0% found this document useful (0 votes)
1K views472 pages

Cloud Service - Merged

The document contains questions about cloud computing concepts including characteristics, deployment models, services like IaaS, PaaS, SaaS, and specific Huawei Cloud services such as ECS, Auto Scaling, EVS, IMS, OBS, and VBS. It tests the reader's knowledge of computing, storage, backup and other cloud services.

Uploaded by

Za Zou
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views472 pages

Cloud Service - Merged

The document contains questions about cloud computing concepts including characteristics, deployment models, services like IaaS, PaaS, SaaS, and specific Huawei Cloud services such as ECS, Auto Scaling, EVS, IMS, OBS, and VBS. It tests the reader's knowledge of computing, storage, backup and other cloud services.

Uploaded by

Za Zou
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1) What are basic characteristics of cloud computing?

(O)
A. On-demand self-service
B. broad network access methods
C. Resource pooling
D. fast and scalable
E. Measurable services

All

2) Which of the following is generally used to provide application development and running
environments?
A. IaaS
B. PaaS
C. SaaS

3) Pain Points of Current Enterprise IT Infrastructure includes:


A. Slow Business Launch
B. Complicated Lifecycle Management
C. High TCO
D. I/O Bottleneck

All

4) Which of the following are deployment models of cloud computing?


A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community/Industry cloud

All

5) The development of Cloud Computing includes:


A. Virtualization
B. Private Cloud
C. Public Cloud
D. Hybrid Cloud

All

6) What is Huawei Cloud Positioning?


A. Focus on IaaS
B. Enable PaaS
C. Converge SaaS
All

7) Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)

ABC

8) Which are part of HUAWEI CLOUD ecosystem?


A. Huawei Cloud Marketplace
B. Huawei Cloud Academy
C. Partners
D. Developers

All

9) Which belongs to Huawei Cloud Developer Center Ecosystem Catalog?


A. Developer Contest
B. Cloud Expert
C. Sign-Up Platform
D. MVP
E. Student Innovation and Entrepreneurship Program
F. Yunzhi Club

All

10) How many types of login users does HUAWEI CLOUD support?
A. 1
B. 2
C. 3
D. 4

11) Which of the following service is used by an ECS to store data? (O)
A. AS
B. IMS
C. EVS
D. DeC

12) Which of the following are ECS types? (O)


A. General computing (General Computing, General Computing Plus)
B. Memory-optimized (Memory Optimized, Large Memory)
C. High Performance Computing (High & Ultra High Performance Computing)
D. Big Data (Ultra High I/O, Disk Intensive)
E. Computing-accelerated (GPU Accelerated, FGPA High Performance)

All

13) ECSs can be charged in yearly/monthly or metered mode (pay per use).
A. True
B. False

14) Is an ECS a physical server?


A. Yes
B. No

15) All OSs support key-authenticated ECS logins.


A. True
B. False

16) Which of the following policies does AS support?


A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy

ABC

17) Which is not an action of Bandwidth scaling policy?


A. Reduce
B. Double
C. Set to
D. Add

18) What is used by an ECS to store data?


A. Auto Scaling
B. Elastic Volume Service
C. Cloud Container Engine
D. Cloud Eye
B

19) Auto Scaling (AS) is charged.


A. True
B. False

20) AS supports the following instance removal policies:


A. Oldest instances created based on the oldest configuration
B. Newest instances created based on the oldest configuration
C. Oldest instances
D. Newest instances

All

21) AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False

22) Alarm policies support system monitoring and custom monitoring.


A. True
B. False

23) An instance added to an AS group by an AS policy cannot be manually removed from the
group.
A. True
B. False

24) AS can automatically adjust ECS and bandwidth resources.


A. True
B. False

A
25) Which of the following policies can be configured to increase the number of instances in an
AS group at a predetermined time each week?
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above

26) Which of the following statements about AS is incorrect?


A. AS can automatically adjust the number of instances in an AS group based on preset
policies.
B. AS can perform health checks on instances in an AS group.
C. Instance protection can be enabled on specified instances in an AS group.
D. AS does not allow users to view the status of instances in an AS group.

27) Which of the following statements about scaling actions is incorrect?


A. When the number of instances in an AS group is not the same as expected, a scaling
action is triggered.
B. After an AS group is disabled, changing the number of expected instances triggers a
scaling action.
C. When a trigger condition of an AS policy is met, a scaling action is triggered automatically.
D. Lifecycle hooks help users better manage scaling actions.

28) Which of the following statements about AS configuration is correct?


A. An AS configuration defines the specifications of ECSs to be added to an AS group.
B. An AS configuration that has been created can be modified as needed.
C. After an AS group is enabled, its AS configuration cannot be changed.
D. An unlimited number of AS configurations can be created.

29) How many types of policies does AS support?


A. 0
B. 1
C. 2
D. 3

30) Which of the following policies are supported by AS?


A. Alarm policy
B. Scheduled policy
C. Periodic Policy
D. Random policy

ABC

31) How can instances be added to an AS group?


A. By an AS policy
B. Manually
C. By a change to the number of expected instances
D. By AS configuration

ABC

32) Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Network Inbound/Outbound Rate
C. Disk Read/Write Requests
D. Memory Usage
E. Custom monitoring metrics
F. GPU Usage/GPU Memory Usage
G. EVS Disk Usage/EVS Disk I/O Read/Write
H. Performance Status

All

33) Which operations can be performed on an AS policy?


A. Manually Execute an AS Policy
B. Modify
C. Enable
D. Create/Delete
E. Disable

All

34) Which of the following services are associated with AS?


A. Cloud Eye
B. Virtual Private Cloud (VPC)
C. Elastic Load Balance (ELB)
D. Elastic Cloud Server (ECS)

All

35) Which operations are required to use ECS to create a Windows image?
A. Configure the Windows ECS.
B. Install Cloudbase-Init.
C. Create a Windows private image.
D. Query and cleanup network rule files.

ABC

36) What is the type of the image converted based on an existing ECS?
A. Public image
B. Private image
C. Shared image
D. EulerOS image

37) Which of the following components are included in an ECS?


A. vCPUs
B. Memory
C. Image
D. EVS disk

All

38) Before creating a data disk image from a data disk, ensure that the ECS has a system disk
and the data disk is not empty.
A. True
B. False

39) What image types does IMS support?


A. Public image
B. Private image
C. Encrypted image
D. Shared image

ABD

40) Private images can be classified into:


A. System disk image
B. Data disk image
C. Full-ECS image
D. Snapshot

ABC

41) If the ECS uses a static IP address, configure DHCP for the ECS, allowing it to dynamically
obtain an IP address.
A. True
B. False

42) When creating image Cloudbase-init should be installed on OS to ensure that configuration
of newly created ECSs from the image can be customized.
A. True
B. False

43) Image creation fails if entered System disk capacity is less than System disk capacity of
external image file.
A. True
B. False

44) Use to Create Private Image (single Choice)


Full ECS Image using ECS
System Disk using ECS
System Disk using OBS File-my answer
System Disk using external Image

45) EVS provides the scalable, virtual block storage service, and the backend of EVS is based
on a distributed architecture.
A. True
B. False

46) VBD EVS disks support only basic SCSI read/write commands.
A. True
B. False

47) Which of the followings are EVS disk types does ECS support?
A. Ultra-high I/O
B. High I/O
C. Common I/O
D. Latency optimized ultra-high I/O

All
48) How many servers can a shared EVS disk be attached to at most?
A. 5
B. 7
C. 8
D. 16

49) EVS can be attached to:


A. OBS
B. ECS
C. BMS
D. VPC

BC

50) An EVS disk can be backed up only when it is in the ( ) state.


A. Available
B. In-use
C. Error
D. Deletion failed

AB

51) Does VBS Support Cross-Region Backup and Restoration?


A. True
B. False

52) HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup
Service (VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults

All

53) VBS does not support backing up EVS disks in batches.


A. True
B. False

B
54) On which of the following services does VBS depend?
A. Elastic Cloud Server
B. Elastic Volume Service
C. Object Storage Service
D. Image Management Service

BC

55) ( ) records operations of VBS resources, facilitating query, audit, and backtracking
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.

56) VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security.
A. True
B. False

57) VBS provides the data backup function for EVS disks. The created data backups can be
used to create EVS disks.
A. True
B. False

58) Which of the following are OBS application scenarios?


A. Massive storage resource pool
B. Static web hosting
C. Big data storage
D. Backup
E. Archiving

All

59) Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs

AB
60) Access requests to OBS can be controlled by,
A. ACLs
B. Bucket policies
C. User signature authentication
D. Server-side encryption

ABC

61) What is the data durability of OBS?


A. 10 nines (99.99999999%)
B. 11 nines (99.999999999%)
C. 12 nines (99.9999999999%)

62) What is the basic storage unit in OBS?


A. File
B. Block
C. Object
D. Bucket

63) Which of the following operations on buckets is not available in OBS?


A. Creation
B. Formatting
C. Modification
D. Deletion

64) If you download an object of the Standard storage class through a HUAWEI CLOUD ECS
server, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity

65) If you download an object of the Archive storage class to your local computer over the
Internet, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration

66) If a customer has some data to store and the data will be downloaded for only 10 times in a
year, which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage

67) Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.

68) Which of the following statements about lifecycle rules is correct?


A. Lifecycle rules support transition between storage classes by hour.
B. Lifecycle rules for objects of historical versions take effect only when versioning is enabled
for the bucket.
C. Lifecycle rules for objects of historical versions cannot be configured if versioning is not
enabled for the bucket.

69) Which of the following items cannot be configured when creating a bucket?
A. Region where bucket resides
B. Storage class of a bucket
C. Bucket policy
D. Static website hosting

70) Which of the following items cannot be configured when uploading an object?
A. File path
B. Storage class of the object
C. KMS encryption
D. File size
D

71) Which storage classes does OBS offer?


A. Archive storage class
B. Backup storage class
C. Infrequent Access storage class
D. Standard storage class

ACD

72) Which of the following are the application scenarios of SFS?


A. Media processing
B. Log management
C. Content management and web directories
D. High-performance computing (HPC)

ACD

73) SFS is charged in pay-per-use or monthly/yearly flat fee mode.


A. True
B. False

74) SFS includes the SFS and SFS Turbo products.


A. True
B. False

75) SFS supports the EXT4 and NTFS protocols.


A. True
B. False

76) SFS can be connected to the AD domain controller for permission control.
A. True
B. False

B
77) SFS (Capacity Oriented) allows ECSs in different VPCs to access the same file system.
A. True
B. False

78) What is the maximum size of a single file supported by SFS Capacity Oriented?
A. 32 TB
B. 64 TB
C. 128 TB
D. 240 TB

79) What is the maximum size of a single file supported by SFS Turbo?
A. 16 TB
B. 32 TB
C. 64 TB
D. 128 TB

80) SFS (Turbo) allows ECSs in different VPCs to access the same file system.
A. True
B. False

81) What is the maximum bandwidth supported by SFS?


A. 2 GB/s
B. 5 GB/s
C. 10 GB/s
D. 20 GB/s

82) What is the maximum bandwidth supported by SFS Turbo?


A. 150 MB/s for Turbo Standard
B. 350 MB/s for Turbo Performance
C. 150 GB/s for Turbo Standard
D. 350 GB/s for Turbo Performance

AB
83) Which of the following file protocol is supported by SFS Turbo?
A. NFS v3
B. NFS v4
C. SMB 2.0/2.1/3.0
D. EXT4

84) What is the minimum latency of SFS Turbo Performance?


A. 10 ms
B. 5 ms
C. 2 ms
D. 1 ms

85) What is the minimum latency of SFS Turbo Standard?


A. 10 ms
B. 5 ms
C. 2 ms
D. 1 ms

86) What is the minimum latency of SFS?


A. 20 ms
B. 3 ms
C. 2 ms
D. 1 ms

87) What is the maximum IOPS supported by SFS Turbo?


A. 5,000
B. 10,000
C. 20,000
D. 30,000

88) Which of the following protocols are supported by SFS?


A. NFS v3
B. NFS v4
C. FTP
D. EXT4

89) Which of the following are mainstream storage types in the industry?
A. Block storage
B. File storage
C. Object storage
D. Backup storage

ABC

90) Which of the following are HUAWEI CLOUD file storage services?
A. SFS
B. SFS Turbo
C. SFS Plus
D. All of the above

AB

91) Which scenarios does SFS suit?


A. HPC
B. Media
C. File sharing
D. Game

ABC

92) Which scenarios does SFS Turbo suit?


A. HPC
B. Media
C. High-performance websites
D. Software development

AC

93) An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False

A
94) Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category?
A. ECS
B. BMS
C. IMS
D. SFS

95) GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops,
graphics rendering and engineering drawing run in virtualization environment.
A. True
B. False

96) Which of the following are the advantages of the VPC service?
A. Secure & Reliable
B. Flexible Configuration
C. High Speed Access/Dynamic BGP
D. Interconnection between VPCs

All

97) Which of the following operation incurs charges?


A. Create an EIP
B. Create a subnet
C. Create a VPC
D. Create a security group

98) The Virtual Private Cloud (VPC) service enables you to provision logically isolated,
configurable, and manageable virtual networks, improving the cloud resource security and
simplifying network deployment.
A. True
B. False

99) Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?
A. Customizing CIDR blocks
B. Customizing access control policies
C. Accessing the Internet using EIPs
D. Connecting a local data center using a VPN or Direct Connect connection

All
100) Which of the Following CIDR blocks care available for VPC Service?
A. [Link]/8
B. [Link]/16
C. [Link]/16

All

101) Which of the following cannot be configured in a VPC?


A. Subnet
B. Security group
C. Elastic IP address
D. Bandwidth
E. Load balancing

102) To enable RDP access to a created Windows ECS, which port must be opened by an
inbound security group rule?
A. 37
B. 53
C. 3389
D. 80

103) Which of the following must be configured to enable an ECS without a bound EIP to access
the Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing

104) How many network interface cards (NICs) does an ECS functioning as a SNAT server
require?
A. 1
B. 2
C. 3

105) Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.

106) Which of the following can enable an ECS in a VPC to communicate with a host in a private
data center?
A. Internet connection
B. VPN
C. VPC peering connection

107) Which of the following is optional when you create a subnet?


A. Name
B. CIDR block
C. Gateway
D. Tag

108) If you have high requirements on network stability and availability, which of the following
EIP types must you choose:
A. Static BGP
B. Dynamic BGP

109) Which of the following CIDR blocks is not supported by the VPC service?
A. [Link] – [Link]
B. [Link] – [Link]
C. [Link] – [Link]
D. [Link] – [Link]

110) Which of the following are VPC features?


A. Secure isolation
B. Flexible deployment
C. Dynamic BGP
D. Hybrid deployment
All

111) Which of the following is NOT a component of the ELB service?


A. Firewall
B. Load Balancer
C. Listener
D. Instance (VM or application container)

112) Elastic Load Balance (ELB) can work independently.


A. True
B. False

113) AS must work with Elastic Load Balance (ELB).


A. True
B. False

114) Which of the following functions are supported by ELB?


A. Creating a load balancer
B. Deleting a load balancer
C. Querying a load balancer
D. Adjusting the bandwidth

All

115) Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm

116) Which of the following load balancing algorithms are provided by ELB?
A. Weighted round robin
B. Weighted least connections
C. Source IP hash
D. Encryption algorithm
E. Weighted
ABC

117) Which of the following protocols requires certificates?


[Link]
[Link]
[Link]
[Link]

118) Which of the following protocols does ELB support?


[Link]
[Link]
[Link]
[Link]

All

119) ELB supports servers running different OSs.


A. True
B. False

120) Which of the following services can be used to view real-time monitoring data of load
balancers and listeners?
[Link] Container Engine
[Link] Eye
[Link] Scaling
[Link] Private Cloud

121) Which of the following statement about Direct Connect is incorrect?


[Link] Connect is a high-speed, low-latency, stable, and secure dedicated network
connection that connects user's local data center to a VPC on a cloud.
[Link] Connect uses the Internet tunneling technology on the public network.
[Link] create a direct connection, users need to create a connection, a virtual gateway, and a
virtual interface.
[Link], only the yearly/monthly billing mode is supported.

B
122) To delete direct connection, you need to delete Virtual interface and the virtual GW bound
with the virtual interface first
A. True
B. False

123) Can I access multiple VPCs using a direct connection?


A. True
B. False

124) Direct Connect enables a user to set up a dedicated network connection between a local
data center and the public cloud. Currently, which of the following connection type is supported
by Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN

125) In Route Mode, Static Route & BGP are supported?


A. True
B. False

126) To unsubscribe an operations connection, you need to delete the hosted connection
depends on it, and then delete the virtual gateway and virtual interface associated with it.
A. True
B. False

127) In Huawei Cloud VPN, only IPsec is supported?


A. True
B. False

128) Direct Connect supports only duration based (Yearly/Monthly) billing mode?
A. True
B. False
A

129) Huawei Cloud VPN uses pay-per-use pricing?


A. True
B. False

130) Select incorrect related to VPN GW connection:


A. In VPN, local GW is HUAWEI CLOUD IP address
B. In VPN, Remote GW is the public IP address of the VPN connection in your DC
C. In VPN, Local Subnet specifies the VPC subnets that need to communicate with your DC
D. In VPN, Remote Subnet specifies the subnets of your DC

131) Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both

132) Which of the following policies must be consistent between the local and remote sides of a
VPN that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec

CD

133) Can VPN gateway have multiple connections?


A. True
B. False

134) Does the IPsec VPN Support Automatic Negotiation?


A. True
B. False
A

135) What are customer requirements for cloud security?


[Link] Top Threats
[Link] legal compliance requirements
[Link] continuity
[Link] confidentiality

All

136) Which of the following are CSA TOP threats?


A. Account hijacking
B. Malicious internal personnel
C. Data leakage and loss
D. Abuse and malicious use of cloud services
E. Insufficient management of identity, credentials, and access
F. Insecure ports and APIs

All

137) Data Security includes:


A. DEW (Data Encryption Workshop)
B. HSS (Host Security Service)
C. CGS (Container Guard Service)
D. DBSS (Database Security Service)

AD

138) Which of the following statements about AAD is incorrect?


A. AAD does not support high-defense IP address access for multiple lines.
B. The Anti-DDoS cluster provides Layer 4 DDoS attack cleansing and works with GameCC
for attack blocking.
C. The WAF cluster provides DDoS attack cleansing and web CC defense on Layer 7.
D. AAD supports various cloud services.

139) With data security as its core, HUAWEI CLOUD builds a series of security services to meet
the particular needs. Security services include:
A. Data Security
B. Host Security
C. Application Security
D. Network Security

All

140) Which of the following security services can be used to protect websites?
A. WAF
B. VSS
C. SCM
D. Anti-DDoS

All

141) What are the basic functions of HSS?


A. Asset management
B. Vulnerability management
C. Baseline inspection
D. Intrusion detection

All

142) Which of the following statements about HTTPS site protection is incorrect?
A. When an HTTPS service is released to users, the HTTPS certificate needs to be uploaded
for using WAF.
B. No matter whether the original website server provides HTTPS or HTTP services, users
can have HTTPS services when using WAF.
C. The basic edition does not support HTTPS protection.
D. A domain name can choose to use either HTTP or HTTPS protocols only.

143) Which of the following problems can WAF solve?


A. The service server of an e-commerce website cannot respond to normal requests because its order
interface is overly invoked.
B. Numerous exclusive and beautiful pictures on a website are crawled by competitors in batches.
C. A website faces threats such as SQL and command code injection.
D. The website server is infected with viruses and CPU usage remains high.

ABC

144) Which of the following scenarios can WAF apply to?


A. The official website of a university deployed on the education portal
B. An enterprise portal in a self-deployed data center
C. A testing website deployed in a LAN
D. An open website deployed on the platforms of other cloud vendors

ABD

145) Which of the following is NOT a capability of Web Application Firewall (WAF)?
A. Anti-SQL injection
B. Anti-Webshell uploading
C. Anti-leeching
D. Anti-traffic attack

146) WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False

147) Which of the following problems can VSS solve?


A. Help tenants detect web vulnerabilities.
B. Help users detect weak passwords of the host.
C. Guide tenants in fixing the root cause of security vulnerabilities.
D. Help tenants repair or intercept vulnerabilities.

ABC

148) Which of the following statements about VSS is incorrect?


A. VSS is installation and maintenance free, requiring no extra labor cost. The service is
offered in the basic (free of charge) and professional (additional fees) editions to meet the
requirements of users.
B. VSS is easy to use and can be enabled with one click.
C. VSS is able to dynamically adjust the scanning frequency to ensure service availability.
D. Users need to manually upgrade the vulnerability library before scanning to improve
scanning accuracy.

149) Which of the following statements about VSS is incorrect?


A. VSS has no industry restrictions and can be widely applied in industries such as finance,
government, and transportation.
B. Users should have obtained a HUAWEI CLOUD account before using VSS.
C. If a tenant's web site or applications can be accessed through the public network, VSS is
available.
D. The tenant needs to deploy services on VMs of HUAWEI CLOUD.

150) Which of the following domain name types is *.[Link]?


A. Single domain name
B. Wildcard domain name
C. Multiple domain names
B

151) What are the challenges of defending against DDoS attacks?


A. Limited performance of the protection device
B. Insufficient service capabilities
C. Low Internet bandwidth

All

152) Which of the following protocols does AAD support?


A. TCP
B. UDP
C. HTTPS
D. HTTP

All

153) Which of the following service is a data security service?


A. Host Intrusion Detection (HID)
B. Host Vulnerability Detection (HVD)
C. Key Management Service (KMS)
D. SSL/TLS Certificate Service (SCS)

154) EVS Disks are associated with one Back-up Policy?


A. True
B. False

155) OBS can access through OBS Console or OBS Browser


A. True
B. False

156) A file system can be mounted to ECSs in different VPCs?


A. True
B. False

157) AS can only dynamically add or reduce ECS in Specified interval?


A. True
B. False

158) Anti DDOS can mitigate which kind of attack:


A. Volume attack
B. Brute force

159) Which of the following statements about KMS are correct?


A. The key and random numbers are generated by the certified third-party hardware security
module.
B. The master key of a user is stored redundantly online.
C. KMS is deeply integrated with computing and storage services such as ECS, EVS, IMS, OBS, EVS,
and VBS. KMS is used to manage the keys of these services.
D. The number of keys can be dynamically adjusted based on service development.

All

160) Which of the following statements about KMS are correct?


A. KMS provides views for users to uniformly manage encryption keys so that the usage of all keys
can be visualized.
B. Users can control the key and manage the lifecycle covering key generation, rotation, and
destruction.
C. Users can easily manage the encryption key used for encrypting data stored in your applications by
invoking APIs.
D. With the built-in auditing capability, KMS logs provide detailed information about access keys to
help you meet regulatory compliance.

All

161) Which of the following statements about Dedicated HSM are correct?
A. The key calculation of Dedicated HSM is performed on an exclusive encryption card. Services for
different tenants are isolated without affecting performance.
B. Dedicated HSM supports China-invented encryption algorithms such as SM1, SM2, SM3, and SM4.
C. Dedicated HSM is recommended for all data encryption requirements on the cloud to ensure
security.
D. Dedicated HSM is a hosting service that can automatically perform time-consuming tasks, such as
hardware presetting, software patching, high availability, and backup.

ABD
162) Which of the following problems does a website tenant not need to consider when selecting
a package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume

163) Which of the following are the advantages of SCM?


A. Improved website security
B. Optimized website image
C. Higher search engine rankings

All

164) Which of the following domain name types does SCM support?
A. Single domain name
B. Wildcard domain name
C. Multiple domain names

All

165) What layer attacks Anti DDOS can withstand?


A. Layer 4 to Layer 7

166) Which of the following technologies does SA use?


A. Big Data
B. Web Crawlers
C. Encryption
D. ID Authentication

AB

167) Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False

168) Server Monitoring includes:


A. Basic Monitoring
B. OS Monitoring
C. CPU Monitoring
D. Disk Monitoring
AB

169) Which rollup methods does Cloud Eye support ( )?


A. Max.
B. Min.
C. Avg.
D. Sum
E. Variance

All

170) Cloud Eye can be used to:


A. monitor the utilization of service resources
B. track the running status of cloud services
C. configure alarm rules and notifications
D. respond to resource changes

All

171) Which tool monitors RDS DB.


A. ECS
B. VPC
C. OBS
[Link] Eye

172) Which of the following DB instances can RDS create? (O)


A. MySQL
B. SQL Server
C. MongoDB
D. PostgreSQL

ABD

173) The Key Features of RDS include:


A. High Availability
B. Backup and Restoration
C. DB Instance Monitoring
D. High security

ABC
174) RDS does not support data backup or restoration.
A. True
B. False

175) To retrieve Alarm History for 7 days. What Service you will use? (Single Choice)
A. SMN
B. CTS
C. ECS
D. RDS

176) Where to restore RDS instance from?


A. Xxx
B. ECS
C. VPC
D. OBS

177) HUAWEI CLOUD EI provides 45 services and 142 functions.


A. True
B. False

178) What are the advantages of HUAWEI CLOUD EI service ModelArts? (O)
A. Readily acquired
B. Fast training
C. Fast launch
D. One-stop

All

179) Which of the following Huawei Cloud EI APIs are vision related?
A. Face Recognition
B. Image Recognition
C. Content Moderation
D. Image search

All
180) DWS is the Enterprise - Class Data Warehouse.
A. True
B. False

181) Which EI service can implement large scale data analysis and query?
A. DLF
B. DWS
C. DIS
D. GES

182) Which of the following is NOT a security feature on API Gateway?


A. App authentication
B. Request throttling
C. IP address blacklist
D. Security sandbox

183) What SDK Languages Does API Gateway Support?


A. Java
B. Go
C. Python
D. C#
E. JavaScript
F. PHP
G. C
H. C++
I. Android
J. Delphi

All except J

184) You can enable API Gateway and create and manage APIs for free? You pay only for
the number of API calls received and the amount of data transmitted.
A. True
B. False

185) Do I Need to Publish an API Again After Modification?


A. True
B. False
A

186) By default, an API can be called up to 200 times per second?


A. True
B. False

187) ECS Login Modes?


A. Key pair
B. OTP Token
C. Fingerprint
D. Password

AD

188) What are Auto Scaling Policy Actions? (multiple choice)


A. Modify
B. Replicate
C. Enable
D. Delete

ACD

189) AS Policies that dynamically expand? (single Choice)


A. Random
B. Alarm
C. Schedule
D. Periodic

190) Which are VPC access control functions?


A. Security group
B. Network access list
C. Fingerprint
D. Password

AB

191) The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason?
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed

192) Cloud computing is a model that enables users to obtain resources (such as computing,
storage, network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers.
A. True
B. False

193) Which of the following statements about hybrid clouds is incorrect?


[Link] centrally manage enterprises' resources on both public and private clouds.
[Link] allow service applications to move seamlessly between public and private clouds.
[Link] leverage both public and private cloud advantages to optimize resource configuration.
[Link] can be deployed only on the public cloud.

194) How long does it take to obtain an ECS? (S)


A. Several seconds
B. Several minutes
C. Several hours
D. Several days

195) Traffic from internet will hit to the which device first?
A. Firewall
B. NGIX
C. ELB

196) If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new
disk?
A. True
B. False

B
197) Which scaling action is not performed on Bandwidth scalling policy?
A. Replicate
B. Add
C. Reduce
D. Set to

198) Which component is not deleted automatically when DB instance is deleted?


A. manual backup

199) You can change CPU or memory of a DB instance


A. True
B. False

200) The management console can be used without logging in.


A. True
B. False

201) After creating ECS, bandwidth cannot be changed.


A. True
B. False

202) When creating ECS you can use File injection function to initialize it.
A. True
B. False

203) The server does not need to be stopped before restoring EVS disk data using VBS backup.
A. True
B. False

204) How are regions divided?


A. Based on AZ
B. Geographic location and Network Latency
C. Cluster servers

205) Logging function of a bucket – where can log file be stored?


A. Any bucket
B. Enable logging
C. The bucket on which logging is enabled
D. All other buckets except the one which is logging

206) When compared with shared file systems what are the advantages of SFS:
A. Robust reliability
B. Seamless integration
C. File sharing
D. Easy operations, high cost- (wrong, should be low)

ABC

207) Primary DB instance can replicate data to secondary DB Instances in :


A. Asynchronous
B. Semi-synchronous
C. Synchronous

AB

208) What is ECS lifecycle?


A. Start
B. Stop
C. Restart
D. Delete

All

209) which of the following is not included in devcloud:


A. Data backup
B. Project Management
C. Code Check
D. Cloud build

A
210) Bucket A has been configured a policy not to allow any users to access it. Object B is inside
Bucket A. Object B has an ACL that allows any users to access it. Therefore, object B can be
access anonymously by any user.
A. True
B. False

211) “Faster Inclusive AI Development”?


A. DLS
B. MLS
C. ModelArts
D. GES

212) API lifecycle?


A. Create
B. Publish
C. Authorize
D. Remove

All

213) The NAT Gateway service is charged.


A. True
B. False

214) NAT Gateway supports smooth upgrade.


A. True
B. False

215) In one VPC, only one NAT gateway can be created.


A. True
B. False

216) After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False
B

217) NAT Gateway supports disaster recovery across AZs.


A. True
B. False

218) Which of the following functions of NAT Gateway can be used to enable ECSs to share an
EIP to access the Internet?
A. SNAT
B. DNAT

219) Which of the following statements about NAT Gateway is incorrect?


A. An SNAT server is more stable than the NAT Gateway service.
B. NAT Gateway supports security isolation.
C. NAT Gateway supports up to 1 million concurrent SNAT connections.
D. NAT Gateway supports up to 200 DNAT rules.

220) Which of the following statements about NAT Gateway is incorrect?


A. After the number of SNAT connections reaches the upper limit, new sessions cannot be
created.
B. Cloud Eye allows you to view the number of SNAT connections.
C. Cloud Eye allows you to view the IP addresses of top 10 VMs that occupy the largest
number of SNAT connections.
D. Cloud Eye does not support setting alarms for the number of connections.

221) Which of the following statements about NAT Gateway is correct?


A. DNAT provides services for external networks.
B. DNAT also has the concept of the number of connections.
C. DNAT supports TCP, UDP, and ICMP port mapping.
D. DNAT does not support mapping all ports.

222) Which of the following is not the component of Big Data Platform?
A. Map Reduce
B. Openstack
C. HDFS
D. Yarn

223) An ECS must be stopped before it is used to create an image?


A. True
B. False

224) An ECS can be attached to multiple EVS disks?


A. True
B. False

225) ELB provides only three types of load balancing algorithms?


A. True
B. False

226) IMS provides comprehensive and flexible self-service image management capabilities.
Users can create a private image and use it to create an ECS or multiple ECSs?
A. True
B. False

227) All Huawei Cloud services can be viewed on the management console?
A. True
B. False

228) Which of the following component can be used to set an access control whitelist to allow
specific IP addresses to access load balancers?
A. Listener
B. Backend Server
C. Backend Server Group
D. Health Check
A

229) Which of the following is not an advantage of RDS compared with self-built databases?
A. Instant Availability
B. Easy Management
C. Elastic Scaling
D. Self-Installed Databases

230) To which of the following scenario does OCR apply?


A. Image Processing
B. Image Recognition
C. Character Recognition
D. Speech Recognition

231) Which of the following can isolate RDS network resources from other services?
A. ECS
B. VPC
C. CES
D. OBS

232) Which of the following operations is not supported by EVS?


A. Attaching/Detaching
B. Capacity Expansion
C. Capacity Reduction
D. Backup

233) Which of the following are advantages of IAM?


A. Permission Management
B. Security Control
C. Agency management
D. Federated ID Authentication

All

234) Which of the following are advantages of Cloud Eye?


