01. Huawei's end-to-end active-active data center solution is divided into six layers. What are these six layers?
a) Storage layer, computing layer, application layer, network layer, transport layer and security layer
b) Storage layer, session layer, application layer, network layer, transport layer and physical layer
c) Storage layer, computing layer, application layer, network layer, transport layer and physical layer
d) Storage layer, session layer, application layer, network layer, transport layer and security layer
02. Before planning and designing the project, it is necessary to collect information on the project. Which of the following information collection descriptions are correct?
(Multiple choice)
a) Collect project contract amount information
b) Collect network topology information on the live network
c) Collect operating system version information of the business host
d) Collect business storage capacity requirement information
03. Which type of log is not supported by FusionStorage?
a) System log
b) Monitoring log
c) Security log
d) Operation log
04. Erasure code redundancy technology supports higher reliability and more flexible redundancy strategies than traditional RAID algorithms. Which one of the following descriptions of Erasurecode principle is wrong?
a) In Erasure Code storage mode, the system supports up to M-1 hard drives
b) The system stores N+M data blocks in parallel in different nodes
c) Calculate M through the ErasureCode algorithm for every N consecutive data blocks
d) When data is written, it is cut into N data blocks with the same size
05. In storage planning and design, which of the following is NOT involved in service planning?
a) Basic service
b) Capacity planning
c) Value-added function
d) Network planning
06. When designing a backup solution, what factors must be considered?
(Multiple Choice)
a) Data and application restoration policy
b) Bandwidth and network
c) Capacity and storage policy
d) Backup system migration
07. Compared with ordinary file backup, the components that need to be deployed when deploying VMware backup are ___.
a) CA
b) MA
c) CS
d) VSA
08. Regarding CIFS share configuration, which of the following options is incorrect?
a) After the mandatory signature is enabled, the client will be forced to use the signature function. If the client is not set to the enabled state, OceanStor 9000 will reject the client's data access request.
b) After the Guest is enabled, the user does not need to enter the username and password when accessing the shared directory on the client.
c) When Oplock (Opportunisticlocking) is enabled, the file will be cached locally before being sent to the shared storage, which helps to improve client access efficiency.
d) After Notify is enabled, a client's change operation in a directory cannot be sensed by other clients that are accessing this directory and its parent directory.
09. File system backup needs to consider compatibility issues. Which of the following statements is wrong?
a) It is necessary to confirm the type and version of the operating system and file system of the backup source.
b) The operating system or application version is too new, you can wait to update the backup software version.
c) If the application is not in the backup software compatibility list, you can export the application data to a file by other means, and then back up the file.
d) Use a new version of the backup software. If the operating system version is too old, an updated version is required.
10. What are the advantages of Huawei OceanStor 9000 clustered NAS technology over traditional NAS storage systems?
(Multiple choice)
a) Scale-out engine architecture is scalable
b) Fast failover, the failure of a single node in the cluster does not affect the business
c) After the Yintong cluster is connected with SAN storage, the SAN storage can adopt heterogeneous storage
d) Multi-node cluster, load balancing, global cache, provide strong performance