A school customer purchased two Huawei OceanStorPacific series storages for daily business deployment. The engineer needs to configure the DPC service on the two storages. Which of the following configurations of the engineer is wrong?
- A . If the upper-layer business has high requirements for data security, engineers need to configure the storage pool type as encryption type when creating a fusion storage pool.
- B . When creating a namespace, engineers need to select the security mode and application type.
- C . Before creating a fusion storage pool, engineers need to enable the file service of the node through DeviceManager before they can proceed with the subsequent creation process.
- D . When the storage network is RoCE networking, engineers can use the systemctl stop lIDpad.service command to shut down the lIDpad service.
A government customer purchased two Huawei all-flash storages for business deployment. During the use of the storage, engineers found that the storage performance often fluctuated. If the engineer wanted to locate the storage performance fluctuation problem at this time, it would involve many operations.
1- Check whether there are obvious changes in IO model or business load at the fluctuation time point
2-Analyze the latency fluctuation module through the latency location tool FTDS on the storage side
3- Check whether there is an obvious hit rate mutation at the fluctuation time point
4- Check whether there is a very small IO scenario at the fluctuation time point
5- Check whether there is any obvious hardware resource bottleneck on the storage side at the fluctuation time point
6- Check whether there are obvious storage background tasks at the fluctuation time point
I would like to ask, among the above operations, which operations can locate the problem and which operations cannot?
- A . 456 can locate the problem, but 123 cannot
- B . 123456 can help locate the problem
- C . 12 can locate the problem, but 3456 cannot
- D . 123 can locate the problem, but 456 cannot
A government customer purchased multiple Huawei distributed storage devices to provide DPC file services for upper-layer businesses.
During the DPC service configuration process, engineers need to plan and configure storage switches. Which of the following descriptions of storage switch configuration requirements is wrong?
- A . During the configuration process, if the control network does not cross subnets, but there will be cross-subnet expansion operations later, engineers must configure VLAN and flow control, but there is no clear configuration requirement for the control network gateway
- B . When the transmission protocol is RoCE, engineers need to configure VLAN and flow control
- C . Engineers can form M-LAG with multiple switches, and when the transmission protocol is IB, engineers need to enable subnet management
- D . During the configuration process, engineers need to configure the IP address of the switch management network port
A financial customer newly purchased several Huawei distributed storages for business deployment, with a total of 6 nodes, including 2 computing nodes and 4 storage nodes, and the business, storage, and management switches were deployed independently.
An engineer needs to plan interfaces for a 25GE switch. Which of the following descriptions about interface planning is wrong?
- A . In interface planning, engineers can reserve interfaces. To shut down reserved interfaces, engineers can execute the shutdown command.
- B . If engineers want to plan M-LAG interfaces, each switch can use two 100GE interfaces to configure M-LAG.
- C . In this scenario, engineers do not need to plan aggregation interfaces, but must plan 8 MGT interfaces to connect to the BMC/management switch.
- D . If engineers want to plan node interfaces, each switch can use 4 to 6 25GE interfaces to connect to computing nodes and storage nodes in sequence.
An engineer is going to install the hardware of Huawei flash memory devices. Which of the following descriptions about hardware installation is correct?
- A . When connecting the flash storage device, the AC power cord needs to be connected to the same independent power supply to ensure line redundancy.
- B . If the flash memory device is a low-end flash memory, after removing the cabinet filler panel, the engineer needs to use the installation template to locate the device installation position.
- C . If the flash memory device is a high-end flash memory, the engineer needs to connect the cabinet ground wire before connecting the external power cord, and then install the cabinet after the connection is completed.
- D . When removing the cabinet filler panel, you need a flat-blade screwdriver and floating nut mounting strip, which are mainly used to remove the 16 screws on the filler panel and remove the filler panel.
A financial customer purchased a Huawei flash storage system for business deployment. The engineer configured the HyperCDP feature on the storage system. Now it is necessary to create a scheduled HyperCDP plan. Which of the following configuration commands can achieve this?
- A . create hyper cdp Schedule general
- B . create is hyper Cdp general
- C . change hyoer cdp Schedule enabled
- D . add Hyper_cdp_schedule fs
When delivering a distributed storage project, Huawei engineers focused on introducing OceanStorPacific’s parallel file system service to customers. Which of the following descriptions of this service is wrong?
- A . Use fixed-length, large-grained primes to ensure large I/O sequential read and write performance
- B . Large I/O can be forwarded to the home node for direct processing, eliminating the distributed lock overhead, thereby significantly reducing the read and write latency of large I/O
- C . Small I/Os are aggregated through the cache before being put into disk, which not only achieves ideal latency but also improves the utilization rate of small files.
- D . In terms of I/O flow, large I/O is transferred to the disk in a direct manner to improve bandwidth capacity
A financial customer purchased several Huawei OceanStor Pacific 9550 storages in the early stage. However, when the engineer configured the basic object service business on the storage, he found that the object service could not be enabled for the storage node. Which of the following reasons can you analyze that is not likely to cause this phenomenon?
- A . The NTP clock in the storage cluster is inconsistent with the clock on the client accessing the object service.
- B . The cluster is not configured with NTP synchronization and does not use the same NTP time source
- C . Engineers manually adjusted the time of cluster nodes, resulting in differences in conflict handling
- D . A namespace with the same name is created under the same account
When delivering a Huawei flash storage project, an engineer introduced the SAN/NAS integrated architecture to the customer. Which of the following descriptions of the architecture is wrong?
- A . In the protocol layer, NFS/CIFS supports DTOE offloading, but iSCSl does not.
- B . The software architecture can be divided from top to bottom into: protocol layer, data service layer, cache layer, file and block space management layer, and storage pool layer
- C . The protocol layer is responsible for protocol parsing and permission management. SAN and NAS are two sets of semantic logic, so different service entry components are used to deliver and implement them respectively.
- D . The space management layer adopts the AA high reliability mode, which can provide reliable data protection capabilities based on the customer’s actual business scenarios.
An industry customer purchased a Huawei OceanStor Dorado6800 storage system for business data deployment. To improve data reliability and security, engineers configured the HyperDetect feature on the storage system for data protection.
Which of the following descriptions of the technical characteristics is wrong?
- A . This feature can realize intelligent ransomware detection. For known ransomware, it can detect whether the snapshot is infected by ransomware through two types of features: extension name and ransom email.
- B . This feature provides the ability to intercept ransomware files. You can update the ransomware file extension by importing the detection model.
- C . In the detection of data change behaviors of snapshots before and after, if a snapshot is judged to be suspicious, it is necessary to further extract the full change features of the suspicious snapshot and use machine learning algorithms to detect whether the snapshot is infected by ransomware.
- D . This feature can realize real-time ransomware detection, that is, through the combination of rapid screening of abnormal I/O behavior and deep detection of underlying block device damage, detect whether the data is being extorted by ransomware
In the existing network environment, Huawei’s backup appliance can provide strong data protection capabilities.
Which of the following descriptions of the functional architecture of the all-in-one machine is correct?
- A . File system management and protocol access are mainly implemented by the data protection layer
- B . The backup appliance can complete application data protection operations without the need for backup agents during data protection.
- C . DataEnable Engine is a data enabling module that can provide global retrieval and data desensitization related capabilities
- D . Protect Manager is a data flow module, mainly responsible for data processing such as backup, recovery, replication, archiving, and replica mounting.
A financial customer purchased several Huawei distributed storage devices for business deployment. In the unstructured service scenario, engineers need to divide the network into multiple planes.
Which of the following descriptions of the relevant network plane is wrong?
- A . The management internal network is used for data communication between storage nodes and management nodes, including deployment upgrades, resource configuration, performance alarm reporting, certificate key updates, etc.
- B . The management network is mainly used for system management and maintenance, and is connected to the customer management network
- C . In the file service DPC scenario, the storage backend network can be used to communicate with the computing nodes to process the communication data between the DPC and the OSD
- D . The business plane is used to connect with customer application systems and access storage through interfaces such as S3, HDFS, NFS, CIFS, and POSIK
A government customer has purchased several Huawei distributed storage devices for subsequent business deployment. Now engineers are required to configure file service services under standard protocol scenarios. Which of the following is not an action that engineers need to complete during the configuration process?
- A . Create a fusion storage pool
- B . Enable node file service
- C . Install DPC
- D . Create a namespace
An industry customer purchased a Huawei OceanStor Pacific 9950 distributed storage for business deployment. During an inspection, the engineer found that the location indicator of the main memory hard disk module of the device was always yellow. Please analyze the status of the main memory hard disk module at this time?
- A . The main memory hard disk module is operating normally
- B . The main memory hard disk module is being positioned
- C . Main memory hard disk module failure or pre-failure
- D . The main memory hard disk module is not powered on
A well-known customer in an industry purchased a Huawei OceanStor Pacific distributed storage system for business deployment. The engineer configured NFS file sharing on the storage system, and the sharing protocol is NFSv4. If the engineer wants to switch the user view to the developer view through the command line, which of the following commands can be used to configure it?
- A . change user_mode Current_modeuser_mode=developer
- B . change nas_1dap advanced_config
- C . change domain ad manager Operation-develop
- D . change dns general address-develop
A financial customer purchased several Huawei OceanStorPacific storages for business deployment. Engineers configured object storage services on the storage system. It is known that there is an AD domain controller in the existing network. Engineers need to add the storage system to the AD domain controller environment. Please analyze which of the following is not a prerequisite that needs to be met before adding the AD domain controller?
- A . IDAP domain environment needs to be built
- B . Before joining, all storage nodes and the DNS server network are connected
- C . The AD domain server and DNS server need to be synchronized with the storage system time
- D . TCP ports 88, 389, 445, 464, and 636 need to be opened between the storage system and the AD domain environment.
A financial customer purchased a Huawei OceanStor Pacific series distributed storage and used the SmartEqualizer feature. If the customer wants to select the node with the lowest number of file service connections to process client connection requests, what load policy should the administrator configure?
- A . By CPU usage
- B . By number of node connections
- C . By node throughput
- D . By file space retention rate
A financial customer purchased a Huawei all-flash storage for business deployment. During daily storage use, the administrator found that the performance of the storage had large fluctuations, and then conducted relevant inspections on the performance issues.
Which of the following is not a check item that needs to be done for performance fluctuation issues?
- A . Check whether there are obvious storage background tasks at the fluctuation time point, such as data reconstruction, etc.
- B . Check whether there are any abnormal SmartKit operations during the fluctuation period
- C . Check whether there is an obvious hit rate mutation at the fluctuation time point
- D . Check whether there are obvious hardware resource bottlenecks on the storage side at the fluctuation time point
Which of the following is an impossible cause of this phenomenon?
- A . Storage controller temperature is too high
- B . LUN Fault page exceeds the limit
- C . A reserved port on the storage switch is faulty.
- D . Battery failure
A financial customer purchased a Huawei flash storage for subsequent business deployment. During the storage system initialization process, engineers need to configure security policies for the storage. Which of the following is not included in the content of configuring security policies?
- A . Configure blacklist and whitelist policies
- B . Configure account policies
- C . Configure user account auditing
- D . Configure login policy
A financial customer purchased a Huawei flash storage for business deployment. In order to improve the space utilization of the storage system, the engineer configured the deduplication and compression feature on the storage system.
If the engineer wants to query the data reduction information of the LUN group at this time, which of the following commands can be used to configure it?
- A . change lun migration split consistency
- B . show workload type detail info
- C . show lun group reduction info lun group Id=c
- D . show lun group reduction switch lun id=c
A financial customer purchased several Huawei distributed storages. Engineers now need to install the distributed storage software through LID configuration.
Which of the following descriptions of LID configuration is wrong?
- A . When installing software using LID, engineers need to create a LID configuration file
- B . Before engineers use the LID Designer tool to create LID configuration files, they need to complete the planning of system deployment parameters and IP addresses.
- C . In LID configuration mode, engineers need to manually complete operations such as node addition and network configuration on the DeviceManager interface.
- D . In LID configuration mode, engineers can use SmartKit to configure node iBMC IP addresses, configure node management, and other operations based on the exported configuration file.
When engineers perform storage-side tuning on Huawei flash memory, they will take the cache prefetch strategy into consideration.
Which of the following is not a type of cache prefetching strategy?
- A . Fixed prefetch
- B . Smart Prefetch
- C . No prefetching
- D . Elastic prefetching
When using Huawei flash storage, if an engineer wants to calculate the effective write bandwidth of the disk, which of the following calculation formulas can be used?
- A . Hard disk effective write bandwidth = single disk write bandwidth x number of hard disks
- B . Disk effective write bandwidth = single port bandwidth x number of ports
- C . Hard disk effective write bandwidth = single disk write bandwidth x number of hard disks x (number of data disks / total number of disks)
- D . Hard disk effective read bandwidth = single disk read bandwidth x number of hard disks x (number of system disks/total number of disks)
A financial customer wants to configure the DME IQ service to perform daily management of flash storage. Before setting up DME IQ, it is necessary to open the server port of the DME IQ cloud to ensure that the storage device can send HTTP requests to the DME IQ cloud normally.
Which of the following ports does not belong to the ports that need to be opened?
- A . 8448/TCP
- B . 8900/TCP
- C . 7448/TCP
- D . 9448/TCP
A scientific research industry purchased several Huawei OceanStorPacific series distributed storages for business deployment, and engineers configured DPC file services on the storage.
Because the front-end business operation requires higher performance, engineers want to set the CPU of the DPC node to performance mode through the CLI command line. Please analyze which of the following commands has this function?
- A . change service ndmp_restart_service
- B . change pms converged_qos_policy
- C . cpupower frequency-info
- D . cpupower frequency-set -g performance
A scientific research customer purchased several Huawei distributed storage systems for HPC business deployment. In order to ensure the performance requirements of the business, the engineer now needs to configure DPC file services on the storage system. Which of the following configuration descriptions of the engineer is correct? One item?
- A . If an engineer wants to enable the feature that allows the creation of namespaces with the same name for different accounts, this can be achieved by executing the change space ops cnd-sameFsName args-set,1 command
- B . Engineers can install DPC software in an existing container environment and need to configure the container node and install the network management component.
- C . After the fusion storage pool is created, engineers need to enable the object service and big data service types of the nodes in the storage pool, while the file service type does not need to be checked.
- D . When creating a disk pool, engineers do not need to select main memory and cache, but need to configure the grading level.
Which of the following descriptions of the networking principles of Huawei flash storage device disk enclosures is wrong?
- A . The P0 port of the disk enclosure is an upstream port and can only be connected to the P1 port of the upper disk enclosure.
- B . The P1 port of the disk enclosure expansion module is connected to the P0 port of the next-level disk enclosure expansion module
- C . Disk enclosure cascading networking usually adopts full positive connection
- D . The interface modules of the two ports on the controller enclosure connected to the same disk enclosure should be symmetrical and have the same port number.
Which of the following descriptions about the principle of the Flash Storage HyperReplication feature is wrong?
- A . In synchronous remote replication mode, after the primary storage system receives a write I/O request from the host, it will send the write I/O request to the slave LU and the primary LUN at the same time. When both the primary LUN and the slave LUN are written successfully, it will return the write I/O success result to the host.
- B . Asynchronous remote replication mode relies on snapshot technology. When the host initiates a write operation request, the storage system will return a successful write request to the host only if the write from the LUN is successful.
- C . Remote replication can be divided into two modes: synchronous and asynchronous. The principles of writing data to the slave LUN are different in different modes.
- D . In synchronous remote replication mode, the primary LUN of the production site and the secondary LUN of the disaster recovery site will establish a synchronous remote replication relationship and start the initial synchronization.
Which of the following is the correct storage system installation process?
- A . Installation preparation > Initialize the storage system > Establish a remote maintenance environment > Install the device > Power on > Connect cables > Check hardware installation
- B . Installation preparation > Install equipment > Power on > Connect cables > Check hardware installation > Initialize storage system > Establish remote maintenance environment
- C . Installation preparation > Install equipment > Connect cables > Check hardware installation > Power on > Initialize storage system > Establish remote maintenance environment
- D . Installation preparation > Connect cables > Install equipment > Power on > Check hardware installation > Initialize storage system > Establish remote maintenance environment
The user purchased several Huawei OceanStorDorado devices to support the database business on the existing network, but found that multipath ping-pong effect occurred during use.
Which of the following descriptions about performance tuning for this phenomenon is correct?
- A . During the optimization process, you can run the upadm startupdateimage command to check whether the failover function is disabled.
- B . During the tuning process, you can run the upadm showoption command to view the multipath configuration and confirm that the multipath function has been disabled.
- C . During the tuning process, you must use the show performanceport command to view the backend port performance indicators to assist in problem location.
- D . To address this problem, you can usually use the echo noop >/sys/block/sdc/queuelscheduler method to temporarily modify the scheduling algorithm of the block device to optimize the multipath ping-pong effect.
Huawei OceanProtect backup appliance is widely used by customers in many industries because it adopts the design of CPU Core grouping + intelligent scheduling key technology. Which of the following is an advantage of this technology?
- A . This technology can achieve physical and logical isolation of resources and reduce latency
- B . The system can pre-fetch data and metadata of all LUNs to improve cache hit rate
- C . The scheduler can distribute tasks to other cores according to the business load status to achieve load balancing
- D . This technology has the problem of overloading some cores when carrying different services, resulting in high latency
In the DeviceManager interface, which of the following menu paths can a user use to view all the alarm information that exists and has not been repaired in the current storage system?
- A . Monitor > Alarms and Events > Current Alarms
- B . Monitor > Alarms and Events > All Alarms
- C . Monitoring > Alarms and Events > Historical Alarms
- D . Monitoring > Alarms and Events > Alarms
In a Linux system environment, which of the following commands can an engineer use to view host latency?
- A . iostat
- B . vmstat
- C . sar
- D . top
SPC certification is a SAN performance test benchmark evaluated by a third party. Which of the following descriptions of the scenarios corresponding to SPC certification is correct?
- A . SPC-2 is used for fast response to random small IOs
- B . Application scenarios of SPC-2 for large IO sequential access
- C . SPC-2 is used to measure the performance of SAN arrays in three application scenarios: OLTP, Database, and Email.
- D . Application scenarios of SPC-1 for large IO sequential access
During daily operation and maintenance, an engineer discovered that there was a problem with the system time of multiple Huawei flash storages purchased by the company earlier, and the system time needed to be corrected.
Which of the following is not a possible impact of modifying the storage device time?
- A . Modifying the device time will affect the life of the hard disk, controller, etc., and may trigger an alarm for hardware expiration or aging.
- B . If the modified device time is greater than the password validity period configured by the user, the system may force the user to change the login password.
- C . If the modified device time exceeds the set deadline for saving historical performance data, the system will no longer save historical performance data.
- D . If the modified device time exceeds the certificate validity period, the certificate will expire
In a storage system, there are multiple system roles. Which of the following roles has full control over the storage device?
- A . Read-only user
- B . Data Protection Officer
- C . Network Administrator
- D . Super Administrator
During routine inspections, Engineer B discovered that the power module indicator light of the OceanStor Dorado 6800 storage system that had just been used was green and flashing. What are the possible states of the power module at this time?
- A . The power input is normal, but the device is not powered on.
- B . No external power input
- C . The power module is in the process of online upgrade
- D . The power module fails
In order to improve the performance and reliability of its core business, a company configured the SmartEqualizer feature in its data storage system. In the process of configuring the address pool, which of the following descriptions about the number of addresses in the IP address segment is correct?
- A . Up to 1024
- B . Up to 512
- C . Up to 2048
- D . Up to 256
A well-known customer in an industry purchased two Huawei OceanStorDorado 18000 series storages for business deployment. In order to ensure high reliability of the business, engineers configured the HyperMetro active-active feature on the storage. It is known that the arbitration mode of the active-active is static priority mode, and storage A is prioritized and storage B is non-prioritized.
Please analyze what the arbitration result is in this mode when the link between storage A and storage B fails?