A. Automatic Provisioning
B. Real Time & Reliable Monitoring
C. Visualized Monitoring
D. Multiple Notification Types

All

235) A file system can be mounted to:


A. A Linux ECS
B. A Windows ECS
C. A Bare Metal Server
D. Dedicated Computing Cluster

AB

236) Which is true about instance removal:


-If number of instances is greater than in AS group, some are removed
-When removed, the balance between AZs is not taken into account
-
-

237) Does OBS support batch upload?

238) When EVS disk is detached; data will be lost?

239) After the subnet is created; CIDR block can be changed?

240) SFS can be mounted to Windows ECS?

241) CCE Auto Scaling Models?

242) What are disadvantages of building your own Database?


A. Out of the Box
B. Stable
C. Easy Manageability
D. High Investment

243) How many AS configurations can be set for AS Group?

244) What is required by a workspace user to access USB connected to a terminal?


A. Clipboard Redirection
B. USB Port Redirection
C. Printer Redirection
D. User cannot access

245) Incorrect about KMS?


A. manage cloud platform & tenants’ keys
B. uses HSM
C. uses multi-layer key protection
D. can be integrated with apps

246) How to make an app created in a container accessible externally?


A. Deploy more than 2 nodes in container cluster
B. Assign 2 GB memory to each node
C. Publish app as a service
D. Bind app to ELB

247) What is not a capability of Anti DDOS?


A. Defend against DDOS Attacks
B. Monitor Individual IP
C. Provide Interception reports for individual IP
D. Regularly scan ECS for vulnerabilities

248) If 10GE is used to connect using Direct Connect? What port is it?
A. Electrical
B. Optical
C. Ethernet
D. Serial

249) What is required on Workspace to support 3D applications?


A. CPU with Hardware Virtualization
B. GPU
C. iNIC
D. SSD

250) For Monitoring Metrics Data, the retention policy differs by roll up period. For how many
days the data is retained with one hour roll up period?
A. 10
B. 20
C. 155
D. 300

251) What is not an objective of cloud computing security services?


A. User Security
B. Cloud Platform Security
C. Data Security
D. Service Security

252) What are the issues with conventional PCs?


A. High Cost
B. Poor Video Playback
C. Poor Software Compatibility
D. PC User behavior cant be monitored

253) Not the advantage of Cloud Eye?


Can monitor 3rd party non-Huawei Cloud Services

254) Which are not the characteristics of RDS?


A. High DBA Cost
B. no need to purchase Hardware & software
C. Only need RDS Rental Fee
D. Low DBA Skill Requirment

255) Procedures to use CCE?

256) What are the pre requisites to create a container cluster?


A. ECS has been created.
B. VPC has been created
C. ELB has been created
D. AK/SK file has been uploaded to CCE
257) Stages of Lifecycle of RDS DB Instance?

258) Important protocols in IPSec framework?


A. IP B. IKE C. AH D. ESP

259) Which peripheral redirections are supported by workstation?


A. Printer
B. USB
C. File
D. Clipboard

260) Cloud Eye notification methods?

261) Capabilities of Host Intrusion Detection?


A. Delete Brute force crack attack
B. Warning of remote login attempts
C. Detect weak passwords
D. Detect permission of database process
E. Detect web backdoors

262) What are scenarios for image replication?


A. Replicate unencrypted image to unencrypted image
B. Replicate unencrypted image to encrypted image
C. Replicate encrypted image to unencrypted image
D. Replicate encrypted image to encrypted image
What are basic characteristics of cloud computing? (O)
A. On-demand self-service
B. broad network access methods
C. Resource pooling
D. fast and scalable
E. Measurable services

Which of the following is generally used to provide application development and running
environments? (AJ)
A. IaaS
B. PaaS
C. SaaS

Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category? (O)
A. ECS
B. BMS
C. IMS
D. SFS

An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False

GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops, graphics
rendering and engineering drawing run in virtualization environment. (S)
A. True
B. False

Which of the following are OBS application scenarios?


A. Massive storage resource pool
B. Static web hosting
C. Big data storage
D. Backup
E. Archiving

Which of the following components are included in an ECS? (O)


A. vCPUs
B. Memory
C. Image
D. EVS disk

ECSs can be charged in yearly/monthly or metered mode.


A. True
B. False

Which of the following service is used by an ECS to store data? (O)


A. AS
B. IMS
C. EVS
D. DeC
Which operations are required to use ECS to create a Windows image? (O)
A. Configure the Windows ECS.
B. Install Cloudbase-Init.
C. Create a Windows private image.
D. Query and cleanup network rule files.

EVS provides the scalable, virtual block storage service, and the backend of EVS is based on a
distributed architecture. (S)
A. True
B. False

Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs

Which of the following are the advantages of the VPC service?


A. Security isolation
B. Flexible deployment
C. Dynamic BGP
D. Hybrid cloud support

Which of the following operation incurs charges? (AJ)


A. Create an EIP
B. Create a subnet
C. Create a VPC
D. Create a security group

Can VPN gateway have multiple connections


True
false

Can I access multiple VPCs using a direct connection?


A. True
B. False

Which of the following is NOT a component of the ELB service?


A. Firewall
B. Load Balancer
C. Listener
D. Instance (VM or application container)

Direct Connect enables a user to set up a dedicated network connection between a local data
center and the public cloud. Currently, which of the following connection type is supported by
Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN

Which of the following service is a data security service? (O)


A. Host Intrusion Detection (HID)
B. Host Vulnerability Detection (HVD)
C. Key Management Service (KMS)
D. SSL/TLS Certificate Service (SCS)
Data Security includes:
A. DEW
B. HSS
C. CGS
D. DBSS

Which of the following is NOT a capability of Web Application Firewall (WAF)?


A. Anti-SQL injection
B. Anti-Webshell uploading
C. Anti-leeching
D. Anti-traffic attack

What are the advantages of HUAWEI CLOUD EI service ModelArts? (O)


A. Readily acquired
B. Fast training
C. Fast launch
D. One-stop

Which of the following is NOT a security feature on API Gateway?


A. App authentication
B. Request throttling
C. IP address blacklist
D. Security sandbox

Which of the following DB instances can RDS create? (O)


A. MySQL
B. SQL Server
C. MongoDB
D. PostgreSQL

The Key Features of RDS include:


A. High Availability
B. Backup and Restoration
C. DB Instance Monitoring
D. High security

The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason (S)
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed

Cloud computing is a model that enables users to obtain resources (such as computing, storage,
network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers. (M)
A. True
B. False

Which of the following statements about hybrid clouds is incorrect?


[Link] centrally manage enterprises' resources on both public and private clouds.
[Link] allow service applications to move seamlessly between public and private clouds.
[Link] leverage both public and private cloud advantages to optimize resource configuration.
[Link] can be deployed only on the public cloud.

How long does it take to obtain an ECS? (S)


A. Several seconds
B. Several minutes
C. Several hours
D. Several days

What is the type of the image converted based on an existing ECS? (aj)
A. Public image
B. Private image
C. Shared image
D. EulerOS image

Which of the following policies does AS support? (O)


A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy

Elastic Load Balance (ELB) can work independently.


True
False

AS must work with Elastic Load Balance (ELB).


A. True
B. False

VBS does not support backing up EVS disks in batches. (O)


A. True
B. False

On which of the following services does VBS depend? (M)


A. Elastic Cloud Server
B. Elastic Volume Service
C. Object Storage Service
D. Image Management Service

( ) records operations of VBS resources, facilitating query, audit, and backtracking) (AJ)
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.

An EVS disk can be backed up only when it is in the ( ) state. (M)


A. Available
B. In-use
C. Error
D. Deletion failed

VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security. (AJ)
A. True
B. False

Does VBS Support Cross-Region Backup and Restoration? (S)


A. True
B. False

VBS provides the data backup function for EVS disks. The created data backups can be used to
create EVS disks. (S)
A. True
B. False

Which of the following functions are supported by ELB?


A. Creating a load balancer
B. Deleting a load balancer
C. Querying a load balancer
D. Adjusting the bandwidth

Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm

API lifecycle? (AJ)


Create -publish- authorize -remove

Which of the following protocols requires certificates? (S)


[Link]
[Link]
[Link]
[Link]

ELB supports servers running different OSs.


A. True
B. False

Which of the following protocols does ELB support?


[Link]
[Link]
[Link]
[Link]

Which of the following services can be used to view real-time monitoring data of load balancers
and listeners? (M)
[Link] Container Engine
[Link] Eye
[Link] Scaling
[Link] Private Cloud

Which of the following statement about Direct Connect is incorrect?


[Link] Connect is a high-speed, low-latency, stable, and secure dedicated network
connection that connects user's local data center to a VPC on a cloud.
[Link] Connect uses the Internet tunneling technology on the public network.
[Link] create a direct connection, users need to create a connection, a virtual gateway, and a
virtual interface.
[Link], only the yearly/monthly billing mode is supported.

What are customer requirements for cloud security? (O)


[Link] Top Threats
[Link] legal compliance requirements
[Link] continuity
[Link] confidentiality

Anti DDOS can mitigate which kind of attack:


Volume attack
Brute force

WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False

Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False
Server Monitoring includes:
A. Basic Monitoring
B. OS Monitoring
C. CPU Monitoring
D. Disk Monitoring

Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)

How many types of login users does HUAWEI CLOUD support?


A. 1
B. 2
C. 3
D. 4

Is an ECS a physical server?


A. Yes
B. No

What is used by an ECS to store data? (aj)


A. Auto Scaling
B. Elastic Volume Service
C. Cloud Container Engine
D. Cloud Eye

Which of the following methods does AS use to expand resources? (S)


A. Dynamically expanding resources
B. Expanding resources as planned
C. Manually expanding resources
D. Automatically expanding resources

AS supports the following instance removal policies:


A. Oldest instances created based on the oldest configuration
B. Newest instances created based on the oldest configuration
C. Oldest instances
D. Newest instances

Which of the following policies does AS support? (O)


A. Alarm policies
B. Scheduled policies
C. Periodic policies
D. Monitoring policies

Before creating a data disk image from a data disk, ensure that the ECS has a system disk and
the data disk is not empty.
A. True
B. False

What image types does IMS support? (O)


A. Public image
B. Private image
C. Encrypted image
D. Shared image

Private images can be classified into:


A. System disk image
B. Data disk image
C. Full-ECS image
D. Snapshot

Which of the followings are EVS disk types? (O)


A. Ultra-high I/O
B. High I/O
C. Common I/O
D. Optimized I/O
E. Low Latency optimized I/O

How many servers can a shared EVS disk be attached to at most?


A. 5
B. 7
C. 8
D. 16

EVS can be attached to: (AJ)


A. OBS
B. ECS
C. BMS
D. VPC

VBD EVS disks support only basic SCSI read/write commands.


A. True
B. False

Access requests to OBS can be controlled by,


A. ACLs
B. Bucket policies
C. User signature authentication ?
D. Server-side encryption

Which of the following are the application scenarios of SFS?


A. Media processing
B. Log management ?
C. Content management and web directories
D. High-performance computing (HPC)

Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?


A. Customizing CIDR blocks
B. Customizing access control policies
C. Accessing the Internet using EIPs
D. Connecting a local data center using a VPN or Direct Connect connection

Which of the Following networks could be VPC subnet. (S)


/24
/24
/24
/23 ALL PRIVATE SUBNETS

HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup Service
(VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults

Which of the following load balancing algorithms are provided by ELB? (AJ)
A. A. Weighted round robin
B. B. Weighted least connections
C. C. Source IP hash
D. D. Encryption algorithm
E. Weighted

Which of the following security services can be used to protect websites?


A. WAF
B. VSS
C. SCM
D. Anti-DDoS

Which rollup methods does Cloud Eye support ( )?


A. Max.
B. Min.
C. Avg.
D. Sum
E. Variance

Which of the following are deployment models of cloud computing?


A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community/Industry cloud
What is the data durability of OBS?
A. 10 nines (99.99999999%)
B. 11 nines (99.999999999%)
C. 12 nines (99.9999999999%)

What is the basic storage unit in OBS?


A. File
B. Block
C. Object
D. Bucket

Which of the following operations on buckets is not available in OBS?


A. Creation
B. Formatting
C. Modification
D. Deletion

If you download an object of the Standard storage class through a HUAWEI CLOUD ECS server,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity

If you download an object of the Archive storage class to your local computer over the Internet,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration

If a customer has some data to store and the data will be downloaded for only 10 times in a year,
which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage

Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.

Which of the following statements about lifecycle rules is correct?


A. Lifecycle rules support transition between storage classes by hour.
B. Lifecycle rules for objects of historical versions take effect only when versioning is enabled
for the bucket.
C. Lifecycle rules for objects of historical versions cannot be configured if versioning is not
enabled for the bucket.

Which of the following items cannot be configured when creating a bucket?


A. Region where bucket resides
B. Storage class of a bucket
C. Bucket policy
D. Static website hosting

Which of the following items cannot be configured when uploading an object?


A. File path
B. Storage class of the object
C. KMS encryption
D. File size

Which storage classes does OBS offer? (O)


A. Archive storage class
B. Backup storage class
C. Infrequent Access storage class
D. Standard storage class

The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable,
and manageable virtual networks, improving the cloud resource security and simplifying network
deployment. (S)
A. True
B. False

Which tool monitors RDS DB.


ECS
VPC
OBS
And correct one

Which of the following cannot be configured in a VPC? (S)


A. Subnet
B. Security group
C. Elastic IP address
D. Bandwidth
C. Load balancing

Which of the following must be configured to enable an ECS without a bound EIP to access the
Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing

How many network interface cards (NICs) does an ECS functioning as a SNAT server require?
A. 1
B. 2
C. 3

Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
Which of the following can enable an ECS in a VPC to communicate with a host in a private data
center?
A. Internet connection
B. VPN
C. VPC peering connection

To delete direct connection you need to delete Virtual GW and virtual interfaces first
True
False

Select incorrect related to VPN GW connection:


In VPN local GW is HUAWEI CLOUD IP address

Which of the following CIDR blocks is not supported by the VPC service? (S)
A. [Link] – [Link]
B. [Link] – [Link]
C. [Link] – [Link]
D. [Link] – [Link]

Which of the following is optional when you create a subnet?


A. Name
B. CIDR block
C. Gateway
D. Tag

If you have high requirements on network stability and availability, which of the following EIP
types must you choose:
A. Static BGP
B. Dynamic BGP

Which of the following policies must be consistent between the local and remote sides of a VPN
that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec
SFS is charged in pay-per-use or monthly/yearly flat fee mode.
A. True
B. False

SFS includes the SFS and SFS Turbo products.


A. True
B. False

SFS supports the EXT4 and NTFS protocols.


A. True
B. False

SFS can be connected to the AD domain controller for permission control.


A. True
B. False

SFS allows ECSs in different VPCs to access the same file system.
A. True
B. False

What is the maximum size of a single file supported by SFS?


A. 32 TB
B. 64 TB
C. 128 TB
D. 240 TB

What is the maximum bandwidth supported by SFS?


A. 2 GB/s
B. 5 GB/s
C. 10 GB/s
D. 20 GB/s

Which of the following file protocol is supported by SFS Turbo? (O)


A. NFS v3
B. NFS v4
C. SMB 2.0/2.1/3.0
D. EXT4

What is the minimum latency of SFS Turbo?


A. 10 ms
B. 5 ms
C. 2 ms
D. 1 ms

What is the maximum IOPS supported by SFS Turbo?


A. 5,000
B. 10,000
C. 20,000
D. 30,000

Which of the following protocols are supported by SFS?


A. NFS v3
B. NFS v4
C. FTP
D. EXT4

Which of the following are mainstream storage types in the industry?


A. Block storage
B. File storage
C. Object storage
D. Backup storage

Which of the following are HUAWEI CLOUD file storage services?


A. SFS
B. SFS Turbo
C. SFS Plus
D. All of the above

Which scenarios does SFS suit?


A. HPC
B. Media
C. File sharing
D. Game

Which scenarios does SFS Turbo suit?


A. HPC
B. Media
C. High-performance websites
D. Software development

Which of the following statements about AAD is incorrect?


A. AAD does not support high-defense IP address access for multiple lines.
B. The Anti-DDoS cluster provides Layer 4 DDoS attack cleansing and works with GameCC
for attack blocking.
C. The WAF cluster provides DDoS attack cleansing and web CC defense on Layer 7.
D. AAD supports various cloud services.

What is the basic capability of HSS?


A. Risk analysis and prevention capability
B. Attack defense capability
C. Intrusion detection capability

Which of the following statements about HTTPS site protection is incorrect?


A. When an HTTPS service is released to users, the HTTPS certificate needs to be uploaded
for using WAF.
B. No matter whether the original website server provides HTTPS or HTTP services, users
can have HTTPS services when using WAF.
C. The basic edition does not support HTTPS protection.
D. A domain name can choose to use either HTTP or HTTPS protocols only.

Which of the following problems does a website tenant not need to consider when selecting a
package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume

Which of the following statements about VSS is incorrect?


A. VSS is installation and maintenance free, requiring no extra labor cost. The service is
offered in the basic (free of charge) and professional (additional fees) editions to meet the
requirements of users.
B. VSS is easy to use and can be enabled with one click.
C. VSS is able to dynamically adjust the scanning frequency to ensure service availability.
D. Users need to manually upgrade the vulnerability library before scanning to improve
scanning accuracy.

Which of the following statements about VSS is incorrect?


A. VSS has no industry restrictions and can be widely applied in industries such as finance,
government, and transportation.
B. Users should have obtained a HUAWEI CLOUD account before using VSS.
C. If a tenant's web site or applications can be accessed through the public network, VSS is
available.
D. The tenant needs to deploy services on VMs of HUAWEI CLOUD.

Which of the following domain name types is *.[Link]?


A. Single domain name
B. Wildcard domain name
C. Multiple domain names

Which of the following are CSA TOP threats? (O)


A. Account hijacking
B. Malicious internal personnel
C. Data leakage and loss
D. Abuse and malicious use of cloud services
E. Insufficient management of identity, credentials, and access
F. Insecure ports and APIs

What are the challenges of defending against DDoS attacks?


A. Limited performance of the protection device
B. Insufficient service capabilities
C. Low Internet bandwidth

Which of the following protocols does AAD support?


A. TCP
B. UDP
C. HTTPS
D. HTTP

What are the basic functions of HSS? (S)


A. Asset management
B. Vulnerability management
C. Baseline inspection
D. Intrusion detection

What are the application scenarios of HSS?


A. Security risk management
B. Intrusion detection
C. Security compliance

Which of the following problems can WAF solve?


A. The service server of an e-commerce website cannot respond to normal requests because its order
interface is overly invoked.
B. Numerous exclusive and beautiful pictures on a website are crawled by competitors in batches.
C. A website faces threats such as SQL and command code injection.
D. The website server is infected with viruses and CPU usage remains high.

Which of the following scenarios can WAF apply to?


A. The official website of a university deployed on the education portal
B. An enterprise portal in a self-deployed data center
C. A testing website deployed in a LAN
D. An open website deployed on the platforms of other cloud vendors

Which of the following problems can VSS solve?


A. Help tenants detect web vulnerabilities.
B. Help users detect weak passwords of the host.
C. Guide tenants in fixing the root cause of security vulnerabilities.
D. Help tenants repair or intercept vulnerabilities.

Which of the following statements about KMS are correct?


A. The key and random numbers are generated by the certified third-party hardware security
module.
B. The master key of a user is stored redundantly online.
C. KMS is deeply integrated with computing and storage services such as ECS, EVS, IMS, OBS, EVS,
and VBS. KMS is used to manage the keys of these services.
D. The number of keys can be dynamically adjusted based on service development.
Which of the following statements about KMS are correct?
A. KMS provides views for users to uniformly manage encryption keys so that the usage of all keys
can be visualized.
B. Users can control the key and manage the lifecycle covering key generation, rotation, and
destruction.
C. Users can easily manage the encryption key used for encrypting data stored in your applications by
invoking APIs.
D. With the built-in auditing capability, KMS logs provide detailed information about access keys to
help you meet regulatory compliance.

Which of the following statements about Dedicated HSM are correct?


A. The key calculation of Dedicated HSM is performed on an exclusive encryption card. Services for
different tenants are isolated without affecting performance.
B. Dedicated HSM supports China-invented encryption algorithms such as SM1, SM2, SM3, and SM4.
C. Dedicated HSM is recommended for all data encryption requirements on the cloud to ensure
security.
D. Dedicated HSM is a hosting service that can automatically perform time-consuming tasks, such as
hardware presetting, software patching, high availability, and backup.

Which of the following are the advantages of SCM?


A. Improved website security
B. Optimized website image
C. Higher search engine rankings

Which of the following domain name types does SCM support?


A. Single domain name
B. Wildcard domain name
C. Multiple domain names

Auto Scaling (AS) is charged.


A. True
B. False

AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False

Alarm policies support system monitoring and custom monitoring.


A. True
B. False

An instance added to an AS group by an AS policy cannot be manually removed from the group.
A. True
B. False

AS can automatically adjust ECS and bandwidth resources. (O)


A. True
B. False

Which of the following policies can be configured to increase the number of instances in an AS
group at a predetermined time each week? (M)
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above

Which of the following statements about AS is incorrect?


A. AS can automatically adjust the number of instances in an AS group based on preset
policies.
B. AS can perform health checks on instances in an AS group.
C. Instance protection can be enabled on specified instances in an AS group.
D. AS does not allow users to view the status of instances in an AS group.

Which of the following statements about scaling actions is incorrect? (M)


A. When the number of instances in an AS group is not the same as expected, a scaling
action is triggered.
B. After an AS group is disabled, changing the number of expected instances triggers a
scaling action.
C. When a trigger condition of an AS policy is met, a scaling action is triggered automatically.
D. Lifecycle hooks help users better manage scaling actions.

Which of the following statements about AS configuration is correct?


A. An AS configuration defines the specifications of ECSs to be added to an AS group.
B. An AS configuration that has been created can be modified as needed.
C. After an AS group is enabled, its AS configuration cannot be changed.
D. An unlimited number of AS configurations can be created.

How many types of policies does AS support?


A. 0
B. 1
C. 2
D. 3

Which of the following policies are supported by AS? (AJ)


A. Alarm policy
B. Scheduled policy
C. Periodic Policy
D. Random policy

How can instances be added to an AS group? (M)


A. By an AS policy
B. Manually
C. By a change to the number of expected instances
D. By AS configuration

Which operations can be performed on an AS policy?


A. Execute now
B. Modify
C. Enable
D. Delete
E. Disable

Which of the following services are associated with AS?


A. Cloud Eye
B. Virtual Private Cloud (VPC)
C. Elastic Load Balance (ELB)
D. Elastic Cloud Server (ECS)

Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Inband Incoming Rate
C. Disk Read Requests
D. Memory Usage
E. Custom monitoring metrics

Which of the following are ECS types? (O)


A. Storage-optimized
B. Computing-accelerated
C. Computing-optimized
D. Memory-optimized
E. General computing

Which of the following are VPC features?


A. Secure isolation
B. Flexible deployment
C. Dynamic BGP
D. Hybrid deployment

Advantages of VPC are:


A. Secure and Reliable
B. Flexible Configuration
C. High-Speed Access
D. Interconnection??

Which operations are required for creating a Windows image using an ECS?
A. Configure the Windows ECS
B. Install Cloudbase-Init
C. Create a Windows private image
D. View and delete network rule files

The NAT Gateway service is charged.


A. True
B. False

NAT Gateway supports smooth upgrade.


A. True
B. False

In one VPC, only one NAT gateway can be created.


A. True
B. False

After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False

NAT Gateway supports disaster recovery across AZs.


A. True
B. False

Which of the following functions of NAT Gateway can be used to enable ECSs to share an EIP to
access the Internet?
A. SNAT
B. DNAT

Which of the following statements about NAT Gateway is incorrect?


A. An SNAT server is more stable than the NAT Gateway service.
B. NAT Gateway supports security isolation.
C. NAT Gateway supports up to 1 million concurrent SNAT connections.
D. NAT Gateway supports up to 200 DNAT rules.

Which of the following statements about NAT Gateway is incorrect?


A. After the number of SNAT connections reaches the upper limit, new sessions cannot be
created.
B. Cloud Eye allows you to view the number of SNAT connections.
C. Cloud Eye allows you to view the IP addresses of top 10 VMs that occupy the largest
number of SNAT connections.
D. Cloud Eye does not support setting alarms for the number of connections.

Which of the following statements about NAT Gateway is correct?


A. DNAT provides services for external networks.
B. DNAT also has the concept of the number of connections.
C. DNAT supports TCP, UDP, and ICMP port mapping.
D. DNAT does not support mapping all ports.

Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both

Pain Points of Current Enterprise IT Infrastructure includes: (M)


A. Slow Business Launch
B. Complicated Lifecycle Management
C. High TCO
D. I/O Bottleneck

RDS can restore backup


-true

Traffic from internet will hit to the which device first (AJ)

1. firewall
2. NGIX
3. ELB
4.

If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new disk.
True
False
Which scaling action is not performed on Bandwidth scalling policy

1. replicate

API Gateway supports SDKs of:


Java
Go
Python
C#
JavaScript
PHP
C
C++
Android
Delphi

What are AI app in vision


Face Recognition
Image Recognition
Content Moderation
Image search

Which component is not deleted automatically when DB instance is deleted


manual backup

You can change CPU or memory of a DB instance


True
false

WHICH IS NOT THE PART OF AI BIG DATA


Openstack

How are regions divided


-Based on AZ
-Geographic location and Network Latency
-Cluster servers

Which are a part of HUAWEI CLOUD ecosystem


-Marketplace
-Academy
-Partners
-Developers

The management console can be used without logging in.


-True
-False

After creating ECS bandwidth cannot be changed/


-True
-False

When creating ECS you can use File injection function to initialize it.
-True
-False

Which is not an action of Bandwidth scaling policy:


-Reduce
-Double
-Set to
-Add

When creating image Cloudbase-init should be installed on OS to ensure that configuration of


newly created ECSs from the image can be customized.
-True
-False

Server needs to be stopped before restoring EVS disk data using VBS backup.
-True
-False

Logging function of a bucket – where can log file be stored?


-Any bucket
-Enable logging
-The bucket on which logging is enabled
-All other buckets except the one which is logging

When compared with shared file systems what are the advantages of SFS:
-Robust reliability
-Seamless integration
-File sharing
-Easy operations, high cost- (wrong, should be low)

In Huawei Cloud VPN only IPsec is supported


-True
-False

What is the use of SA?


-Identification authentication
-Encryption
-Web crawlers
-Big data

Which is true about instance removal:


-If number of instances is greater than in AS group, some are removed
-When removed, the balance between AZs is not taken into account
-
-

Image creation fails if entered System disk capacity is less than System disk capacity of external
image file.
-True
-False

Which are VPC access control functions?


-Security group
-Network access list
-Fingerprint
-Password

Which EI service can implement large scale data analysis and query ?
-DLF
-DWS
-DIS
-GES

ECS lifecycle?
Start-Stop-Restart-Delete

Primary DB instance can replicate data to secondary DB Instances in :


Asynchronous
Semi-synchronous

which of the following is not included in devcloud:

A. Data backup
B. Project Management
C. Code Check
D. Cloud buildup

Bucket A has been configured a policy not to allow any users to access it. Object B is inside Bucket A. Object B
has an ACL that allows any users to access it. Therefore, object B can be access anonymously by any users.
True
False

What layer Anti DDOS support


Layer 4 to Layer 7

“Faster Inclusive AI Development”


DLS
MLS
ModelArts
GES

Huawei Cloud Positioning


Focus on IaaS, Enable PaaS, Aggregates SaaS

ECS Login
Key pair
OTP Token
Fingerprint
Password

What are BW Scaling (multiple choice)


Modify
Replicate
Enable
Delete
AS Policies that dynamically expand? (single Choice)
Random
Alarm
Schedule
Periodic

Use to Create Private Image (single Choice)


Full ECS Image using ECS
System Disk using ECS
System Disk using OBS File-my answer
System Disk using external Image

RDP ports used for xxx. inbound traffic

37
53
3389
80

Retrieve Alarm History for 7 days. What Service you will use. (Single Choice)
SMN
CTS-my answer
ECS
RDS

Where to restore RDS instance


Xxx
ECS
VPC
OBS

ELB Algorithms not provided (single choice)


Least Connections
Maximum connections
Round Robin
Weight

Status of File system that can be deleted (single Choice)


Creating
Deleting
Disable
Deleting failed

Not feature of VPC………(single Choice)


Authenticity
XXX
Integrity
Timeliness-my answer

EVS Disks Associated one Back up Policy


True
False

OBS can access through OBS Console or OBS Browser


True
False

File System can be mounted to Multiple ECS?


True
False

AS can only dynamically added or reduces ECS in Specified interval?


True
False
1. Elastic Volume Service (EVS) is a scalable virtual block storage service based on the
distributed architecture. [Score: 1]
The correct answer is A. Right.

2. What is the payment mode of Workspace? [Score: 1]


Answer: D. Pay-per-use (score: 1)

3. VBS does not support batch backup of EVS disks. [Score: 1]


Your answer: B. False (score: 1)

4. Which of the following functions are supported by OBS Browser? [Score: 1]


Answer: A. Static website hosting B. Versioning C. Cross-domain resource sharing D. Mounting to an
external bucket C. Cross-domain resource sharing D. Mounting to an external bucket

5. Which of the following are the major defense types of Anti-DDoS? [Score: 1]
Your answer: (null) Correct answer: A. Traffic attack defense|D. Application attack defense

6. After RDS HA is enabled, which of the following primary/standby DB instance


synchronization modes are available? [Score: 1]
Your answer: (null) Correct answer: B. Semi-synchronous | C. Asynchronous

7. In the cloud computing environment, confidentiality, integrity, and availability are still the
fundamental security requirements of users. [Score: 1]
Your answer: (null) Correct answer: A. Correct

8. Which of the following port types is 10GE when you enable Direct Connect? [Score: 1]
Your answer: (empty) Correct answer: B. Optical port

9. Instances added using AS policies cannot be manually removed. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

10. Huawei provides capability openness for developers to integrate the capabilities opened
by Huawei products with upper-layer applications and build differentiated innovative
solutions. [Score: 1]
Your answer: (null) Correct answer: A. Correct

11. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer is: D. After the capacity of an EVS disk is expanded, you can use
this backup to restore data. After the data is restored, the size of the EVS disk remains unchanged.

12. Which of the following protocols is not supported when the load balancer is a private
network load balancer? [Score: 1]
Your answer: (null) Correct answer: [Link]

13. How many types of AS policies can be configured? [Score: 1]


Your answer: (empty) Correct answer: B.3

14. The AS service can only dynamically add or reduce server resources based on the
specified time period. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

15. Which of the following scenarios does object storage apply to? [Score: 1]
Your answer: (null) Correct answer: A. Massive storage resource pool|B. Static website hosting|C. Big
data storage|D. Backup|E. Archiving
16. After creating an AS group by following the wizard, you need to manually enable the AS
group. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

17. What Can I Do If the Disk Capacity of an ECS Is Insufficient? [Score: 1]


Your answer: (null) Correct answer: C. Expanding the capacity of disks

18. Cloud Container Engine (CCE) is a high-performance and scalable container service. It
provides enterprises with Docker container lifecycle management capabilities, such as quick
application packaging and deployment and automatic O&M, helping you efficiently deploy
applications. [Score: 1]
Your answer: (null) Correct answer: A. Correct

19. What Is ECS Lifecycle Management? [Score: 1]


Your answer: (null) Correct answer: A. Delete ECS|C. Power off|D. Power on
20. Which of the following terminals can access Workspace? [Score: 1]
Your answer: (null) Correct answer: [Link]|[Link]|[Link] PC

21. ECSs are billed in yearly/monthly or pay-per-use mode. [Score: 1]


Your answer: (null) Correct answer: A. Correct

22. How Can I Create a Private Image? [Score: 1]


Your answer: (null) The correct answer is: A. Create from cloud server|C. Create from external image file

23. Cloud Eye is free of charge. [Score: 1]


Your answer: (null) Correct answer: A. Correct

24. Which of the following file access protocols is supported by SFS? [Score: 1]
Your answer: (null) Correct answer: [Link]

25. If the system disk is faulty, you can use the backup of the system disk to create an EVS
disk and attach it to the ECS as the system disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

26. Unlike traditional servers, users cannot deploy service applications on ECSs. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

27. In which of the following states can an EVS disk be backed up? [Score: 1]
Your answer: (empty) The correct answer is A. Available.

