H13-629 : HCIE-Storage : Part 07

  1. WMware backup transfer mode NBD SSL refers to the backup agent through the TCP / IP network to read the backup data, VSA and ESX between encrypted transmission.

    • True
    • False
  2. OceanStor 18000 hot backup strategy is set to high, all using 1TB hard drive when the hard disk domain, respectively, eight hard drives, 80 hard drives, 180 Hard disk, 280 hard disk, the system will be assigned how much hot spare space, in Terabytes?

    • 1,7,8,9
    • 1,7,15,24
    • 1,4,8,9
    • 1,5,7,9
  3. Simpana storage strategy is an important parameter is data retention rules to determine the need to back up the contents of the backup time and backup methods. Each copy has an independent data retention period, each copy can be set using______. (Multiple choice.)

    • Basic rules of retention
    • Advanced retention rules
    • Extended retention rules
    • Special retention rules
  4. What is the error in the Oracle ASM description?

    • ASM directly manages the hard disk, not the files, the files are evenly distributed across all the disks.
    • ASM instance SGA includes buffer pool share pool larger pool and so on.
    • ASM instances can be synchronized and data instances started and synchronized, and must be closed later than the database instance.
    • ASM is an oracle-based storage solution similar to RDMS, consisting of instances and files, maintained by the sql plus tool.
  5. In a Huawei disaster recovery plan, in order to implement the one-click disaster recovery operation for Oracle applications, you must configure the recovery in Replciation Director Plan. What configuration actions do you need to do on the Replication Director side before configuring the recovery plan? (Multiple choice.)

    • Configure the protection group
    • Configure the protection strategy
    • Configure the site and register disaster recovery host
    • Find the LUNs used by Oracle and make policy protection for these LUNs
  6. In the Huawei OceanStor system, the size of the file system block is a measure of the size of the accessed file system block. The size of the block is designed according to the size of the data block. Different size of the file system block selects the corresponding file system block, according to the size of the data block. If the business scenario is the media, for large file archiving or stagger I / O backup scenarios, it is recommended to choose the default 64KB disk block size.

    • True
    • False
  7. Customers need to create a new Oracle database server Huawei RH5885. V2 32 nuclear CPU, the host using Redhat6.4 operating system, the text system is EXT4, the storage device Oceanstor V3, the I SAS disk and 8D + 1P RAID5 are configured to guide one million data batch. Which of the following methods can improve the import performance into the new database? (Multiple choice.)

    • Modify the value of DB-WRITER-PROCESSES.
    • Redhat system default CFQ algorithm on the database business efficiency is not high, should be adjusted to noop algorithm.
    • Oracle database FILESYSTEMIO-OPTIONS parameter can be set to Asynch, and the file system log off.
    • Modify Oracle’s DB-BLOCK-SIZE parameters.
  8. Existing set customer of database uses a raw device, due to the large amount of data in the database. The customer plans to replace the old storage with new storage devices.
    In the process of environmental inspection lvcb engineers found the following:
    #getlvcb -TA sjklv
    Intrapolicy =
    copies = 0
    interpolicy =
    lvid =
    lvname =
    label =
    machine id =
    number Ips = 0
    relocatable =
    strict =
    stripe width = 0
    stripe size in exponent = 0
    type =
    upperbound = 0
    fs =
    time created = time modified =

    As the vg is too large, the expansion of vg is impossible. As the service window is very short, and customers do not want to avoid the risk of large adjustments of the whole original environment, what is the recommended approach?

    • Based on lvcb offset reconstruction nude equipment, and the database level 0 backup import
    • Use the dd command for data migration
    • Use the cplv command for data migration
    • Use migratepv for data migration
  9. Information of the disaster recovery research Beijing project mainly includes three aspects (Who / What / Why) description. Which of the following is true? (Multiple choice.)

    • A bank has more than XX customers and XX corporate customers.
    • Loss of data will result in substantial loss of business interruption and may also result in significant financial loss.
    • Business interruption has a huge impact, and the interruption time of business deployment <2h.
    • Customers want to build two live-action data centers in the same city and realize double-live of the key business systems. The disaster recovery plan RPO = 0, RTO = 0
  10. The MTTR indicator is used to describe the average continuous time of the failure of a product during operational use or testing.

    • True
    • False
  11. Which of the following is not an authentication method supported by the OceanStor 9000 NFS protocol?

    • LDAP authentication
    • WSSE certification
    • NIS certification
    • AD domain certification
  12. Huawei two nodes Standard Edition N8500, opened the CIFS service. Which of the following CIFS parameters prevents users from seeing other users in the table of Contents?

