Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Huawei H13-531_V2.0 HCIE-Cloud Computing (Written) V2.0 Exam Practice Test

Page: 1 / 77
Total 765 questions

HCIE-Cloud Computing (Written) V2.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

In order to give full play to the performance and function of the system, which of the following operations must be strictly observed (multiple choice)

Options:

A.

Strictly limit user roles to ensure (to ensure that users who belong to different roles only have the minimum operation permissions to access resources)

B.

Strictly implement the backup plan and regularly back up system data

C.

It is strictly forbidden to install or run non-standard software (such as firewalls, etc.) on the deployed equipment

D.

In case of emergency, maintenance personnel should immediately report back to the headquarters or contact technical support directly.

Question 2

Which of the following descriptions are correct about the assignment of desktops when FA is issued quickly?

Options:

A.

When "Virtual Group Type" is "Linked Clone", it is necessary to configure "Set Assignment Type", "Add User", "Setup Right"

limited group °

B.

When "Virtual Group Type" is "Complete Copy", you need to configure "Set Assignment Type", "Add User", "Set Permission Group"

C.

When the "Virtual Group Type" is "Complete Copy", you need to configure the number of virtual machines, "Issuing users (groups) °

D.

When the type of virtual machine group is "Linked clone", you need to configure the number of virtual machines, and the user (group) to be issued °

Question 3

In today's IT industry, the amount of data is growing rapidly, new; regulations are constantly introduced, in order to prevent data Loss, the protection business can be quickly switched after an accident, continue to work normally, the business will be designed when planning Disaster recovery and backup solutions, which of the following statements about disaster recovery and backup is false? ( one)

Options:

A.

If there is only disaster recovery, the production side has wrong operations, or the system upgrade fails, etc., it will be Synchronizing to the disaster recovery side will also cause data or business interruption.

B.

The backup is generally performed periodically. Once the data is damaged, the data will be restored from the recovery time to the last backup time. data in between will be lost.

C.

If there is only backup, the business cannot be recovered quickly, and data recovery takes time. During this time, the business cannot be used. For a certain industry, such business interruption cannot be tolerated.

D.

If there is only disaster recovery, business can be quickly recovered and data can be protected.

Question 4

Ebackup only supports data backup in virtualization scenarios, eReplication supports both physical machines and virtual machine disaster recovery

Options:

A.

Correct

B.

False

Question 5

Use the Rainbow tool to migrate a third-party platform's x86-architecture Linux virtual machine to When using the FusionCompute platform, the following descriptions of the ports involved in the migration process are correct:

Options:

A.

445, the destination virtual machine mounts the LiveCD

B.

7443, create a destination virtual machine

C.

443, send a snapshot creation command

D.

1880, log in to the migration server remotely and issue a migration task

Question 6

FusioncomputeThe relationship between cluster hosts and virtual machines, which of the following is incorrect?

Options:

A.

Hosts can be moved between different clusters

B.

A cluster is composed of multiple hosts and their associated storage networks

C.

Whether a host succumbs to a unified cluster depends on whether the same shared storage is used

D.

Virtual machines can be migrated across clusters

Question 7

Which of the following scenarios requires manual data backup of each service instance in FusionCloud? (many)

Options:

A.

Routine backup

B.

Before the server replaces the hard disk

C.

Before upgrading the service instance

D.

Before major business adjustments

Question 8

In FusionCloud, a private image can be created by calling the IMS interface of the image service, as follows:

Which way of creation is incorrect? (many)

Options:

A.

Upload the image file to the OBS bucket, and use the image file in the OBS bucket to apply for a private image.

B.

After selecting an elastic cloud server (ECS) to shut down, use the ECS to apply for a private image.

C.

After selecting a bare metal server (BMS) and shutting it down, use the BMS to apply for a private image.

D.

Register the image file on ServiceOM, and then use the image to apply for a private image.

Question 9

When installing FusionCloud 6.3, if the step installation fails, which of the following is the correct method?

Options:

A.

Check the log for troubleshooting, and retry the entire task after completion

B.

View the specific error log. If manual configuration is required, skip this step after the configuration is complete.

C.

Check the logs for troubleshooting, then skip this step

D.

skip directly

Question 10

Fusioncloudprivate inVPC, including which of the following objects?

Options:

A.

subnet

B.

network

C.

port

D.

elasticityIP

Question 11

Virtualization technology can virtualize one server into multiple virtual machines, thereby improving performance

Options:

A.

True

B.

False

Question 12

Disaster recovery is a method of synchronizing data cycles or real-time

In the event of failure, the business continuity performance is better guaranteed by the gate technology. To ensure this, the data is in addition to in production

In addition to having a copy of the heart, it is the most basic requirement to save a copy of data in other local devices or in other places. Which of the following are

The technical principle used above? (multiple choice)

Options:

A.

Role-based replication

B.

Block-based replication

C.

File system-based replication

D.

Volume-based replication and mirroring

Question 13

eReplication supports storage layer replication disaster recovery and host layer replication history, which of the following is about the two disaster recovery solution groups

Is the net wrong? (single choice)

Options:

A.

storage layer replication includes a variety of technologies, including synchronous replication, asynchronous replication, etc.