28. After an application is created, the CPU, memory, and network usage of the container
cannot be monitored. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

29. What is the type of the image converted from an ECS? [Score: 1]
Your answer: (empty) Correct answer: B. Private image

30. Which of the following services can work with EVS? [Score: 1]
Your answer: (Null) Correct answer: A. Elastic Cloud Server (ECS)|C. Volume Backup Service (VBS)|D.
Cloud Eye

31. What is the full name of ECS? [Score: 1]


Your answer: (null) Correct answer: A. Elastic Cloud Server
32. The VPN supports interconnection between two VPCs. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

33. Which of the following statements about hybrid cloud is incorrect? [Score: 1]
Your answer: (Null) Correct answer: D. Applications can be deployed only in the public cloud.

34. How many buckets can be created for an OBS account at most? [Score: 1]
Your answer: (null) Correct answer: B.100

35. Which of the following methods is correct for a Workspace user to access a USB flash
drive on a terminal? [Score: 1]
Your answer: (null) Correct answer: B. USB port redirection

[Link]. The subnet segment can be modified after being created. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

37. IAM - What are the key features of identity authentication? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Centralized control of users and security credentials |
B. Centralized control of user access | C. User group-based rights | D. Support for Huawei customer
service agent maintenance

38. Which of the following service resource metrics can be monitored by Cloud Eye? [Score:
1]
Your answer is as follows: (Null) Correct answer: A. Virtual Private Cloud (VPC)|B. Elastic Computing
Service (ECS)|C. Distributed Cache Service (DCS)|D. Elastic Load Balance

39. Which of the following is not the key of WAF? [Score: 1]


Your answer is: (Null) The correct answer is: D. Preventing excessive traffic.

40. Which of the following services helps you monitor RDS resources in real time? [Score: 1]
Your answer: (null) Correct answer: [Link]

41. Which of the following is not the main reason why traditional IT infrastructure
architecture cannot support efficient operation of enterprises and urgently calls for
architecture transformation? [Score: 1]
Your answer is: (empty) The correct answer is: D. The network speed is too slow.

42. If no EIP is bound to a VM, you can configure a custom route for the VM to access the
Internet. [Score: 1]
Your answer: (null) Correct answer: A. Correct

43. The alarm threshold consists of the set mode (raw data, maximum value, minimum value,
average value, and variance), judgment condition (>, ≥, <, ≤, and =), and critical value. The
set mode is used to configure alarm conditions. [Score: 1]
Your answer: (null) Correct answer: A. Correct

44. What operations can the shared image provider perform? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Specifying an image to be shared | B. Deleting a
shared image | C. Adding a tenant who can share an image | D. Deleting a tenant who can share an image

45. The AS service must be used together with elastic load balancing. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
46. Compared with traditional file sharing storage, what are the advantages of SFS? [Score:
1]
Your answer: (null) The correct answer is: A. File sharing|B. Seamless integration|D. High reliability

47. VBS can create backups for EVS disks and use the backups to roll back EVS disks,
maximizing user data accuracy and security. [Score: 1]
Your answer: (null) Correct answer: A. Correct

48. To enable two sites to communicate with each other across the Internet, deploy
[Link] on the firewalls at both sites to protect the mutual access traffic between the
intranets at the two sites. [Score: 1]
Your answer: (null) Correct answer: A. Correct

49. The cloud security service system consists of five parts: network security, data security,
application security, security evaluation, and security support. [Score: 1]
Your answer: (null) Correct answer: A. Correct

50. Which of the following are the main functions of HID? [Score: 1]
Your answer: (null) Correct answer: A. Brute force cracking detection | B. Remote login notification | C.
Weak password detection | D. Database process permission detection | E. Web page backdoor file
detection

51. Which of the following is not an RDS DB instance category? [Score: 1]


Your answer: (null) The correct answer is D. Disk.

52. What are the alarm statuses of Cloud Eye? [Score: 5]


Your answer: (null) Correct answer: A. Alarm|B. Normal|C. Insufficient data|D. Close

53. Similar to traditional server disks, EVS disks allow you to format EVS disks attached to
ECSs, create file systems on the EVS disks, and store data persistently. [Score: 1]
Your answer: (null) Correct answer: A. Correct

54. Which of the following management functions are supported by ELB? [Score: 5]
Your answer is as follows: (null) Correct answer: A. Create a load balancer. |B. Delete a load balancer. |C.
Enable a load balancer. |D. Disable a load balancer.

55. What computing services does Huawei public cloud provide? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Auto Scaling|B. Elastic Cloud Server|C. Image
Management Service

56. SFS cannot be attached to an ECS running the Windows OS. [Score: 1]
Your answer: (null) Correct answer: A. Correct

57. What are the prerequisites for creating a cluster? [Score: 1]


Your answer: (Null) Correct answer: B. A VPC has been created.|[Link]/SK certificate has been uploaded
to CCE.

58. What information needs to be configured before creating a file system? [Score: 1]
Your answer: (null) Correct answer: [Link]
59. Which of the following statements about KMS is incorrect? [Score: 1]
Your answer: (Null) Correct answer: A. Managing the cloud platform and tenant keys

60. Identity and Access Management (IAM) refers to the identity and authentication service.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

61. Which of the following is not a Huawei computing cloud service? [Score: 1]
Your answer: (null) Correct answer: D. Scalable File Service

62. Which of the following are basic features of cloud computing? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. On-demand self-service|B. Wide network access|C.
Resource pooling|D. Fast elastic scaling|E. Measurable service

63. Which of the following is not a major function of Anti-DDoS? [Score: 1]


Your answer: (Null) Correct answer: D. Periodically scan ECS vulnerabilities.

64. Which of the following are the application scenarios of SFS? [Score: 5]
Your answer: (null) The correct answer is: A. Media processing|B. Log management|C. Content
management and home directory|D. High-performance computing

65. If a user wants to query historical alarms in the last seven days, which of the following
services needs to be enabled? [Score: 1]
Your answer: (Null) The correct answer is A. Cloud Trace Service.

66. Which of the following components receives traffic from the Internet first after the traffic
enters [Link]? [Score: 1]
Your answer: (null) The correct answer is [Link].

67. Penetration testing service (PTS) belongs to security evaluation service products. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect

68. Which of the following image types are supported by IMS? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Public image|B. Private image|C. Shared image

69. To use Cloud Eye to monitor Huawei ECSs, you need to install the plug-in on the ECSs.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect

70. If the capacity of the data disk attached to the ECS is insufficient, you must detach the
disk and purchase a new one. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

71. Which of the following statements about Anti-DDoS traffic cleaning is incorrect? [Score:
1]
Your answer: (Null) Correct answer: A. Web vulnerability detection
72. Attach the EVS disk to an ECS. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

73. Which of the following operations will incur fees? [Score: 1]


Your answer: (blank) The correct answer is A. Create an EIP.

74. What are the types of EVS disks? [Score: 1]


Your answer: (null) Correct answer: A. Ultra-high I/O|B. High I/O|C. Common I/O|D. Optimized I/O

75. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. Multiple EVS disks can be associated with a backup policy for
batch backup.
76. Which of the following operations cannot be performed by the recipient of a shared
image? [Score: 1]
Your answer: (null) The correct answer is: A. Sharing the specified mirror.

77. The size of the exported image is not limited. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

78. RDS can meet the ever-changing requirements of the gaming industry, effectively
shortening the R&D period and reducing R&D costs. [Score: 1]
Your answer: (null) Correct answer: A. Correct

79. If the status of an alarm rule remains unchanged, the system sends an alarm notification
to the user only when the alarm rule is in the status for the first time. [Score: 1]
Your answer: (null) Correct answer: A. Correct

80. Data in the file system is stored using erasure codes. [Score: 1]
Your answer: (null) Correct answer: A. Correct

81. Which of the following user authentication modes is supported by Workspace? [Score: 1]
Your answer: (null) The correct answer is [Link] Directory.

82. WAF detects anomalies of HTTP requests to prevent malicious network intrusions, such
as web page tampering, information leakage, and Trojan horse implantation. [Score: 1]
Your answer: (null) Correct answer: A. Correct

83. All types of HUAWEI CLOUD service products can be viewed on the management
console. [Score: 1]
Your answer: (null) Correct answer: A. Correct

84. If only one AS policy is enabled in the AS group and the action in the AS policy is to add
two instances, how many instances are there in the AS group? [Score: 1]
Your answer: (empty) Correct answer: D. Uncertain

85. High availability is not a key feature of RDS. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

The CCE does not support Elastic Load Balance. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

87. Which of the following images is a standard image provided by the public cloud platform
and is visible to all users? [Score: 1]
Your answer: (blank) Correct answer: A. Public image

88. The management console can be used without login. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

89. What Does an ECS Use to Build a Logical Zone That Is Logically Isolated? [Score: 1]
Your answer: (null) Correct answer: B. Virtual private cloud

90. When an EVS disk is detached from an ECS, the data on the EVS disk will be lost.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect
91. Which of the following EVS disks can be directly created on the EVS console? [Score: 1]
Your answer: (null) Correct answer: B. Data disk

92. What are the methods of adding instances to an AS group? [Score: 1]


Your answer: (null) Correct answer: A. Scaling action|B. Manually adding instances|C. Changing the
expected number of instances

93. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three
times, disable versioning for the bucket, and upload object aaa for three times. After the
preceding operations are complete, how many objects are displayed in the bucket basic
information? [Score: 1]
Your answer: (null) Correct answer: B.4

94. Workspace supports user authentication using Micrlslft Active Directory. [Score: 1]
Your answer: (null) Correct answer: A. Correct

95. Which of the following cloud products is a data security type? [Score: 1]
Your answer: (null) Correct answer: [Link] (key management service)

Elastic Load Balance automatically distributes access traffic to multiple ECSs to balance
their service load. It enables you to achieve higher levels of fault tolerance in your
applications and expand application service capabilities. [Score: 1]
Your answer: (null) Correct answer: A. Correct

97. Network security, as an important part of cloud security services, implements network
isolation, responds to network attacks, and ensures network security. [Score: 1]
Your answer: (null) Correct answer: A. Correct

98. The AS service automatically adjusts service resources based on users' service
requirements and policies. [Score: 1]
Your answer: (null) Correct answer: A. Correct

99. The 0BS supports the batch upload function. [Score: 1]


Your answer: (null) Correct answer: A. Correct

100. What CIDR Blocks Does a VPC Support? [Score: 1]


Your answer: (null) Correct answer: A.[Link]/23|B.[Link]/24|C.[Link]/24|D.[Link]/24

101. Which of the following is not a major application scenario of VPC? [Score: 1]
Your answer: (None) The correct answer is B. The desktop cloud accesses Huawei Vmall.

102. Images can be uploaded to the container image repository. [Score: 1]


Your answer: (null) Correct answer: A. Correct

103. If you use an ECS to create an image, the ECS must be stopped. [Score: 1]
Your answer: (null) Correct answer: A. Correct

104. What are the benefits of Workspace to customers? [Score: 1]


Your answer: (null) The correct answer is: B. Quick access | C. Pay-per-use | D. Simplified O&M

105. Which of the following statements are correct? [Score: 1]


Your answer is: (Null) Correct answer is: B. The parameters of the created file system cannot be modified.
|C. The file system can access different AZs of the same VCP. |D. The performance of the SFS file system
increases with the capacity increase.
106. How Many Monitoring Panels Can I Create at Most on the Dashboard Page? [Score: 1]
Your answer: (empty) Correct answer: B.2.

107. How Long Does It Take to Apply for an ECS? [Score: 1]


Your answer: (empty) Correct answer: B. Minutes

108. Which of the following shared file systems can be directly deleted? [Score: 1]
Your answer: (null) Correct answer: B. Unavailable

109. GPU desktops can be used for CAD auxiliary design. [Score: 1]
Your answer: (null) Correct answer: A. Correct

110. Cloud Eye is a multi-dimensional monitoring platform for resources such as Elastic
Cloud Servers (ECSs) and bandwidth. You can monitor alarms, notifications, and
personalized report views in real time to accurately learn about the product resource status.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

111. Which of the following statements is incorrect? [Score: 1]


Answer: (null) Correct answer: A. Create a folder named br..ra/1 in the OBS bucket. |B. OBS Cosole
supports batch deletion of buckets. |D. You have created 101 buckets using OBS Cnsole.

112. After an ECS is created, you can change the ECS specifications if they do not meet your
requirements. [Score: 1]
Your answer: (null) Correct answer: A. Correct

Which of the following key technologies are used by situational awareness? [Score: 1]
Your answer: (null) The correct answer is: A. Big data technology | B. Crawler technology

114. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. After an EVS disk is deleted, you can use a backup to create an
EVS disk. |D. After an EVS disk is deleted, the backup data will not be deleted.

115. What applications and services are provided by HUAWEI CLOUD Marketplace?
[Score: 1]
Your answer: (null) Correct answer: A. Basic software|B. Business software|C. Developer tools|D.
Professional services

116. Which of the following is not a major function of WTP? [Score: 1]


Your answer: (null) Correct answer: D. SQL injection prevention

117. CCE allows you to view application logs and events. [Score: 1]
Your answer: (null) Correct answer: A. Correct

118. Which of the following is not a capability of DevCloud? [Score: 1]


Your answer: (null) Correct answer: D. Data backup

119. Which of the following belong to the life cycle management of database instances?
[Score: 1]
Your answer is as follows: (Null) Correct answer: A. Adding a read replica|B. Viewing DB instance
information|C. Expanding the storage space of the database|D. Deleting the database cluster|E. Rebooting
the database instance
120. The encrypted mirror cannot be changed to an unencrypted mirror. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

121. CCE allows you to directly use official Docker Hub images. [Score: 1]
Your answer: (null) Correct answer: A. Correct

122. Users can use OBS on OBS Console or OBS Browser. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

123. What Are the Steps for Creating a Windows Image Using an ECS? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Configure the Windows server. |B. Install Cloudbase-
Init. |C. Create a Windows private image.

124. How many alarm rules can be created at most? [Score: 1]


Your answer: (null) Correct answer: B.50

125. Which of the following are the objectives of cloud computing security services? [Score:
1]
Your answer is as follows: (null) Correct answer: A. Data protection|B. Operation environment
protection|C. Service independence and linkage|D. Security evaluation

126. Relational Database Service (RDS) users can modify database configurations to achieve
optimal performance. [Score: 1]
Your answer: (null) Correct answer: A. Correct

127. How many common services can be added to My Favorites at most? [Score: 1]
Your answer: (empty) Correct answer: C.7

128. SFS can set read-only permissions for users. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

129. When creating a monitoring panel, you can add a maximum of () monitoring indicators
to a view. [Score: 1]
Your answer: (null) Correct answer: B.5

130. The time required for backing up an EVS disk depends only on the volume of data in the
EVS disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

131. Which of the following can be used to monitor ECSs? [Score: 1]


Your answer: (null) Correct answer: B. Cloud Eye

132. What do I need to create for two VPCs to communicate with each other? [Score: 1]
Your answer: (null) Correct answer: B. Peering connection

133. Multiple EVS disks can be attached to an ECS. [Score: 1]


Your answer: (null) Correct answer: A. Correct

134. The GPU is applicable to graphics rendering, engineering drawing, and desktop cloud
scenarios. [Score: 1]
Your answer: (null) Correct answer: A. Correct

135. Data security ensures confidentiality and integrity of user data applications and storage
in the cloud computing environment. [Score: 1]
Your answer: (null) Correct answer: A. Correct

136. What is the basis for the division of Regions? [Score: 1]


Your answer: (empty) Correct answer: A. Geographical location and network latency

137. What are the deployment modes of cloud computing?' [Score: 1]


Your answer: (Null) Correct answer: A. Private cloud|B. Public cloud|C. Hybrid cloud|D. Community
cloud/Industry cloud

138. Which of the following load balancing modes is not supported by listeners? [Score: 1]
Your answer: (null) Correct answer: A. Maximum connection|C. Set weight

139. What are the scenarios of user replication chain compensation? [Score: 1]
Your answer: (null) Correct answer: B. Replicate the unencrypted image as an encrypted image. |C.
Replicate the encrypted image as an encrypted image. |D. Replicate the encrypted image as an unencrypted
image.

140. Which of the following is not the application scenario of Cloud Eye? [Score: 1]
Your answer: (null) Correct answer: D. Operation audit

141. Which of the following components is not included in the big data platform? [Score: 1]
Your answer: (null) Correct answer: B. OpenStack

142. Which of the following is not a main application scenario of KMS? [Score: 1]
Your answer: (Null) The correct answer is: A. Network transmission encryption

143. What are the benefits of containers? [Score: 1]


Your answer is as follows: (Null) The correct answer is: A. More efficient virtualization | B. More secure
running applications | C. Faster delivery and deployment | D. Easier migration and expansion | E. Simpler
management

144. To implement dynamic resource expansion, which of the following policies is selected
when you create an AS policy? [Score: 1]
Your answer: (blank) Correct answer: C. Alarm policy
145. Which of the following is not a major function of HVD? [Score: 1]
Your answer: (Null) Correct answer: B. ECS brute-force cracking prevention

146. Alarm notification is the action taken when an alarm is triggered. You can set or disable
alarm notification when creating or modifying an alarm. [Score: 1]
Your answer: (null) Correct answer: A. Correct

147. What are the problems of traditional VDI? [Score: 1]


Your answer: (empty) Correct answer: D. High fixed investment cost

148. Data outsourcing and service outsourcing are the main security challenges faced by
users in cloud computing. [Score: 1]
Your answer: (null) Correct answer: A. Correct

149. What Are the ECS Login Authentication Modes? .c\'\ [Score: 1]
Your answer: (empty) Correct answer: A. Password|D. Key pair

150. Which of the following is NOT true of the LEADS philosophy? [Score: 1]
Your answer: (null) Correct answer: E.S: Service
151. A policy is configured for bucket A to prevent any user from accessing objects in bucket
A. Bucket A contains object B, which is configured with an ACL to allow anonymous users
to access object B. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

152. Which of the following methods can be used to directly access a container from the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Elastic IP address

153. What are the advantages of VPC? [Score: 1]


Your answer is: (empty) The correct answer is: A. Security isolation|B. Soul deployment|C. Dynamic
BGP|D. Hybrid cloud deployment is supported.

154. Which of the following is a disadvantage of self-built databases? [Score: 1]


Your answer: (empty) The correct answer is D. High investment.

155. Which of the following statements about the ELB product functions is incorrect? [Score:
1]
Your answer is: (empty) The correct answer is: A. Provide a private line connection.

156. Which of the following services does VBS depend on? (Multiple-choice question)
[Score: 1]
Your answer: (Null) Correct answer: B. Cloud hard disk|C. Object storage

157. Workspace data is encrypted using TLS during transmission. [Score: 1]


Your answer: (null) Correct answer: A. Correct

158. How Many AS Configurations Can Be Configured in an AS Group? [Score: 1]


Your answer: (empty) Correct answer: A.1

159. EVS disks must be used with ECSs. [Score: 1]


Your answer: (null) Correct answer: A. Correct

160. Which of the following is incorrect about ELB configuration? [Score: 1]


Your answer: (null) Correct answer: B. You can select an IP address when adding an Elastic Load
Balance.

161. The next decade of IT infrastructure evolution in the cloud computing era is from
separation to convergence. No matter how spirally the IT architecture evolves, which of the
following statements about customer values and driving forces is incorrect? [Score: 1]
Your answer: (Null) Correct answer: B. Higher efficiency in service deployment and lifecycle
management

162. When IPSec VPN is used for communication, the encryption and decryption check is
performed on the firewalls at both ends. [Score: 1]
Your answer: (null) Correct answer: A. Correct

163. Which of the following statements are correct? [Score: 1]


Your answer is: (Null) The correct answer is: A. VBS provides data protection for EVS disks. |B. VBS can
be used to quickly restore data when an EVS disk is faulty. |C. VBS is implemented based on the snapshot
technology. |D. VBS supports online backup.

164. To enable the log management function of an OBS bucket, which permissions on the
target OBS bucket must be granted to the log delivery user group? [Score: 1]
Your answer: (null) Correct answer: B. Write permission|C. View ACL permission
165. Users can use terminals such as iPad to access Workspace. [Score: 1]
Your answer: (null) Correct answer: A. Correct

166. Which of the following methods can be used to set the access permission for anonymous
OBS object users? [Score: 1]
Your answer: (null) Correct answer: B. Setting the ACL for OBS objects|C. Setting the policy for OBS
objects

167. The minimum management unit of RDS is an instance. [Score: 1]


Your answer: (null) Correct answer: A. Correct

168. What are the types of VPNs based on service usage? [Score: 1]
Your answer: (null) Correct answer: A. Access VPN|[Link] VPN|[Link] VPN

169. Which of the following functions are provided by ECS? [Score: 1]


Your answer is: (Null) Correct answer: A. Users can create and delete VMs, modify VM specifications,
and start and stop VMs. B. Users can add and uninstall extension NICs, and add EIPs, attach and detach
disks. |C. Users can view information about their ECSs on the management console. |D. Users can set ECS
alarm rules.

170. The file system can be accessed across VPCs. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

171. What are the important functions of IKE? [Score: 1]


Your answer: (null) Correct answer: A. Negotiation protocol parameters|C. Negotiation key and key
management|D. Peer identity authentication

172. After an ECS is created, the bandwidth used by the ECS cannot be changed. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

173. What Are the AS Policy Types? [Score: 1]


Your answer: (null) Correct answer: A. Scheduled policy|B. Periodic policy|C. Alarm policy

From which perspectives does situational awareness analyze security posture? [Score: 1]
Your answer: (null) Correct answer: A. Global perspective|B. User perspective|D. Attacker perspective

175. Which of the following is the procedure for using the CCE? [Score: 1]
Your answer is as follows: (Null) Correct answer: C.1. Create a cluster. 2. Upload an image. 3. Create an
application.

176. Which of the following is not an advantage of RDS compared with self-built databases?
[Score: 1]
Your answer: (null) Correct answer: D. Users install the database by themselves.

177. As an important part of the cloud security service, application security ensures the
security of elastic cloud computing servers and cloud computing applications running on
them from the perspective of operating system and application security protection. [Score: 1]
Your answer: (null) Correct answer: A. Correct

178. Which of the following devices needs to be configured for Workspace to support 3D
applications? [Score: 1]
Your answer: (null) Correct answer: [Link] card
179. During VPC creation, which of the following parameters can be used to automatically
obtain an IP address? [Score: 1]
Your answer: (null) The correct answer is [Link].

180. Workspace has the following security protection mechanisms: [Score: 1]


Your answer is as follows: (Null) Correct answer: A. Data is separated from terminals, and data is not
stored on terminals. |B. Data is encrypted using TLS during transmission. |C. Data is isolated from other
tenants using VPCs. |D. Peripheral channels can be managed and controlled. Read-only redirection is
supported. Data cannot be copied to peripheral storage.

181. Which of the following functions are supported by the 0BS Console? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Static website hosting | B. Versioning | C. Cross-
domain resource sharing | D. Adding external buckets

182. What are the application scenarios of VBS? [Score: 1]


Your answer: (null) Correct answer: A. Hacker attack or virus attack|B. Data deleted by mistake|D.
Application error

183. What is the audio sampling rate in Workspace? [Score: 1]


Your answer: (null) The correct answer is C.44.1 kHz.

184. Which of the following constitute the Huawei public cloud ecosystem? [Score: 1]
Your answer: (Null) Correct answer: A. Marketplace|B. Developer Community|C. Partner|D. Huawei
cloud service certification engineer

185. Containers and virtual machines have similar resource isolation and allocation
advantages, but have different functions because containers are more portable and efficient
due to the fact that containers are virtualized operating systems rather than hardware. [Score:
1]
Your answer: (null) Correct answer: A. Correct

186. Direct Connect is a private network service that connects your local data center to the
public cloud. Currently, which of the following private lines is supported by Direct Connect?
[Score: 1]
Your answer: (null) Correct answer: [Link] VPN

187. IPSec VPN is an encrypted tunneling technology. It uses encrypted security services to
establish secure and comprehensive communication tunnels between different networks.
Which of the following is not the feature that ensures the transmission of data packets on the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Timeliness

188. On the Dashboard page, you can add or delete monitoring graphs of key monitored
objects. The graphs can be used to compare multiple monitored objects. You can view the
graphs in a timely manner each time you log in to the Cloud Eye console. [Score: 1]
Your answer: (null) Correct answer: A. Correct

189. IMS provides flexible self-service and comprehensive image management capabilities.
Users can create private images and use images to create ECSs or replicate ECSs in batches.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

190. Which of the following management operations is not supported by EVS disks? [Score:
1]
Your answer: (null) The correct answer is C. Reduce the capacity.

191. What is the return value when a user-defined monitoring indicator is successfully
uploaded using the Open API? [Score: 1]
Your answer: (null) The correct answer is B.201.

192. What are the concepts of VPC? [Score: 1]


Your answer: (null) Correct answer: A. Subnet|[Link]|C. Security group|[Link]

193. VPCs can be connected to traditional data centers through private lines or VRNs to
flexibly integrate resources. [Score: 1]
Your answer: (null) Correct answer: A. Correct

194. Which of the following statements about the positioning of Huawei cloud services are
correct? [Score: 1]
Your answer: (null) The correct answer is: A. Focus on the IaaS layer, use the PaaS layer, and aggregate
the SaaS layer.

195. What Are the Advantages of CCE? [Score: 1]


Your answer is: (Null) The correct answer is: A. Microservice governance: Decouple a single architecture
into multiple containers, making the system more flexible. |B. Provide a continuous container delivery
platform. Container images are used throughout the development and O&M phases, and the environment
configuration is unified, fast service provisioning|C. VMs are isolated into multiple containers (with fine-
grained containers) and applications are built on containers to improve resource utilization.|D. The system
automatically and elastically expands the capacity to quickly respond to concurrent peaks

196. After an ECS is bound to a (), the ECS can be accessed through a fixed public IP
address. [Score: 1]
Your answer: (blank) Correct answer: D. Elastic IP address

197. ECS indicates the Auto Scaling (AS) service. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

198. When multiple VMs are created, you can bind multiple EIPs to enable multiple VMs to
access the Internet at the same time. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

199. When creating an ECS, you can use the file injection function provided by the system to
initialize the ECS. [Score: 1]
Your answer: (null) Correct answer: A. Correct

200. Which of the following layer is the cloud service that provides the application running
and development environment? [Score: 1]
Your answer: (null) Correct answer: [Link]

201. Certificates of the SCS can be used for trusted authentication of enterprise websites.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

202. What data does an ECS use for storage? [Score: 1]


Your answer: (null) Correct answer: C. Cloud hard disk

203. Which of the following are RDS functions? [Score: 1]


Your answer is as follows: (Null) Correct answer: A. Creating a database cluster |B. Expanding the disk |C.
Adding a read-only version |D. Creating/Restoring a snapshot |E. Restoring a backup to a specified time
point

204. How Many EVS Disks Can Be Attached to an ECS? [Score: 1]


Your answer: (empty) Correct answer: D.11

205. An availability zone (AZ) is a collection of one or more physical data centers with
independent cooling, fire extinguishing, moisture-proof, and electricity facilities. Within an
AZ, computing, network, and storage resources are logically divided into multiple clusters.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

206. Which of the following cloud services is not a computing cloud service? [Score: 1]
Your answer: (null) Correct answer: C. Virtual private cloud

207. How Many RDS DB Instances Can Each User Create by Default? [Score: 1]
Your answer: (null) Correct answer: B.20

208. Which of the following is not the target of cloud computing security services? [Score: 1]
Your answer: (null) Correct answer: B. Cloud platform security

209. Cloud Eye is an open resource monitoring platform that provides resource monitoring,
alarm reporting, and notification services. [Score: 1]
Your answer: (null) Correct answer: A. Correct

210. Which of the following commands is used to tag an image? [Score: 1]


Your answer: (null) The correct answer is [Link] tag.

211. When the average value is selected as the collection mode, the peak values may be
different when users switch the data range. [Score: 1]
Your answer: (null) Correct answer: A. Correct

212. What are the disadvantages of traditional PC office? [Score: 1]


Your answer is (empty) Correct answer: A. High O&M costs

213. Which of the following containerized application management functions are provided by
CCE? [Score: 1]
Your answer: (null) Correct answer: A. Rolling upgrade|B. Elastic scaling|C. Application monitoring|D.
Viewing events

214. Compared with self-built databases, RDS has more costs and O&M workloads. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect

215. Cloud computing is a model that enables the required resources (e.g., computing,
storage, network, applications, and services) to be obtained from the shared pool of
configurable resources anytime, anywhere, conveniently, and on demand. Resources can be
quickly provisioned and released, and the workload of managing resources and interaction
with service providers can be minimized. [Score: 1]
Your answer: (null) Correct answer: A. Correct

216. What operations do I need to perform to enable the created application to be accessed
from the outside? [Score: 1]
Your answer is: (Null) The correct answer is: C. When creating an application, publish the application as a
service.

217. Which of the following statements about the ELB function cannot be implemented?
[Score: 1]
Your answer: (null) Correct answer: D. Layer 2 and Layer 3 data forwarding

218. Which of the following is not a feature of RDS? [Score: 1]


Your answer is: (empty) The correct answer is: A. Expensive OBA costs

219. Which of the following cloud services can be used together with RDS to ensure network
security isolation between RDS instances and other services?
Your answer: (null) Correct answer: [Link]

220. The retention period of monitoring data in different aggregation periods is different.
How long is the retention period of metric data in an aggregation period of 1 hour? [Score: 1]
Your answer: (null) The correct answer is C.155.

221. Which of the following is not an advantage of CES? [Score: 1]


Correct answer: D. Monitoring third-party non-HUAWEI CLOUD services

222. Which of the following commands is used to upload images from the Docker client to
the image repository? [Score: 1]
Your answer: (null) Correct answer: [Link] push
1, ELB provides three types of load balancing algorithms.

@ True

O False

An ECS must be stopped beforeit is used to create an image.


KX

© Tre

@ false

3, RDS does not support data backup orrestoration.

© Tre

© False

6, The ECS have to be stopped when do EVS backup.

O Tne

@ False

5, IMS provides comprehensive and flexible self-service image management capabilities. Users can create a
private image and use it to create an ECS or multiple ECSs.

@ Twe
O False

7, An ECS can be attached with multiple EVS disks.

© Tne

© False

8, WAF detects abnormal requests to prevent networkintrusions such as webpage tampering,information le


and Trojan horse implantation.

@ Te
O False

9. file system can be mounted to ECSsin different VPCs.

© True

@ False
10, Currently, only IPsec VPNs are supported.

© Tne

© False

11, Which of the following operationsis not supported by EVS?

@ A. Capacity reduction

© B. Capacity expansion

© [Link]

© [Link]/Detaching
12, To enable remote RDP access to a created Windows ECS, which ofthe following ports must be opened |
an inboundsecurity group rule?

A5S3
0

B. 33
0

C. 3389
®

D.80
o

13, Which ofthe following is not an advantage of RDS compared withself-built databases?

© Elastic scaling

@ [Link]-installed databases

‘OC. Easy management

‘© D. Instantavailability

14, Which of the following can isolate RDS network resources from other services?

O AECS

© B.0BS

@ [Link]

© [Link]
15, Which SDKlanguage is NOT supported on API Gateway?

@ A Delphi

O BJava

© [Link]

oO Dc

16, Which of the following is not an action of the bandwidthscaling policy?

O [Link]

O BSetto

© [Link]

@ [Link]

17, Whichof the following can monitor SFS performance indicators?

