Check the alarm policy configuration
Check the alarm policy configurationA . 1, 2B . 3C . 1, 2, 3D . 2, 3View AnswerAnswer: C
Which of the following statements about storage virtualization is wrong?
Which of the following statements about storage virtualization is wrong?A . Hides the complexity of physical devicesB . Get rid of the limitation of physical capacityC . Information about hardware additions and subtractions can be displayedD . Integrate and use existing functionsView AnswerAnswer: C
Which of the following descriptions of data compression characteristics is wrong?
Which of the following descriptions of data compression characteristics is wrong?A . Reorganize the dataB . Extend the service life of SSDC . Some data information may be lostD . Reduce the storage space occupied by dataView AnswerAnswer: C
The iSCSI protocol is a SCSI instruction set that runs on top of the IP protocol. For a TCP message that encapsulates the iSCSI protocol, which of the following parts is not included?
The iSCSI protocol is a SCSI instruction set that runs on top of the IP protocol. For a TCP message that encapsulates the iSCSI protocol, which of the following parts is not included?A . iSCSI HeaderB . TCP HeaderC . IP HeaderD . iSCSI dataView AnswerAnswer: D
Which of the following storage management software can a company user use to automatically report alarms of storage devices connected to it to the Huawei Service Support Center?
Which of the following storage management software can a company user use to automatically report alarms of storage devices connected to it to the Huawei Service Support Center?A . DeviceManagerB . SmartKitC . CLID . eServiceView AnswerAnswer: D
Which of the following purposes is the FE 25Gb RoCE module supported by OceanStor Dorado V6 used for?
Which of the following purposes is the FE 25Gb RoCE module supported by OceanStor Dorado V6 used for?A . Connecting to the application serverB . Connect to the smart disk enclosureC . Active-Active ArbitrationD . Connect to SAS disk enclosureView AnswerAnswer: A
The virtualized data in the storage pool consists of two parts: metadata volume and data volume. Which of the following does the metadata volume not contain?
The virtualized data in the storage pool consists of two parts: metadata volume and data volume. Which of the following does the metadata volume not contain?A . Where the data is storedB . Data volume IDC . LUN IDD . DCLView AnswerAnswer: D
Which of the following storage network architectures can provide file-level sharing services for hosts?
Which of the following storage network architectures can provide file-level sharing services for hosts?A . NASB . FC SANC . DASD . IP SANView AnswerAnswer: A
How many NVMe SSDs does the OceanStor Pacific 9950 support at most?
How many NVMe SSDs does the OceanStor Pacific 9950 support at most?A . 36B . 80C . 25D . 72View AnswerAnswer: B
Both RoCE and iWARP belong to RDMA technology. Which of the following networks are they based on?
Both RoCE and iWARP belong to RDMA technology. Which of the following networks are they based on?A . IB NetworkB . EthernetC . FC networkD . IPX networkView AnswerAnswer: B