B.

The host layer replication scenario cannot use the storage layer service

C.

storage layer DR production site and DR site storage devices can use storage devices from different manufacturers

D.

Host layer replication disaster recovery uses I0 Mirror to capture and replicate I0 to realize remote replication and disaster recovery management of data

Question 14

The security management mechanism of the desktop cloud FusionAccess system includes access security, user information security and

And desktop management component security. Which of the following is about user information security? (one)

Options:

A.

FusionAccess adopts the mechanism of SSL and certificate authentication for terminals to ensure that only secure terminals are

to access the desktop cloud

B.

FusionAccess supports fingerprint login authentication, dynamic password authentication, USBKey authentication, and fixed terminal

Authentication and other login methods C. The information transmission from the desktop cloud system client to the server, and the information transmission between the internal components of the system are all

Based on SSL encryption mechanism to ensure the security of information transmission

C.

FusionAccess reinforces the operating system and management system of the management server to ensure that the entire

Security of desktop cloud management system

Question 15

The technology used in data disaster recovery, the common array layer is array replication, which may be block replication or NAS replication.

In general, virtualized storage arrays cannot write data mirroring to other storage devices.

Options:

A.

True

B.

Fault

Question 16

During the daily operation and maintenance work, a series of preliminary preparations are often required to ensure the smooth operation and maintenance work. Which of the following is the preliminary preparation information that needs to be done? (multiple choice)

Options:

A.

Human Matrix

B.

Account Information

C.

Alarm handling

D.

Environmental Information

Question 17

FusionStorage block storage adopts distributed cluster management mode, the system is fully redundant, and there is no single point

Fault. Supports two data redundancy protection mechanisms: multiple copies and EC (Brasure Coding).

Which of the descriptions of copy and EC is wrong?

Options:

A.

The Erasure Coding technology is applied to realize the RAID function between nodes, and the configuration of the protection level is supported.

Any node or any disk failure without affecting data integrity.

B.

Multiple copies can ensure that in the case of server failure, cabinet failure, or even computer room failure, the data is still

While not lost, accessible.

C.

The application of the multi-copy mechanism can copy 2 to 3 copies of the same data, and place different copies in different

On the server, on the cabinet, or even in a different computer room.

D.

Compared with the EC mechanism, the reliability of multiple copies is not reduced, or even higher than the EC mechanism, while the space utilization rate increased significantly.

Question 18

Fusion compute virtual machine supports the first full permanent incremental backup

Options:

A.

TRUE

B.

FALSE

Question 19

FusionCloudAutomated installation tool

Options:

A.

FusionCare

B.

FusionStage

C.

FusionNetDoctor

D.

FusionCloud Deploy

Question 20

Which of the following functions does CPU virtualization in Fusioncompute support? (multiple choice)

Options:

A.

Support heterogeneous servers

B.

CPU resource over-allocation

C.

QOS

D.

Support Windows and Linux virtual machines to increase CPU online

Question 21

Which of the following descriptions about the NTP clock of the FusionCompute virtualization platform is wrong?

Options:

A.

After modifying the NTP server time or when the site time is inconsistent with the NTP server time, you can to perform forced time synchronization operations without any impact on the business

B.

If multiple NIP servers are configured, it is necessary to ensure that the NTP servers have the same upper-layer clock source to Make time consistent between NTP servers

C To configure the NTP clock source and change the time zone, the Fusioncompute service needs to be restarted; service is temporarily interrupted and may cause abnormal antivirus services

C.

If the set internal clock source node type is host, the service process of the host will be restarted during the configuration process

Question 22

An enterprise plans to deploy FusionCloud, when the business storage FusionStorage adopts the ———— deployment method

During deployment, you need to manually install and configure the storage node operating system.

Options:

Question 23

In Huawei Fusioncompute, in order to facilitate unified management, each DVS needs to be configured with a

Manage IP addresses.

Options:

A.

TRUE

B.

FALSE

Question 24

In Huawei Fusioncompute, it is necessary to modify a certain disk of the virtual machine. Which of the following operations can be implemented?

(single choice)

Options:

A.

Change the status of the disk from available to unavailable

B.

Change the mode of the disk from slave to independent-persistent

C Change the capacity of the disk from 80G to 8G

D Change the configuration mode of the disk from thin to normal

Question 25

FusionCloudis one of the public cloud products

Options:

A.

True

B.

False

Question 26

OnerainbowThe server can only add one target platform

Options:

A.

correct

B.

mistake

Question 27

When operation and maintenance engineers conduct network equipment inspections, they need to check the operation status and link status of network equipment every time.

Which of the following operations are in compliance with the network equipment inspection standards for operation and maintenance engineers?

Options:

A.

It is necessary to obtain consent before inspection and operate it when the business volume is low

B.

During the inspection process, refer to the standard to complete the network inspection and output the inspection report

C.

It is recommended to log in to each device to collect device alarm information

D.

Customers who have completed inspections and submitted reports, and put forward improvement suggestions to customers

Question 28

Which of the following scenarios does virtualization apply to? (multiple choice)

Options:

A.