@ Cloud Eye

O B. Auto Scaling

© [Link] Engine

© [Link] Cloud

18, Which ofthe following is not a HUAWEI CLOUD computing service?

© A. Image ManagementService

®@ [Link] File Service

© [Link] Metal Service

O [Link]
19, Which ofthe following is NOT a componentofthe big data platform?

O [Link] Reduce

© [Link]

O [Link]

® [Link]

20. Which ofthe following is used by ECSto store data?

© A. Image

© 8B. Dedicated Cloud

© ©. AutoScaling

@ [Link] disk

21, Which of the following policies can be configured to increase the numberofinstances in an AS groupat
predetermined time each week?

O AAllofthe above

® [Link] policy

© [Link] policy

© [Link] policy

22, To whichofthe following scenarios does OCRapply?

© A. Image recognition

@ 8. Character recggnition

© [Link] recognition

OD. Image processing


23, Which of the following components can be used to set an access controlwhitelist to allow specific IP
addresses to access load balancers?

© A. Backendserver

© 8B. Backend server group

@ [Link]
R
O [Link] check

24, () records operations of VBS resources,facilitating query, audit, and backtracking.

O [Link] Eye

O [Link] Volume Service

© [Link] Tracefgrvice

O D. Object Storage Service

25, Which ofthe following protocols requirescertificates?

@A nugps

O [Link]

© [Link]

O [Link]

26, Which of the following statementabout Direct Connect is incorrect?

O [Link], only the yearly/monthly billing mode is supported.

® B. Direct Connect usestheInternet tunneling technology on the public network.

© . To create a direct connection, users need to create a connection,a virtual gateway, and a virtual interface.

fo} D. Direct Connectis a high-speed, low-latency,stable, and secure dedicated network connection that connectsuser's
local data center to a VPC on a cloud.
27, Which ofthe following key technologies does SA use?

@ [Link]

[Link] authentication

© .£ncryption

@ OD. Web crawlers

28, Which ofthe following CIDR blocks does the VPC service support?

G A.100.0.5/24

@ 8B. [Link]/24

@ Cc. [Link]/23

@ 0. [Link]/24

29. Which ofthe following are advantages of Cloud Eye?

©@ A. Multiple notification types

@ B. Visualized monitoring

@ C. Real-timeand reliable monitoring

@_D. Automatic provisioning

30, Which of the following types of images does IMS support?

@ A Public image

@ [Link] image

O [Link] image

@ [Link] image

31, A file system can be mounted to ().

© Aa Dedicated Computing Cluster (OCC)

OB. Bare Metal Server (BMS)

@ [Link]—cs

@ D.a Windows ECS


32, Which of the following are advantages of Identity and Access Management(|AM)?

(@ Security control

@ 8. Federated identity authentication

(@ C. Agency management

@ D. Permission management

33, Which of the following HUAWEI CLOUD EI APIs are vision-related?

& A. Image recognition

@ 8B. Content Moderation

@ [Link]

@ OD. Face Recognition

34, Which of the following EVS disk types does ECS support?

@ [Link] /0

@ [Link]-high 1/0

@ [Link] Oo

@ [Link]-optimized ultra-high 1/0.

[Link] Points of Current Enterprise IT Infrastructure includes(multiple choices):

A. Slow Business Launch

B. Complicated Lifecycle Management


8

C. High TCO
8

D. 1/0 Bottleneck
[Link] Computing Characteristics include(multiple choices):

A. On-demand self-service

B. Broad networkaccess
8

C. Rapid scalability
8

D. Resource pooling

. Cloud Computing Deployment Models can be(multiple choices):

[Link] cloud

B. Industry cloud
a

C. Rapid cloud
oa

D, Public cloud

1.A regionis a distinct logical area.

O true

@ falseeW

2. An availability zone (AZ) contains one or multiple physical data centers.

@ truev

© false
1
-Huawei Cloud Network Services includes:

A. VPC

O [Link]

Cc. ELB

© [Link]

. Which of the Following Compute Services Does HUAWEI CLOUD Provide?(multiple choices)
=

[Link] Cloud Server(ECS)

B. AutoScaling (AS)

C, Image ManagementService (IMS)

©) [Link] Volume Service (EVS)

-Huawei Cloud Career Certifications includes: (multiple choices)


=

AHCIA

[Link]

CHCIE

OO [Link]

Which belongs to HUAWEI CLOUD Developer Center Ecosystem Catalog? (multiple choices)

A, Developer Contest

B. Cloud Expert

C, Sign-up Platform

D. MVP
1, The ITUAWEI CLOUD Partner Network (I ICPN) is a global partner program for | IUAWCI CLOUD.

© truev

O false

1. You can view, purchase, use, and operate various HUAWEI CLOUD service products after you have logged in to
the management console.

@ truv

O false

2, The management console manages various services such as computing, storage, network, security, management
and deployment, application services, databases,data analysis, enterprise applications, and DevCloud.

@ truev

O false

[Link] is used by an ECSto store data?(single chaice)

© [Link] Scaling

© [Link] Volume Service #

O [Link] Container Engine

© [Link] Eye

1, High-performance computing ECSsprovide a large number of CPU cores, large memory size, and high
throughput.

@ truev

© false

1. Linux OS support key-authenticated ECS logins.

@ truev

© false
1, Which of the following methods does AS use to expand resources?(multiple choice)

A. Dynamically expanding resources

B. Expanding resources as planned

@ C. Manually expanding resources


&

D. Automatically expanding resources

Quiz-2

0 points possible (ungraded)

[Link] Specifies a physical region where resources use independent power supplies and networks. AZs are physically
isolated but interconnected throughan internal network.

@ truev

O false
[Link] supportsthe following instance removal policies:(multiple choices)

[Link] created based onthe oldest configuration

[Link] based onthe oldest configuration

[Link]

[Link]

[Link] ofthe following policies does AS support?(multiple choices)

AAlarm policies

[Link]

[Link] policies

O [Link]
[Link] images can heclassified into: (multiple choices)

[Link] disk image


a

[Link] disk image


a

[Link]-ECS image
a

© [Link]

[Link] the ECS uses a static IP address, configure DHCPforthe ECS,allowingit to dynamically obtain an IP address.

@ truev

O false

1. What image types does IMS support?(multiple choices)

A. Public image

B. Private image

© C. Encrypted image

D. Shared image

[Link] EVSdisks support only basic SCSI read/write commands.

@ truev

© false

[Link] can be attached to:(multiple choices)

© [Link]

[Link]

[Link]

f) DPC
[Link] many servers can a shared EVS disk be attached to at most?(single choice)

OAS

O B7

Oo C8

© D164

[Link] ofthe followings are EVS disk types?(multiple choices)

[Link]-high |/O

[Link] /O

[Link] I/O

O [Link] I/O

[Link] CLOUD provides Cloud Server Backup Service (CSBS) and Volume BackupService (VBS) to protect your
data against:(multiple choices)

[Link]

[Link] deletions

Csoftwarefaults

D. hardwarefaults

[Link] relatively inexpensive, reducing customers’ costs.

@® truev

O false

[Link] provides the data backup function for EVS disks. The created data backupscan beusedto create EVS disks.

@ truev

O false
[Link] Storage Service (OBS) is a stable, secure,efficient, and easy-to-use cloud storageservice.

@ truev

© false

2. The Advantages of Product OBS are:(multiple choices)

A. Stable

B. Efficient

C. Secure

D. Easy to use

1.0BS supportsfine-grained permission control for buckets and objects through bucketpolicies.

© truev

© false

[Link] can collect OBS resource operation records through CTSservice to facilitate future query, audit and
backtracking.

@ ATrueY

O B. False
[Link] SFS include:(multiple choices)

A. File sharing

B, Elastic scalability

C. Superior performance andreliability

D. Durable

. CIFS is a protocol used for networkfile access.


=

@® truev

© false

2. A file system provides users with shared file storage service through NFSor CIFS.

© truev

O false

[Link] ofthe following are the application scenarios of SFS?(multiple choices)

[Link] processing

[Link] management
8

[Link] managementand webdirectories

[Link]-performance computing (HPC)


[Link] of VPC are:(multiple choices)

A. Secure and Reliable

B, Flexible Configuration

C. High-Speed Access

D. Interconnection

1.A VPC providesanisolated virtual network for ECSs.

@® truv

O false

1. Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?(multiple choices)

Customizing CIDR blocks

Customizing access control policies

Accessing the Internet using EIPs

Connecting a local data center using a VPN or Direct Connect connection


[Link] related service includes: (multiple choices)

A. ECS

B. ELB

C. Cloud Eye

D. Cloud Trace Service

[Link] of ELB include: (multiple choices)

A, High availability

B, High flexibility

C. High performance

OD. High I/O speed

[Link] Operations include:(multiple choices)

A, Create, delete, or query load balancers.

B. Add, modify, or deletelisteners.

C. Add or remove backend servers.

D. Create, modify, or delete certificates,

1,Which ofthe following load balancing algorithms are provided by ELB? (multiple chaices)

A. Weighted round robin

B, Weighted least connections

C, Source IP hash

OD, Encryption algorithm


[Link] the following protocols are supported by ELB? (multiple choices)

A. TCP

B. UDP

Cc HTTP

D. HTTPS

[Link] does not support BGP dynamic routing.

© true

® falsew

.In Route Mode, Static route and BGP are supported.

© truev

© false

[Link] Eyeis a monitoringservice that can help you capturethe status of your Direct Connect connections.

® truev

© false

1,Multiple Connections can access One VPC.

@ truev

© false

[Link] is used to establish a secure and encrypted public network communication tunnel between the remote user
and the VPC.

@ truev

O false
[Link] modes does VPN support?(multiple choices)

A. pay by bandwidth

B. pay by networktraffic

OC. Pay by year/month

OD, Pay per use

[Link] VPN connection supports IPsec VPN protocol.

@® truev

© false

1. With data security as its core, HUAWEI CLOUD builds a series of security services to meet the particular
[Link] services include:(multiple choices)

A. Data Security

B. Host Security

C. Application Security

D. Network Security

2. Data Security includes:(multiple choices)

A. DEW

OB. HSS

O ccGs

D. DBSS
[Link] can use Cloud Eye to:(multiple choices)

[Link] of service resources

[Link] the runningstatus of cloud services

[Link] alarm rules and notifications

[Link] resource changes

. Which of the following security services can be usedto protect websites? (Multiple choices)

[Link]

[Link]

[Link]

[Link]-DDoS
8

[Link] Eye Advantagesinclude:(multiple choices)

A. Automatic provisioning

[Link]-time and reliable monitoring


8

[Link] monitoring
3

D. Multiple notification methods


8

1. Server Monitoring includes:(multiple choices)

A. Basic Monitoring

B. OS Monitoring

OC. CPU Monitoring

OD. Disk Monitoring


1. Advantages ofRelational Database Service include:(multiple choices)

A,InstantAvailability

B. High Reliability

C, High Security

D, Elastic Scaling

Which aggregation methods does Cloud Eye support?(multiple choices)

A. Max

B. Min

C. Avg

D. Sum

1. The Key Features of RDS include:(multiple choices)

A, High Availability

B. Backup and Restoration

C. DB Instance Monitoring

D. High security
1. You can reboota DB instance only whenits status is Available.

@® truev

© false

[Link] HUAWEI CLOUD EI services, ModelArtsusesthe self-developed Moxing deep learning framework to
accelerate algorithm developmentandtraining.

@ truev

O false

[Link] Applications in Vision include:(multiple choices)

A. Face Recognition

B. Image Recognition

C. Content Moderation

D. ImageSearch

1,DWSis the Enterprise - Class Data Warehouse.

© truev

© false

1, Massive Repetition Scenario makes you facus on high-valuedservices.

© truevd

O false

1, Opening APIs greatly promotes service innovation and standardization of existing services.

@ truv

O false
2. API Gateway doesn't supportall API integration and opening on HUAWEI CLOUD.

O true

@ falseW

[Link] can enable API Gateway and create and manageAPIs for free.

@® truevd

O false
1. The minimum managementunit of RDSis an instance.
Yeah. Wrong
2. ECS refers to the Auto Scaling (AS) service.
Yeah. Wrong
3. Whatare the key features of IAM?
A. Centralized control of users and security credentials
B. Centralized user access control
C. User group-basedrights
D. Huawei customer service agent maintenance
4. The VPC subnet segment can be modified after being created.
Yeah. Wrong
5. VBS can create backups for EVS disks and use the backupstoroll back EVS
disks, ensuring user data accuracy and security to the maximum extent.
\Yeah. Wrong
6. Which of the following statements about KMS is incorrect?
A. Management cloud platform and tenant key
B. HSM (hardware security module)
C. Multi-layer key protection technology
D. Support for application combination
7. Which of the following doesnot exist in the listener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode

8. On the Dashboard page, you can add or delete monitoring icons of concerned
instances. Supports multi-indicator comparison so that users can view the
Yeah. Wrong
9. Relational Database Service (RDS) users can modify database configurations to achieve optimal performance.
Yeah. Wrong
10. The size of the exported imageis not limited.
Yeah. Wrong
11. The ASservice can only dynamically add or reduce server resources based on the specified time period.
Yeah. Wrong
12. Which of the following statements aboutSFSis correct?
A. A file system can be mountedto an ECS and canbelongtodifferent VPCs.
B. Parameters cannot be modified forthe file system that is successfully created.
C. The file system can access different AZs in the same VPC.
D. The performanceofthe SFS file system improveswith the increase of capacity.
13. Which of the following imagesis a standard image provided by the public cloud platform andisvisible to all users?
A. Public image
B. Private images
C. Shared image
D. Market image
14. The GPUis applicable to graphics rendering and engineering drawingin virtualization environments and desktop cloud scenarios.
Yeah. Wrong
15. Whatare the typesof AS policies?
A. Scheduled policy
B. Periodic policy
C. Alarm policy
|p. Randompolicy
16. Which of the following scenarios are involved in image replication?
A. Copying an unencrypted image to another unencrypted image
B. Replicating an unencrypted image as an encrypted image
C. Replicating an encrypted image as an encrypted image
D. Replicate an encrypted image to an unencrypted one.
17. Allowsusers to set read-only permissions for SFS.
Yeah. Wrong
18. Which of the following load balancing modesare not supportedbylisteners?
A. Maximum number oflinks
B. Polling
C. Set weights.
D. Minimum connection
19. Which of the following methods can be usedto set the access permission for anonymous users of OBS objects?
A. Set an ACL for the OBS bucket.
B. Set the ACL for OBS objects.
C. Set a policy for OBS objects.
D. Set a policy for the OBS bucket.
20. OBS supports batch upload.
Yeah. Wrong
21. WhatAre the Steps for Creating a Windows Image Using an ECS?
A. Configure the Windowsserver.
B. Install Cloudbase-Init.
C. Creating a Windowsprivate image
D. View and clear networkrule files.

22. You must stop the ECS beforeusing it to create an image.


Yeah. Wrong
23. Which of the following is not a major application scenario of VPC?
A. VMs access each other.
B. Desktop cloud access to Huawei Vmall
C. The VM accesses the external network.
D. VPN access to VMs

24. To implement dynamic resource expansion, which of the following policies is


selected when youcreate an AS policy?

A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy
25. Which of the following parameters is used to automatically obtain an IP address during VPC creation?
[Link]
B. Network segment
C. Partitioning
D. Gateway
26. Which of the following is not the application scenario of Cloud Eye?
A. Daily resource management
B. Issue notification
C. Capacity adjustment
D. Operation audit
27. Which of the following is not a capability of DevCloud?
A. Project management
B. Code check
C. Compile and build
D. Data backup
28. Cross-VPCaccessto file system is supported.
Yeah. Wrong
29. WhatAre the ECS Login Authentication Modes?
A. PasswordB. [Link] D. Key pair
30. Huawei provides developers with functional development, which will help
developers integrate the functions developed by Huaweiwith their upper-layer
applications to build differentiated and innovative solutions.

Yeah. Wrong
31. Which of the following are RDS functions?
A. Create a databasecluster.
B. Expand the disk capacity.
C. Adding a read replica
D. Creating or restoring a snapshot
E. Restore the backup to a specified time point.
32. Whichof the following functions are provided by OBS Console?
A. Static website hosting
B. Multi-version control
C. Cross-domain resource sharing
D. Mounting external buckets

33. Attach the EVS disk to an ECS so thatthe disk can be used directly.
Yeah. Wrong
34. Which of the following statements about VBS are correct?
A. After an EVS disk is deleted, its backup datais also deleted.
B. After an EVS disk is deleted, you can use the backup to restore the EVS disk.
C. After an EVSdisk is deleted, you can still use the backup to create the EVSdisk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
35. How Can | Add Instances to an AS Group?
[Link] action
B. Manually add instances.
C. Change the number of expected instances.
D. AS configuration
36. Alarm ni ication is the action taken whenan alarmis triggered. Users can
set or disable alarm notification when creating or modifying an alarm.
Yeah. Wrong
From which aspects doessituational awarenessanalyze security posture?
A. Global perspective
B. User perspective
C. Managementperspective
D. Attacker perspective
38. After an application is created, you can change the application by replacing the image of the application.
Yeah. Wrong
39. ECSsare billed in yearly/monthly or pay-per-use mode.
Yeah. Wrong
40.A policy is configured for OBS bucketA to prevent any user from accessing
objects in the bucket. Bucket A contains object B, which is configured with the
ACL permission to allow anonymous usersto access object B. In this way, users
can access object B anonymously.
Yeah. Wrong
41. Which of the following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and home directory
D. High-performance computing

42. IMS providesflexible self-service and comprehensive image capabilities.


Users can create private images and use imagesto create ECSs in batches or
replicate ECSsin batches.

Yeah. Wrong
43. WhenIPSec VPNis used for communication, the encryption and decryption
check is performed onthe firewalls at both ends.
Yeah. Wrong
44. VBS doesnot support batch backup of EVS disks.
\Yeah. Wrong

45. Identity and Access Management(IAM)


Yeah. Wrong

A. Read permission
B. Write permission
C. ACL permission
D. Modify the ACL permission.
47. Which of the following is the image type converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
48. What are the concepts of VPC?
A. Subnet [Link] C. Security group D. VPN

1. After an ECSis created, the bandwidth used bythe ECS cannotbe changed.
Yeah. Wrong
2. Which ofthe following operations is charged?
A. Create an EIP.
B. Create a subnet.
C. Create a VPC.
D. Create a security group.
3. Which of the following doesnotexistin thelistener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode
4. Whichof the followingis not the target of the cloud computing security service?
[Link]
B. Cloud platform security
C. Data security
D. Service security
5. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and homedirectory
D. High-performance computing
6. Which of the following EVSdisks can be directly created on the EVS console?
A. System disk B. Data disk C. Delta disk D. Mirror disk
The ASservice must be used with Elastic Load Balance.
Yeah. Wrong
8. Which ofthe following statements about VBSare correct?
A. VBS has no quota limit.
B. If the capacity of an EVS disk is expandedafter the disk is backed up, the disk capacity remains unchangedafter the disk is restored using the backup data.
C. If you back up an EVS disk and then expandits capacity, you cannot use the backupto restore the disk
data. This is because the disk spacewill be restored to theoriginal size after the restoration.
D. After the capacity of an EVS disk is expanded,the disk space remains unchangedif the EVS disk is backed up and the backup is usedto restore data.
9. Whatis the full name of ECS?
Elastic Cloud Server

10. WhatArethe Stepsfor Creating a WindowsImageUsing an ECS?


A. Configure the Windowsserver.
[Link] Cloudbase-Init.
C. Creating a Windowsprivate image
D. View andclear networkrulefiles.
11. Which type ofimageis converted from theelastic and server images?
A. Public image
B. Private images
C. Shared image
D. Market image
12. To enable the log management function of an OBS bucket, which ofthe following permissions of the target OBS bucket must be granted to the log delivery user group?
A. Read permission
B. Write permission
C. ACL permission
D. Modify the ACL permission.
13. VPCs can be connected to traditional data centers throughprivate lines or VPNsto flexibly integrate resources.
Yeah. Wrong
[Link] the capacity of the data disk attached to the ECSis insufficient, you must detachthe disk and purchase a new one.
Yeah. Wrong
15. The size of the exported imageis notlimited.
Yeah. Wrong
16. Whichof the following imagesis a standard image provided bythe public cloud platform andisvisible to all users?
A. Public image
B. Private images
C. Shared image
D. Market image

17. The VPC subnet segmentcan be modified after being created.


Yeah. Wrong
18. Which of the following componentsis not a componentofthe big data platform?
[Link]
[Link]
[Link]
DYarn
19. Attach the EVSdisk to an ECS so thatthe disk can be used directly.
Yeah. Wrong
20. The AS service can only dynamically increase or decrease server resources based on a specified period.
Yeah. Wrong
21. SFS cannotbe attached to an ECS running the WindowsOS.
Yeah. Wrong
22. After an ECSis created, you can changeits specifications if they do not meet your requirements.
Yeah. Wrong
23. Whatare the key features of IAM?
A. Centralized control of users and security credentials
B. Centralized user access control
C. User group-based rights
D. Huawei customer service agent maintenance
24. What are the important functions of IKE?
A. Negotiation protocol parameters
B. Protecting traffic security
C. Key negotiation and management
D. Peer identity authentication
25. The managementconsole can be used without login.
Yeah. Wrong
26. Whichofthe following statements aboutVBSis incorrect?
A. VBS is based on the snapshot technology and supports online backup.
B. VBS supportsfull backup and incremental backup.
C. You do not need to stop the server when using a backup to restore an EVSdisk.
D. When backing up EVSdisks, you do not needto stop the server.
27. Whatarethe alarm statuses of Cloud Eye?
A. Alarms B. Normal C. Insufficient dat D. Close
28. What Data Doesan ECS Use?
EVSdisk
29. After the external networktraffic reaches the load balancer, which of the following componentsis the first componentto receive the traffic?
AFirewall [Link] CLVS [Link] Check
30. Whatis the return value whena user-defined monitoring indicator is successfully uploaded using the Open API?
Return value: 201
31. Before creating an imageusingan ECS,ensure that the ECS has been stopped.
Yeah. Wrong
32. The cloud security service system consists offive parts: networksecurity, data security, application security, security evaluation, and security support.
Yeah. Wrong
33. Database Service RDS Users Can Modify Database Configurations to Achieve Optimal Performance
Yeah. Wrong
34. Which ofthe following functions are supported by OBS Browser?
[Link] website hosting
B. Multi-version control
C. Cross-domain resource sharing

35. Whatare the application scenarios of VBS?


A. Hackerattacksorvirus attacks
B. Data is deleted by mistake.
C. Data archiving and retention
D. The application program is faulty.
36. In the cloud computing environment, confidentiality, integrity, and availability are still the fundamental security requirementsof users.
Yeah. Wrong
37. RDS can meet the ever-changing requirementsof the gaming industry, shorten the R&D period, and reduce R&Dcosts.
Yeah. Wrong
38. Multiple EVS disks can be attached to an ECS.
Yeah. Wrong
39. Which of the following statements about SFSare correct?
A.A file system can be mountedto an ECS and can belong to different VPCs.
B. Parametersof created file systems cannot be modified.
C. The file system can access different AZs in the same VPC.
D. The performance of the SFS file system improves with the increase of capacity.
40. Which ofthe following are RDS functions?
A. Create a databasecluster.
B. Expandthe disk capacity.
C. Adding a read replica
D. Creating or restoring a snapshot
E. Restore the backup to a specified time point.
41. Which ofthe following load balancing modesis not supported bylisteners?
A. Maximum nun B. Polling C. Set weights. D. Minimum connection

42. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three times, disable
versioning for the bucket, and upload object aaa for three times. After the preceding operations are
complete, how manyobjectsare displayed in the bucket basic information?
Quantity: 4
43. Whichofthe following statements about Anti-DDoS traffic awarenessis incorrect?
A. Web vulnerability security detection
B. Configures and modifies anti-DDoS parameters for public IP addresses.
C. Provides protection for public IP addresses of ECSs and load balancing devices.
D. Monitors a single public IP addressin the obstetrics department, including the current defense status,
current defense configuration parameters,traffic since 24 hours ago, and one event within 24 hours.

1. If two sites communicate with each otheracross the Internet, IPSec VPN can be deployed on
the firewalls at both sites to protect the mutual accesstraffic betweenthe intranets at the two
sites.
Yeah. Wrong
2. Which ofthefollowing statements about hybrid cloudis incorrect?
‘A. Unified management ofpublic and private cloud resources
B. Service resourcesare migrated betweenthe public cloud and private cloud.
C. Optimal resourceallocationthrough hybrid cloud
D. Applications can only be deployedonthe public cloud.
3. Cloud computing is a modelthatenables users to obtain required resources from the shared
pool of configurable resources anytime, anywhere, and on demand.
Yeah. Wrong
4. All types of HUAWEI CLOUDproducts can be viewed on the managementconsole.
Yeah. Wrong
5. Whichofthefollowing doesnotexist in the configuration for creatinga listener?
A. Load balancer protocol/port
B. VPC
C. HTTPScertificate
D. Load mode
6. Whichofthefollowingis not a major function of WTP?
A. Websitefile protection
B. Alarm information recording
C. Protection details stati S
D. SQLinjection prevention
7. Which of the followingare the main functions of HID?
[Link] cracking detection
B. Remotelogin notification
C. Weak password detection
D. Checkthe database processpermission.
E. Webpage file detection
8. Whentheaveragevalueis selected as the aggregation mode, the peak values may be inconsistent when users switch the data range.
Yeah. Wrong
9. Which of the following statementsis incorrect?
A. Create a folder named br..ra/1 in the OBS bucket.
B. OBS Console supportsbatch deletion of buckets.
C. OBS Console supports batch deletion of objects.
D. A user has created 101 buckets using OBS Console.
10. Whichofthefollowing functionsare provided by the ECS service?
‘A. Users can create and delete VMs, modify VM specifications, andstart and shut down VMs.
B. Users can add and uninstall extension NICs, add EIPs, and attach and detach disks.
C. Users can view information about their ECSs on the management console.
D. Users can set ECS alarm rules.

11. RDS meets the ever-changing requirementsof the gaming industry, shortens the R&D period, and reduces R&D costs.
Yeah. Wrong
12. Which of the following services can work with EVS?
A. Elastic Cloud Server
B. Image ManagementService (IMS)
C. Volume Backup Service (VBS)
D. Cloud monitoring service
13. Application security is an importantpart of the cloud security service. It ensures the
security of elastic cloud computing servers and cloud computing applications running on them
from the perspective of operating system and application security protection.
Yeah. Wrong
14. Which of the following statements about VBS is incorrect?
A. VBS is based on the snapshot technology and supports online backup.
B. VBS supportsfull backup and incremental backup.
C. You do not needto stop the server whenusing a backup to restore an EVSdisk.
D. When backing up EVS disks, you do not need to stop the server.
15. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content managementand home directory
D. High-performance computing
16. Whatare the application scenarios of VBS?
A. Hackerattacks orvirus attacks
B. Data is deleted by mistake.
C. Dataarchiving andretention
D. The application program is faulty.
21. An availability zone (AZ) is a collection of one or more physical data centers with
independentcooling, fire extinguishing, moisture-proof, andelectricity facilities. Within an AZ,
computing, network, storage, and other resourcesare logically divided into multiple clusters.

Yeah. Wrong
22. Which type of image is converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
23. Which of the following operations can be performed by a shared image provider?
A. Sharing a specified image
B. Delete the shared image.
C. Add a tenant to whom an image is shared.
D. Delete the tenant who shares the image.
24. Which of the following statements about the ELB function cannot be implemented?
A. Eliminate single points offailure.
B. Sharing service node pressure
C. Check the health status of service nodes.
D. Layer 2 and Layer 3 data forwarding
25. When enabling Direct Connect, whatis the port type if the port type is 10GE?
Optical port
26. How long doesit take to apply for an ECS?
A few minutes.
27. OBS supports batch upload.
Yeah. Wrong
28. What are the types of EVS disks?
A. More than I/O B. High I/O C. Common |/C D. Optimized 1/0
29. The VPC subnet segment can be modified after being created.
Yeah. Wrong

30. Data security ensures confidentiality and integrity of user data applications and storagein the cloud computing environment.
Yeah. Wrong
31. Before creating an imageusing an ECS, ensurethat the ECS has been stopped.
Yeah. Wrong
32. Users cannotdeployservice applications on ECSsasif they wereusingtraditional servers.
Yeah. Wrong
33. Whichofthefollowingis not a basic concept of ELB?
[Link]
B. Load balancer
C. Listener
[Link] (VM orapplication container)
34. Whichofthefollowingis not the main application scenario of KMS?
[Link] transmission encryption
B. Personal data encryption
C. Coreservice data encryption
D. Key information asset encryption
35. Which of the following statements aboutVBS are correct?
A. After an EVSdisk is deleted, its backup data is also deleted.
B. After an EVSdiskis deleted, it can be restored using a backup.
C. After an EVSdisk is deleted, you can still use the backup to create the EVS disk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
36. Which of the following componentsis not included in the big data platform?
[Link]
[Link]
[Link].
[Link]
41. VPCs can be connected totraditional data centers through private lines or VPNstoflexibly integrate resources.
Yeah. Wrong
42. After an ECSis created,its bandwidth cannot be modified onceit is determined.
Yeah. Wrong
43. The webapplicationfirewall performs anomaly detection on HTTPrequeststo effectively
prevent malicious network intrusion behaviors such as web page tampering, information
leakage, and Trojan horse implantation.
Yeah. Wrong
44, Whatare the advantagesof SFS over traditional file sharing storage?
[Link] sharing
B. Seamlessintegration
C. The operationis simple butthe cost is high.
D. High reliability
45. When multiple VMsare created, you can bind an EIP to multiple VMsto enable the VMsto accessthe Internetat the sametime.
Yeah. Wrong
46. IMSprovidesflexible self-service and comprehensive image managementcapabilities.
Users can create private images and use the imagesto create ECSsor load ECSsin batches.
Yeah. Wrong
47. RDSusers can modify database configurationsto achieve optimal performance.
Yeah. Wrong
48. A policyis configured for OBS bucketA to prevent any userfrom accessingobjectsin the
bucket. Bucket A contains object B, which has an ACLthat allows anonymoususers to access.
Then,users can access object B anonymously.
Yeah. Wrong
49. Alarm notificationis the action taken whenan alarm is triggered. Users can setor disable
alarm notification when creating or modifying an alarm.
Yeah. Wrong

1, Whatare the componentsof an ECS?


