New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Huawei H13-629 Practice Exam with Questions & Answers | Set: 4

Questions 31

Choose the correct statement regarding the N8000 clustered NAS system that provides file system sharing services, surface VxFS file system, and roll features.

Options:
A.

VxFS is a non-log file system that can support morethan 2T files.

B.

File system snapshot using copy-on-write (copy-on-write technology) and other files together, share partition or volume storage space.

C.

Provide file system-level snapshots, copy.

D.

File System Snapshots, Scenarios, Replication, etc. Features are based on Storage Checkpoint.

Huawei H13-629 Premium Access
Questions 32

In a Huawei OceanStor 18000 the engine, SVP, diskenclosure, and PCIe switch interconnections must be in accordance with certain rules and order. Which of the following statement is incorrect?

Options:
A.

The SVP needs to connect multiple engines through two PCI-e switches, and each engine's controller needs to be connected to a PCIe switch to ensure that the link redundancy provides reliability.

B.

When the control plane is connected to the network, when the engine and the PCIe switch are interconnected, the port P0 of the A3 slot and the PCI switch PCI port canbe used pick up.

C.

Huawei OceanStor 18000 can be used to install SAS interface modules and interconnect disk enclosures in slot 0 and slot 5 of the Huawei OceanStor 18000.

Questions 33

An Engineer installed a OceanStor 9000 for a customer (a total of 5 OceanStor 9000 C Node, front and rear ends are 10GE TOE networking, on-site installation TOE network card). Then connected the signal lines, power lines, and debugged the software. During the installation there were issues. Which of the following description of these issues are correct? (Multiple choice.)

Options:
A.

5 devices TOE NIC A0, B1, and A0, B3 inserted into the PCIe slot will not affect the system. Deployment will not affect the network bandwidth, so it cannot be adjusted.

B.

The signal cables are long and need to be strapped to the cabinet or placed on the bottom tray.

C.

Label NODE 01 A0-0 The signal cable is inserted in the network port A0-1. The signal cable labeled NODE01 B3-1 is inserted in the network positionB3-0, due to the same network card two network port peer, you can place the wrong line, you cannot adjust.

D.

CE6850 switch connected to two stacked copper cables, one of which is needed to post-cold more cold, because it does not affect the network interoperability. You can base this software debugging.

Questions 34

What are the design information research activities in a backup solution? (Multiple choice.)

Options:
A.

Customer needs collection and refining

B.

Backup capacity calculation

C.

Project background research

D.

Network environment is collected

Questions 35

An enterprise buys a set of Huawei OceanStor 9000 storage systems. Some of the enterprise's basicsoftware is stored in a directory, and users can access enjoy/it. In order to facilitate the operation, users should not enter the account password, and the basic software directory is set to NFS enjoy, you should check the share of the "guest enabled" option.

Options:
A.

True

B.

False

Questions 36

In amanual recovery process, which of the following operations is not required? (Multiple choice.)

Options:
A.

Stop the current production business, delete the host mapping.

B.

Adding the remote device to the original production side array.

C.

With thedisaster recovery array as the master LUN and the original production array as the slave LUN, create the remote replication relationship between the DR and the production end and wait for the initial synchronization to be completed.

D.

Make an incrementalsynchronization.

E.

Delete the original production array consistency group.

Questions 37

True or False, Info Replicator supports copying the data at the same time. The basic attributes of the home directory, extended attributes, ACL (access control list).

WORM (write-once-read-many) and CIFS / NFS share configuration information is known as a wealth island from the end. When a disaster occurs, master and slave sites can quickly take over the business after the switch.

Options:
A.

True

B.

False

Questions 38

Customers in the process of using Simpana software, CS for some reason can not start normally. You need to restore the CS. Which of the following situations will cause the restoration to fail?

Options:
A.

The backup server and the ring server can not communicate properly

B.

The link between the backup server and the media server is faulty

C.

Backup server SQL database failure

D.

DDB is abnormal

Questions 39

Which of the following description of the infoLocker feature of Huawei's Ocenastor 9000 is incorrect?

Options:
A.

To prevent changes in the directory or file protection time because of thechanges in cluster time, a directory or file is configured with WORM attributes. After the directory or file will use the WORM clock to time, set the WORM clock. When the system will be based on the clock, user’s file will not be modified over the protection period.

B.

If the cluster time is earlier than the WORM clock, the WORM clock will be chased every hour for up to 138 seconds to adjust. If the cluster is after the WORM clock, the WORM clock adjusts to the cluster time.

C.

When a directory is configured as a WORM root directory, all subdirectories, new directories and new files in the directory automatically get the parent directory of WORM attributes. These attribute parameters can only be configured when the WORM root directory is set. Only then the user’s view can not be modified.

D.

WORM logs are used to record the logs related to WORM operations and record them according to the time. The monthly log is a file that can be modified and can delete the file.

Questions 40

A RedHat Linux 6 system includes a specific file folder read and write errors, the file system needs to be modified after the diagnosis. Which of the following is the correct repair operations?

Options:
A.

Direct use of the root user, in the case ofthe file system is mounted fsck repair

B.

Using the owner of the user data file, perform an fsck fix if the file system is mounted

C.

Use the owner of the user data file to perform a fsck fix on the device if the file system is unmounted

D.

Using the rootuser, perform a fsck fix on the device while the file system is unmounted