An enterprise needs a high-load, sophisticated environment

B.

A company has a total of ten business systems, and the utilization rate of the host resources carrying these businesses is less than 20%.

C.

The daily use of office desk applications by employees of a certain unit is highly similar.

D.

A scientific research institution uses a customized operating system to ensure the confidentiality of scientific research results.

Question 29

Which of the following is wrong in the description of the eBackup backup network topology? (multiple choice)

Options:

A.

In the server-free networking topology, the backup data flow and the service data flow are the same network

B.

For existing business; the biggest impact is the server-free networking topology

C.

In the LAN-Base networking topology, the backup data flow and the service data flow are not the same network

D.

In the LAN-Free networking topology, the backup data flow and the service data flow are not the same network

Question 30

The desktop cloud can completely replace the traditional physical desktop and realize the refined management and control of the enterprise desktop.

Options:

A.

TRUE

B.

FALSE

Question 31

Data disaster recovery is divided into virtual machine layer, SAN network layer and

array layer.

Options:

A.

TRUE

B.

FALSE

Question 32

The total CPU resources of a FusionCompute host are 3.00 GHZ, and the virtual machine A is configured with QoS

The policy reserves 1.00 GHz CPU resources, which of the following statements is correct? (one)

Options:

A.

Virtual machine A can use at least 1.00 GHz of CPU resources

B.

Virtual machine A can use at least 2.00 GHz of CPU resources

C.

Other virtual machines can use up to 3.00 GHz of CPU resources

D.

Other virtual machines can use up to 1.00 GHz of CPU resources

Question 33

In the early stage of migration, it is necessary to investigate and evaluate the business to be migrated.

What are the contents? (many)

Options:

A.

Applied Relationship Analysis

B.

Migration strategy

C.

Risk assessment

D.

Business log analysis

Question 34

Which of the following items will cause the failure to create a VM in FusionCloud R6? ( many)

Options:

A.

The image_cache partition space of the computing node is insufficient

B.

Disk type configuration error

C.

VMTools is not installed in the mirror

D.

The label of the flavor does not match the label of the host group

Question 35

Database Security Service (DBSS) is an intelligent data

The library security protection service is used to ensure the security of the database on the cloud. The following description about DBSS is wrong. Which one is it? (one)

Options:

A.

In terms of database auditing, it can provide database column-level management and access activity monitoring. Senior Event Supervisor

Control includes front-to-back views of sensitive database tables and columns, allowing independent monitoring and analysis of database activity and

Right activity alert

B.

In terms of sensitive data protection, sensitive data can be automatically located and classified according to rules, and desensitization can be easily created

and audit rules to ensure users do not expose sensitive information

C.

DBSS can support multiple types of databases, including: SQL Server, MySQL, PostgreSQL, etc.

D.

In terms of database security, based on the characteristics of database firewall and separation of rights and responsibilities, it can provide detection and reporting

Alarm capability, does not support real-time intrusion prevention and fault repair functions

Question 36

When using the Rainbow 8.x version to migrate the virtual machine to the HCS platform, it is necessary to release the purpose in advance

For the end virtual machine, which of the following options is the correct way to issue the destination virtual machine? (one)

Options:

A.

The implementer logs in to the ManageOne operation side to issue manually.

B.

Rainbow server connects with CPS for automatic distribution.

C.

The Rainbow server is connected to the ManageOne operation side for automatic distribution.

D.

Rainbow server connects with ServiceOM for automatic distribution.

Question 37

When registering an image in Fusioncloud, you need to select the corresponding image server type. Which of the following

Item description about OBS mirror server is wrong? ( one)

Options:

A.

Upload the image file to the OBS bucket before registering the image, and the system will upload the image directly when registering the image.

Upload to Glance

B.

When registering the image type of FusionCompute, use OBS as the image server and require OBS to serve

The IP address of the service communicates with the management plane of the CNA

C.

If you want to delete the image and use the image file in the OBS bucket at the same time, you can configure OBS as Glance

backend storage

D.

When OBS is used as a mirror server, deleting the mirror will only delete the address information of the mirror, not OBS

Image files in the bucket

Question 38

The user enables the HA function on Fusioncompute. Which of the following descriptions about this function is correct an item? ( one)

Options:

A.

Configuring the cluster HA strategy is to automatically adjust the resource load balancing on different hosts

B.

Dedicated failover hosts refer to: setting a specified number of hosts in the cluster to fail, the system

Periodically check that there are enough resources left in the cluster to fail over the virtual machines on these hosts

C.

To allow host failure in the cluster refers to: Reserving a designated host as a dedicated failover host, when the host is used as a failover host, ordinary virtual machines are prohibited from starting, migrating, waking up, and snapshot recovery on the host

D.

HA resource reservation is to reserve CPU and memory resources according to the configured values ​​in the entire cluster

Question 39

It is assumed that a portal website needs to be built to provide external services, and the elastic scaling in Fusioncloud is used.

The service can dynamically adjust the number of instances according to the business load. In addition, we may also use which of the following

some cloud services? (many)

Options:

A.

VPC

B.

EIP

C.

