Huawei H13-624_V5.5-ENU HCIP-Storage V5.5 Online Training
Huawei H13-624_V5.5-ENU Online Training
The questions for H13-624_V5.5-ENU were last updated at Feb 20,2025.
- Exam Code: H13-624_V5.5-ENU
- Exam Name: HCIP-Storage V5.5
- Certification Provider: Huawei
- Latest update: Feb 20,2025
A school customer purchased two Huawei OceanStorPacific series storages for daily business deployment. The engineer needs to configure the DPC service on the two storages. Which of the following configurations of the engineer is wrong?
- A . If the upper-layer business has high requirements for data security, engineers need to configure the storage pool type as encryption type when creating a fusion storage pool.
- B . When creating a namespace, engineers need to select the security mode and application type.
- C . Before creating a fusion storage pool, engineers need to enable the file service of the node through DeviceManager before they can proceed with the subsequent creation process.
- D . When the storage network is RoCE networking, engineers can use the systemctl stop lIDpad.service command to shut down the lIDpad service.
A government customer purchased two Huawei all-flash storages for business deployment. During the use of the storage, engineers found that the storage performance often fluctuated. If the engineer wanted to locate the storage performance fluctuation problem at this time, it would involve many operations.
1- Check whether there are obvious changes in IO model or business load at the fluctuation time point
2-Analyze the latency fluctuation module through the latency location tool FTDS on the storage side
3- Check whether there is an obvious hit rate mutation at the fluctuation time point
4- Check whether there is a very small IO scenario at the fluctuation time point
5- Check whether there is any obvious hardware resource bottleneck on the storage side at the fluctuation time point
6- Check whether there are obvious storage background tasks at the fluctuation time point
I would like to ask, among the above operations, which operations can locate the problem and which operations cannot?
- A . 456 can locate the problem, but 123 cannot
- B . 123456 can help locate the problem
- C . 12 can locate the problem, but 3456 cannot
- D . 123 can locate the problem, but 456 cannot
A government customer purchased multiple Huawei distributed storage devices to provide DPC file services for upper-layer businesses.
During the DPC service configuration process, engineers need to plan and configure storage switches. Which of the following descriptions of storage switch configuration requirements is wrong?
- A . During the configuration process, if the control network does not cross subnets, but there will be cross-subnet expansion operations later, engineers must configure VLAN and flow control, but there is no clear configuration requirement for the control network gateway
- B . When the transmission protocol is RoCE, engineers need to configure VLAN and flow control
- C . Engineers can form M-LAG with multiple switches, and when the transmission protocol is IB, engineers need to enable subnet management
- D . During the configuration process, engineers need to configure the IP address of the switch management network port
A financial customer newly purchased several Huawei distributed storages for business deployment, with a total of 6 nodes, including 2 computing nodes and 4 storage nodes, and the business, storage, and management switches were deployed independently.
An engineer needs to plan interfaces for a 25GE switch. Which of the following descriptions about interface planning is wrong?
- A . In interface planning, engineers can reserve interfaces. To shut down reserved interfaces, engineers can execute the shutdown command.
- B . If engineers want to plan M-LAG interfaces, each switch can use two 100GE interfaces to configure M-LAG.
- C . In this scenario, engineers do not need to plan aggregation interfaces, but must plan 8 MGT interfaces to connect to the BMC/management switch.
- D . If engineers want to plan node interfaces, each switch can use 4 to 6 25GE interfaces to connect to computing nodes and storage nodes in sequence.
An engineer is going to install the hardware of Huawei flash memory devices. Which of the following descriptions about hardware installation is correct?
- A . When connecting the flash storage device, the AC power cord needs to be connected to the same independent power supply to ensure line redundancy.
- B . If the flash memory device is a low-end flash memory, after removing the cabinet filler panel, the engineer needs to use the installation template to locate the device installation position.
- C . If the flash memory device is a high-end flash memory, the engineer needs to connect the cabinet ground wire before connecting the external power cord, and then install the cabinet after the connection is completed.
- D . When removing the cabinet filler panel, you need a flat-blade screwdriver and floating nut mounting strip, which are mainly used to remove the 16 screws on the filler panel and remove the filler panel.
A financial customer purchased a Huawei flash storage system for business deployment. The engineer configured the HyperCDP feature on the storage system. Now it is necessary to create a scheduled HyperCDP plan. Which of the following configuration commands can achieve this?
- A . create hyper cdp Schedule general
- B . create is hyper Cdp general
- C . change hyoer cdp Schedule enabled
- D . add Hyper_cdp_schedule fs
When delivering a distributed storage project, Huawei engineers focused on introducing OceanStorPacific’s parallel file system service to customers. Which of the following descriptions of this service is wrong?
- A . Use fixed-length, large-grained primes to ensure large I/O sequential read and write performance
- B . Large I/O can be forwarded to the home node for direct processing, eliminating the distributed lock overhead, thereby significantly reducing the read and write latency of large I/O
- C . Small I/Os are aggregated through the cache before being put into disk, which not only achieves ideal latency but also improves the utilization rate of small files.
- D . In terms of I/O flow, large I/O is transferred to the disk in a direct manner to improve bandwidth capacity
A financial customer purchased several Huawei OceanStor Pacific 9550 storages in the early stage. However, when the engineer configured the basic object service business on the storage, he found that the object service could not be enabled for the storage node. Which of the following reasons can you analyze that is not likely to cause this phenomenon?
- A . The NTP clock in the storage cluster is inconsistent with the clock on the client accessing the object service.
- B . The cluster is not configured with NTP synchronization and does not use the same NTP time source
- C . Engineers manually adjusted the time of cluster nodes, resulting in differences in conflict handling
- D . A namespace with the same name is created under the same account
When delivering a Huawei flash storage project, an engineer introduced the SAN/NAS integrated architecture to the customer. Which of the following descriptions of the architecture is wrong?
- A . In the protocol layer, NFS/CIFS supports DTOE offloading, but iSCSl does not.
- B . The software architecture can be divided from top to bottom into: protocol layer, data service layer, cache layer, file and block space management layer, and storage pool layer
- C . The protocol layer is responsible for protocol parsing and permission management. SAN and NAS are two sets of semantic logic, so different service entry components are used to deliver and implement them respectively.
- D . The space management layer adopts the AA high reliability mode, which can provide reliable data protection capabilities based on the customer’s actual business scenarios.
An industry customer purchased a Huawei OceanStor Dorado6800 storage system for business data deployment. To improve data reliability and security, engineers configured the HyperDetect feature on the storage system for data protection.
Which of the following descriptions of the technical characteristics is wrong?
- A . This feature can realize intelligent ransomware detection. For known ransomware, it can detect whether the snapshot is infected by ransomware through two types of features: extension name and ransom email.
- B . This feature provides the ability to intercept ransomware files. You can update the ransomware file extension by importing the detection model.
- C . In the detection of data change behaviors of snapshots before and after, if a snapshot is judged to be suspicious, it is necessary to further extract the full change features of the suspicious snapshot and use machine learning algorithms to detect whether the snapshot is infected by ransomware.
- D . This feature can realize real-time ransomware detection, that is, through the combination of rapid screening of abnormal I/O behavior and deep detection of underlying block device damage, detect whether the data is being extorted by ransomware