Statement 1: When Windows mounts a CIFS share with the same IP address (domain name or machine name), the same user can mount one or more shares at the same time, but different users cannot mount the same or different shares.

Statement 1: When Windows mounts a CIFS share with the same IP address (domain name or machine name), the same user can mount one or more shares at the same time, but different users cannot mount the same or different shares. Statement 2: When Windows mounts the Homedir share with...

September 23, 2021 No Comments READ MORE +

When there are bad sectors or bad blocks on the hard disk, which reconstruction method is used?

When there are bad sectors or bad blocks on the hard disk, which reconstruction method is used?A . Whole disk reconstructionB . Local RemeshingC . Restoration reconfigurationD . Local remodelingView AnswerAnswer: B

September 22, 2021 No Comments READ MORE +

Regarding data-level, application-level, and business-level disaster recovery, which of the following statements is correct?

Regarding data-level, application-level, and business-level disaster recovery, which of the following statements is correct?A . Regarding RTO, data-level <application-level <business-levelB . Regarding RTO, data-level <business-level <application-levelC . Regarding TCO, data-level <application-level <business-levelD . Regarding TCO, business-level <data-level <application-levelView AnswerAnswer: C

September 21, 2021 No Comments READ MORE +

Which storage network architecture is suitable for this bank?

A bank needs to ensure data security and use it to transfer large databases. Which storage network architecture is suitable for this bank?A . IP SANB . FC SANC . DASD . NASView AnswerAnswer: B

September 21, 2021 No Comments READ MORE +

In the backup system, the data that needs to be backed up must pass through the media server before being stored in the backup media.

In the backup system, the data that needs to be backed up must pass through the media server before being stored in the backup media.A . TrueB . FalseView AnswerAnswer: A

September 20, 2021 No Comments READ MORE +

In Huawei OceanStor V3 based on RAID 2.0+, when a user creates a file system, the system will first automatically create a corresponding LUN and generate a file system on the LUN.

In Huawei OceanStor V3 based on RAID 2.0+, when a user creates a file system, the system will first automatically create a corresponding LUN and generate a file system on the LUN.A . TrueB . FalseView AnswerAnswer: B

September 20, 2021 No Comments READ MORE +

Which type of backup do you recommend?

A company needs to make a backup strategy. The company has a small amount of backup data and hopes to back up in a short time and save storage space to the utmost extent. Which type of backup do you recommend?A . Full backupB . Cumulative incremental backupC . Differential...

September 20, 2021 No Comments READ MORE +

The following are two statements about cloud computing:

The following are two statements about cloud computing: Statement 1: A deployment model of cloud computing is to divide a large physical server into multiple small virtual machines. Statement 2: A deployment model of cloud computing is to aggregate multiple small physical servers into one large host.A . Both Statement...

September 19, 2021 No Comments READ MORE +

An enterprise adopts cloud primary and backup data-level disaster recovery. During business planning, storage can be divided into two types of LUNs based on actual needs: protected LUNs and unprotected LUNs. VMs that need disaster recovery are created on the protected LUNs, and only configure array replication for protection LUNs to save the storage space requirements of the disaster recovery center.

An enterprise adopts cloud primary and backup data-level disaster recovery. During business planning, storage can be divided into two types of LUNs based on actual needs: protected LUNs and unprotected LUNs. VMs that need disaster recovery are created on the protected LUNs, and only configure array replication for protection LUNs...

September 19, 2021 No Comments READ MORE +

Multipath software can only be used in IP-SAN.

Multipath software can only be used in IP-SAN.A . TrueB . FalseView AnswerAnswer: B

September 19, 2021 No Comments READ MORE +