ECS

D.

ELB

Question 40

In the FusionCloud private cloud scenario, which of the following descriptions about virtual machine live migration are correct?

item? (many)

Options:

A.

Live migration requires that the Hypervisor types on the destination host and the source host are the same

B.

If the virtualization type of the available partition where the virtual machine is located is "Vmware", it supports cold and hot migration functions

C.

If the virtualization type of the available partition to which the virtual machine belongs is "FusionCompute", it is not supported to use

Batch cold and hot migration capabilities

D.

Cross-AZ hot migration of virtual machines is not supported, only cross-AZ cold migration of virtual machines is supported

Question 41

When the administrator routinely checks Fusioncompute, it is found that a CNA host is

Machine communication is interrupted. Which of the following options would cause this behavior? (many)

Options:

A.

The network cable connected to the host network port is loose

B.

The VRM clock synchronization process is abnormal

C.

The network cable of the switch connected to the host is loose or damaged

D.

The host is restarting

Question 42

Which of the following descriptions about port groups in FusionCompute are correct? (many)

Options:

A.

There are two types of port groups: common and relay.

B.

A port group can be configured with multiple IP addresses.

C.

A port group is a distributed virtual switch.

D.

All virtual ports in the port group have the same attributes.

Question 43

When using FusionAccess, when the virtual machine network card, desktop proxy service, etc. are stopped unexpectedly, use If the user cannot connect to the virtual machine, the user can self-check through the tool and try to solve the problem. The following about

Description of inspection tools and problem solving, which one is wrong? ( one)

Options:

A.

Using the self-service maintenance desk can solve the blue screen/stuck problem of the virtual machine

B.

The desktop cloud connection maintenance tool can solve the virtual machine patch update problem

C.

The desktop cloud connection repair tool can detect whether the virtual machine network card is disabled

D.

The use of the self-service maintenance desk can solve the problem that the virtual machine takes too long to start or restart

Question 44

Which of the following descriptions about the rapid encapsulation of virtual desktops is wrong? ( one)

Options:

A.

Compared with the complete copy template, using the fast encapsulation template to issue virtual machines is faster and more efficient

B.

There is no essential difference between full reproduction and rapid distribution

C.

using sysprep package

D.

Rename and add domain by the application in the virtual machine

Question 45

When eReplication performs disaster recovery on data, an agent needs to be installed on the protected host, using to identify the application information; for virtual machine disaster recovery, there is no need to install agent.

Options:

A.

TRUE

B.

FALSE

Question 46

In Fusioncloud, which of the following descriptions about virtual private network VPN are correct? (many)

Options:

A.

Currently VPN only supports IPsec VPN

B.

One VPN gateway in the VPN can correspond to multiple VPN connections

C.

VPN is a secure and encrypted communication tunnel used to connect the local data center and the network on the cloud

D.

VPN can also be used to connect two VPCs under the same region

Question 47

There are two main technical indicators for disaster recovery, RTO is the recovery time objective, RPO is the recovery point objective, the following

Which statements about the two technical indicators are correct? ( many)

Options:

A.

RTO is infinitely close to 0. Even if synchronous replication is used, the business still needs some time,

B.

The smaller the RTO value, the less data is lost

C.

The smaller the RPO value, the smaller the service interruption time.

D.

In theory, RPO can be equal to 0. When disaster recovery or backup uses synchronous replication, the same

Step data, RPO can be achieved equal to 0.

Question 48

Which other component works besides the Server dAgent in the Rainbow process——

Options:

Question 49

In the next FusionCloud, the user is using the Linux type public image to create an elastic cloud server After that, some operations belong to high-risk or prohibited dry operation, the following descriptions of ECS high-risk or prohibited operations,

Which one is wrong?

Options:

A.

Modifying the permissions or names of system directories may cause the system to fail to run or start normally

B.

Modifying the system default DNS SERVER (/etc/resolv.conf may result in a one-key reset password function unavailable

C.

Deleting system directories or files may cause the system to fail to operate or start normally

D.

Modifying the content of the /etc/issue file may cause the system release version to not be recognized

Question 50

In the exclusive type mode, is the process of allocating user virtual machines correct? ◎ ITA according to the IP of the virtual machine address, send a Ping request to the virtual machine; ②ITA sends a request to allocate a virtual machine to HDC; ③ITA sends a request to the virtual machine

The virtual machine sends a request to format the data disk and modify the computer name; ④ITA sends a query message to the DB for the virtual machine

request for information (single)

Options:

A.

4131

B.

1423

C.

1432

D.

4123

Question 51

FusionNetDoctor, also known as network traffic diagnosis, is for operation and maintenance personnel to detect the network field.

Which can detect traffic in which of the following scenarios? ( many)

Options:

A.

East-west traffic detection between the tenant's two virtual machines

B.

Tenant's VM-to-VM Elastic IP (EIP) traffic inspection

C.

Access traffic detection from the client computer to the ELB on the cloud

D.

Inspection of access traffic from client computers to virtual private network services (VPNs) on the cloud

Question 52

When using eBackup software for backup in Fusioncloud, view it on the eBackup monitoring interface

To the alarm event "Failed to backup virtual machine", the following description about the impact of the alarm event is correct which items? ( many)

Options:

A.

