Which of the following descriptions about CIFS and NFS is wrong?

Which of the following descriptions about CIFS and NFS is wrong?A . CIFS is easier to use than NFS, but additional software must be installed on the host.B . NFS is often used for file service access on LINUX hostsC . CIFS is often used to access Windows host file...

March 22, 2025 No Comments READ MORE +

Which of the following descriptions about RAID 2.0+ is wrong?

Which of the following descriptions about RAID 2.0+ is wrong?A . One-to-many rapid refactoring modeB . All hard disks in the storage pool participate in the reconstructionC . Greatly reduce the impact on business during the reconstruction processD . Data recovery speed is 20 times faster than traditional RAIDView AnswerAnswer:...

March 18, 2025 No Comments READ MORE +

During data migration, what unit does the storage pool use to identify data activity?

During data migration, what unit does the storage pool use to identify data activity?A . Data BlockB . Single fileC . LUND . Hard diskView AnswerAnswer: A

March 17, 2025 No Comments READ MORE +

Which of the following descriptions about RDMA (Remote Direct Memory Access) is wrong?

Which of the following descriptions about RDMA (Remote Direct Memory Access) is wrong?A . High throughputB . Low responseC . Low latencyD . Less CPU resource usageView AnswerAnswer: B

March 15, 2025 No Comments READ MORE +

Which of the following descriptions about NAS architecture is wrong?

Which of the following descriptions about NAS architecture is wrong?A . UNIX and Windows users cannot directly share the same data through NASB . NAS is based on file-level sharingC . Using NAS eliminates the need to create multiple file serversD . NAS enables customers to share files quickly and...

March 15, 2025 No Comments READ MORE +

FC HBA card is mainly used to connect which of the following devices?

FC HBA card is mainly used to connect which of the following devices?A . Fiber Array and IP Storage ArrayB . Server to ServerC . Server and fiber arrayD . Server and IP-SAN arrayView AnswerAnswer: C

March 15, 2025 No Comments READ MORE +

When configuring SmartQoS, if the user does not configure the priority attribute of the created LUN or file system, which of the following priorities will be used by default?

When configuring SmartQoS, if the user does not configure the priority attribute of the created LUN or file system, which of the following priorities will be used by default?A . MediumB . HighC . LowD . NoneView AnswerAnswer: C

March 13, 2025 No Comments READ MORE +

Which of the following commands is used to query the function configuration information of the license file that has been imported into the storage system?

Which of the following commands is used to query the function configuration information of the license file that has been imported into the storage system?A . show system generalB . show licenseC . show license_activeD . show systemView AnswerAnswer: B

March 12, 2025 No Comments READ MORE +

Check the alarm policy configuration

Check the alarm policy configurationA . 1, 2B . 3C . 1, 2, 3D . 2, 3View AnswerAnswer: C

March 12, 2025 No Comments READ MORE +

Which of the following statements about storage virtualization is wrong?

Which of the following statements about storage virtualization is wrong?A . Hides the complexity of physical devicesB . Get rid of the limitation of physical capacityC . Information about hardware additions and subtractions can be displayedD . Integrate and use existing functionsView AnswerAnswer: C

March 12, 2025 No Comments READ MORE +