New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H13-629_V2.5 Exam Dumps - HCIE-Storage (Written) v2.5

Go to page:
Question # 9

Which of the OceanStor V3 file system remote replication descriptions are correct? (Multiple choice.)

A.

It is an object-based approach to data replication

B.

ROW snapshots are based on the cyclical manner of data replication

C.

It can be manually set off by the user or system timing synchronization starting

D.

It supports the Quota quota information of the main file system to the slave, no need to configure the quota.

Full Access
Question # 10

True or False, the disaster recovery plan of Huawei means that when the production site fails, the production business is automatically switched to run the disaster recovery site.

A.

True

B.

False

Full Access
Question # 11

In the scenario of protecting the database, the slave uses the virtual snapshot method to verify the services of the production end and the DR-side and discover the data of the DR on the disaster recovery end. What are the possible reasons that the library can not start normally? (Multiple choice.)

A.

After a snapshot of the LUN of the redundancy site is created, the snapshot is not activated at the same time.

B.

Disaster recovery side of the data stored in the cache, not yet written to the hard disk.

C.

When creating a snapshot on the disaster recovery end LUN, the production end is copying data to the disaster recovery end.

D.

The production end and disaster recovery end adopt the disaster recovery solution of incremental LUN copy, and the incremental data link is abnormal during the synchronization.

Full Access
Question # 12

For commonly used SQL server 2005 and 2008, users can connect to a specific service through the SQL server management studio tool database engine. T login there are two ways to authenticate. Which mode is needed for the client application connection?

A.

sql server authentication

B.

Windows authentication

C.

Log in as super user

D.

Other ways when landing

Full Access
Question # 13

If you need to automate the DR protection of an Oracle database in Replication Director, the configuration flow is:

A.

Create a site discovery store, find the host registration store, register the host to create a protection policy.

B.

Discovery Store, Discovery Host Registration Store, Register Host Create Site Registration Store Create Protection Group Create Protection Policy.

C.

Found storage, found that the host to create a site registration store, register the host to create a protection group to create a protection strategy.

D.

Create a site registration store, register the host to create a protection group to create a protection policy.

Full Access
Question # 14

Huawei OceanStor storage controller BBUs are both in a fault alarm. Which description is correct for the upper application?

A.

System does not work.

B.

If the device is powered off unexpectedly, some of the business data will be lost.

C.

Business performance is not affected.

D.

Upper business IO read and write will not have any impact.

Full Access
Question # 15

The iSCSI protocol is mapped on the TCP protocol. For a TCP encapsulation of the iSCSI protocol packet, which of the following parts are not included?

A.

TCP Header

B.

IP Header

C.

ISCSI Header

D.

ISCSI data

Full Access
Question # 16

Choose the correct statement regarding the N8000 clustered NAS system that provides file system sharing services, surface VxFS file system, and roll features.

A.

VxFS is a non-log file system that can support more than 2T files.

B.

File system snapshot using copy-on-write (copy-on-write technology) and other files together, share partition or volume storage space.

C.

Provide file system-level snapshots, copy.

D.

File System Snapshots, Scenarios, Replication, etc. Features are based on Storage Checkpoint.

Full Access
Go to page: