The SCSI protocol can be used not only for the communication between the host and the disk, but also for the communication between hosts, physical tape libraries, and optical disks, etc.
The SCSI protocol can be used not only for the communication between the host and the disk, but also for the communication between hosts, physical tape libraries, and optical disks, etc.A . TrueB . FalseView AnswerAnswer: A
The process of regenerating all user data and parity data on the failed disk in the mirror array or RAID array is called:
The process of regenerating all user data and parity data on the failed disk in the mirror array or RAID array is called:A . RecalculationB . RefactoringC . Hot backupD . RecoveryView AnswerAnswer: B
Regarding IOPS, which of the following statement is incorrect?
Regarding IOPS, which of the following statement is incorrect?A . How many IOs can be performed per second, each IO is fixed according to the size of the written data.B . If you each IO write a large piece of continuous data without changing lanes frequently, the number of IOs...
Statement 1: Hyper Mirror one LUN failure, the host business is not interrupted, Hyper Clone primary LUN failure, the host business is interrupted.
Statement 1: Hyper Mirror one LUN failure, the host business is not interrupted, Hyper Clone primary LUN failure, the host business is interrupted. Statement 2: Hyper Mirror supports dual copy, and Hyper Clone supports a maximum of 1 primary LUN: 16 secondary LUNs.A . Statement 1 is correct, Statement 2...
Which of the following about FC SAN network switching technology is wrong?
Which of the following about FC SAN network switching technology is wrong?A . A widely used technology that supports up to 127 devices.B . The switch can provide simultaneous communication between multiple nodes connected to it.C . A node failure in one zone will not affect node services in other...
CKG is composed of multiple CKs on different types of different hard disks in the hard disk domain.
CKG is composed of multiple CKs on different types of different hard disks in the hard disk domain.A . TrueB . FalseView AnswerAnswer: B
A company has sufficient client server resources, but the network resources are tight. Which deduplication strategy is suitable?
A company has sufficient client server resources, but the network resources are tight. Which deduplication strategy is suitable?A . File-level deduplicationB . Byte-level deduplicationC . Source-end deduplicationD . Target-end deduplicationView AnswerAnswer: C
Regarding the steps of SAN synchronous replication, which of the following is in the correct order?
Regarding the steps of SAN synchronous replication, which of the following is in the correct order? (1) The production storage receives the host write request. Hyper Replication logs the request. Only the address information is recorded in the log, and the data content is not recorded. (2) Hyper Replication waits...
Port of the local controller
Port of the local controllerA . 1->2->3B . 2->1->3C . 3->1->2D . 2->3->1View AnswerAnswer: C
The following are two statements about cloud computing:
The following are two statements about cloud computing: Statement 1: A deployment model of cloud computing is to divide a large physical server into multiple small virtual machines. Statement 2: A deployment model of cloud computing is to aggregate multiple small physical servers into one large host.A . Both Statement...