[Link] B. Memory C. MirrorinD. Elastic Volume Service
2. What operations do | need to perform to enable the created application to be accessed from the external network?
A. The numberof nodesin the cluster exceeds 2.
B. The memory of each node exceeds 2 GB.
C. Release an application as a service when creating the application.
D. The Elastic Load Balance must be bound.
3. How Long DoesIt Take to Apply for an ECS?
A few minutes.
A. Which ofthe following protocols are important in the IPSec framework?
AIP [Link] CAH [Link].
5. Whatare the types of VPNs based onservice usage?
[Link] VPN
[Link] VPN
[Link] VPN
D.Lay2 and Lay3 tunnel VPN
6. Attach the EVS disk to an ECS.
Yeah. Wrong
7. Which ofthe following statements about VBSis incorrect?
A. VBS is based on the snapshot technology and supportsonline backup.
B. VBS supportsfull backup and incremental backup.
C. You do not need to stop the server when using a backup to restore an EVS disk.
D. Whenbacking up EVSdisks, you do not need to stopthe server.
8. EVS disks can be used only with ECSs.
Yeah. Wrong
9. Whencreating multiple VMs, you can bind oneEIP to multiple VMsto enable them to accessthe Internet at the sametime.
Yeah. Wrong
10. Whencreating an ECS, youcan use thefile injection function provided by the system toinitialize the ECS.
Yeah. Wrong

11. Which ofthe following statements about Anti-DDoStraffic cleaning is incorrect?


A. Webvulnerability security detection
B. Configures and modifies anti-DDoS parameters for public IP addresses.
C. Provides protection for public IP addresses of ECSs andload balancing devices.
D. View the monitoring capability of a single public IP address.
12. Which ofthe following are the main functions of HID?
A. Brute force cracking detection
B. Remote login notification
C. Weak password detection
D. Check the database process permission.
E. Web pagefile detection
13. What computing services does Huawei public cloud provide?
[Link]
B. Elastic Cloud Server
C. Image ManagementService(IMS)
D. Elastic Volume Service
14. The webapplicationfirewall performs anomaly detection on HTTP requeststo effectively prevent mal us network intrusion behaviors such as web page
tampering, information leakage, and Trojan horse implantation.
Yeah. Wrong
15. Which of the following statementsaboutthe positioning of Huaweicloud servicesare correct?
Focus onthelaaSlayer, enable the PaaS layer, and aggregate the SaaSlayer.
16. To enable the log managementfunction of an OBS bucket, whichof the following permissionsof the target OBS bucket must be granted to the log delivery user group?
A. Read permission
B. Write permission
C. ACLpermission
D. Modify the ACL permission.
17. VBScan create backups for EVS disks and use the backupstoroll back EVSdisks, maxi \g user data accuracy andsecurity.
Yeah. Wrong
18. Which of thefollowing statements aboutthe ELBfunction cannot be implemented?
A. Eliminatesinglepointsoffailure.
B, Sharing service nodepressure
C. Health checkfor service nodes
[Link] 2 andLayer 3 data forwarding
19. Cloud computing is a modelthat enables users to obtain required resourcesfrom the shared pool ofconfigurable resources anytime, anywhere,and on demand.
Yeah. Wrong
20. Which ofthefollowingis not a majorfunction of Anti-DDoS?
A. DDoSattack protection
B. Monitoring a single IP address
C. Report on interceptionof a single IP address
[Link] scan ECS vulnerabilities.

21. How Can I Add Instances to an AS Group?


A. Scaling action
B. Manually add instances.
C. Modify the expectedinstance
D. ASconfiguration
22. The SFScan controlthe read-only permission ofusers.
Yeah. Wrong
23. Which ofthe following statements about health check are correct?
[Link] no recovery is received within the timeoutperiod,a failure is considered.
B. Check whetherthe path protocol supports HTTPS.
C. Whenthe numberoffailures exceeds the health threshold, the service is unavailable.
D. When the number offailures exceeds the unhealthy threshold, the service is unavailable.

The ASservice must be used with Elastic Load Balance.


Yeah. Wrong
25. Whichofthe following service resource metrics can be monitored by Cloud Eye?
[Link] private cloud
B. Elastic computing service
C. Distributed cache service
D. Elastic Load Balance
26. IPSec VPNis an encrypted tunnelcalculation. It uses encrypted security services to establish confidential and secure communication tunnels betweendifferent
networks. Whichof the following is not the feature that ensures packet transmission on the public network?
A. Timelines B. Integrity C. AuthentiD. Confidentiality
27. How Can| Monitor ECSs?
A. Cloud Container Engine
B. Cloud Eye
C. Elastic scaling
[Link] private cloud
28. Whichofthe following aggregation modesis supported by instance monitoring in Cloud Eye?
A. Maximun [Link] dif C. Standarc D. Average
29. Whatis the maximum numberof alarm rules thatcan be configured?
1000 records
30. Whichofthe followingload balancing modesare not supported bylisteners?
A. [Link] _C. Set weig D. Minimum connection
31. Whichofthe followingis not a major function of SIS?
[Link] level assessment
B. Active and passive security concepts
[Link] configuration evaluation
[Link] collection
32. Whatare thetypes of ASpolicies that can be configured for AS?
3 types
33. VPCscanbe interconnected withtraditional data centers throughprivate lines or VPNs to flexibly integrate resources.
Yeah. Wrong
34, Which of the following services can be used together with RDS to ensure network security isolation between RDSinstances andotherservices?
[Link] [Link] [Link], [Link]
35. Which of the following shared file systems can be directly deleted?
[Link] B. Unavailabl C. Deleting D. Deletionfailed.

36. Which of the following statements about SFS are correct?


A. A file system can be mountedto an ECS and can belongto different VPCs.
B. Parameters of created file systems cannot be modified.
C. The file system can access different AZs in the same VPC.
D. The performance of the SFSfile system improves with the increase of capacity.
37. Which of the following constitute the Huawei public cloud ecosystem?
A. Application market
B. Developer community
C. Partners
D. Huawei and service certification engineers
38. Which ofthe following imagetypes are supported by IMS?
A. Public image
[Link] images
C. Shared image
[Link] mirroring
39. Multiple EVS disks can be attached to an ECS.
Yeah. Wrong
40. The GPUis applicable to graphics rendering and engineering drawingin the virtualization environment and desktopcloud scenarios.
Yeah. Wrong
41. Whichofthe followingfunctions are supported by OBS Browser?
A. Static website hosting
B. Multi-version control
C. Cross-domain resourcesharing
D. Mounting external buckets
42. Networksecurity, as an importantpart of cloud security services, implementsnetworkisolation to cope with network attacks and ensure network security.
Yeah. Wrong
43. Whichofthe following statements is incorrect?
A. Create a file named br..ra/1 in the OBS bucket.
B. OBS Console supports batch deletion of buckets.
C. OBS Consolesupportsbatch deletion of objects.
D. A userhas created 101 buckets using OBS Console.
44, How manytypesofusers canlog in to Huawei Enterprise Cloud?
2 types
45. How Many EVSDisks Can Be Attached to an ECS?
10 PCS
46. Whenan EVSdiskis detached from an ECS, the data on the EVS disk will be lost.
Yeah. Wrong
47. Whichofthe following parameters is used to automatically obtain an IP address during VPC creation?
[Link] B. Network C. Partition D. Gateway
48. If the capacity of the data disk attached to the ECSis insufficient, you must detach the disk and purchase a new one.
Yeah. Wrong
49. Whichofthe following EVSdisks can be directly created on the EVS console?
A. System d B. Data disk C. Delta dis D. Mirrordisk
50. Which ofthe following is not an advantage of CES?
A. Real-time
B. Save money
C. Multiple notification modes
D. Monitoring third-party non-HUAWEI CLOUDservices
51. Relational Database Service (RDS) users can modify database configurations to achieve optimal performance.
Yeah, Wrong
52. The AS service automatically adjusts service resources based on service requirementsand policies.
Yeah. Wrong
53. What CanI Do If the Disk Capacity of an ECSIs Insufficient?
A. Detachinga disk
B. Reinstall the operating system.
C. Expandthedisk capacity.
D. Changethe operating system.
Questions & Answers PDF Page-1

Huawei
H13-511_V4.0 Exam
HCIA-Cloud Computing V4.0 Exam

[Link]
Questions & Answers PDF Page-2

Product Questions: 253


Version: 7.0

Question: 1

In Huawei FusionCompute, the administrator can view the DVS port to which the virtual machine is
connected.

A. TRUE
B. FALSE

Answer: B

Question: 2

When creating a port group in Huawei FusionCompute, the following operation is wrong

A. Set the VLAN ID to "5000" / 1-4094 total 4096 0-4095


B. Set the name of the port group to "ceshi"
C. Set the port type to "Ordinary" // access ordinary trunk relay
D. Add "This is the test port" in the description

Answer: A

Question: 3

In Huawei FusionCompute, adjusting virtual machine specifications is not supported when cloning a
virtual machine.

A. TRUE
B. FALSE

Answer: B

Question: 4

The memory and CPU resources used by virtual machines in Huawei FusionCompute can only be
provided by the same cluster. Therefore, the maximum available computing resources for virtual
machines cannot exceed the sum of resources available to all hosts in the cluster

[Link]
Questions & Answers PDF Page-3

A. TRUE
B. FALSE

Answer: B

Question: 5

The following options are characteristic of the era of cloud computing 1.0 (multiple choices)

A. Agile application development and life cycle management


B. Focus on virtualization products
C. Standardization and automation of resource services
D. Use virtualization technology to improve resource utilization

Answer: B. D

Question: 6

In Huawei FusionCompute, the role of the uplink is.

A. Assign an IP address to the virtual machine


B. Connect virtual and physical networks
C. Manage virtual machine MAC addresses
D. Detecting the status of the virtual network card

Answer: B

Question: 7

The following description of cloud computing is correct

A. Cloud computing is a technology that enables IT resources to be obtained anytime, anywhere,


conveniently, and on demand
B. Various IT resources in cloud computing need to be paid to use
C. IT resources obtained in cloud computing need to be used through the network
D. In the process of obtaining IT resources, users need to repeatedly negotiate with cloud computing
service providers

Answer: A

Question: 8

In the development of the Internet, there are many milestone events. The order of the milestone
events in the following options is normal.

[Link]
Questions & Answers PDF Page-4

A. The establishment of TCP / IP protocol specifications-ARPANET is born-www is officially open to


the public-DNS is born
B. www is officially open to the public-the birth of DNS-the establishment of TCP / IP protocol
specifications-the birth of ARPANET
C. The birth of ARPANET-the establishment of TCP / IP protocol specifications-the birth of DNS-www
is officially open to the public
D. The birth of DNS-the establishment of TCP / IP protocol specifications-the birth of ARPANET-www
is officially open to the public

Answer: C

Question: 9

Cloud computing is the product of the development of the Internet and computing technology, so
cloud computing must be inseparable from the network.

A. TRUE
B. FALSE

Answer: A

Question: 10

The description of the relationship between Host Machine and Guest Machine is correct (multiple
choice)

A. After using virtualization technology, one guest machine can use the resources of multiple host
machines at the same time.
B. After using virtualization technology, a guest machine can only run on the host machine that
created it
C. After using virtualization technology, a Host Machine can only run one Hypervisor
D. After using virtualization technology, multiple guest machines can run on one host machine

Answer: C. D

Question: 11

The following are computing virtualization (multiple choices)

A. CPU virtualization
B. Network virtualization
C. Memory virtualization
D. I / O virtualization
E. Disk virtualization

Answer: A. C. D

[Link]
Questions & Answers PDF Page-5

Question: 12

KVM (Kernel-based Virtual Machine) virtual machine can run on other virtualization platforms after
format conversion
on. A

A. TRUE
B. FALSE

Answer: A

Question: 13

In the Huawei FusionCompute architecture, what belongs to the Host Machine role is

A. CNA
B. UVP
C. KVM
D. VRM

Answer: A

Question: 14

In the following description, the advantages of virtualization are (multi-select)

A. After using virtualization, multiple virtual machines can run on one physical host at the same time.
B. After using virtualization, the CPU utilization of a physical host can be stabilized at about 65%
C. After using virtualization, virtual machines can be migrated between multiple hosts
D. After using virtualization, multiple applications can run on the operating system of a physical host.

Answer: A. C

Question: 15

The following description about KVM (Kernel-based Virtual Machine) is correct (multiple selection)

A. KVM is type II virtualization


B. KVM is a type I virtualization
C. KVM is a module in the Linux kernel
D. KVM is an open source virtualization technology

Answer: A. C. D

[Link]
Questions & Answers PDF Page-6

Question: 16

In KVM-type virtualization, the following description is correct (multi-select)

A. Guest OS can be Windows


B. Guest OS can be Linux
C. Host OS can be Windows
D. Host OS can be Linux

Answer: A. B. D

Question: 17

In Huawei FusionCompute, users can manage VMs in multiple ways:

A. Log in to the virtual machine directly for management


B. Use the graphical interface for management after logging into CNA
C. Use the graphical interface for management after logging in to VRM
D. Use the command line to manage after logging in to CNA

Answer: A. C. D

Question: 18

Virtualization technology can improve the utilization of hardware resources, reduce operation and
operation and maintenance costs, and cloud computing also has these advantages.
Therefore, cloud computing and virtualization technology are inseparable. // Cloud computing is not
equal to virtualization

A. TRUE
B. FALSE

Answer: B

Question: 19

Computing virtualization has different classifications from different perspectives, which can be
divided into type I and type II virtualization, and can also be divided into full virtualization and
paravirtualization.

A. TRUE
B. FALSE

Answer: A

[Link]
Questions & Answers PDF Page-7

Question: 20

In Huawei FusionCompute, the following can only be used as non-virtualized storage: ()

A. NAS
B. FusionStorage
C. local disk
D. SAN

Answer: B

Question: 21

The weakest data redundancy of the following RAID levels is ()

A. RAID 1
B. RAID 6
C. RAID 0
D. RAID 5

Answer: C

Question: 22

Which of the following is not included in the NAS architecture?

A. Volume management module


B. Status verification module
C. file system
D. Network interface

Answer: D

Question: 23

For scenarios such as archives that need to store large amounts of data for a long time, but do not
need to read frequently, it is recommended Type of disk?

A. SAS disk
B. NL-SAS disk
C. SATA disk
D. SSD disk

Answer: C

[Link]
Questions & Answers PDF Page-8

Question: 24

A SATA disk is a disk using a parallel interface type, and a SAS disk is a disk using a serial interface
type.

A. TRUE
B. FALSE

Answer: B

Question: 25

In RAID 5 and RAID 6, the number of failed disks is

A. 3, 2
B. 2, 1
C. 1, 2
D. 2, 3

Answer: C

Question: 26

The following can achieve computer virtualization in the era of cloud computing 1.0 and improve
resource utilization

A. KVM
B. Xen
C. Hyper-v
D. OpenStack

Answer: B

Question: 27

After KVM uses Virtio, the description of the I / 0 forwarding process is correct [multiple choices]

A. I / 0 requests are sent directly from the front-end driver to the back-end driver
B. I / 0 requests are no longer forwarded via QUEM
C. I / 0 requests will be more efficiently forwarded
D. I / 0 requests need to be forwarded by the KVM module

Answer: A. C

Question: 28

[Link]
Questions & Answers PDF Page-9

If an enterprise uses a hybrid cloud, the devices that cannot be used as the demarcation point
between public and private clouds are

A. Core switch
B. Firewall
C. Virtual switch
D. Flow cleaning equipment

Answer: A. C

Question: 29

Open source virtualization technologies are all type I virtualization, and closed source virtualization
technologies are all type II virtualization

A. TRUE
B. FALSE

Answer: B

Question: 30

The following description about the characteristics of type I (bare metal) computing virtualization is
correct [multiple choices]

A. Applications can run directly on VMM


B. Hypervisor runs directly on physical hardware
C. Both applications and virtual machines can run directly on the Host OS
D. Application cannot run directly on Host Machine

Answer: B. D

Question: 31

In Huawei FusionCompute, the correct step to delete storage resources is


1. Delete or virtual machine disk
2. Disassociate the host
3. Delete storage resources
4. Destroy data storage

A. 3 ---> 2 ---> 4 ---> 1


B. 2 ---> 4 ---> 1 ---> 3
C. 1 ---> 2 ---> 3 ---> 4
D. 1 ---> 4 ---> 2 ---> 3

[Link]
Questions & Answers PDF Page-10

Answer: D

Question: 32

To configure the IP SAN for the host, you usually need to configure the host on the storage device to
enable the host to be mapped on the IP SAN Shoot.

A. ISCSI Target
B. ISCSI Server
C. ISCSI Client
D. ISCCSI Initiator

Answer: D

Question: 33

The essence of the Internet of Things is the Internet. As long as hardware or products are connected
to the network, data interaction can be called the Internet of Things

A. TRUE
B. FALSE

Answer: A

Question: 34

In Huawei FusionCompute, FusionStorage can be used as a virtualized storage

A. TRUE
B. FALSE

Answer: B

Question: 35

In Huawei FusionCompute, when a compute node is powered off, the system can have HA on the
computer node.
Attribute virtualization is pulled up on other computer nodes. Among the following options, it is not
necessary to implement this function:

A. The virtual machine is not bound to the host


B. The source and destination computing nodes use shared data storage,
C. The cluster to which the compute node belongs opens HA
D. Virtual machines with HA attributes on the compute nodes all use the same network segment IP

[Link]
Questions & Answers PDF Page-11

Answer: D

Question: 36

In computing virtualization, the operating system running in a virtual machine is called Host OS.

A. TRUE
B. FALSE

Answer: B

Question: 37

With the development of AI technology, almost every technology now involves artificial intelligence.
Which of the following is now AI?
Application area? [multiple choices]

A. Appease the robot


B. Voice recognition
C. Image Identification
D. NLP (Neuro-Linguistic Programming)

Answer: A. B. C. D

Question: 38

In Huawei Fusioncompute, administrators can discover storage devices by scanning or manually


refreshing.
[Link]
B. FALSE
Answer: B

Question: 39

In Huawei FusionCompute, when a host in the cluster fails, the virtual machine on that host will
automatically
Automatic migration to other hosts in the cluster

A. TRUE
B. FALSE

Answer: B

Question: 40

[Link]
Questions & Answers PDF Page-12

The following are CIFS descriptions that are correct

A. CIFS supports multi-user access


B. CIFS has low requirements for the reliability of network transmission. It can use both TCP / IP and
UDP protocols.
C. CIFS requires clients to have special software installed
D. CIFS retains file format characteristics

Answer: A

Question: 41

In Huawei FusionCompute, if the server has a small number of physical NICs, you can consider
merging multiple planes.
, Using a VLAN to logically isolate each plane A

A. TRUE
B. FALSE

Answer: A

Question: 42

The following description about the cluster, host and virtual machine in Huawei FusionCompute is
incorrect

A. Determine whether the hosts belong to the same cluster depends on whether you use unified
shared storage
B. A cluster is made up of multiple hosts and their associated storage and network resources
C. Virtual machines can be migrated across clusters
D. Hosts can be moved between different clusters

Answer: C

Question: 43

In Huawei FusionCompute, the configuration mode of the most storage-efficient virtual machine disk
loading is

A. General
B. Independent-persistent
C. Streamline
D. Independent-non-persistent

Answer: C

[Link]
Questions & Answers PDF Page-13

Question: 44

The following description about virtualized storage and non-virtualized storage is correct

A. Virtualized storage is more secure than non-virtualized storage


B. Virtualized storage is better than non-virtualized storage
C. Read and write performance of non-virtualized storage is better than virtualized storage
D. Non-virtualized storage scales better than virtualized storage

Answer: C

Question: 45

Which of the following technologies or equipment cannot isolate broadcasts

A. Router
B. VLAN
C. Hub
D. Firewall

Answer: C

Question: 46

Memory reuse technology is a prerequisite for QoS implementation of memory resources.

[Link]
B. FALSE
Answer: A

Question: 47

What is incorrect about the VIMS file system description below? D

A. VIMS is compatible with FC SAN, IP SAN, local disk


B. VIMS is the technical foundation for advanced features such as thin disks, snapshots, and storage
migration
C. VIMS is a high-performance cluster file system
D. VIMS is a universal storage virtualization file system

Answer: D

Question: 48

[Link]
Questions & Answers PDF Page-14

The SAN provides the host with a "bare disk" without a file system. What file system is built on it
depends entirely on the host's operating system.

A. TRUE
B. TRUE

Answer: B

Question: 49

The following description about the differences between physical switches and virtual switches is
incorrect (B)

A. virtual switch runs on a physical server, and the physical switch has separate hardware
B. The virtual switch cannot operate on the VLAN tag, and the physical switch can operate on the
VLAN tag
C. A virtual switch cannot be configured with a Layer 3 interface, and a physical switch can be
configured with a Layer 3 interface
D. Virtual switches also require certain hardware resources for their normal operation

Answer: B

Question: 50

In Huawei Fusion Compute, the following description of the number correspondence between
virtual machines and DVS is correct (multiple selection)

A. When a virtual machine has a network card, the network card can only be associated with one
DVS
B. When a virtual machine has multiple network cards, each network card can be associated with a
DVS
C. When there are multiple NICs in a virtual machine, multiple NICs can be associated with the same
DVS.
D. When a virtual machine has a network card, the network card can be associated with multiple
DVSs.

Answer: A. B. C

Question: 51

The configuration of a Huawei switch port is as follows:


Interface (GigabitEhernet 0/0/1)
Port link-type trunk
Port trunk allow-pass vlan 16 17
According to the above configuration, the following statement is correct (D)

[Link]
Questions & Answers PDF Page-15

A. Data frame containing vlan 16 label will be stripped and forwarded when passing through the port
B. Data frames that do not contain any labels are dropped when passing through the port
C. When a data frame that does not contain any tags passes through the port, it will be tagged with
VLAN 16 or VLAN 17 and
Forward
D. Data frames containing VLAN 17 tags will be tagged and forwarded as they pass through the port

Answer: D

Question: 52

In Huawei FusionCompute, the following incorrect technical description of CPU QoS is (C)

A. The role of "reservation" is to ensure the lower limit of the computing power of the virtual
machine, that is, how much resources are used at least
B. "Shares" is used to calculate resources based on the relative CPU share values ​of multiple virtual
machines when computing resources are insufficient.
Source balance and adjustment
C. "limit" is used to specify the maximum number of hosts
D. By adjusting the "Reservation", "Share", "Restriction", to achieve control of the virtual machine
CPU resource usage

Answer: C

Question: 53

In Huawei Fusion Compute, to facilitate unified management, each DVS must be configured with a
management IP address.

A. TRUE
B. TRUE

Answer: B

Question: 54

Artificial intelligence is a new research and development theory, method, technology and application
system used to extend artificial intelligence.
Technical science, the following statement about artificial intelligence is wrong (D)

A. Artificial intelligence is not social


B. Artificial intelligence is an unconscious mechanical physical process
C. Artificial intelligence does not have the dynamic creativity unique to human consciousness
D. Artificial intelligence is a technology for items to exchange information through network
connectivity

[Link]
Questions & Answers PDF Page-16

Answer: D

Question: 55

In Huawei FusionCompute, when a virtual machine installs an operating system by mounting a local
image file, the administrator can close the VNC window at any time without affecting the reading of
the image. A

A. TRUE
B. TRUE

Answer: A

Question: 56

The following incorrect description of memory reuse is (B)

A. memory reuse technology can make the sum of virtual machine memory specifications larger than
the sum of physical server specifications
B. memory reuse technology can make the total memory used by virtual machines larger than the
total memory of physical server specifications
C. After the C memory reuse function is enabled, the memory reuse rate is inversely proportional to
the actual memory usage of each virtual machine.
D. memory reuse single technology includes memory bubbles, memory swap and memory sharing

Answer: B

Question: 57

In Huawei FusionCompute, the following description of the virtual machine HA is correct (multi-
selection) ABC

A. Virtual machine HA function can quickly restore business when a failure occurs
When system
B. detects the blue screen of the virtual machine and configures the processing strategy as HA. the
system will choose another normal computing node for reconstruction
virtual machine
C. After HA is enabled in the cluster, virtual machines can be rebuilt on other hosts after a host failure
As long as resources are reserved in the D cluster, virtual machines with HA attributes can be rebuilt
on other computing nodes when a fault occurs
success

Answer: A. B. C

Question: 58

[Link]
Questions & Answers PDF Page-17

Which of the following scenarios is not applicable to snapshots? B

A. Business Destructive Test


B. Long-term preservation of business data
C. Business Patch Upgrade
D. Major business changes

Answer: B

Question: 59

Which of the following technologies on a switch can increase link speed?

A. LDAP
B. LACP
C. VLAN
D. VXLAN

Answer: B

Question: 60

The following incorrect description of virtualization is (multi-select)

A. network virtualization refers to distributed virtual switches


B. Storage virtualization refers to distributed storage
C. In cloud computing, IaaS layer virtualization can be divided into computing virtualization, storage
virtualization, and network virtualization
D. Computing virtualization includes CPU virtualization, memory virtualization, and IO virtualization

Answer: A. B

Question: 61

CPU virtualization technology can be divided into full virtualization, paravirtualization, software
virtualization, and hardware-assisted virtualization.

A. TRUE
B. TRUE

Answer: A

Question: 62

In Huawei FusionCompute, virtual machines using non-virtualized storage do not support the

[Link]
Questions & Answers PDF Page-18

snapshot function.

A. TRUE
B. TRUE

Answer: B

Question: 63

IoT devices can be connected to the Internet and can be controlled via the Internet.

A. TRUE
B. TRUE

Answer: A

Question: 64

Some virtualization technologies are open source, and some are closed source. The same is true for
cloud computing management platforms. Open source cloud computing management platforms
need to be implemented using open source virtualization technology.

A. TRUE
B. TRUE

Answer: B

Question: 65

In Huawei FusionCompute, in addition to configuring static routes, DVS also supports multiple
dynamic routes.

A. TRUE
B. TRUE

Answer: B

Question: 66

In Huawei FusionCompute, the default alarm level does not include ()

A. Normal
B. emergency
C. hint
D. secondary
E. important

[Link]
Questions & Answers PDF Page-19

Answer: A

Question: 67

Create a virtual machine by importing it in Huawei FusionCompute. The following file formats are
not supported ()

A. ova
B. qcow2
C. ovf
D. vmdk

Answer: D

Question: 68

The configuration of a Huawei switch port is as follows:


Interface GigabitEhernet 0/0/1
Port link-type access
Port default vlan 16
According to the above configuration, the following statement is correct

A. This port will add a VLAN 16 tag to the data frames that pass by
B. This port allows only data with vlan 16 tags to pass through.
C. The port will strip the VLAN 16 label of the passing data frame and forward it.
D. The port will not do any operations on the data frames passing by.

Answer: C

Question: 69

In Huawei FusionCompute, to improve VRM reliability, which of the following deployment methods
is recommended?

A. active / standby deployment


B. single node deployment
C. hybrid deployment
D. active-active deployment

Answer: A

Question: 70

Which of the following is not a feature of big data 4V

[Link]
Questions & Answers PDF Page-20

A. Value
B. Varitey
C. Valid
D. Volume
Answer: C

Question: 71

Which of the following statements about the relationship between cloud computing and the Internet
of Things is incorrect?

A. Without cloud computing support, the Internet of Things cannot perform data transmission
B. Cloud computing is the cornerstone of the development of the Internet of Things, and at the same
time, the Internet of Things continues to promote the development of cloud computing
C. Cloud computing can provide enough storage space for massive data of the Internet of Things
D. If there is no cloud computing as the basic support, the work efficiency of the Internet of Things
will be greatly reduced

Answer: A

Question: 72

Storage virtualization technology can improve storage utilization and provide storage resources for
multiple virtual machines.

A. Yes
B. wrong

Answer: A

Question: 73

In Huawei FusionCompute, which of the following actions takes effect immediately?

A. Read and write directly to the newly bound disk


B. Install Tools
C. Disk capacity reduction
D. Remove the network card

Answer: D

Question: 74

The virtual switch plays an important role in communicating between virtual machines and is an
indispensable component

[Link]
Questions & Answers PDF Page-21

A. Yes
B. wrong

Answer: A

Question: 75

The following description about making templates in FusionCompute is incorrect .

A. "Virtual machine to template" is to directly convert a virtual machine into a template, all
parameters use the current configuration of the virtual machine
The virtual machine will no longer exist after conversion
B. When using a virtual machine to make a template, the status of the virtual machine can be
"running"
C. "Clone a template as a template" is to copy the template as a new template and support
adjustment of some parameter configurations, which can be slightly different from the original
template
The difference is that the template still exists after cloning is complete
D. "Clone a virtual machine as a template" is to copy the virtual machine as a template and support
adjustment of some parameter configurations, which can be compared with the original virtual
machine.
The virtual machine is slightly different. The virtual machine still exists after cloning is complete.

Answer: B

Question: 76

In Huawei FusionCompute, if a virtual machine is bound to a host, the functions that will be affected
are (multi-select) .

A. DRS
B. Memory Hot Add
C. Thermal migration
D. Snapshot

Answer: A. C

Question: 77

The way FusionCompute Installer deploys VRM virtual machines is ().

A. ISO file automatic installation


B. Import the template file to the virtual machine
C. Automatically create virtual machines and automatically mount ISO files for installation
D. PXE automatic installation

[Link]
Questions & Answers PDF Page-22

Answer: B

Question: 78

In Huawei FusionCompute, the description of the "shared" type disk is correct (multi-select).

A. The virtual machine to which this type of hard disk is bound does not support the snapshot
function
B. This type of hard disk can only be bound to one virtual machine
C. The virtual machine does not support changing datastores on such hard disks
D. This type of hard disk can be bound to multiple virtual machines

Answer: A. C. D

Question: 79

The following description of NFS is correct ().

A. No special software is required for NFS clients


B. NFS cannot set user permissions
C. NFS supports multi-user access
D. NFS is a stateful protocol

Answer: C

Question: 80

Memory reuse technology cannot be implemented () .

A. Enable memory reuse technology. The higher the reuse ratio, the better the performance of the
virtual machine.
B. Enabling memory reuse technology can improve the deployment of virtual machines on physical
hosts
C. If the user's virtual machine memory usage is high, you can optimize it by modifying the memory
reuse ratio
D. Enabling memory reuse technology, the total memory of all virtual machines created by the user
can exceed the physical memory

Answer: A

Question: 81

The function of the Internet of Things is only to collect data generated by various things.

A. Yes
B. wrong

[Link]
Questions & Answers PDF Page-23

Answer: B

Question: 82

Which device in the physical network is capable of routing and forwarding?

A. Hub
B. Layer 2 switch
C. Router
D. Physical server NIC

Answer: C

Question: 83

In cloud computing, the network can be divided into two parts: virtual network and physical
network.

A. Yes
B. wrong

Answer: A

Question: 84

In FusionCompute, the following description about deleting a security group is incorrect .

A. Authorization between the security group to be deleted and other security groups does not affect
the deletion
B. There are no virtual machines in the security group. If there are virtual machines in the security
group, you need to remove the virtual machines from the security group.
C. After the security group is deleted, all the security group rules in the group are deleted at the
same time
D. When you delete a security group to which a virtual machine belongs, the other security groups
have no effect on the virtual machine.

Answer: C

Question: 85

Intelligent memory reuse technology (memory bubble, memory swap, memory sharing) can be
customized to turn on / off any of the functions according to customer needs

A. Yes
B. wrong

[Link]
Questions & Answers PDF Page-24

Answer: B

Question: 86

In Huawei FusionCompute, a disk of a virtual machine needs to be modified. The following


operations can be implemented .

A. Modify the disk capacity from 80GB to 8GB


B. Change the disk configuration mode from "Thin" to "Normal"
C. Change disk mode from "slave" to "independent-persistent"
D. Change the status of the disk from "Available" to "Unavailable"

Answer: C

Question: 87

In Huawei FusionCompute, DPM must rely on DRS before it can be used.

A. Yes
B. wrong

Answer: A

Question: 88

The following incorrect description of iSCSI and Fibre Channel is ().

A. The FC protocol is completely heterogeneous with the existing Ethernet and has poor
compatibility.
B. iSCSI runs on Ethernet based on TCP / IP protocol and can be seamlessly integrated with existing
Ethernet
C. FC has a longer transmission distance than TCP / IP
D. From the perspective of the transport layer, Fibre Channel uses the FC protocol, and iSCSI uses the
TCP / IP protocol.

Answer: C

Question: 89

The following are not part of snapshot management .

A. Copying a snapshot
B. Modifying a snapshot
C. Create a snapshot
D. Delete a snapshot

[Link]
Questions & Answers PDF Page-25

Answer: A

Question: 90

Use a template in Huawei FusionCompute to deploy multiple virtual machines in batches

[Link]
B. FALSE
Answer: A

Question: 91

In Huawei fusion compute, all virtual machine NICs that join the same security group use this
security group filtering. To improve security, you need to add the same network card to multiple
security groups. B // A network card is only assigned to one security group

A. TURE
B. FALSE

Answer: B

Question: 92

A virtual machine can have multiple virtual network adapters at the same time, corresponding to
different virtual switches.
[Link]
B. FALSE
Answer: A

Question: 93

Which of the following virtual machine disk file formats does Huawei fusioncompute not support? A

A. VMDK
[Link]
[Link]
D.QCOW2

Answer: A

Question: 94

[Link]
Questions & Answers PDF Page-26

In fusioncompute, the virtual switch is connected to the physical network via ().

