The host layer disaster recovery investment is less, and the compatibility is better.

The host layer disaster recovery investment is less, and the compatibility is better.A . TrueB . FalseView AnswerAnswer: A

September 14, 2021 No Comments READ MORE +

Due to the earthquake, a company's IT system went down at 16:00 on November 11 leading to a business halt. By 23:00 on the same day, the IT system resumed operation and the data at 12:00 of that day can be restored. Then what respectively are the RTO and the RPO?

Due to the earthquake, a company's IT system went down at 16:00 on November 11 leading to a business halt. By 23:00 on the same day, the IT system resumed operation and the data at 12:00 of that day can be restored. Then what respectively are the RTO and the...

September 14, 2021 No Comments READ MORE +

Most of the data generated by the Internet industry is structured data, and this part of the data accounts for about 80% of the total amount of data.

Most of the data generated by the Internet industry is structured data, and this part of the data accounts for about 80% of the total amount of data.A . TrueB . FalseView AnswerAnswer: B

September 13, 2021 No Comments READ MORE +

A company has sufficient client server resources, but the network resources are tight. Which deduplication strategy is suitable?

A company has sufficient client server resources, but the network resources are tight. Which deduplication strategy is suitable?A . File-level deduplicationB . Byte-level deduplicationC . Source-end deduplicationD . Target-end deduplicationView AnswerAnswer: C

September 13, 2021 No Comments READ MORE +

Huawei OceanStor V3 SmartTier feature can be used to place data on the specified disk type.

Huawei OceanStor V3 SmartTier feature can be used to place data on the specified disk type.A . TrueB . FalseView AnswerAnswer: A

September 13, 2021 No Comments READ MORE +

For random accessing to mechanical disks, the biggest impact on the time taken to complete an IO is:

For random accessing to mechanical disks, the biggest impact on the time taken to complete an IO is:A . Seek timeB . Rotation delayC . Data transfer timeView AnswerAnswer: A

September 12, 2021 No Comments READ MORE +

The server installed Linux operating system accesses the disk array based on the RAID 5 strategy, and the access path sequence is:

The server installed Linux operating system accesses the disk array based on the RAID 5 strategy, and the access path sequence is:A . File System->Application System->Volume->I/O Subsystem->RAID Controller->DiskB . Application System->File System->Volume->I/O Subsystem->RAID Controller->DiskC . Application System -> File System -> I/O Subsystem -> Volume -> RAID Controller -> DiskD...

September 12, 2021 No Comments READ MORE +

Regarding the Refactoring, which of the following statement is incorrect?

Regarding the Refactoring, which of the following statement is incorrect?A . RAID 0, 1, 3, 5, 6 and 10 support RefactoringB . Refactoring does not necessarily require a hot spare diskC . Refactoring affects RAID performanceD . Refactoring will not interrupt the RAID businessView AnswerAnswer: A

September 12, 2021 No Comments READ MORE +

An enterprise adopts cloud primary and backup data-level disaster recovery. During business planning, storage can be divided into two types of LUNs based on actual needs: protected LUNs and unprotected LUNs. VMs that need disaster recovery are created on the protected LUNs, and only configure array replication for protection LUNs to save the storage space requirements of the disaster recovery center.

An enterprise adopts cloud primary and backup data-level disaster recovery. During business planning, storage can be divided into two types of LUNs based on actual needs: protected LUNs and unprotected LUNs. VMs that need disaster recovery are created on the protected LUNs, and only configure array replication for protection LUNs...

September 12, 2021 No Comments READ MORE +

Xiao Wang, an employee of a small company, uses the CIFS protocol to access shared files on the Linux application server supported by his company's storage system.

Xiao Wang, an employee of a small company, uses the CIFS protocol to access shared files on the Linux application server supported by his company's storage system.A . TrueB . FalseView AnswerAnswer: B

September 11, 2021 No Comments READ MORE +