, the order of unit capacity price from low to high is:

A.

Tape, CD/DVD, SSD, virtual tape library

B.

CD/DVD, magnetic tape, virtual tape library, SSD

C.

tape, CD/DVD, virtual tape library, SSD

D.

CD/DVD, SSD, tape, virtual tape library

Full Access
Question # 53

What technology is used to convert Thick LUN and Thin LUN?

A.

clone

B.

LUN migration

C.

LUN copy

D.

Volume mirroring

Full Access
Question # 54

In the HUAWEI OceanStor storage system, one LUN can create multiple snapshots, but only one snapshot

Can be activated.

A.

TRUE

B.

FALSE

Full Access
Question # 55

If a company uses an OLTP database, which migration strategy is suitable for SmartTier?

A.

No migration

B, automatic migration

B.

Migration to high-performance layer

C.

Migration to the low-performance layer

Full Access
Question # 56

In the Huawei storage system using RAID2.0+ technology, regarding the difference between Thick LUN and Thin LUN, the following

Which description is correct? (Multiple choices)

A.

Allocate storage capacity when Thick LUN is created

B.

The storage capacity is not allocated by default when the Thin LUN is created, and the storage capacity is allocated when data is written

C.

Thin LUN is more flexible than Thick LUN, and has better performance during sequential read and write of large IO

D.

Thin LUN makes the entire storage space utilization rate higher

Full Access
Question # 57

A company has sufficient client server resources, but network resources are tight. Which deduplication strategy is suitable?

A, file-level deduplication

B. Byte-level deduplication

C, source deduplication

D. Deduplication on the target side

Full Access
Question # 58

Why storage systems has more than one storage controllers in the Dual Storage Controller Architecture?

A.

2 controllers can complete a single I/O operation much faster.

B.

To provide redundancy in case of failure of a single controller.

C.

To have more energy savings since the performance is doubled.

D.

Single storage controller architecture is obsolete.

Full Access
Question # 59

Statement 1: If possible it is always advised to make only Full Backups

Statement 2: LAN free backups typically run slower than LAN based backups.

A.

Statements 1 and 2 are both true.

B.

Statement 1 is true and statement 2 is false.

C.

Statement 1 is false and statement 2 is true.

D.

Both statements 1 and 2 are false.

Full Access
Question # 60

When the RTO is 10 minutes the traditional Tape Backup method cannot be used.

A.

TRUE

B.

FALSE

Full Access
Question # 61

Select the correct statements that describes the properties of bus technology in ICT architecture. (Choose all that apply.)

A.

Bus technology are only available in serial form.

B.

Bus can be divided into internal bus and external bus.

C.

The CPU needs to go through the memory to directly access the Bus.

D.

Bus is a communication system that transfers data between internal components and external components.

Full Access
Question # 62

For all operating systems there is a specific version of Huawei UltraPath multipathing software.

A.

FALSE

B.

TRUE

Full Access
Question # 63

The following two descriptions about cloud computing,

Description 1. A deployment model of cloud computing is to divide a large physical server into multiple small virtual machines;

Description 2. A deployment model of cloud computing is to aggregate multiple small physical servers into one mainframe.

A.

description 1 and description 2 are correct

B.

Description 1 is correct, description 2 is incorrect

C.

Description 1 is wrong, description 2 is correct

D.

description 1 and description 2 are wrong

Full Access
Question # 64

Which of the following operations is a daily maintenance item in data center storage?

A.

View and handle alarms

B.

Inspection storage equipment

C.

Check the computer room environment

D.

Check the internal environment of the rack

Full Access
Question # 65

Storage Pools cannot be created with a single tier of disks.

A.

TRUE

B.

FALSE

Full Access
Question # 66

Dual-switch networking is widely applied in Fibre Channel SANs. Which of the following are its characteristics? (Multiple Choice)

A.

Two Fibre Channel switches are deployed in a SAN for connecting to the two controllers of a storage device.

B.

Per host two fibre channel ports should be available. The two Fibre Channel ports connect to two Fibre Channel switches.

C.

The ports on the two Fibre Channel switches connecting to the hosts and storage device must reside in the same zone.

D.

As multiple paths exist, the dual switch networking mode supports link redundancy but does not support load balancing.

Full Access
Question # 67

Which of the following describe DAS? (Multiple Choice)

A.

A storage device connects to a host using the SCSI-based bus architecture.

B.