[Link]
B. Virtual network card
C. Port group
D. Uplink

Answer: D

Question: 95

The rules in the security group will be deleted along with the security group
[Link]
B. FALSE
Answer: B

Question: 96

What types of storage virtualization can be divided into? (Multiple choices)

A. Application-level virtualization
B. Block-level virtualization
C. Page-level virtualization
D. File-level virtualization

Answer: B. D

Question: 97

The process of creating a file system on a disk is often referred to as

A. Packaging
B. Formatting
C. RAID
D. Partition

Answer: B

Question: 98

The necessary conditions for a virtual machine to communicate with other virtual machines are
(multiple choice)

A. Configure a fixed IP address for the virtual machine


B. Configure the correct IP address for the virtual machine
C. Configure the correct MAC address for the virtual machine

[Link]
Questions & Answers PDF Page-27

D. Configure the gateway address for the virtual machine

Answer: B. C

Question: 99

In Huawei FunsionCompute, the operations that can be performed on VRM are (multi-select)

A. RAID RAID
B. Converting virtualized storage to non-virtualized storage
C. Manually add storage devices to the virtual machine
D. Add SAN storage as non-virtualized storage

Answer: C. D

Question: 100

The VLAN ID (except 0) configured for DVS in Huawei FunsionCompute needs to exist on the physical
switch, otherwise it will affect the normal communication of the virtual machine.

A. TRUE
B. TRUE

Answer: B

Question: 101

The following description of the Hypervisor is correct

A. Hypervisor is virtualization
B. Hypervisor is essentially an operating system
C. Hypervisor carries a large number of drivers, so the Hypervisor does not need to install drivers and
patches
D. Hypervisor is the key to computer virtualization

Answer: D

Question: 102

Create a new disk in Huawei FusionCompute, which of the following operations is incorrect

A. Set the disk type to "normal" and the disk mode to "independent-non-persistent"
B. Set the disk configuration mode to "Thin" and the disk mode to "Independent-Persistent"
C. Set the disk mode to "independent-non-persistent" and change the raw device mapping to
"supported"
D. Set the disk configuration mode to "Thin" and the disk mode to "Independent-Non-persistent"

[Link]
Questions & Answers PDF Page-28

Answer: C

Question: 103

If a virtual machine wants to communicate with other virtual machines, which of the following
options is necessary?

A. Need to configure port binding on the physical server


B. Port binding needs to be configured on the physical switch
C. The physical server where the virtual machine is located needs to be networked
D. Need to add at least one network card to the virtual machine

Answer: D

Question: 104

The picture describes the service model

A. IaaS
B. DaaS
C. PaaS
D. SaaS

Answer: A

Question: 105

Which of the following methods are generally supported by a physical switch for remote
management (multiple selection)

A. Telnet
B. SSL
C. Web
D. SSH

Answer: A. C. D

Question: 106

What is right about VNC is (multiple choice)

A. VNC needs to support Linux operating system


B. The controlled computer needs to install the corresponding software to become a VNC server
C. VNC is a lightweight remote control software
D. The host that initiates the control request needs to install the corresponding software to become a

[Link]
Questions & Answers PDF Page-29

VNC server

Answer: B. C

Question: 107

The following Hypervisor description is incorrect

A. In virtualization, Hypervisor and VMM are a concept


B. In virtualization, Hypervisor can run directly on Host Machine
C. In virtualization, Hypervisor can monitor the status of the guest machine
D. In virtualization, only Hypervisor has direct access to physical resources

Answer: D

Question: 108

Which of the following scenarios is not recommended to enable the memory reuse function?

A. Ordinary office cloud hosting


B. Telecommunications business hall
C. Graphic workstation
D. Bank window office

Answer: C

Question: 109

NUMA is a memory architecture designed for multiprocessor computers. Memory access time
depends on
Processor location, under NUM
A. the processor accesses its own local memory faster than non-local memory (the memory is
located in
Another processor, or shared memory between processors) is faster.
A. TRUE
B. FALSE

Answer: A

Question: 110

The following are the north-south traffic (multi-select)

A. Traffic generated by virtual machine live migration


B. Traffic between virtual machines accessing each other across data centers
C. Traffic generated by customers accessing data center business via the Internet

[Link]
Questions & Answers PDF Page-30

D. Traffic between virtual machines inside the data center

Answer: B. C

Question: 111

What you can do in Huawei FusionCompute (multi-selection)

A. Convert virtual machines from other virtualization platforms into virtual machines available to
FusionCompute
B. Cloning a virtual machine
C. create a virtual machine
D. delete the virtual machine

Answer: B. C. D

Question: 112

Data packets in the cloud computing virtual network need to be routed and forwarded by routers in
the physical network. / TOR switch

[Link]
B. FALSE
Answer: B

Question: 113

ISCSI is a standardized protocol based on the _____ protocol and the SCSI instruction set. It is widely
used in many storage networks using the ____ architecture.

A. FC IP SAN
B. TCP / IP FC SAN
[Link] FC SAN
D. TCP / IP IP SAN

Answer: D

Question: 114

Cloud computing is the product of the development of parallel computing, grid computing, and
distributed computing. The correct description of the relationship between the four is

A. Grid computing is completely replaced by the emergence of distributed computing


B. Cloud computing is a type of distributed computing
C. Parallel computing, network computing and distributed computing are all cloud computing
D. Grid computing completely replaces parallel computing

[Link]
Questions & Answers PDF Page-31

Answer: C

Question: 115

In Huawei FusionCompute, the traditional network equipment corresponding to DVS is

A. Router
B. Hub
C. Layer 2 switch
D. Layer 3 switch

Answer: C

Question: 116

The following description of the characteristics of cloud computing resource pooling is correct

A. Cloud computing resource pooling is a prerequisite for achieving extensive network access
B. Cloud computing resource pooling feature can put CPU and hard disk in the same resource pool
C. Cloud computing resource pooling characteristics can shield the differences between similar
resources
D. Cloud computing resource pooling features must rely on virtualization technology to achieve

Answer: C

Question: 117

Templates can be used to quickly deploy virtual machines. Currently, templates can only be made by
converting or cloning virtual machines.

A. TRUE
B. FALSE

Answer: B

Question: 118

In Huawei FusionCompute, a virtual machine can have multiple virtual network adapters.

A. TURE
B. FALSE

Answer: A

[Link]
Questions & Answers PDF Page-32

Question: 119

During the snapshot creation process, you can perform other operations on the virtual machine.

[Link]
B. FALSE
Answer: B

Question: 120

If VM A can ping VM B. which of the following can be inferred?

A. Virtual machine A and virtual machine B use the same network segment
B. Both virtual machine A and virtual machine B are configured with the correct IP addresses
C. Virtual machine A and virtual machine B use different network segments
D. Virtual machine A and virtual machine B run on the same physical host

Answer: B

Question: 121

In Huawei FusionCompute, the following description about the hot migration is incorrect

A. Live migration includes virtual machine live migration and disk live migration
B. Use the technology of rapid replication of memory data and shared storage during the hot
migration of virtual machines to ensure the number of virtual machines
Data unchanged
C. Storage live migration can only be performed within the same storage device under storage
virtualization management
D. The types of virtual machine live migration are divided into change host, change datastore, and
change host and datastore

Answer: C

Question: 122

In Huawei FusionCompute, DRS rules do not take effect for virtual machines bound to USB devices.
[Link]
B. FALSE
Answer: A

Question: 123

In Huawei FusionCompute, the way to create a virtual machine is (multi-select)

[Link]
Questions & Answers PDF Page-33

A. Other virtual platform import


B. deployment using templates
C. clone using an existing virtual machine
D. Create a new virtual machine directly

Answer: B. C. D

Question: 124

Common disk arrays include (multi-select)

A. MAID (massive arrays of Idle disks)


B. RAID
C. JBOD (Just a bunch of Idle disks)
D. SBOD (Switch of bunches Idle disks)

Answer: B. C

Question: 125

Memory reuse is a resource allocation scheme that increases the density of virtual machines on a
single host, reduces costs, and sacrifice performance for density.

[Link]
B. FALSE
Answer: B

Question: 126

FC SAN, which is not the advantage of IP SAN compared to the following?

A. convenient bandwidth expansion


B low construction cost
C. long transmission distance
D. high transmission efficiency

Answer: D

Question: 127

Virtualization description is correct

A. VMM runs in Guest Machine


B. VMM runs directly on Host Machine
C. VMM runs on Guest OS

[Link]
Questions & Answers PDF Page-34

D. VMM runs on Host OS

Answer: D

Question: 128

The following description of KVM and Xen is correct (multi-select)

A. Xen virtual machines can be converted into KVM virtual machines


B. Domain 0 and Domain U are concepts in KVM
C. KVM and Xen are both open source hypervisors
D. KVM and Xen can run in the same Host OS

Answer: A. C

Question: 129

When installing Huawei FusionCompute, which storage is recommended for VRM deployment?

A. NAS
B. FC SAN
C. IP SAN
D. Local Disk

Answer: D

Question: 130

The following incorrect description of the template is

A. After the virtual machine is cloned as a template, the virtual machine still exists
B. Custom parameters when deploying virtual machines using templates
C. After converting the template to a virtual machine, the template no longer exists
D. Templates can be used across virtualization platforms

Answer: D

Question: 131

In cloud computing, different types of hardware of the same type can form a resource pool.

A. TRUE
B. FALSE

Answer: A

[Link]
Questions & Answers PDF Page-35

Question: 132

The following description of Huawei Virtual Switch is correct ()

A. The virtual switching function of the intelligent network card is also provided by Huawei Virtual
Switch
B. Huawei virtual switch is open source open vSWitch
C. If Huawei distributed switch has multiple virtual ports, each port has its own attributes
D. Huawei virtual switches are divided into standard virtual switches and distributed virtual switches

Answer: B

Question: 133

The following incorrect description of hot and cold migration is () .

A. Hot migration is the migration of virtual machines running from one host to another king machine,
business will not occur during the migration process Break.
B. In the performance test-reliability test, there are tests for virtual machine migration, including hot
migration, cold migration, migration duration,
Duration of business interruption.
C. Cold migration is to migrate a virtual machine in a stopped state from one host to another host,
and business will be interrupted during the migration process.
D. both hot and cold migrations will migrate memory and disk data

Answer: D

Question: 134

In Huawei FunsionCompute, the incorrect description of virtual machine migration is

A. The communication between the source host and the destination host is normal
B. destination storage for different storage devices
C. virtual machine status is "running"
D. destination host must have sufficient resources

Answer: C

Question: 135

In Huawei FunsionCompute, the following incorrect description of the host storage interface is

A. supports two methods of adding interfaces manually and adding in batches.


B. By adding multiple storage interfaces, multi-path transmission of storage can be achieved
The IP address of the

[Link]
Questions & Answers PDF Page-36

C. storage interface can be on the same network segment as the management plane
D. Local hard disk and FC SAN can be connected to the storage device without adding a storage
interface.

Answer: A

Question: 136

Virtual machines are generally composed of virtual machine configuration information and disk files.
Users can move the two files to implement virtual machines running on different physical hosts.
What are the characteristics of cloud computing described above? (Multiple choices)

A. Partition
B. isolation
C. independent
D. Encapsulation

Answer: A. B. C. D

Question: 137

The following are not KVM (Kernel-Based Virtual Machine) management tools: ()

A. QEMU
B. Virsh instruction set
C. Virt-Manager
D. Libvirt

Answer: A

Question: 138

The following description of virtualization is correct

A. Virtualization and non-virtualization cannot exist in the same data center at the same time
B. Applications that can run on physical machines must also run on virtual machines
C. Virtualization can improve the uniformity of hardware resources
D. Virtual machines using different types of virtualization technology can be converted to each other

Answer: C

Question: 139

In computing virtualization, the CPU and memory allocated to the virtual machine is (multi-select)

A. Hypervisor

[Link]
Questions & Answers PDF Page-37

B. VMM
C. Guest OS
D. Host OS

Answer: A. B

Question: 140

KVM virtual machines can be created through a graphical interface or created using the command
line.

A. True
B. False

Answer: A

Question: 141

Using virtualization technology can virtualize a physical server into multiple virtual machines,
thereby improving the hardware performance of the physical server. B

A. True
B. False

Answer: B

Question: 142

In a Linux virtual machine. The one who can manage the logical volume is B

A. OVM
B. LVM
C. PVM
D. DVM

Answer: B

Question: 143

In Huawei FusionCompute, the following incorrect description of port groups and security groups is D

A. A virtual machine NIC is connected to a virtual port in the port group, and a virtual machine NIC is
associated with a security groupA
B. B-port group is a collection of one or more virtual ports on a DVS, while a security group is a
collection of one or more rules
C. A DVS can have multiple port groups and a VM can be protected by multiple security groups

[Link]
Questions & Answers PDF Page-38

D. Security groups are based on port groups to protect virtual machines /// virtual network cards

Answer: D

Question: 144

Which of the following network file sharing protocols does the NAS support (multiple choice)

A. CIFS
B. NFS
C. NTFS
D. FTP

Answer: A. B

Question: 145

Switches can be divided into access switches, aggregation switches, and core switches according to
their usage. Virtual switches belong to aggregation switches Switch

A. True
B. False

Answer: B

Question: 146

In actual work, which function can VLAN implement

A. The virtual machine IXUS belonging to the same VLAN uses the IP address of the same address
segment, otherwise it cannot communicate normally
B. The virtual machines of the two departments cannot communicate with each other after using
different VLANs
C. virtual machines belonging to the same VLAN can use IP addresses in different address segments
and can use broadcasts to discover each other
D. virtual machines belonging to different VLANs can use the same IP address without address
conflicts

Answer: A

Question: 147

If two virtual machines can ping each other, the network device that will be used in the
communication process is

A. Distributed Virtual Machine Switch

[Link]
Questions & Answers PDF Page-39

B. Physical switch
C. Physical network card
D. Virtual network card

Answer: D

Question: 148

In KVM, there are two ways for the virtual machine NIC to connect to the physical network: and ()

A. bridging, address translation


B. address translation, pass-through
C. bridge, pass-through
D. pass-through, bridge

Answer: A

Question: 149

In Huawei FusionCompute, the following incorrect descriptions of security groups and rules are

A. Security group rule changes need to be manually applied to virtual machines in the security group
B. must create a security group before adding rules
C. security group denies all by default before adding rules
D. The premise of deleting a security group is that there are no virtual machines in the security group

Answer: A

Question: 150

When you use a template to quickly deploy a virtual machine, you do not need to install the
operating system or configure it, so you save a lot of time and effort.

A. True
B. False

Answer: A

Question: 151

In Huawei FusionCompute, the following incorrect description of CPU resource QoS is

A. CPU reservation defines the minimum computing resources allocated when multiple virtual
machines compete for physical CPU resources
B. CPU quota defines the allocation of computing resources by priority when multiple virtual
machines compete for physical CPU resources

[Link]
Questions & Answers PDF Page-40

C. CPU shares define how multiple virtual machines allocate computing resources proportionally
when competing for physical CPU resources
D. CPU reservation only works when a virtual machine competes for computing resources. If no
competition occurs, the virtual machine can exclusively occupy the physical CPU resources.

Answer: B

Question: 152

In Huawei Fusion Compute, the following incorrect description of memory reuse is

A. The administrator can enable or disable the memory reuse function at any time.
B. After the memory reuse function is turned off, the internal sum of all virtual machines is less than
or equal to the total available physical memory
C. Using memory reuse can degrade virtual machine performance
D. Turning off memory reuse requires that the memory reuse rate of all hosts in the cluster is less
than or equal to 100%

Answer: C

Question: 153

The following incorrect description of the security group application scenario is

A. By setting security group rules, you can control permissions on folders in the virtual machine
B. By setting a security group rule, you can only allow remote login of virtual machines to specific IP
addresses
C. By setting security group rules, you can protect virtual machines from being accessed
D. By setting a security group rule, you can make the virtual machine inaccessible to the FTP server

Answer: A

Question: 154

What is incorrect about the snapshot description is

A. A virtual machine can create multiple snapshots. When you use a snapshot to restore a virtual
machine, subsequent snapshots become invalid.
B. Snapshots can save both virtual machine settings and virtual machine disk data
C. All virtual machines on a host can only create one memory snapshot at the same time
D. Snapshots can save the state of virtual machine memory

Answer: A

Question: 155

[Link]
Questions & Answers PDF Page-41

When using the same Window template to quickly deploy a virtual machine, the SIDs generated may
be consistent. As a result, some special software will fail when installed

A. True
B. False

Answer: A

Question: 156

In the OpenStack solution, which module does the load provide for persistent block storage?

A. Swift // Object Storage


B. Glance /// Quick storage
C. Nova // Compute node life cycle
D. Cinder

Answer: D

Question: 157

In Huawei FusionCompute, when multiple virtual machines are writing to the same shared disk at
the same time, in order to prevent data loss, it is necessary to ensure the application software's
access control to the disk

A. True
B. False

Answer: A

Question: 158

The following incorrect description of Huawei FusionCompute HA is

A. If the data of the virtual machine is stored in shared storage, the data saved in the event of a
failure will not be lost
B. This function supports automatic restart after a virtual machine failure
C. The system periodically detects the status of the virtual machine. When a virtual server fails due to
a physical server failure, the system can migrate the virtual machine to another physical server and
restart it to ensure that the virtual machine can recover quickly
D. administrator can set different HA policies according to the importance of the virtual machine

Answer: B

Question: 159

[Link]
Questions & Answers PDF Page-42

Set the VLAN ID of the port group to 10 in Huawei FusionCompute (multi-selection)

A. untagged the data frame with VLAN 10 tag passing the port group and forwarded it
B. Data frames passing the port group with a VLAN 10 tag are re-labeled with a VLAN ID and then
forwarded.
C. Drop data frames passing the port group with a non-VLAN 10 tag
D. VLAN 10 tagged data frames passing through this port group are forwarded

Answer: A. C. D

Question: 160

In Huawei FusionCompute, what is incorrect about the IMC function description is

A. It is recommended to enable the IMC function when the CPU models of the CNA hosts in the
cluster are inconsistent.
B. Enabling IMC cannot ensure that the virtual machine is successfully migrated between hosts with
different CPU models.
C. IMC only supports migration from lower version CPU feature set to higher version
It is recommended to enable the IMC function when the main frequency of the CNA hosts in the
cluster is inconsistent.

Answer: C

Question: 161

In Huawei FusionCompute, after the data is deleted inside the virtual machine, the disk size will not
be automatically reduced. The next time the user writes again, the internally released space will be
used.

A. True
B. False

Answer: A

Question: 162

In Huawei FusionCompute, the operation of creating a disk using IP SAN includes


Create storage resource
2. Add a storage port on the host
3. Add a data store
4. Create a disk
The correct sequence of operations is
A.1-3-4-2
B. 4-2-1-4
C.1-2-3-4

[Link]
Questions & Answers PDF Page-43

D.2-1-3-4
Answer: D

Question: 163

Huawei FusionCompute can sense the use of global physical resources during the running of a virtual
machine, and use an intelligent scheduling algorithm to calculate the best host suitable for the
virtual machine to run, and run the virtual machine on the best host by means of hot migration,
Thereby improving the global business experience

A. True
B. False

Answer: A

Question: 164

Common external storage solutions are

A. DAS
B. NAS
C. NFS
D. SAN

Answer: B. C

Question: 165

SSD disks are mechanical hard disks, which have the advantages of fast read and write speeds, low
power consumption, and light weight, but they have a limited life span

A. TRUE
B. FALSE

Answer: B

Question: 166

Among the following RAID levels, the highest utilization of disk space is

A. RAID 0
B. RAID 6
C. RAID 1
D. RAID 5

[Link]
Questions & Answers PDF Page-44

Answer: A

Question: 167

Where did the user apply for a cloud hard drive on the Huawei public cloud? The service model
belongs to

A. IaaS
B. DaaS
C. PaaS
D. SaaS

Answer: A

Question: 168

The role of the following VLANs is incorrect:

A. Enhance network security


B. Increase physical switch interface bandwidth
C. Isolated broadcast domain
D. Improve the robustness of the network

Answer: B

Question: 169

Both CPU resource QoS and memory multiplexing technologies use different strategies to rationally
allocate resources

A. True
B. False

Answer: A

Question: 170

Which of the following requirements can be fulfilled by Huawei FusionCompute DRS

A. Windows virtual machine automatically restarts after a blue screen


B. A host in the cluster is unavailable. The virtual machines running on this host are automatically
migrated to the odd host.
C. Require a virtual machine to run on a specific host
D. When the virtual machine configuration does not meet business needs, the management system
automatically increases CPU resources for the virtual machine

[Link]
Questions & Answers PDF Page-45

Answer: C

Question: 171

The following scenarios that are not suitable for increasing the memory reuse ratio are

A. Memory reuse in commercial scenarios has reached 150%


B. Reduce customer hardware procurement costs
C. While ensuring performance, customers require a single host to deploy the maximum number of
virtual machines
D. Virtual machine memory utilization is low

Answer: A

Question: 172

In Huawei FusionCompute, after enabling the automatic computing resource scheduling function,
the reason for the migration of the virtual machine may be (multi-select)

A. Windows virtual machine blue screen and processing policy is "HA virtual machine"
B. An application running on a virtual machine crashes
C. The administrator manually migrates according to the system prompt
D. The system automatically migrates according to the scheduling policy

Answer: A. C. D

Question: 173

What is included in the virtual NUMA (multiple choice)

A. Load balancing, considering the node correlation during the scheduling process, and the
corresponding relationship between the node and the physical node, to ensure the VCPU access to
local content to the greatest extent
B. Place the site, check the NUMA topology of the virtual machine, and select the physical node
mode VCPU and memory, so the relationship between VCPU and memory in nide has always been
physical.
C. The topology is [Link] NUMA is recognized in the temporal part of the virtual machine. The
guestOS and the NUMA optimization function take effect.
D. Dynamic migration, when the affinity between the VCPU and the physical node changes, trigger
the migration of its corresponding Vnode memory

Answer: A. B. C. D

Question: 174

Fog computing is a distributed computing model that extends the concept of cloud computing to the

[Link]
Questions & Answers PDF Page-46

edge of the network to support mobile and IoT and geographically distributed applications. The
following incorrect statement about fog calculation is

A. Fog computing can quickly generate big data and reduce latency at the edge of the network
B. Fog computing can temporarily buffer data and reduce network pressure
C. Fog computing provides more reliable network and physical device security than cloud computing
D. Fog computing can reduce the bandwidth consumed in the core Internet and limit the movement
of data to the local network

Answer: C

Question: 175

The following option is not an element of artificial intelligence is

A. Computing power
B. Perceptual analysis
C. Big data
D. Scenario

Answer: B

Question: 176

Artificial intelligence is the research and development of concepts, methods, technologies and
application systems for simulation extension and expansion of artificial intelligence.
A new technology science, the following false statement about artificial intelligence is

A. Artificial intelligence does not have the dynamic creativity unique to human consciousness
B. Artificial intelligence is a technology for items to communicate with each other through the
network
C. Artificial intelligence is not social
D. Physical processes that are unconscious mechanical

Answer: B

Question: 177

Set the port group VLAN ID to 0 in Huawei FusionCompute for

A. Set the vlan label of the data frame passing through the port group to 0
B. Allow only data frames tagged with vlan 0 to pass through this port group
C. Allow 0 VLAN tagged data frames to pass through this port group
D. No modification is made to the data frames passing through this port group

Answer: D

[Link]
Questions & Answers PDF Page-47

Question: 178

In Huawei FusionCompute, the following measurement factors for computing resource scheduling
are incorrectly described as

A. When set to "CPU", the scheduling policy is triggered when the CPU conditions are met
B. When set to "memory", the scheduling policy is triggered when the memory conditions are met
C. When set to "CPU and Memory", the scheduling policy is triggered when the CPU or memory
conditions are met
D. When set to "CPU and memory", the scheduling policy is triggered only when the CPU and
memory conditions are met

Answer: D

Question: 179

In Huawei FusionCompute, virtual machines using raw device mapping type data storage are not
supported (multiple selection)

A. Snapshot
B. CPU Hot Add
C. Storage thin provisioning
D. Storage live migration

Answer: A. C

Question: 180

The following description of the relationship between virtualization and cloud computing is correct
(multiple choices)

A. Without cloud computing, there is no value in virtualization


B. Virtualization is a technology, and cloud computing is a service model. Virtualization has promoted
the development of cloud computing.
C. Without virtualization, cloud computing has no value
D. Virtualization is one of the important technologies for cloud computing

Answer: B. C. D

Question: 181

The following are the main driving forces for the emergence and development of virtualization
technologies:

A. The emergence of the Internet

[Link]
Questions & Answers PDF Page-48

B. Reduce the failure rate of hardware resources


C. make full use of hardware resources
D. Improve the recognition of hardware resources

Answer: C

Question: 182

Virtualization is divided into computing virtualization, storage virtualization and network


virtualization, corresponding to cloud computing cloud host, cloud storage, cloud network

A. yes
B. wrong

Answer: A

Question: 183

Features of virtualization include partitioning, isolation, encapsulation and standalone A

A. yes
B. wrong

Answer: A

Question: 184

Which of the following options are KVM (multiple choice)

A. Libvirt
B. Domain 0
C. QEMU
D. ESXI

Answer: A. C

Question: 185

The following options belong to open source virtualization technology:

A. FusionCompute
B. vSphere
C. KVM
D. Hyper-v

[Link]
Questions & Answers PDF Page-49

Answer: C

Question: 186

Among the following options, the correct description of the characteristics of cloud computing on-
demand self-service is

A. The cloud computing service provider only needs to prepare all the services, and the remaining
work is completely done by the user.
B. In the process of using cloud computing, users need to solve all problems by themselves
C. After the user has determined the cloud computing service he needs, he can complete the
application for cloud computing resources alone.
D. Users do not need to explain to service providers when using cloud computing resources.

Answer: C

Question: 187

The reason computing virtualization technology can improve application reliability is (multiple
choice)

A. The virtual machine hosting the application is decoupled from the hardware. You can use the
virtual machine to migrate between multiple physical hosts.
B. Use computer virtualization technology to automatically allocate virtual machines that host
applications to physical hosts with sufficient resources
C. Use computing virtualization technology to enable multiple applications to run on a physical host
at the same time
D. Use computing virtualization technology to automatically adjust virtualization specificationsk

Answer: A. B

Question: 188

In Huawei's FusionCompute, the system disk of the virtual machine cannot be unbound

A. TRUE
B. FALSE

Answer: B

Question: 189

The following description of distributed storage is correct

A. The disks of the distributed storage come from the x86 architecture disk array.
B. The disk of the distributed storage comes from a personal PC

[Link]
Questions & Answers PDF Page-50

C. The disks of the distributed storage come from x86 architecture servers
D. The disks of the distributed storage come from the x86 architecture virtual machine

Answer: C

Question: 190

The following description of RAID is correct (multiple choice)

A. RAID6 compared with RAID5, data recovery stronger, but the decline in literacy disk
B. when after a damaged disk, RAID5 the other disk still work, is unaffected disk I / O performance
C. RAID are to improve I / O performance of the storage system by concurrent read and write data on
a plurality of disks
D. RAID storage space can be regarded as composed of two or more disks, the disk capacity available
capacity for the sum

Answer: B. C

Question: 191

RAID 6 on the basis of enhanced RAID 5 disk fault tolerance, can allow two disk failures, but not less
than the number of disks required 4

A. TRUE
B. FALSE

Answer: A

Question: 192

In the following description, in line with the characteristics of the virtual package (multiple) the

A. The configuration file of the virtual machine contains information such as CPU type and quantity.
B. Virtual machines can be migrated from one physical host to another
C. Multiple virtual machines can run on one physical host at the same time
D. If a virtual machine has multiple hard disks, each hard disk will generate a corresponding disk file

Answer: A. B. D

Question: 193

In Huawei FusionCompute, the tools installed for the virtual machine have nothing to do with the
type and version of the operating system used by the virtual machine // System-dependent

A. TRUE

[Link]
Questions & Answers PDF Page-51

B. FALSE

Answer: B

Question: 194

As FusionCompute, which one of the following options do not belong CPU resources QoS
parameters?

A. CPU share of resources


B. CPU resource limits
C. CPU resource reservation
D. CPU resource reuse

Answer: D

Question: 195

The main purpose on open NUMA functions are correct is ()

A. optimize memory access performance of the virtual machine


Computing capacity B. to maximize the physical host CPU
C. to maximize the physical memory of the machine multiplexing rate
VCPU computing power of D. maximize virtual machine

Answer: A

Question: 196

As FusionSphere, the disk thin provisioning can be achieved is (multiple choice)

A. thin provisioning and virtual storage operating system, hardware has nothing to do, so as long as
the use of virtual image management system, will be able to achieve disk thin provisioning
B. does not currently support NTFS formatted virtual machine disk recovery // NTFS does not support
online recovery
C. providing virtual disk space monitoring and recovery features
D. to provide data storage capacity warning threshold may be set, generating a warning when the
storage capacity exceeds the threshold value

Answer: A. C. D

Question: 197

In FusionCompute, when adding multiple hosts to shared storage, the following operations are
correct (choose) the

[Link]
Questions & Answers PDF Page-52

A. Select all hosts when associating storage devices


B. Check the corresponding host when adding data storage
C. when the shared memory type is IP SAN, and storage to ensure storage network interface to a host
service in communication
D. Select all hosts when initializing storage resources

Answer: B. C. D

Question: 198

What's incorrect in NUMA's description is ()

A. Guest NUMA is to identify the Guest OS and its internal applications by presenting the NUMA
structure to the virtual machine.
NUMA structure to achieve the purpose of improving application performance
B. NUMA technology makes CPU access similar to the speed of memory in Node and the speed of
access to memory in other Nodes
C. Host NUMA mainly provides a CPU load balancing mechanism to resolve VM performance
bottlenecks caused by imbalanced CPU resource allocation.
D. Host NUMA guarantees VM access to local physical memory, reduces memory access latency, and
can improve VM performance

Answer: C

Question: 199

For FusionCompute, the following incorrect description of the template format is

A. .ovf is the description file of the virtual machine and .vhd is the disk file of the virtual machine
B. The virtual machine template format is divided into two types: ova and ovf.
C. ovf format template contains only one ovf file and one vhd file
D. Format template contains only one file after export

Answer: D

Question: 200

It is found in FusionCompute that the IP address of a Windows virtual machine is [Link], the
possible reason is

A. The IP address of the virtual machine is set manually


B. The IP address of the virtual machine is manually set to [Link]
C. The virtual machine's IP address is assigned by DHCP
D. Tools are not installed on the virtual machine

[Link]
Questions & Answers PDF Page-53

Answer: D

Question: 201

For FusionCompute, the incorrect description of the hardware of the bare device is ()

A. Disks mapped using raw devices perform best


B. The operating system is recommended to be installed on a disk that uses the raw device mapping
function.
C. A data store using raw device mapping intelligently corresponds to a LUN on the SAN storage
D. A data store using raw device mapping can only correspond to one disk

Answer: B

Question: 202

In FusionCompute, the virtual network adapter of each virtual machine is connected to the port of
the virtual switch. In order to facilitate the user to configure and manage multiple ports at the same
time, divide the ports with the same network attributes into the same port group

A. TRUE
B. FALSE

Answer: A

Question: 203

In-use memory exchange refers to using virtual memory or external storage for the virtual machine,
and storing temporarily unused data on the virtual machine to external storage. When the system
needs to use this data, it is then exchanged with data reserved in memory Exchange

A. TRUE
B. FALSE

Answer: A

Question: 204

For FusionCompute, the following incorrect description of storage-related concepts is

A. A physical storage device can be used as a storage resource


B. Logical unit in the physical storage corresponding to the storage device, such as a LUN
C. Data storage can be IP SAN, FC SAN, NAS, etc. //
D. VHD is the virtual machine disk file format

[Link]
Questions & Answers PDF Page-54

Answer: C

Question: 205

For FusionCompute, you can create snapshots for CNA hosts.