If the eBackup system includes multiple eBackup servers, the overall backup and recovery performance of the VBS service can drop

B.

If the eBackup system contains multiple eBackup servers, the VBS service cannot be provided normally Backup and restore

C.

The failed eBackup server cannot provide backup and recovery functions normally

D.

If the eBackup system contains only one eBackup server, the VBS service cannot be provided normally. Provides backup and recovery capabilities

Question 53

Huawei Desktop Cloud launched a sub-HD mapping desktop solution, which can support a variety of high-definition mapping software.

According to its 3D display implementation principle, which of the following technologies are mainly used? (Multiple)

Options:

A.

graphics workstation management

B.

GPU hardware virtualization

C.

GPU pass-through

D.

Device redirection

Question 54

The administrator configures the HTTP server for storing alarms through FusionCompute.

View the stored alarm information on the corresponding HTTP server. If the alarm dump is not configured, the system will report After a certain number of entries are exceeded, the latest alarm information will be automatically cleared to free up space. If alarm dump is configured,

It will dump the earliest certain entry alarms to the HTTP server

A, TRUE

B. FALSE

Options:

Question 55

When Fusioncloud is deployed, at least 2 servers are required for its management node deployment, which can use AA (active-active-active) mode to improve the high availability of system management nodes

Options:

A.

TRUE

B.

FALSE

Question 56

In the FusionSphere server virtualization backup scenario, the following describes the eBackup backup process:

Which one is wrong? ( one)

Options:

A.

When using snapshot comparison technology for incremental backup, it is necessary to retain snapshot data on the production side

B.

Use CBT technology for incremental backup, which saves storage space compared to snapshot comparison.

C.

CBT technology will not be used during the first full backup

D.

When using CBT technology for incremental backup, snapshot technology will not be involved

Question 57

After adding on the Rainbow server and passing the source check, it can be displayed on the source details page What information? ( many)

Options:

A.

Source network card information

B.

Source disk information

C.

Source username and password information

D.

The version number of the destination cloud platform compatible with the source

Question 58

In FusionCloud, the following description about the deployment of cinder-volume components is wrong which items? (many)

Options:

A.

HBA card is required when connecting to FC--SAN. In this scenario, cinder-volume can be deployed in virtual In the virtual host

B.

There is no need to deploy the image-cache partition when deploying the cinder-volume host

C A set of cinder-volume (at least one node) connected to only one storage pool

C.

cinder-volume can only be deployed on the control node

Question 59

FusionSphere OpenStackbuttFusionComputeIn the scenario, about the host groupvCPUThe description of the reuse ratio, which of the following is correct?

Options:

A.

CPUonly supportKVMreuse in the environment

B.

vCPUThe reuse ratio indicates that,FusionSphere OpenStackofvCPUnumber of cores andFusionCompute vCPUThe reuse relationship of the number of cores

C.

vCPUThe reuse ratio indicates that,FusionSphere OpenStackofvCPUnumber of cores andFusionComputephysicsCPUThe reuse relationship of the number of cores

D.

FusionSphere OpenStackofvCPUofvCPUNumber of cores =FusionComputenumber of threads*vCPUReuse ratio

Question 60

FusionSphereIn a server virtualization scenario, when deploying a virtual machine according to a template, set the disk property to "non-persistent" and the operating system will be lost after the virtual machine is restarted

Options:

A.

True

B.

False

Question 61

(multiple choice)FusionSphereIn the server virtualization scenario, the host failure control policy set in the cluster is "Recovery within the virtual machine cluster".CNAsAfter a node fails, a virtual machine on it cannot be recovered. Which of the following are possible reasons?

Options:

A.

The virtual machine is created on a local disk

B.

The virtual machine is bound to a graphics processor

C.

The remaining resources in the cluster are insufficient to start the virtual machine

D.

This virtual machine has a user logged in

Question 62

When the host in Huawei FusionSphere uses a GE network card, it is recommended to separate the management, service, and storage networks and use them independently.

a physical network?

Options:

A.

True

B.

False

Question 63

(multiple choice) inFusionComputeadd to siteFusion Storage BlockAfter the storage resource succeeds, the host data storage fails.

Which of the following reasons may cause the failure?

Options:

A.

Fusionstorage BlockVolume not created

B.

When adding storage resourcesIPgrave writing error

C.

Fusionstorage BlockandFusionComputestorage plane failure

D.

Fusionstorage BlockStorage pool not created

Question 64

AboutFusionSphereDescription of private cloud, which of the following is incorrect?

Options:

A.

FusionSphere OpenStack OMResponsible for resource access, configuration, monitoring and maintenance functions

B.

In a single data center scenario, it needs to be deployed in the data center at the same timeFusionSphere OpenStack OMand ManageOne Service Center

C.

In a multi-data center scenario, it needs to be deployed in each data center at the same timeFusionSphere OpenStack OMandManageOne Service Center

D.

ManageOne Service CenterResponsible for account opening and cancellation, cloud service application, approval, management and other functions

Question 65

(multiple choice) Which of the following isManageOneWhat are the functions provided by the operation side?

Options:

A.

project management

B.

VDCmanage

C.

Application resource monitoring

D.

Application management

Question 66

huawei full memory desktop10 TailorDeduplication compression technology forVDIIt is specially optimized with the memory medium, while deduplication and compression, it also ensures the real-time and consistency of data interaction

Options:

A.

True

B.

False

Question 67

FusionSphere OpenStackis based on the originalOpenStackdeveloped, which of the following components providesendpoint Serve?

Options:

A.

Nova

B.

Keystone

C.

Cinder

D.

Neutron

Question 68

(Multiple Choice) Login Fusion Access Wl After the virtual machine list is not displayed, which of the following aspects are recommended for troubleshooting?

Options:

A.

HDC virtual machine and WI Whether the network between the virtual machines is faulty

B.

Whether the virtual machine is unbound

C.

Is the database working

D.

Whether the virtual machine is shut down

Question 69

During the deployment and implementation of the FusionAccess gateway and load balancer, if the user logs in to the self-service maintenance gateway, the It shows that there is no gateway available, which of the following reasons cannot be caused?

Options:

A.

There is a firewall in the network, and the firewall is not allowed to pass throughvAGservice port.

B.

ITAconfigure onvAGofIPwrong address.

C.

vAGconfigure onHDCwrong port.

D.

vAGAfter the component was installed, the service did not start.

Question 70

Which of the following is deleteFusionComputeCorrect steps to store resources in ?

○1Deleting or migrating virtual machine disks

○2Disassociate host

○3delete storage resource

○4Destroy the data store

Options:

A.

1--->2--->3--->4

B.

1--->4--->2--->3

C.

3--->2--->4--->1

D.

2--->4--->1--->3

Question 71

In the user login connection process of FusionAccess, what information does the vAG send to the HDC in order to exchange for the virtual machine real IP and port?

Options:

A.

Adress ticket

B.

Login ticket

C.

Network ticket

D.

Token

Question 72

If the computing node of FusionCompute has only two 10GEx network cards, which of the following networking methods should be used to store the IP SAN? more suitable?

Options:

A.

Willeth0,eth1The binding is in load sharing mode, and both the management plane and the storage plane follow this mode.Bond, configure link aggregation on the

interconnected switch

B.

eth0go manage traffic,eth1Send storage traffic, connect to the switch and configure link aggregation

C.

Willeth0,eth1Binding to active/standby mode, both the management plane and the storage plane follow this modeBond, the interconnected switch is not configured with link aggregation

D.

eth0go manage traffic,eth1For storage traffic, the interconnected switch is not configured with link aggregation

Question 73

In Huawei's disaster recovery solution, aboutVRGdescription, which of the following is correct?

Options:

A.

Created and configuredVRGAfter that, create a snapshot for it immediately to prevent unavailability caused by misoperation

B.

when oneVRGWhen the load requirement cannot be met, it needs to be addedVRG.addedVRGCannot be created by cloning, can only be deployed by template

C.

When using the storage replication disaster recovery method, you need toFusionComputedeployVRG

D.

When using the host replication disaster recovery method, only theVRGofCANOnly virtual machines on the host can be protected

Question 74

(multiple choice)FusionsphereIn the private cloud solution home, which of the following statements about security groups are correct?

Options:

A.

The security group feature is provided byDVSport implementation on

B.

One NIC of a virtual machine can be added to multiple security groups (to be verified)

C.

Virtual machines using smart NICs are not allowed to join security groups

D.

In the incoming direction of the security group, the access of other security groups is denied by default

Question 75

Use HuaweiBCmanager eBackupdata backup and useLAN-BaseIn networking mode, when a user backs up a virtual machine, what does the backup agent do?

Options:

A.

TowardsVRMorvcenterIssue a backup task

B.

received fromCANSnapshot of the virtual machine sent by the host

C.

Distribute backup tasks to production storage

D.

Receive backup data from production storage

Question 76

(Multiple choice) Regarding the functions of each service in FusionSphere OpenStack, which of the following descriptions is incorrect?

Options:

A.

hostVBSprocess withOSDProcess communication exception

B.

GlanceProvides query, upload and download of virtual machine images

C.

MDCProcess exception

D.

hostVBSinternal error

Question 77

Multiple choice) In FusionCompute, which of the following storage resources can be used to create virtualized data storage?

Options:

A.

FC-SAN

B.

IP-SAN

C.

FusionStorage Block

D.

NAS

Question 78

HuaweiManageOne OperationCenterpassHTTPSandSNMP TrapThere are two ways to synchronize alarm data from the lower management system. The former ensures that alarms can be detected in time, and the latter ensures that alarms will not be lost.

Options:

A.

True

B.

False

Question 79

In progressFusionSphereWhen hardware deployment of a server virtualization cloud platform, which of the following is the recommended order of hardware deployment in

the cabinet from bottom to top?

Options:

A.

Storage---Server---Switch

B.

Storage---Switch---Server

C.

Server---Storage---Switch

D.

Server---Switch---Storage

Question 80

When choosing the Huawei desktop cloud disaster recovery solution, the company hopes that the solution can perform disaster recovery on user data in the desktop. Which of the following disaster recovery solutions is more suitable?

Options:

A.

GSLB +NASDisaster recovery plan

B.

Disaster recovery for client-side autonomous services

C.

Wlredirect disaster recovery

D.

GSLBBusiness disaster recovery

Question 81

In FusionComupte, two virtual machines in the same port group on the same host cannot communicate, which of the following

Not the cause of this failure?

Options:

A.

virtual machineIPConfiguration error

B.

Physical router failure

C.

Virtual machine firewall configuration error

D.

DVSworking abnormally

Question 82

FusionSphereIn a server virtualization scenario, if you configureHAFunction; Which of the following configuration suggestions for storage is correct?

Options:

A.

Shared storage is connected to theFusionSphere, all hosts in the server virtualization platform

B.

Shared storage directly connected to the host

C.

Shared storage is connected to all hosts in the cluster through switches

D.

Use local storage

Question 83

In the distributed virtual switch of FusionCompute, which of the following are required for the virtual machine to communicate with the external network communicate with each other?

Options:

A.

port group

B.

uplink

C.

virtual network card

D.

storage interface

Question 84

InstallFusionSphereWhich of the following software packages should not be used in a server virtualization environment?

Options:

A.

FusionComputeXXXCNA

B.

FusionManagerXXXX

C.

FusionComputexXXX DC zip

D.

FusionToolXXXXFusionCare zip

Question 85

In the FusionSphere private cloud solution, users can apply for cloud hard disk backup to realize local backup of cloud hard disks backup and recovery.

Options:

A.

True

B.

False

Question 86

inFusionSphereIn the private cloud solution, which of the following descriptions are incorrect about the principle of rapid provisioning of virtual machines?

Options:

A.

When provisioning virtual machines, there is no need to create a new system volume in the storage and copy the full image content to it

B.

The system volume presented by the virtual machine to the outside worldIDof the parent volume used for itID

C.

During the use of the virtual machine, all modifications to the system volume are written to the subvolume

D.

When provisioning a virtual machine, the system only needs to quickly create a lightweight subvolume and add the existing parent volume to form a virtual machine

Question 87

Fusion Sphere In server virtualization scenarios, if customers need to use software routers and VPC. Which of the following components needs to be installed in the routing network?

Options:

A.

fusionCompute

B.

fusionStorage Manage

C.

VSAM

D.

VPC

Question 88

(Multiple choice) The following aboutFusionComputeDescription of virtualized storage and non-virtualized storage, which option is correct?

Options:

A.

The read and write performance of non-virtualized storage is better than that of virtualized storage

B.

Virtualized storage is more secure than non-virtualized storage

C.

Non-virtualized storage scales better than virtualized storage

D.

Virtualized storage is more compatible than non-virtualized storage

Question 89

Cloud resource monitoring mainly real-time data center cloud resource usage from five aspects of computing, storage, network, application and security, collect invigilation

indicators of each cloud resource module, and detect the availability of resource modules, so that administrators can fully understand cloud resources. The current situation, and

then analyze the operating status and health of the business, and respond to abnormal alarms in a timely manner to ensure the smooth operation of the application.

Options:

A.

TRUE

B.

FALSE

Question 90

InFusionSphereIn the private cloud solution, users can apply for cloud hard disk backup to achieve local backup and recovery of cloud hard disks.

Options:

A.

True

B.

False

Question 91

(Multiple Choice) HuaweiFusion Sphere OpenstackmiddleNeutronWhich of the following advanced network services can be provided to tenants?

Options:

A.

anti-virus

B.

load balancing

C.

firewall

D.

VPN

Question 92

OpenstackAs the most popular open source cloud operating system platform, which of the following cloud computing service models belong to?

Options:

A.

DaaS

B.

PaaS

C.

IaaS

D.

Saas

Question 93

FusionAccessProvisioning of linked-clone virtual machines fails. Which of the following reasons cannot be the cause?

Options:

A.

Fusion Acces the number of concurrent users has reached the maximum limit

B.

The virtual machine template was deleted by mistake

C.

FusionComputePlatform failure

D.

ADServer exception

Question 94

(Multiple choice) In HuaweiFusionsphere Openstack, which of the following services needs to interact with all other

services?

A Cinder

B. Neutron

C. keystone

D Nowa

Options:

Question 95

What should I do if the user thinks about the pre-symptom of the desktop card when using the FusionAccess desktop cloud? (multiple choice)

Options:

A.

Restart the virtual machine and log in to the virtual desktop again.

B.

Disabled in service listHDPRelated Services.

C.

deleteHDA

D.

closureCPU.Processes with high memory usage.

Correct case

Question 96

(True or False)FusionAccessTo recycle static multi-user desktops, system administrators only need to delete them on the virtual machineUsers can.

Options:

A.

True

B.

False

Question 97

(Multiple choice) WhenFusionAccessWhich of the following virtual machine types is not included when the desktop group type is "Static Pool"?

Options:

A.

linked clone

B.

Fast packaging

C.

full copy

D.

full memory

Question 98

The ManageOne system can realize the connection of third-party systems by configuring the 3A authentication protocol, and the system no longer passes the

The user management function performs user authentication, and the user authentication is implemented by the 3A system when logging in. Where 3A stands for which of the following content ?

Options:

A.

Accounting

B.

Accessing

C.

Authentication

D.

Authorization

Question 99

Which of the following descriptions about FusionAccess log collection is correct? (Multiple Choice)

Options:

A.

able to passsshLog in to the user VM to collect logs.

B.

can be collectedGuessDBThe database service check log and database operation log.

C.

able to passgandalfusersshLog inLinuxThe system infrastructure virtual machine virtual machine, and then copy the component logs to the local.

D.

LinuxSystem logs are generally in /var/logUnder contents.

Question 100

(Single choice question) InFusionaccessDuring the process of provisioning virtual desktops, which of the following components will check whether the specified virtual

group and desktop group exist?

Options:

A.

GaussDB

B.

HDA

C.

ITA

D.

HDC

Question 101

Which of the following FusionComputeCan the operation take effect immediately?

Options:

A.

InstallTools

B.

Disk reduction

C.

remove network card

D.

Direct read and write to the newly bound disk

Question 102

(Single-choice questions) Which of the following is notFusionComputeNecessary constraints for virtual machine live migration?

Options:

A.

Virtual machine cannot be bondedUSBequipment.

B.

The target host to be migrated cannot be in maintenance mode.

C.

source host and target hostCPUModels must be the same.D. The virtual machine is installedTools.

Question 103

UItraVRcan be achievedFusionComputedisaster recoveryRPO,RTOboth0.

Options:

A.

TRUE

B.

FALSE

Question 104

(True or False)ebackupIt supports comprehensive protection of user data in four application scenarios: virtualization, public cloud, private cloud and hybrid clouD.

Options:

A.

True

B.

False

Question 105

If passedVNCLog inFusionComputeThe business virtual machine fails, which of the following may be the reason?

Options:

A.

Virtual machine blue screen failure, restarting.B. VNCThe login mode is "exclusive" and there is already a user logged in.

B.

virtual machineGuset OSnot supportVNCFunction.

C.

The virtual machine NIC is faulty.

Question 106

The panorama of Huawei's disaster recovery solutions includes local, intra-city, and remote storage. Which of the following descriptions about the three disaster recovery

solutions is incorrect?

Options:

A.

Local high availability can use real-time mirroring and synchronous replication solutions. Due to the close bandwidth and distance, it usually requires RPO=0.

B.

the remote disaster recovery party can choose the remote active-active and remote active-standby solutions according to different needs

C.

For intra-city disaster recovery, you can choose intra-city active-active and intra-city active/standby solutions according to different needs.

D.

Local high availability deploys services in the same computer room in close proximity.

Question 107

In the cloud data center solution, which of the following components provides public capabilities to realize the full interface operation of cloud service configuration

Options:

A.

FusionCompute

B.

ServiceOM

C.

FusionSphere OpenStack

D.

CloudOpen ManageOne

Question 108

Which of the following descriptions about reverse proxy setup in CPS is the correct option?

Options:

A.

The reverse proxy network plane can only be usedexternallapiflat.

B.

matchrvnc”after reverse proxyVNClog in to the virtual machine.

C.

Provided by default "system',inc'and'cps webReverse proxy for three services.

D.

configurecps webAfter that, you can log in through the reverse proxyManageOneoperation and maintenance.

Question 109

(True or False)FusionaccessSupports monitoring of resource load by manual or automatic means. Shut down virtual machines that are not in use.

Options:

A.

True

B.

False

Question 110

ManageOne ServiceCenter supports disaster recovery, production site and disaster recovery site can synchronize ServiceCenter data. After a disaster occurs, the disaster recovery site can be automatically started.

Options:

A.

True

B.

False

Question 111

(Single-choice questions) FusionAccessWhat data is only retained after a linked clone virtual machine restores the system disk?

Options:

A.

data disk data

B.

system disk data

C.

desktop data

D.

Favorite data

Question 112

During the deployment and implementation of the FusionAccess gateway and load balancer, after the vAG/vLB is configured, it is found that the HA. The state is abnormal, it is not possible to be caused by one of the following reasons

Options:

A.

Modified by the administratorvAG/vLBmanagement planeIPaddress.

B.

Modified by the administratorvAG/vLBbusiness planeIPaddress.

C.

Modified by the administratorvAG/vLBofgandalfpassworD.

D.

Modified by the administratorvAG/vLBofrootpassworD.

Question 113

FusionCareIt is a set of health check and information collection tools for technical support engineers and operation and maintenance engineers. Which of the following areFusionCareHealth check inspection content?

Options:

A.

0Sstate

B.

Reliability inspection

C.

Security Inspection

D.

Availability inspection

Question 114

For cloud servers with shared volumes mounted in FusionCloud, applying for the cloud server backup CSBS service is not supported.

service instances and cloud server high-availability CSHA service instances

Options:

A.

TRUE

B.

FLASE

Page: 1 / 77
Total 765 questions