- A . Both the LUN of storage A and the LUN of storage B continue to run services
- B . The LUN of storage A continues to run services, while the LUN of storage B stops running services
- C . The LUN of storage A is inaccessible, and the LUN of storage B stops running services.
- D . The host cannot access the LUNs of storage A and storage B
An industry customer purchased several Huawei OceanStor Pacific 9950 distributed storages for business deployment. Now the engineer needs to configure NFS file sharing services on the storage. Which of the following configuration operations is correct?
- A . Before creating an account, engineers must create a Dtree and a namespace.
- B . When configuring a business network, engineers must create subnets and AccessZones, and in the subnet configuration, engineers must disable the universal DNS service.
- C . If the engineer wants to enable the NFSv4.0 service, he can do so by configuring the change service Nfs-config nfsv40-status-enable account-name-XX command.
- D . When creating an NFS share, engineers do not need to select a namespace, but must select a dtree.
An industry customer purchased several Huawei OceanStorPacific series distributed storages for business deployment, and engineers configured the SmartMigration feature on the above storage devices. Due to actual business needs, engineers now want to modify the split mode and migration rate of SmartMigration.
Which of the following SmartMigration operating states does not allow engineers to perform the above modification operations?
- A . Abnormal disconnection
- B . Disconnect
- C . Migration failure
- D . Migrating
An industry customer purchased several Huawei flash storages for business deployment. During an inspection, engineers found that some storage components had failed and needed to be disassembled and replaced.
Which of the following descriptions of the disassembly and replacement of related parts is correct?
- A . The interface modules and system enclosures of storage devices can be replaced independently.
- B . The CPU of the storage system cannot be replaced independently, but it can be disassembled independently.
- C . In storage devices, button batteries cannot be replaced or disassembled.
- D . The memory and system disk of the storage system can be replaced and disassembled independently
Which of the following expansion technologies is not included in the intelligent many-core technology supported by OceanStor Dorado?
- A . Business Grouping Technology
- B . Cross-core access technology
- C . CPU grouping technology
- D . Inter-core lock-free technology
The OceanStor hybrid flash storage system uses a SAN/NAS integrated design. Which of the following file backup protocols does it support?
- A . HTTP
- B . CIFS
- C . NDNP
- D . FTP
SmartIndexing can help enterprises manage massive amounts of data. Enterprises need to first select storage nodes to enable data navigation services and form clusters. Which of the following cannot be set as the number of nodes in the data navigation service cluster?
- A . 24
- B . 36
- C . 12
- D . 48
Based on RAID2.0+ technology, during data reconstruction within the same RAID group, which of the following is the corresponding relationship between the normal data blocks used for reconstruction and the faulty data blocks?
- A . Many to One
- B . One-to-one
- C . One-to-many
- D . Many-to-many
The customer purchased several Huawei OceanStorPacific storages for deploying NAS file services. During the use of this file service, it is usually necessary to allocate and restrict resources to users based on the SmartQuota feature.
Which of the following descriptions of SmartQuota file system quota technology is wrong?
- A . If an alarm is generated and needs to be eliminated, SmartQuota’s processing strategy is generally to eliminate the alarm immediately when the user’s used resources are lower than the soft quota.
- B . SmartQuota is suitable for file service scenarios. Administrators can configure different quotas for different QuotaTrees to limit the resources used by users of the corresponding directories.
- C . The entire I/O operation and quota update either succeeds completely or fails completely
- D . During each I/O operation, check whether the used capacity and number of files in the quota plus the incremental capacity and files of this operation will exceed the hard quota. If so, the operation fails. Otherwise, the operation succeeds.
The customer purchased several Huawei OceanStorDorado series storages for deploying active-active services. During the service management process, it was found that the active-active pairs had many service states.
Which of the following is not a common status of active-active services?
- A . Forced synchronization status
- B . Pause state
- C . Normal state
- D . Waiting for synchronization
The block service logic architecture is a layered architecture, and each layer has its corresponding function. Which of the following is used to implement data redundancy protection?
- A . Storage Service Layer
- B . Storage Interface Layer
- C . Data protection layer
- D . Storage engine layer