A. TRUE
B. FALSE

Answer: B

Question: 206

FusionCompute performs a virtual machine change host live migration operation. The following
description is not a limitation of it

A. The status of the virtual machine must be "running"


B. The destination host cannot be in maintenance mode
C. Cannot mount "shared" disks
D. The virtual machine cannot use "raw device" type data storage

Answer: C

Question: 207

In FusionCompute, the administrator binds the two network adapters of the CNA host in the active /
standby mode. After binding, the transmission rate is equal to the sum of the transmission rates of
the two network ports.

A. TRUE
B. FALSE

Answer: B

Question: 208

The correct description of the extensive network access characteristics of cloud computing is ().
[Multiple choice]

A. Through the network, users can use self-purchased cloud computing resources through different
terminals
B. Through the network, users can use self-purchased cloud computing resources at any time
C. Through the network, users can check the status of self-purchased cloud computing resources at
any time
D. Through the network, users can use self-purchased cloud computing resources in different
locations

[Link]
Questions & Answers PDF Page-55

Answer: A. B. C. D

Question: 209

When a virtual machine on a physical host fails, it will not affect other virtual machines on the
physical host. Which characteristic of virtualization technology is this?

A. Isolation
B. Division
C. Independence
D. Packaging

Answer: A

Question: 210

Which of the following scenarios does virtualization apply to? [Multiple choice]

A. A company has a total of ten business systems, and the host resource utilization of these services
is less than 20%
B. A scientific research institution uses a customized operating system to ensure the confidentiality of
scientific research results
C. An enterprise needs a high-load, intensive computing environment
D. The daily use of desk applications by employees in a unit is highly similar

Answer: A. C. D

Question: 211

The following description of Virt-manager is correct. [Multiple choice]

A. Virt-manager is a KVM virtual machine management command set


B. Virt-manager is an open source KVM virtual machine management tool
C. Virt-manager is a commercial KVM virtual machine management tool
D. Virt-manager is a graphical management tool for KVM virtual machines

Answer: B. D

Question: 212

In a NAS environment, multiple hosts writing to a file at the same time will cause data consistency
issues.

A. True
B. False

[Link]
Questions & Answers PDF Page-56

Answer: A

Question: 213

If virtual machine A and virtual machine B run on different physical servers, which physical device
must be used in the communication process? (Multiple choice)

A. Virtual NIC
B. Virtual Switch
C. Physical switch
D. Physical network card

Answer: A. B. C. D

Question: 214

. A virtual machine can have multiple virtual NICs at the same time, corresponding to different virtual
switches

A. True
B. False

Answer: A

Question: 215

In Huawei FusionCompute, the following incorrect description of the template format is.

A. Ovf format template contains only one ovf file and one vhd file
B. Ova format template contains only one file after export
C. There are two formats for virtual machine templates: ova and ovf.
D. .ovf is the virtual machine's description file, and .vhd is the virtual machine's disk file

Answer: A

Question: 216

The following incorrect way to create a virtual machine template is.

A. Template clone to template


B. Virtual machine clone as a template
C. Virtual machine to template
D. Snapshot to template

[Link]
Questions & Answers PDF Page-57

Answer: D

Question: 217

Virtual machine live migration refers to moving virtual machines in the same cluster from one
physical server to another physical server in the state of a virtual machine.

A. True
B. False

Answer: B

Question: 218

In Huawei FusionCompute, the following incorrect description of virtual machine snapshot recovery
is .

A. Use the existing snapshot of the virtual machine to restore the data of the virtual machine to the
state at the moment of the snapshot creation
B. If a virtual machine deletes the port group where the virtual machine NIC is located after the
snapshot is created, the deleted port group will also be restored when the virtual machine is restored
using the snapshot
C. If a disk mode of the virtual machine is "independent-persistent" or "independent-non-
persistent", the data on the disk is not restored when the virtual machine is restored using a
snapshot
D. Virtual machines can have multiple snapshots

Answer: B

Question: 219

In FusionCompute, the QoS parameters that can be set for the virtual machine do not include:

A. GPU
B. Disk IOPS
C. Memory
D. Network
E. CPU

Answer: A

Question: 220

When using a template to quickly deploy a virtual machine, the generated virtual machine
configuration information is consistent with the template

[Link]
Questions & Answers PDF Page-58

A. True
B. False

Answer: A

Question: 221

Voice recognition, image recognition, and emotional companion robots are all applications of
artificial intelligence

A. True
B. False

Answer: A

Question: 222

The following description of big data and cloud computing is.

A. Cloud computing is a collection of data that cannot be captured, managed, and processed with
conventional software tools within a certain time frame
B. Big data is a pay-as-you-go model that provides usable, portable, and on-demand network access
C. Cloud computing cannot function as the underlying computing resource for big data processing
D. Big data can serve as a type of cloud computing service for users to choose according to their
needs

Answer: D

Question: 223

In Huawei FusionCompute, users log in to a virtual machine using VNC and find that they cannot
operate normally and are stuck (such as being unable to open files). The most likely cause of this
failure is.

A. Virtual machine is corrupted


B. Service links are unstable
C. Management link is unstable
D. The storage link is unstable

Answer: C

Question: 224

In Huawei FusionCompute, the correct description of "role" is .

A. If a "user" has multiple "role", its "operation authority" depends on the "role" with the highest

[Link]
Questions & Answers PDF Page-59

priority
B. A "role" can have one or more different "operating systems"
C. "Operation Permissions" of "Role" cannot be modified
D. A "user" can only have one "role"

Answer: A

Question: 225

In Huawei FusionCompute, what functions will be affected when a virtual machine is bound to a USB
device? [Multiple choice]

A. Virtual machine resource expansion


B. Virtual machine restart
C. Virtual Machine Live Migration
D. Cluster scheduling strategy

Answer: C. D

Question: 226

When binding a disk to a virtual machine in Huawei FusionCompute, to achieve the following
requirements, the virtual machine does not take a snapshot of the disk when creating a snapshot,
and does not restore the disk when using the snapshot to restore the virtual machine. At the same
time, all data is required to be permanently written. The disk, which mode should I choose?

A. Independent-non-persistent
B. Independence-durable
C. Independence
D. Subordinate

Answer: B

Question: 227

In Huawei FusionCompute, the memory and CPU resources used by virtual machines can only be
provided by the same cluster. Therefore, the maximum computing resources that virtual machines
can actually use cannot exceed the sum of resources available to all hosts in the cluster

A. True
B. False

Answer: B

Question: 228

[Link]
Questions & Answers PDF Page-60

In Huawei FusionCompute, if there is only one physical network port in the bound network port, the
physical network port cannot be removed directly.

A. True
B. False

Answer: A

Question: 229

In Huawei FusionCompute, the following incorrect description of the security group rule is.

A. When a virtual machine has multiple network cards, you can configure a security group for each
network card.
B. A virtual machine can communicate with the outside world only after a security group is created
and rules are added.
C. All virtual machine NICs in the same security group will use the security group rules for access
control
D. The essence of a security group is a collection of rules

Answer: B

Question: 230

In Huawei FusionCompute, if the Windows virtual machine has a blue screen, what operations can
the system perform? [Multiple choice]

A. HA Virtual Machine
B. Recover a virtual machine using a snapshot
C. Restart the virtual machine
D. Not processed

Answer: A. C. D

Question: 231

In Huawei FusionCompute, the correct description of the method for logging in to the virtual
machine is . [Multiple choice]

A. The virtual machine does not have an IP address, and the administrator can log in through VNC. so
VNC gets rid of its dependence on the network
B. If the operating system of the virtual machine is windows, the administrator can log in to the
virtual machine through remote desktop
C. Administrators can log in to a virtual machine with any operating system installed through VNC
D. If the operating system of the virtual machine is Linux, the administrator can log in to the virtual

[Link]
Questions & Answers PDF Page-61

machine through remote desktop

Answer: B. C

Question: 232

In Huawei FusionCompute, to enable virtual machines to migrate between CNA hosts with different
CPU models, the function to be enabled is.

A. Cluster GuestNUMA Policy


B. Cluster IMC Policy
C. Cluster I / O ring adaptation
D. Cluster HANA Optimization

Answer: B

Question: 233

In Huawei FusionCompute, the following incorrect description of virtual machine storage live
migration is.

A. Storage live migration can be performed between different storage devices


B. Storage live migration can be performed between different virtual disks
C. Storage live migration can be performed between different storage resources
D. Storage live migration can be performed between different data stores

Answer: B

Question: 234

In Huawei FusionCompute, the resources of the cluster are composed of the host and its associated
storage and network resources.

A. True
B. False

Answer: A

Question: 235

Cloud computing quantifiable services refer to charging customers based on time and volume of use.

A. TRUE
B. FALSE

[Link]
Questions & Answers PDF Page-62

Answer: A

Question: 236

Cloud computing is the product of the development of the Internet and computing technology, so
cloud computing must be inseparable from the network

A. TRUE
B. FALSE

Answer: A

Question: 237

In Huawei FusionCompute, a Linux-based virtual machine is created. In this scenario, the host OS
Running at

A. VNA
B. CNA
C. VRM
D. Linux virtual machine

Answer: B

Question: 238

The KVM virtualization architecture includes KVM modules, QEMU and Libvirt. The following
incorrect description of these modules is

A. KVM module is mainly responsible for the creation of Vcpu and the allocation of virtual memory
B. KVM + QEMU can constitute a set of virtualization solutions
C. Libvirt + QEMU can constitute a set of virtualization solutions
D. QEMU is mainly responsible for I / O operation simulation

Answer: C

Question: 239

Virtual machines generally have corresponding configuration files that record information such as the
specifications and names of the virtual machines.

A. TRUE
B. FALSE

Answer: A

[Link]
Questions & Answers PDF Page-63

Question: 240

The following description is incorrect

A. Each file system block corresponds to a discontinuous area on the physical disk.
B. The file is stored on the file system, and the file system is mapped to the file system block.
C. The file system block corresponds to the logical area of ​LVM
D. The logical area is mapped to the physical area of ​the disk through LVM

Answer: A

Question: 241

In Huawei FusionCompute, the management VLAN ID used by VRM cannot be changed.

A. TRUE
B. FALSE

Answer: B

Question: 242

After using virtio, the network card speed of the windows virtual machine is 10Gbps

A. TRUE
B. FALSE

Answer: B

Question: 243

. Where is the memory reuse function enabled in Huawei FusionCompute?

A. Host
B. operating system
C. virtual machine
D. Cluster

Answer: D

Question: 244

In Huawei FusionCompute, when the virtual machine is in the "running" or "stopped" state, users can
To increase or decrease the number of vCPUs of the virtual machine

[Link]
Questions & Answers PDF Page-64

A. TRUE
B. FALSE

Answer: B

Question: 245

In Huawei FusionCompute, which of the following factors does DRS perform virtual machine
migration? (Multiple choices)

A. Memory
B.I / O
C. Network traffic
[Link]

Answer: A. D

Question: 246

The following Qos description about CPU and memory resources is incorrect.

A. Memory resources QOS is used to ensure that business-critical virtual machines can get sufficient
memory resources
B. CPU shares and CPU reservations work only when each virtual machine competes for computing
resources
C. The CPU QoS of the virtual machine is used to ensure that the computing resources of the virtual
machine are reasonably allocated
D. Memory resource QoS can only be used after the memory reuse switch is enabled

Answer: D

Question: 247

With the "Internet" being valued and the rise of big data and cloud computing, related technologies
have entered like mushrooms
In your vision, one of the most widely used and valued is Docker. The following incorrect statement
about Docker is

A. Docker can package the underlying environment of applications to ensure that applications can
still run normally after migration
B. Docker needs to create a virtual layer, virtual operating system, etc. on the host or host operating
system, and then
installation
[Link] launches faster than other virtual machine technologies
[Link] runs with containers, which are running instances created from Image

[Link]
Questions & Answers PDF Page-65

Answer: B

Question: 248

. The following incorrect description of Huawei FusionCompute architecture is

A. CNA provides computing resources for virtual machines


B. VRM can run on CAN or can be deployed on a separate physical machine
C. VRM provides a management portal for administrators
D. CNA can manage cluster network, storage and computing resources // all of the cluster

Answer: D

Question: 249

Huawei FusionCompute supports adding hosts in batches. The administrator fills in host information
according to the template provided by the system and imports it at one time.

A. TRUE
B. FALSE

Answer: A

Question: 250

The storage resource types supported by Huawei FusionCompute are (multi-select)

A. FusionStorage
B. Advanced SAN
C. NAS
D. IP SAN
E. FC SAN

Answer: A. B. C. D. E

Question: 251

The cloud service purchased by the user includes the application operating environment, but there is
no application and related dat

a. This mode
Formula belongs to
A. SaaS
B. PaaS
C. NaaS

[Link]
Questions & Answers PDF Page-66

D. IaaS

Answer: B

Question: 252

What does not reflect the features of cloud computing on-demand self-service in the following
options are

A. The engineer purchased a cloud server from Huawei public cloud according to his needs.
B. The engineer upgraded the cloud server CPU he purchased from 2 to 4
C. The engineer changed the operating system of the cloud server he purchased from Linux to
Windows
D. The engineer received a notification message from the server provider one week before the cloud
server expired.

Answer: D

Question: 253

Which operating system can format a disk to NTFS?

A. Linux
B. Windows
C. uvp
D. Unix

Answer: B

[Link]
Questions & Answers PDF Page-67

Thank You for Purchasing H13-511_V4.0


PDF

Download Free Practice Test Demo from Here:


[Link]

Test Your Preparation with


Practice Exam Software
Use Coupon “20OFF” for extra 20% discount on purchase of
Practice Test Software. Practice Exam Software helps you validate
your preparation in simulated exam environment.

[Link]
1. On Huawei FusionCompute , the administrator can view the DVS port connected to the
VM . ( B )
A , TRUE
B , FALSE

2. When creating a port group in Huawei FusionCompute , the following operation error is ( A ) .
A , set the VLAN ID to " 5000 " / 1 -4094 total 4096 0-4095
B. Set the port group name to " ceshi "
C , set the port type to "normal" // access ordinary trunk relay
D , add "This is the test port" in the description

3. In Huawei FusionCompute , when you clone a VM, you do not support adjusting the
specifications of the VM. ( B )
A , TRUE
B , FALSE

4. The memory resources and CPU resources used by the VM in Huawei FusionCompute can only
be provided by the same cluster. Therefore, the maximum amount of computing resources that
a virtual machine can actually use cannot exceed the sum of resources available to all hosts in
the cluster ( B ).
A , TRUE
B , FALSE

5 , the following options belong to the characteristics of the cloud computing 1.0 era (multiple
choice)
A , agile application development and lifecycle management
B , based on virtualization products
C , resource service standardization, automation
D , use virtualization technology to improve resource utilization

6. In Huawei FusionCompute , the role of the uplink is ( B ) .


A. Assign an IP address to the virtual machine.
B , connect virtual network and physical network
C , manage the virtual machine MAC address
D , detecting the status of the virtual network card

7. The following description of cloud computing is correct ( A )


A , cloud computing is a technology that enables anytime, anywhere, convenient, on-demand
access to IT resources
B , cloud computing in a variety of IT resources to pay to use
C. IT resources acquired in cloud computing need to be used through the network.
D , in access to IT resources process, the user needs to cloud computing Fuwu Tigong Shang
repeated representations
8 , in the development of the Internet, there are many milestones, the following options for
milestone events sort order is normal ( C )
A , TCP/IP protocol specification established - ARPANET was born - www officially opened to the
public - DNS was born
B , www officially open to the public - the birth of DNS - the establishment of TCP / IP protocol
specifications - the birth of ARPANET
C , ARPANET was born - TCP/IP protocol specification established - DNS was born - www officially
opened to the public
D , the birth of DNS - the establishment of TCP / IP protocol specification - the birth
of ARPANET - www officially open to the public

9 , cloud computing is the product of the development of the Internet and computing technology,
so cloud computing must be inseparable from the network. A
A , TRUE
B , FALSE

10 , the description of the relationship between Host Machine and Guest Machine is correct
(multiple choice) C D
A. After using virtualization technology, a Guest Machine can use multiple Host
Machine resources at the same time .
B. After using virtualization technology, a Guest Machine can only run on the Host
Machine that created it .
C. After using virtualization technology, one Host Machine can only run one hypervisor.
D. After using virtualization technology, multiple guest machines can be run on one Host
Machine .

11 , the following is the calculation of virtualization is (multiple choice) ACD


A , CPU virtualization
B , network virtualization
C , memory virtualization
D , I / O virtualization
E , disk virtualization

12 , KVM ( Kernel-based Virtual Machine ) virtual machine can run on other virtualization
platforms through format conversion
on. A
A , TRUE
B , FALSE

13 In the Huawei FusionCompute architecture, the role of the Host Machine is ( A )


A , CNA
B , UVP
C , KVM
D , VRM
14 , the following description of the advantages of virtualization is (multiple choice) AC
A. After using virtualization, multiple virtual machines can run simultaneously on one physical
host.
B. After using virtualization, the CPU utilization of a physical host can be stabilized
at around 65% .
C. After virtualization, virtual machines can be migrated between multiple hosts.
D. After using virtualization, multiple applications can be run simultaneously on the operating
system of one physical host.

15 , the following description of KVM ( Kernel-based Virtual Machine ) is correct (multiple choice)
A , KVM belongs to type II virtualization
B , KVM belongs to type I virtualization
C , KVM is a module in the Linux kernel
D , KVM is an open source virtualization technology

16. In the virtualization of KVM type, the following description is correct (multiple choice) AB D
A , Guest OS can be Windows
B , Guest OS can be Linux
C , Host OS can be Windows
D , Host OS can be Linux

17. In Huawei FusionCompute , the way users manage virtual machines is (multiple choice) A CD
A , directly log in to the virtual machine for management
B. Use the graphical interface to manage after logging in to the CNA .
C. Use the graphical interface to manage after logging in to VRM .
D. Use the command line to manage after logging in to the CNA .

18 , virtualization technology can improve hardware resource utilization, reduce operating and
operation and maintenance costs, cloud computing also has these advantages,
Therefore, cloud computing and virtualization technologies are inseparable. // Cloud computing
is not equal to virtualization
A , TRUE
B , FALSE

19 , computing virtualization through different angles will produce different classifications, can
be divided into type I and type II virtualization, can also be divided into full virtualization and
paravirtualization. A
A , TRUE
B , FALSE

20 , in Huawei FusionCompute , the following can only be used as non-virtualized storage () B


A , NAS
B , FusionStorage
C , local disk
D , SAN

21 , the following RAID level data redundancy ability is the weakest () C


A , RAID 1
B , RAID 6
C , RAID 0
D , RAID 5

22 , Which of the following is not included in the NAS architecture? D


A , volume management module
B , status check module
C , file system
D , network interface

23 , for archives and other scenarios that need to store large amounts of data information for a
long time, and do not need to read frequently, it is recommended to choose which of the
following
Types of disks? C
A , SAS disk
B , NL-SAS disk
C , SATA disk
D , SSD disk

24 , SATA disk is a disk using the parallel interface type, SAS disk is a disk using the serial interface
type. B
A , TRUE
B , FALSE

25 , in RAID 5 and RAID 6 , the number of disks allowed to fail is ( C )


A,3,2
B,2,1
C,1,2
D,2,3

26 , the following can achieve computer virtualization in the era of cloud computing 1.0 , improve
resource utilization is ( B )
A . KVM
B . Xen
C . Hyper-v
D . OpenStack

27 , KVM uses Virtio , the description of the I / 0 forwarding process is correct ( AC ) [multiple
choice]
A . I/0 request is sent directly by the front-end driver to the back-end driver
B . I/0 request is no longer forwarded via QUEM
C . I/0 request forwarding efficiency will increase
D . I/0 request requires KVM module forwarding

28 , if a company uses a hybrid cloud, the device that can not be used as the demarcation point
between the public cloud and the private cloud is ( AC ) [multiple choice]
A . Core switch
B . Firewall
C . Virtual switch
D . Flow cleaning equipment

29 , open source virtualization technology is type I virtualization, closed source virtualization


technology is type II virtualization ( B )
A. TRUE
B. FALSE

30 , the following description of the type I (bare metal) computing virtualization features is
correct ( BD ) [multiple choice]
A . Applications can be run directly in VMM on
B . Hypervisor runs directly on top of physical hardware
C . Applications and virtual machines can run directly in the Host OS on
D . Application can not directly run Host Machine on

31 , Huawei FusionCompute , remove storage resources is the right step ( D )


1 , delete or virtual machine disk
2 , unlink the host
3 , delete storage resources
4 , destroy the data storage
A. 3--->2--->4--->1
B. 2--->4--->1--->3
C. 1--->2--->3--->4
D. 1--->4--->2--->3

32 , the host configuration IP SAN , a host typically requires arranged on the storage device so
that the host to the IP SAN for mapping
Shoot. D
A. ISCSI Target
B. ISCSI Server
C. ISCSI Client
D. ISCCSI Initiator

33 , things nature of the Internet, as long as the hardware or the product on the network, data
generating interaction can be called IOT ( A )
A . TRUE
B . FALSE

34 , Huawei FusionCompute in, FusionStorage can be used as a virtual storage ( B )


A . TRUE
B . FALSE

35 , Huawei FusionCompute when calculating node fails, the system having a computer node on
the HA
Attribute virtualization is pulled up on other computer nodes. The following options are not
necessary to implement this function ( D )
A . The virtual machine is not bound to the host
B . The source compute node uses shared data storage,
C . The cluster to which the compute node belongs turns on HA.
D . The virtual machine with the HA attribute on the compute node uses the same network
segment IP.

36 , the calculation of virtualization, virtual machine operating system running is referred to


as the Host the OS . B
A . TRUE
B . FALSE

37 , with the AI technology, and now the technology is almost all related to artificial intelligence,
which is now the following AI 's
Application area? ( ABCD ) [Multiple choices]
A . Appease the robot
B . Voice recognition
C . Image Identification
D . NLP ( Neuro-Linguistic Programing )

38. In Huawei FusionCompute , administrators can discover storage devices by scanning or


manually refreshing. B
[Link]
[Link]

39 , Huawei FusionCompute , after the failure of a host cluster, virtual machines on that host will
be from
Migrate to other hosts in the cluster ( B )
A. TRUE
B. FALSE

40 , the following is true for the CIFS description ( A )


A. CIFS supports multi-user access
B. CIFS has low reliability requirements for network transmission, and can use
either TCP/IP protocol or UDP protocol.
C. CIFS requires the client to install special software
D. CIFS retains file format features

41 , Huawei FusionCompute , if the number of physical NICs fewer servers may be considered a
plurality of combined flat portions
Department, using VLAN to isolate from each plane is logically A
A. TRUE
B. FALSE

42. The following is about the cluster in Huawei FusionCompute . The description of the host and
virtual machine is incorrect ( C )
A . Determining whether a host belongs to the same cluster depends on whether you use unified
shared storage
B . A cluster consists of multiple hosts and their associated storage and network resources.
C . Virtual machines can be migrated across clusters
D . Hosts can move between different clusters

43. In Huawei FusionCompute , the most storage mode for virtual machine storage is ( C )
A. Ordinary
B. Independence - lasting
C. Streamlining
D. Independent - non-persistent

44. The following description of virtualized storage and non-virtualized storage is correct ( C )
A. Virtualized storage is more secure than non-virtualized storage
B. Virtualized storage compatibility is better than non-virtualized storage
C. The read and write performance of non-virtualized storage is better than virtualized storage.
D. Non-virtualized storage is more scalable than virtualized storage

45. Which of the following technologies or devices cannot isolate broadcasts ( C )


A. Router
[Link]
[Link]
D. Firewall

46. Memory multiplexing technology is the premise of memory resource QoS implementation.
[Link]
[Link]

47. The following is incorrect about the VIMS file system description? D
A VIMS is compatible with FC SAN , IP SAN , local disk
B VIMS is the technical foundation for streamlining advanced features such as disk, snapshot, and
storage migration.
C VIMS is a high performance cluster file system
D VIMS is an industry-wide storage virtualization file system

48 , SAN provided to the host file system is not established a "naked Disk" to establish what file
system on it, depends entirely on the host operating system B
A TRUE
B FALSE

49. The following description of the difference between a physical switch and a virtual switch is
incorrect ( B )
A virtual switch runs on a physical server, and the physical switch has separate hardware.
The B virtual switch cannot operate on the VLAN tag. The physical switch can operate on
the VLAN tag.
A virtual switch cannot be configured with a Layer 3 interface. A physical switch can be configured
with a Layer 3 interface.
The normal operation of the D virtual switch also requires certain hardware resources.

50 , Huawei Fusion Compute in the following on the virtual machine and DVS amount of
correspondence between the description is correct (multiple choice)
When a virtual machine has a network card, the network card can only be associated with
one DVS.
When a virtual machine has multiple network cards, each network card can be associated with
a DVS.
When a virtual machine has multiple network cards, multiple network cards can be associated
with the same DVS.
When a virtual machine has a network card, the network card can be associated with
multiple DVSs.

51. The port configuration of a Huawei switch is as follows:


Interface ( GigabitEhernet 0/0/1 )
Port link-type trunk
Port trunk allow-pass vlan 16 17
According to the above configuration, the following statement is correct ( D )
A data frame containing a vlan 16 tag will be stripped and forwarded as it passes through the
port.
B data frames that do not contain any labels are discarded when they pass through the port.
C data frame does not contain any labels when passing through the port, it is added VLAN
16 or VLAN 17 tag and
Forwarding
D The data frame containing the VLAN 17 tag will be reserved and forwarded when passing the
port.

52. In Huawei FusionCompute , the following description about CPU QoS technology is incorrect
(C)
A “Reservation” is to ensure the lower limit of the computing power of the virtual machine, that
is, the minimum amount of resources used.
B action "share" is the lack of computing resources when multiple virtual machines based on the
relative CPU be owned share values
Source balance and adjustment
C "limit" the role of the host is the provision on the maximum number of runs
D achieve control of virtual machine CPU resource usage by adjusting "reservation" , "share" ,
and "restriction"

53. In Huawei Fusion Compute , to facilitate unified management, each DVS needs to be
configured with a management IP address.
A TRUE
B FALSE

54. Artificial intelligence is a new research, development of theories, methods, techniques and
application systems for extending and extending artificial intelligence.
Technical science, the following statement about artificial intelligence is wrong ( D )
A . Artificial intelligence is not social
B. Artificial intelligence is the physical process of unconscious mechanical
C. Artificial intelligence has no creative creativity unique to human consciousness.
D. Artificial intelligence is a technology for information exchange through items through the
network.

55. On Huawei FusionCompute , when the virtual machine installs the operating system by
mounting a local image file, the administrator can close the VNC window at any time without
affecting the mirror reading. A
A TRUE
B FALSE

56. The following description about memory reuse is incorrect ( B )


A memory multiplexing technology can make the sum of virtual machine memory specifications
larger than the sum of physical server specifications.
B memory multiplexing technology can make the total memory usage of the virtual machine
larger than the sum of the physical server specification memory.
After the C memory reuse function is enabled, the memory reuse rate is inversely proportional
to the actual memory usage of each virtual machine.
D memory multiplexing single-item technology includes memory bubbles, memory swapping,
and memory sharing

57. In Huawei FusionCompute , the following description of the virtual machine HA is correct
(multiple choice) ABC
A virtual machine HA function can quickly resume business when a failure occurs.
When the B system detects the blue screen of the virtual machine and the
configuration processing policy is HA , the system selects other normal computing nodes to
rebuild.
virtual machine
C is enabled in the cluster HA After the function, the host fails, the virtual machine can be rebuilt
on the other hosts
As long as resources are reserved in the D cluster, virtual machines with HA attributes can be
reconstructed at other compute nodes when a failure occurs.
success

58. Which of the following scenarios does the snapshot not apply to? B
A business devastating test
B business data is saved for a long time
C service patch upgrade
Major changes in D business

59. Which of the following technologies on the switch can increase the link rate? B
A LDAP
B LACP
C VLAN
D VXLAN

60. The following incorrect description about virtualization is (multiple choice) AB


A network virtualization refers to distributed virtual switches
B storage virtualization refers to distributed storage
C In cloud computing , IaaS layer virtualization can be divided into computing virtualization,
storage virtualization and network virtualization.
D compute virtualization includes CPU virtualization, memory virtualization, and IO virtualization

61 , the CPU virtualization technology can be divided into full virtualization, paravirtualization,
virtualization software and hardware-assisted virtualization.
A TRUE
B FALSE

62. In Huawei FusionCompute , virtual machines that use non-virtualized storage do not support
snapshots. B
A TRUE
B FALSE

63. IoT devices can be connected to the Internet and can be controlled via the Internet. A
A TRUE
B FALSE
64. Some virtualization technologies are open source, some are closed source, and the cloud
computing management platform is the same. The open source cloud computing management
platform needs to be implemented using open source virtualization technology. B
A TRUE
B FALSE

65. In Huawei FusionCompute , DVS supports multiple dynamic routes in addition to static
routes. B
A TRUE
B FALSE

66. In Huawei FusionCompute , the default alarm level does not include () A.
A common
B emergency
C prompt
D secondary
E important

67. Create a virtual machine by importing a VM in Huawei FusionCompute . The following file
formats do not support ()
A the .ova
B .qcow2
[Link]
[Link]

68. The configuration of a Huawei switch port is as follows:


Interface GigabitEhernet 0/0/1
Port link-type access
Port default vlan 16
According to the above configuration, the following statement is correct ( C )
A. This port will add a vlan 16 tag to the data frame that will pass.
B. This port only allows data with vlan 16 tags to pass.
C. The port will strip the vlan 16 label of the passed data frame and forward it.
D This port will not do anything with the passing data frames.

69. In Huawei FusionCompute , which of the following deployment methods is recommended to


improve the reliability of VRM ? A
A active and standby deployment
B single node deployment
C hybrid deployment
D live-active deployment

70. Which of the following is not a feature of Big Data 4V ( C )


[Link]
[Link]
[Link]
[Link]

71 Which of the following statements about cloud computing and the Internet of Things is
incorrect? A
A. If there is no cloud computing support, the Internet of Things cannot transmit data.
B. Cloud computing is the cornerstone of the development of the Internet of Things, and the
Internet of Things continues to promote the development of cloud computing.
C. Cloud computing can provide enough storage space for massive data of the Internet of Things.
D. If there is no cloud computing as a basic support, the efficiency of the Internet of Things will
be greatly reduced.

72 storage virtualization technology can improve storage utilization, storage resources to provide
multiple virtual machines A
A. Yes
B. wrong

73. Which of the following operations can take effect immediately on


Huawei FusionCompute ? D
A. Directly read and write to the newly bound disk
B. Install Tools
C. Disk volume reduction
D. Delete the network card

74. Virtual switches play an important role in communicating between virtual machines and are
an indispensable component A.
A. Yes
B. wrong

75. The following description of making a template in FusionCompute is incorrect ( B ) .


A. "Virtual machine to template" is to convert the virtual machine directly into a template, all
parameters are currently configured using the virtual machine.
The virtual machine will no longer exist after the conversion
B. When creating a template using a virtual machine, the state of the virtual machine can be
"running"
C. "Template cloning as a template" is to copy the template as a new template and support
adjustment of some parameter configuration, which can be slightly different from the original
template.
There is a difference, the template still exists after the clone is completed.
D. "Virtual machine is cloned as a template" is to copy the virtual machine as a template and
support adjustment of some parameter configuration, which can be compared with the original
virtual
The machine is slightly different, and the virtual machine still exists after the clone is completed.
76. In Huawei FusionCompute , if a virtual machine and host are bound, the affected functions
are ( multiple choice ). AC
A. DRS
B. Memory hot add
C. Thermal migration
D. Snapshot

77. The way the FusionCompute Installer deploys the V RM virtual machine is () . B
A. Automatic installation of ISO files
B. Template file import into virtual machine
C. Automatically create a virtual machine and automatically mount the ISO file.
D. PXE automatic installation

78. In Huawei FusionCompute , the description of the "shared" type disk is correct (multiple
choice) . A CD
A. The virtual machine bound to this type of hard disk does not support the snapshot function.
B. This type of hard disk can only be bound to one virtual machine.
C. The virtual machine does not support changing the data storage for such a hard disk.
D. This type of hard disk can be bound to multiple virtual machines

79. The following description about NFS is correct (). C


A. NFS client does not need to install special software
B. NFS cannot set user permissions
C. NFS supports multi-user access
D. NFS is a stateful protocol

80. The memory can not achieve multiplexing () A .


A. Turn on the memory multiplexing technology. The higher the multiplexing ratio, the stronger
the performance of the virtual machine.
B. Turn on the memory reuse technology to improve the deployment of virtual machines on the
physical host.
C. If the user virtual machine memory usage is relatively high, you can optimize it by modifying
the memory reuse ratio.
D. Turn on the memory multiplexing technology, the total memory of all virtual machines created
by the user can exceed the physical memory.