    • oplock
    • noguest
    • fs-mode
    • hide-unreadable
  13. The RMAN command dbms-rcvcat in the three PL / SQL packages is used to query the recovery catalog and target database control files, such as the list, report commands or a call to the package.

    • True
    • False
  14. In an 8500 Clustered NAS System there are several modules in the cluster communication architecture that work together to implement cluster communication such as resource agent, HAD, Gab, and LLT. Describe the correct mechanism for these. (Multiple choice.)

    • Agent-Agent monitors the resources of each system and provides the status to each machine’s HAD
    • HAD Cluster service that monitors and manages the cluster’s NAS
    • Under the management of the master node of the cluster, Gab sends the communication information between the cluster members to the point communication
    • LLT (Low-Latency Transport) sends information to all nodes in the cluster through a low-latency delivery protocol
  15. An administrator creates 2 libraries (Library#1, Library#2) in Simpana CommCell console, and creates a storage policy Policy#1 using Library#1 to store backup data. Now the administrator wants the backup data to be stored in both Library#1 and Library#2 in turn. So, how to configure the storage policy to meet the requirement? (Choose two.)

    • Adding Library#2 as the library for Policy#1.
    • Setting Data Paths to “Use Alternate Data Paths” mode.
    • Setting Data Paths to “Round-Robin between Data Paths” mode.
    • Setting Data Paths to “Use preferred Data Path” mode.
  16. How can you view the WWN HBA card that is in a Windows2008 R2 system?

    • In Device Manager, right-click of the HBA card to see its properties
    • View in Storage Explorer Manager
    • View using the FC Info tool
    • CMD command line, enter the diskpart
  17. Which of the following description of the application of NDMP backup on the OceanStor 9000 V100R001C30 is wrong?

    • Does not support the system disk backup and recovery operations
    • When enabling the snapshot-based backup mode, the NDMP backup feature requires the file system to support snapshots. Otherwise, the backup task can not be successfully performed.
    • Based on the snapshot backup, snapshots are created for the current directory. Because the extended attributes of the current directory receive the snapshot protection, the current directory extended attributes will be backed up.
    • Does not support the system time zone or other time-related adjustments, does not support daylight saving time.
  18. To cluster the server’s public IP address in an Oracle RAC deployment process, a private IP address is written to the / etc / hosts file, along with the Virtual IP address, cluster unique access IP address and public IP. Which of the following configuration is correct? (all subnet masks are 255.255.255.0)

    • 127.0.0.1 localhost
      129.22.221.200 cluster-scan
      129.22.221.201 node1
      129.22.221.211 node1-vip
      192.168.222.211 node1-priv
      129.22.221.202 node2
      129.22.221.212 node2-vip
      192.168.222.212 node2-priv
    • 127.0.0.1 localhost
      129.22.221.200 cluster-scan
      129.22.221.201 node1
      129.22.221.211 node1-vip
      192.168.222.211 node1-priv
      129.22.221.202 node2
      129.22.221.212 node2-vip
      192.168.221.212 node2-priv
    • 127.0.0.1 localhost
      129.22.222.200 cluster-scan
      129.22.221.201 node1
      129.22.221.211 node1-vip
      192.168.222.211 node1-priv
      129.22.221.202 node2
      129.22.221.212 node2-vip
      192.168.222.212 node2-priv
    • 127.0.0.1 localhost
      129.22.221.200 cluster-scan
      129.22.222.201 node1
      129.22.221.211 node1-vip
      192.168.222.211 node1-priv
      129.22.221.202 node2
      129.22.221.212 node2-vip
      192.168.222.212 node2-priv
  19. Which description of the the OceanStor V3 file system snapshot feature is wrong?

    • In File System Snapshot when you create a snapshot, you simply copy the root of the file system and save it to form a snapshot of the file system.
    • Deletion Snapshots use a mechanism for reclaiming space, so snapshot data space is immediately freed after snapshots have been deleted.
    • After creating a snapshot in the File System, as the main file system is continuously updated, the original data block will gradually become the space occupied by this quick debt. However, a newly written data will not be included in the snapshot space.
    • File system snapshot data can not be deleted directly, and only after the snapshot has been deleted, this part of the space can be released.
  20. Which of the following description for Thin LUNs and Thick LUNs for OceaStor V3 storage is true?

    • Thin LUN and thick LUN can be configured with the same capacity.
    • Both thin LUN and thick LUN can make initial capacity allocations.
    • The maximum capacity of thin LUNs and thick LUNs can be greater than or equal to the available capacity of the storage pool where they reside.
    • Both thin LUNs and thick LUNs can be created in bulk.
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments