(single choice) Among the following OceanStor 9000 software features, which feature can provide file
system snapshots?
B
(multiple choice) OceanStor 9000 adopts Erasure code technology to protect dat
a. If a site has 6 nodes,
And the customer wants to ensure that the data can be recovered even if three disks are broken in
one strip, the redundancy protection levels that can be adopted are:
A, D
(multiple choice) Which of the following is correct in IDC's description of the characteristics of big
data?
A, B, C, D
(Multiple choice) The quota types supported by OceanStor 9000 InfoAllocator are:
A, B
(Judgment) FusionStorage Block uses a unique data block slicing technology and data based on DHT
Hash
The routing algorithm can evenly distribute the data of the volume to the fault domain of a larger
resource pool, so that each volume can obtain a larger
IOPS and MBPS performance also makes the load of each hardware resource relatively balanced.
A
(Judgment) Whether the Huawei OceanStor 9000 is upgraded online or offline, it has no impact on
device management.
B
(multiple choice) The daily inspection performance indicators of the big data storage system include:
A, B, C, D
(multiple choice) The basic principles of daily maintenance of big data storage systems include:
A, B, C
(single choice) Which of the following is the correct power-on sequence of the Huawei OceanStor
9000 big data storage system?
A
(Judgment) The InfoLocker feature of OceanStor 9000 can be used to meet the business scenario of
one write and multiple read.
A
(multiple choice) The value of Huawei OceanStor 9000 InfoTier is reflected in:
A, B, C, D
(single choice) Which load balancing method does the Huawei OceanStor 9000 InfoEqualize feature
not support?
B
(single choice) In the Huawei OceanStor 9000, which of the following is not an authentication
method supported by NFS sharing?
D
(multiple choice) In an OceanStor 9000 system, the total number of nodes is 10, and the data
protection levels that can be configured for it are:
B, C
(multiple choice) Which of the following are correct in the description of the CIFS protocol?
A, D