DAS is unfavorable to storage resource sharing,

C.

The host CPU has a work load when storing data.

D.

Long-distance transmission is supported between a host and a storage device.

Full Access
Question # 68

Due to the earthquake, an enterprise's IT system went down at 16:00 on November 11th and the business was stopped. By 23:00 on that day, the IT system resumed operation, and the data at 12:00 on that day could be restored. Then this RTO What is the difference between RPO and RPO?

A.

RTO=4 hours, RPO=7 hours

B.

RTO=7 hours, RPO=4 hours

C.

RTO=2 hours, RPO=4 hours

D.

RTO=7 hours, RPO=3 hours

Full Access
Question # 69

Which of the following are the 3 layers of SCSI Initiator Model? (Multiple Choice)

A.

SCSI Link Layer.

B.

SCSI Network Layer.

C.

SCSI Middle Layer.

D.

SCSI Device Driver Layer.

Full Access
Question # 70

The maintenance network port is used, by the DeviceManager, for daily management.

A.

TRUE

B.

FALSE

Full Access
Question # 71

Each organization independently determines which data should be stored and for how long.

A.

TRUE

B.

FALSE

Full Access
Question # 72

Which of the following statements about the differences between DAS and SAN is incorrect?

A.

SAN uses the Fibre Channel or iSCSI protocol and therefore offers better scalability.

B.

DAS and SAN are both external storage and can achieve storage resource sharing easily.

C.

DAS applies to small and medium LANs that have general storage capacity requirements and only a small number of servers.

D.

SAN applies to mid-range and high-end storage application environments such as key databases, centralized storage, mass storage, backup, and disaster recovery.

Full Access
Question # 73

Which of the following best describes SDN?

A.

Using a software program to manage your network.

B.

The virtualization of network services to achieve better efficiency and scalability.

C.

Decoupling of the data plane and control plane in networks.

D.

Using hardware to manage the network.

Full Access
Question # 74

Regarding the description of Huawei OceanStor storage system safe disk, which of the following is correct? (Multiple choice)

A.

When the device is powered off, the safe disk stores the data in the cache to prevent data loss

B.

When an unexpected power failure occurs, the BBU supplies power to the cache and safe disk

C.

Safe disk cannot be used to store user data

D.

Only the first two disks in the controller cabinet are used for safe disks

Full Access
Question # 75

In the FC protocol, which of the following layers is responsible for encoding and decoding?

A, FC-0

B, FC-1

C, FC-2

D, FC-3

Full Access
Question # 76

OceanStor 5300 V3 is a dual-controller converged storage product, which must ensure the working controller and attribution control of the LUN

The controller is consistent.

A.

TRUE

B.

FALSE

Full Access
Question # 77

With the advent of the era of big data, the corresponding storage technology is also undergoing changes.

Is the following statement correct? (Multiple choice)

A.

The file system develops from a local file system to a cluster file system and a distributed file system

B.

Traditional NAS, facing PB-level data, complex volume management and unbalanced system capacity allocation, will result in waste of resources

C.

The mass storage system is characterized by a more complicated file system and more complicated management

D.

Having large-scale expansion capability is the characteristic of mass storage system

Full Access
Question # 78

What are the following descriptions of the three iSCSI connection methods?

A.

The connection mode of the Ethernet card + initiator software does not occupy the host resources at all

B.

The hardware TOE network card + initiator software connection method reduces the pressure on the host resources

C.

The iSCSI HBA card completes the TCP/IP protocol conversion without occupying host resources at all

D.

TOE network card completes the conversion of iSCSI packets to TCP/IP packets

Full Access
Question # 79

Which of the following descriptions of RAID technology are correct? (Multiple choice)

A.

Not every RAID technology can improve write performance

B.

In RAID 0, multiple hard drives are accessed simultaneously (parallel access), speeding up data access performance

C.

The current RAID technology only uses the parity mechanism to protect the data

D.

The performance of all RAID levels increases linearly with the increase in the number of member disks

Full Access
Question # 80

In Huawei RAID 2.0+, is the description about chunck and extent correct?

A.

chunck is the smallest unit for LUN to apply for space from the storage pool and free up space

B.

The extent is the smallest unit for the storage pool to allocate resources from the hard disk domain

C.

chunck is the smallest unit of hot data statistics and migration (data migration granularity)

D.

The extent size of different storage pools can be different, but the extent size in the same storage pool is uniform

Full Access