81. The function of the Internet of Things is to collect data generated by various things. B
A. Yes
B. wrong

82. Which device is capable of routing and forwarding in a physical network? C


A. Hub
B. Layer 2 switch
C. Router
D. Physical server network card

83. In the cloud , the network can be divided into two virtual and physical networks Part A
A. Yes
B. wrong

84. In FusionCompute , the following description about deleting a security group is incorrect ( C ) .
A. The authorization behavior between the security group to be deleted and other security
groups does not affect the deletion operation.
B. There is no virtual machine in the security group. If there is a virtual machine in the security
group, you need to remove the virtual machine from the security group.
C. After the security group is deleted, all security group rules in the group are deleted at the same
time.
D. When a security group to which a virtual machine belongs is deleted, other security groups are
not affected by the virtual machine.

85. Intelligent Memory multiplexing (bubble memory, swapping, shared memory) may be based
on customer demand, custom opening / closing either of a function B
A. Yes
B. wrong

86. In Huawei FusionCompute , you need to modify a certain disk of the virtual machine.
The following operations can be implemented ( C ) .
A. Change the disk capacity from 80GB to 8GB
B. Change the configuration mode of the disk from "reduced" to "normal"
C. Change the mode of the disk from "slave" to "independent - persistent"
D. Change the status of the disk from "available" to "not available"

87. In Huawei FusionCompute , DPM must rely on DRS before it can be used. A
A. Yes
B. wrong

88. The following description of iSCSI and Fibre Channel is incorrect (). C
A. The FC protocol is completely heterogeneous with the existing Ethernet, and the compatibility
is poor.
B. iSCSI runs on Ethernet based on TCP/IP protocol and can be seamlessly integrated with existing
Ethernet
C. FC transmission distance than the TCP / IP away
D. From the perspective of the transport layer, the Fibre Channel transmission uses
the FC protocol, and the iSCSI uses the TCP/IP protocol.

89. The following is not a snapshot management ( A ) .


A. Copy the snapshot
B. Modify the snapshot
C. Create a snapshot
D. Delete the snapshot

90. Using Templates in Huawei FusionCompute to Deploy Multiple Virtual Machines A in Batches
[Link]
[Link]

91. In Huawei Fusion compute , all virtual machine NICs that are added to the same security
group are filtered by the security group. To improve security, you need to add the same NIC to
multiple security groups. B// One network card is only classified into one security group
A. TURE
B. FALSE

92. A virtual machine can have multiple virtual network cards at the same time, corresponding
to different virtual switches. A
[Link]
[Link]

93. Which of the following virtual machine disk file formats does Huawei support
for fusioncompute ? A
[Link]
[Link]
[Link]
D.QCOW2

94. In fusioncompute , the virtual switch is connected to the physical network by (). D
[Link]
B. Virtual network card
C. Port group
D. Uplink

95. rules within the security group will also delete the security group as B
[Link]
[Link]

96. What types of storage virtualization can be divided into? (multiple choice) BD
A. Application level virtualization
B. block-level virtualization technology
C. Page level virtualization
D. File level virtualization

97. The process of creating a file system on a disk is often referred to as ( B )


A. Package
B. Formatting
[Link]
D. Partition

98. The necessary conditions for the virtual machine to communicate normally with other virtual
machines are (multiple choice) BC
A. Configure a fixed IP address for the virtual machine.
B. Configure the virtual machine with the correct IP address.
C. Configure the correct MAC address for the virtual machine.
D. Configure the gateway address for the virtual machine

99 In Huawei's FundCompute , the operations that can be performed on the VRM are (multiple
choice) CDs.
A divides the RAID for the disk array
B converts virtualized storage to non-virtualized storage
C manually add storage devices for virtual machines
D adds SAN storage as non-virtualized storage

100 The VLAN ID (excluding 0 ) configured for the DVS in the Huawei FusionCompute needs to
exist on the physical switch. Otherwise, the normal communication of the virtual machine will be
affected. B
A TRUE
B FALSE
The following 101 descriptions about the Hypervisor are correct ( D )
A Hypervisor is virtualization
B Hypervisor is essentially an operating system
C Hypervisor carries a lot of drivers, so Hypervisor does not need to install drivers and patches.
D Hypervisor is the key to computer virtualization

102. Create a new disk in Huawei FusionCompute . Which of the following operations is incorrect
(C)
A. Set the disk type to "Normal" and set the disk mode to "Independent - Non-persistent"
B. Set the disk's configuration mode to "Reduced" and set the disk mode to
"Independent - Persistent"
C. Set the disk mode to "independent - non-persistent" and change the raw device mapping to
"support"
D. Set the disk's configuration mode to "Reduced" and set the disk mode to "Independent - Non-
persistent"

103. If the virtual machine is to communicate with other virtual machines, which of the following
options is necessary? D
A. Need to configure port binding on the physical server
B. Need to configure port binding on the physical switch
C. Need to network the physical server where the virtual machine is located
D. Need to add at least one network card to the virtual machine

104. The service mode described in the picture is ( A )


A. IaaS
B. DaaS
C. PaaS
D. SaaS

105. The physical switch which follows the general support for remote management (multiple
choice) ACD
A. Telnet
B. SSL
C. Web
D. SSH

106 is correct about VNC (multiple choice) BC


A VNC needs to support the Linux operating system
B controlled computer needs to install the corresponding software to become VNC server
C VNC is a lightweight remote control software
D launch control request the host to install the appropriate software becomes VNC server

107 below the Hypervisor description is incorrect ( D )


A. In virtualization, Hypervisor and VMM are a concept.
B In virtualization, the Hypervisor can run directly on the Host Machine .
C In virtualization, the Hypervisor can monitor the status of the Guest Machine .
D In virtualization, only the hypervisor can directly access physical resources.

108. Which of the following scenarios is not recommended to enable memory multiplexing? C
A. Ordinary office cloud host
B. Telecom Business Hall
C. Graphics workstation
D. Bank window office

[Link] is a memory architecture designed for multiprocessor computers. Memory access


time depends on memory.
The location of the processor , under NUMA , the processor accesses its own local memory faster
than the non-local memory (memory is located
The other processor, or the memory shared between the processors, is faster. A
A. TRUE
B. FALSE

110. The following is the north-south traffic (multiple choice ) BC


A. Traffic generated by virtual machine hot migration
B. Traffic between virtual machines that access each other across data centers
C. Traffic generated by customers accessing data center services over the Internet
D. Traffic between virtual machines in the data center

111. Operations that can be done in Huawei FusionCompute (multiple choice) BCD
A. Convert virtual machines of other virtualization platforms into virtual machines available
for FusionCompute
B. Clone a virtual machine
C create a virtual machine
D delete virtual machine

112. Packets in the cloud computing virtual network need to be routed through routers in the
physical network. /TOR switch
[Link]
[Link]

113. ISCSI is a standardized protocol based on the _____ protocol and SCSI instruction set, and is
widely used in many storage networks using the ____ architecture. D
[Link] IP SAN
[Link]/IP FC SAN
[Link] FC SAN
[Link]/IP IP SAN

114. Cloud computing is the product of the development of parallel computing, grid computing
and distributed computing. The correct description of the relationship between the four is ( C )
A. Distributed computing completely replaced grid computing
B. Cloud computing is a kind of distributed computing
C. Parallel computing, network computing and distributed computing are all cloud computing
D. Grid computing completely replaces parallel computing

115. In Huawei FusionCompute , the traditional network device corresponding to DVS is ( C )


A. Router
B. Hub
C. Layer 2 switch
D. Layer 3 switch

116. The following description of the cloud computing resource pooling characteristics is correct
(C)
A. The cloud computing resource pooling feature is the prerequisite for achieving extensive
network access.
B. Cloud computing resource pooling feature can put the CPU and hard disk into the same
resource pool
C. Cloud computing resource pooling feature can shield the difference between similar resources
D. Cloud computing resource pooling features must rely on virtualization technology to achieve
117. Templates can be used to quickly deploy virtual machines. Currently, templates can only be
created by converting or cloning virtual machines. B
A. TRUE
B. FALSE

118. In Huawei FusionCompute , a virtual machine can have multiple virtual network cards. A
A. TURE
B. FALSE

119. During the snapshot creation process, other operations can be performed on the virtual
machine. B
[Link]
[Link]

120. If virtual machine A can ping virtual machine B , which of the following results can be
inferred? B
A. Virtual machine A and virtual machine B use the same network segment.
B. Both virtual machine A and virtual machine B are configured with the correct IP address.
C. Virtual machine A and virtual machine B use different network segments.
D. Virtual machine A and virtual machine B run on the same physical host

121. In Huawei FusionCompute , the following description about hot migration is incorrect ( C )
A. Hot migration includes virtual machine hot migration and disk hot migration
B. Using the technology of fast copying and sharing storage of memory data during virtual
machine hot migration to ensure the number of virtual machines before and after migration
According to the same
C. Storage hot migration can only be migrated within the same storage device under storage
virtualization management
D. Virtual machine hot migration types are divided into changing hosts, changing data storage,
and changing host and data storage.

122. Huawei FusionCompute the DRS for a binding rule USB can not take effect device virtual
machine. A
[Link]
[Link]

123 In Huawei FusionCompute , the way to create a virtual machine is (multiple choice) BCD
A other virtual platform import
B uses template deployment
C uses an existing virtual machine clone
D directly create a new virtual machine

124 common disk arrays include (multiple choice) BC


A MAID ( massive arrays of Idle disks )
B RAID
C JBOD ( Just a bunch of Idle disks )
D SBOD ( Switch of bunches Idle disks )

125. Memory reuse is a resource allocation scheme that increases the density of virtual machines
on a single host, reduces costs, and sacrifices performance for density. B
[Link]
[Link]

126 , FC SAN , which of the following is not the advantage of IP SAN ? D


A bandwidth extension is convenient
B construction costs are low
C transmission distance is far
D transmission efficiency is high

127. The following description of type II (host type) virtualization is correct ( D )


A. VMM running in the Guest Machine in
B. VMM runs directly Host Machine on
C. VMM running in Guest OS on
D. VMM running in Host OS on

128. The following description about KVM and Xen is correct (multiple choice) AC
A. Xen virtual machine can be converted to KVM virtual machine
B. Domain 0 and Domain U are concepts in KVM
C. KVM and Xen are both open source hypervisors
D. KVM and Xen can run on the same Host OS in

129. Installation Huawei FusionCompute , the recommended VRM deployed on which storage D
A. NAS
B. FC SAN
C. IP SAN
D. local disk

130. The following description about the template is incorrect ( D )


A. After the virtual machine is cloned as a template, the virtual machine still exists.
B. Customizable parameters when deploying virtual machines using templates
C. After the template is converted to a virtual machine, the template no longer exists.
D. Templates can be used across virtualization platforms

131. Different types of hardware of the same type in cloud computing can form a resource
pool. A
[Link]
[Link]
132. The following description about Huawei virtual switch is correct ( ) B
A. The virtual switching function of the intelligent network card is also provided by Huawei virtual
switch.
B , Huawei virtual switch is open source open vSWitch
C. If Huawei distributed switches have multiple virtual ports, each port has its own attributes.
D. Huawei virtual switches are divided into standard virtual switches and distributed virtual
switches.

133. The following description of thermal migration and cold migration is incorrect ( )D .
A. Hot migration is to transfer the running virtual machine from one host to another. The business
will not happen during the migration.
Interrupt
B. In the performance test - reliability test, there are tests for virtual machine migration, including
hot migration, cold migration, migration duration,
Business interruption time .
C , the cold stop state migration is known virtual machine is migrated from one host to
another - hosts, the migration process be interrupted traffic
D , hot migration, and cold migration migrate both in-memory and disk data

134 at Huawei's FundCompute , the description about virtual machine migration is incorrect. C
The communication between the A source host and the destination host is normal.
B destination storage is different storage devices
C virtual machine status is "running"
D destination host must have sufficient resources

135 Huawei FunsionCompute less memory on the host interface description is not correct A
A supports manual addition and batch addition to add interfaces.
B can achieve multi-path storage of storage by adding multiple storage interfaces
The IP address of the C storage interface can be on the same network segment as the
management plane.
D local hard disk and FC SAN can be connected to the storage device without adding a storage
interface.

136. The virtual machine generally consists of virtual machine configuration information and disk
files. The user can move the two files to run the virtual machine on different physical hosts. What
are the characteristics of cloud computing in the above description ? (multiple choice) AB CD
A . Partition
B . isolation
C . independent
D . Package

137. The following are not KVM ( Kernel-Based Virtual Machine ) management tools ()
A . QEMU
B . Virsh instruction set
C . Virt-Manager
D . Libvirt

138. The following description about virtualization is correct ( C )


A. Virtualization and non-virtualization cannot exist in one data center at the same time
B. Applications that can run on physical machines must also run on virtual machines.
C. Virtualization can improve the uniformity of hardware resources
D. Virtual machines that use different types of virtualization technologies can convert between
each other

139. In computing virtualization, allocating CPU and memory to a virtual machine is (multiple
choice) AB
A . Hypervisor
B . VMM
C . Guest OS
D . Host OS

[Link] virtual machine can be created through a graphical interface, or you can use the
command line to create A
A . True
B . False

141. Using virtualization technology can virtualize a physical server into multiple virtual
machines, thereby improving the hardware performance of the physical server. B
A . True
B . False

142. In the Linux virtual machine. It is B that can manage the logical volume.
A OVM
B LVM
C PVM
D DVM

143. Huawei FusionCompute , the following ports on the group and security groups are not
correctly describe D
A virtual machine NIC is connected to a virtual port of the port group, and a virtual machine NIC
is associated with a security group.
A port group is a collection of one or more virtual ports on a DVS , and a security group is a
collection of one or more rules.
C . A DVS can have multiple port groups, and one VM can be protected by multiple security
groups.
D . The security group is based on the port group to protect the virtual machine's /// virtual
network card.
144. Which of the following network file sharing protocols does NAS support (multiple choice) AB
A CIFS
B NFS
C NTFS
D FTP

145. The switch can be divided into an access switch, an aggregation switch, and a core switch
according to the use, and the virtual switch belongs to the convergence.
Change B
A True
B False
146. In actual work, which function can the VLAN implement ( A )
A virtual machine IXUS belonging to the same VLAN uses the IP address of the same address
segment , otherwise it cannot communicate normally.
After the virtual machines of the two departments use different VLANs , they can no longer
communicate with each other.
C virtual machines belonging to the same VLAN can use IP addresses of different address
segments and can discover each other using broadcasts.
D virtual machines belonging to different VLANs can use the same IP address without address
conflicts.

147. If two virtual machines can ping each other, the network device that will be used during the
communication process is ( D )
A. Distributed virtual machine switch
B. Physical switch
C. Physical network card
D. Virtual network card

148. In KVM , there are two ways for a virtual machine NIC to connect to a physical network,
namely ( A ) and ()
A bridge, address translation
B address conversion, straight through
C bridge, straight through
D straight through, bridge

149. In Huawei FusionCompute , the following descriptions about security groups and rules are
incorrect ( A )
Changes to A security group rules need to be manually applied to virtual machines in the security
group
B must first create a security group to add rules
C security group rejects all by default before adding rules
D. The prerequisite for deleting a security group is that there is no virtual machine in the security
group.
150. When the use of templates for rapid deployment of virtual machines, do not need to install
the operating system, you do not need to configure, and therefore save a lot of time and effort A
A True
B False

151. In Huawei FusionCompute , the following incorrect description of CPU resource QoS is ( B )
A. CPU reservation defines the minimum computing resource allocated when multiple virtual
machines compete for physical CPU resources.
B. CPU quota defines multiple virtual machines to allocate computing resources by priority
when competing for physical CPU resources
C. CPU share defines multiple virtual machines to allocate computing resources proportionally
when competing for physical CPU resources
D. The CPU reservation only works when a virtual machine competes for computing resources. If
there is no competition, the virtual machine can be used to monopolize the
physical CPU resources.

152. Huawei Fusion Compute , the following is a description of an incorrect memory complex C
A. The administrator can turn the memory alternate function on or off at any time.
B. After the memory reuse function is turned off, the internal sum of all virtual machines is less
than or equal to the sum of the actual available physical memory.
C. Using memory multiplexing can degrade virtual machine performance
D. Turn off memory multiplexing. The memory reuse rate of all hosts in the cluster is less than or
equal to 100%.

153. The following description about the security group application scenario is incorrect ( A )
A. By setting security group rules, you can control the permissions of folders in the virtual
machine.
B. By setting the security set of rules that can be achieved only allow specific IP addresses to
virtual machines into the line telnet
C. By setting security group rules, you can protect virtual machines from being accessed.
D. By setting security group rules, you can make the virtual machine unable to access
the FTP server.

154. The description about the snapshot is incorrect ( A )


A . A virtual machine can create multiple snapshots. When a virtual machine is restored using a
snapshot, the subsequent snapshot will be invalidated.
B . Snapshots can save virtual machine settings as well as save virtual machine disk data
C . All virtual machines on a host can only create one memory snapshot at the same time
D . Snapshots can save the state of virtual machine memory

155. When using the same Window template to quickly deploy a virtual machine, the
generated SIDs may be consistent. Resulting in failure when installing some special software
A. True
B. False
156. In the OpenStack solution, which module does the load provide for persistent block
storage ? D
A Swift / / object storage
B Glance / / fast storage
C Nova// compute node life cycle
D Cinder

157. In Huawei FusionCompute , when multiple virtual machines write to the same shared disk
at the same time, in order to prevent data loss, it is necessary to ensure that the application
software accesses the disk to control A.
A. True
B. False

158. The following About Huawei FusionCompute HA description is incorrect is B


If the data of the A virtual machine is saved in the shared storage, the data saved when the failure
occurs will not be lost.
B. This function supports automatic restart after virtual machine failure.
The C system periodically detects the status of the virtual machine. When the physical server fails
and the virtual machine fails, the system can migrate the virtual machine to another physical
server to restart, ensuring that the virtual machine can recover quickly.
D administrators can set different HA policies according to the importance of the virtual machine.

159. Setting the port group vlan ID to 10 in Huawei FusionCompute (multiple choice) ACD
A forwards the data frame with the VLAN 10 label passing through the port group and then
forwards it.
B forwards the data frame with the VLAN 10 label through the port group to VLAN ID and
forwards it.
C discards data frames with non- VLAN 10 labels passing through the port group
D forwards the data frame with no VLAN tag on the port group and then forwards the label
of VLAN 10 .

160. In Huawei FusionCompute , the description about the IMC function is incorrect ( C )
It is recommended to enable the IMC function when the CPU models of the CNA host in
the cluster are inconsistent.
B opened IMC can not ensure that the virtual machine in different models CPU successful
migration between hosts, to be determined according to the actual scene
C IMC only supports migration from a lower version of the CPU feature set to a higher version
It is recommended to enable the IMC function when the CNA host memory frequency in
the D cluster is inconsistent.

161. In Huawei FusionCompute , after the virtual machine deletes data internally, the disk size is
not automatically reduced. When the user writes again, the internal free space A is utilized.
A. True
B. False
162. In Huawei FusionCompute , the operation of creating a disk using IP SAN includes D.
1. Create a storage resource
2. Add a storage port on the host
3. Add data storage
4. Create a disk
The correct sequence of operations is
A.1-3-4-2
B.4-2-1-4
C.1-2-3-4
D.2-1-3-4

163. Huawei FusionCompute can sense the global physical resource usage during the running of
the virtual machine, and calculate the optimal host suitable for the virtual machine
running through the intelligent scheduling algorithm, and run the virtual machine on the optimal
host through hot migration and other means. Up, thereby improving the global business
experience A
A True
B False

164. Common external storage solutions have BD


A . DAS
B . NAS
C . NFS
D . SAN

165. SSD disk is a mechanical hard disk, which has the advantages of fast reading and writing
speed, low power consumption and light weight, but it has a service life limit B.
A , True
B , False

166. Among the following RAID levels, the highest disk space utilization is A.
A , RAID 0
B , RAID 6
C , RAID 1
D , RAID 5

167. The user applied for a cloud hard disk on the public cloud of Huawei . The service mode
belongs to A.
A . IaaS
B . DaaS
C . PaaS
D . SaaS

168. The following description of the role of the VLAN is incorrect B


A . Enhance network security
B . Increase physical switch interface bandwidth
C . Isolate the broadcast domain
D . Improve the robustness of the network

169. CPU resource QoS and memory reuse technology are all based on the use of different
strategies to rationally allocate resources.
A . True
B . False

170. Which of the following requirements can be achieved by Huawei FusionCompute DRS rules ?
A . After the Windows virtual machine has a blue screen, the system automatically restarts it.
B . A host in the cluster is not available, the virtual machines running on that host automatically
migrated to the odd hosts
C . Require a virtual machine to run on a specific host
D . When the virtual machine configuration does not meet the service requirements, the
management system automatically adds CPU resources to the virtual machine.

171. The following scenario that is not suitable for improving the memory reuse ratio is A.
A . Memory reuse has reached 150% in commercial scenarios
B . Reduce customer hardware procurement costs
C . While ensuring performance, customers require a single host to deploy the largest number of
virtual machines.
D . Virtual machine memory utilization is low

172. In Huawei FusionCompute , after the computing resource scheduling automation function
is enabled, the reason for the virtual machine migration may be (multiple choice) ACD.
A . Windows virtual machine has a blue screen and the processing strategy is " HA virtual
machine"
B . An application running on a virtual machine crashes
C . The administrator manually migrates according to the system prompts.
D . The system automatically migrates according to the scheduling policy

173. Which of the virtual NUMA include (multiple choice) ABCD


A . Load balancing, considered in the scheduling process node association, has node and a
physical node corresponding relationship, to ensure maximum VCPU access to local content
B . Site placement, view the virtual machine NUMA topology, select the
physical node way VCPU and memory, it nide in VCPU with relation to physical memory actually
been
C . Topology rendering, virtual machine temporal portion has recognized NUMA , the use
of GuestOS and application NUMA optimization features to take effect
D . Dynamic migration, when the VCPU and physical node affinity change, trigger its
corresponding Vnode memory for migration
174. The fog is calculated ( FOG Computing ) is a distributed computing model, cloud
computing extend the concept to the network edge, and to support the movement of things and
the geographically distributed applications. The following statement about fog calculation is
incorrect. C
A . Fog calculations can quickly generate big data and reduce latency at the edge of the network
B . Fog calculation can achieve short-term data cache, reducing network pressure
C . Fog computing provides higher reliability for network and physical device security than cloud
computing
D . Fog calculations can reduce the bandwidth consumed in the core Internet and limit the
movement of data to the local network.

175. Among the following options that are not part of artificial intelligence are B.
A. Computing power
B. Perceptual analysis
C. Big data
D. Scene

176. Artificial intelligence is the research, development of concepts, methods, techniques and
application systems for simulating the extension and extension of artificial intelligence.
A new technical science, the following about artificial intelligence is wrong B
A. Artificial intelligence has no creative creativity unique to human consciousness.
B. Artificial intelligence is a technology in which items communicate with each other through
networks to exchange information.
C. Artificial intelligence is not social
D. is the physical process of unconscious mechanical

177. Set the port group VLAN ID to 0 for D in Huawei FusionCompute .


A . Set the vlan tag of the data frame passing the port group to 0.
B . Only data frames with vlan 0 tags are allowed to pass through this port group
C . Allow 0 th with vlan tag data frames through the port group
D . No modifications are made to the data frames passing through this port group
178. If Huawei FusionCompute , the following factors on the measurement of computing
resource scheduling description is not correct D
A . When set to " CPU " , the CPU condition is triggered to trigger the scheduling policy.
B . When set to " memory " , the memory condition is met, that is, the scheduling policy is
triggered.
C . When set to " CPU and memory " , the CPU or memory condition is met to trigger the
scheduling policy.
D . When set to " CPU and memory " , the scheduling policy is triggered only when the CPU and
memory conditions are met.
179. In Huawei FusionCompute , virtual machines using raw device mapping type data storage
are not supported ( AC ) (multiple choice)
A. Snapshot
B. CPU hot add
C. Storage thin provisioning
D. Storage hot migration
180. The following description of the relationship between virtualization and cloud computing is
correct (multiple choice) B C D
A , no cloud computing, there is no value in virtual reality
B. Virtualization is a technology. Cloud computing is a service model. Virtualization drives the
development of cloud computing .
C , without virtualization, cloud computing has no value
D. Virtualization is one of the important technologies for implementing cloud computing .

181. The following major drivers of the emergence and development of virtualization
technologies are ( C )
A , the emergence of the Internet
B , reduce the failure rate of hardware resources
C , make full use of hardware resources
D , improve the identification of hardware resources
182. Virtualization is divided into computing virtualization, storage virtualization, and network
virtualization, corresponding to cloud computing cloud hosting, cloud storage, and cloud
network A.
A , right
B , wrong
183. Features of virtualization include partitioning, isolation, encapsulation, and standalone A
A , right
B , wrong
184. Which of the following options belong to KVM (multiple choice) AC
A , Libvirt
B , Domain 0
C , QEMU
D , ESXI
185. The following options belong to the open source virtualization technology ( C )
A , FusionCompute
B , vSphere
C , KVM
D , Hyper-v
186. Among the following options, the description of cloud computing on-demand self-service
features is correct ( C )
A , cloud computing service providers only need to be ready to service all of the remaining work
done entirely by the users themselves
B. Users need to solve all the problems themselves in the process of using cloud computing .
C. After the user has determined the cloud computing service that he needs , he can
complete the application of the cloud computing resource by himself .
D , when users use cloud computing resources, they do not need to explain to the service
provider at all.
187 The reason why computing virtualization technology can improve application reliability is
(multiple choice) AB
A , virtual machine and hardware decoupling that host applications, can be migrated between
multiple physical hosts using virtual machines
B , the use of computer virtualization technology can automatically carry application virtual
machines assigned to the physical host sufficient resources
C , calculated using virtualization technology allows multiple applications to run simultaneously
on a single physical host
D , using computing virtualization technology can automatically adjust the virtualization
specifications
188 In Huawei's FusionCompute , the system disk of the virtual machine cannot be unbound B.
A , True
B , False
The following 189 descriptions about distributed storage are correct ( C )
A , distributed storage disk from the x86 architecture disk array
B , distributed storage disk from the individual PC
C , distributed storage disk from the x86 architecture server
D , distributed storage disk from the x86 architecture virtual machine

The following description of RAID about 190 is correct (multiple choice) BC


A , RAID6 and RAID5 , data recovery ability is stronger, but the disk read and write ability is
reduced
B , when a damaged disk, a RAID5 the other disk still work, the disk I / O performance is not
affected
C , RAID is to improve the I / O performance of the storage system by concurrently reading and
writing data on multiple disks
D , the RAID can be viewed by two or more number storage disks, the disk capacity available
capacity for the sum and
191 RAID 6 in RAID 5 enhances the fault tolerance of the disk based on, may be allowed 2 disks
fails, but not less than the number of disks needed . 4 block A
A , True
B , False
192 In the following description, the characteristics of the virtualized package are (multiple
choice) ABD
A , the virtual machine configuration file will contain information such as CPU type, quantity, etc.
B , a virtual machine can be migrated from one physical host to another physical host
C , you can run multiple virtual machines simultaneously on a single physical host
D , if a virtual machine has multiple hard drives, each hard disk will have a corresponding file
193 Huawei FusionCompute , the virtual machine installed Tools operating system type and
version of the virtual machine is independent of B // associated with the system
A , True
B , False
194 is the FusionCompute . Which of the following options does not belong to
the CPU resource QoS parameter? D
A , CPU resource share
B , CPU resource limit
C , CPU resource reservation
D , CPU resource reuse
195 The main purpose of opening NUMA function, the description is correct () A
A , optimize the memory access performance of the virtual machine
B , maximize the computing power of the physical host CPU
C , maximize the reuse rate of physical machine memory
D , maximize the virtual machine's vCPU computing power
196 is the FusionSphere , the function that disk thinning can achieve is (multiple choice) A CD
A , virtual storage thin provisioning and operating system, hardware has nothing to do, so as long
as the use of virtual image management system, it can achieve disk thin provisioning
B , does not currently support NTFS formatted virtual machine disk recovery // NTFS does not
support online recovery
C , provide virtual disk space monitoring and recycling
D , to provide data storage capacity warning threshold may be set, generating a warning when
the storage capacity exceeds the threshold value
197 In FusionCompute , when adding shared storage for multiple hosts, the following operations
are correct (multiple choice) BCD
A. Check all the hosts when associating storage devices.
B. Check the corresponding host when adding data storage .
C. When the shared storage type is IP SAN , ensure that the storage network of the host and the
service interface of the storage are connected.
D. Check all hosts when initializing storage resources.

198 NUMA 's description is incorrect () C


A , Guest NUMA is to identify the Guest OS and its internal applications by presenting
a NUMA structure to the virtual machine.
NUMA structure for the purpose of improving application performance
B , NUMA technology makes the CPU access the same speed as the memory in Node and access
the memory speed of other Nodes .
C , Host NUMA mainly provides CPU load balancing mechanism to solve VM performance
bottleneck caused by unbalanced CPU resource allocation .
D , Host NUMA guarantees VM access to local physical memory, reducing memory access latency
and improving VM performance
199 is the FusionCompute , the following description about the template format is incorrect ( D )
A , .ovf is the description file of the virtual machine , and .vhd is the disk file of the virtual
machine.
B , the virtual machine template format is divided into ova and ovf two kinds
The C , ovf format template contains only one ovf file and one vhd file.
D , the format of the template is exported to contain only one file
200 is the FusionCompute , and the IP address of a Windows VM is [Link] . The possible reason
is ( D )
A , the virtual machine's IP address is manually set
B , the virtual machine's IP address is manually set to [Link]
C , the virtual machine's IP address is assigned to DHCP
D , the virtual machine does not have Tools installed
201 is in FusionCompute . The hardware description of the bare device is incorrect () B.
A , the best performance of disk mapping using raw device mapping
B , the operating system is recommended to be installed on the disk using the raw
device mapping function
C , a data storage smart using raw device mapping corresponds to a LUN on the SAN storage
D , a data storage using raw device mapping can only correspond to one disk
202 is FusionCompute , the virtual NIC is connected to each virtual machine on the virtual switch
port, in order to facilitate the user to simultaneously configure and manage a plurality of ports,
the ports have the same network properties into the same port of the group A
A , True
B , False
The memory exchange in 203 means that the memory is virtual or externally stored to the virtual
machine, and the temporarily unused data on the virtual machine is stored on the external
storage. When the system needs to use the data, and the data reserved in the memory.
Exchange A
A , True
B , False
204 is the FusionCompute . The following description about the storage related concept is
incorrect ( C )
A , a physical storage device can be used as a storage resource
B , the physical storage in the storage device corresponding to the logical unit, e.g. LUN
C , data storage can be IP SAN , FC SAN , NAS, etc. //
D , VHD is the virtual machine disk file format
On the FusionCompute , you can create a snapshot for the CNA host. B
A , True
B , False
206 Performing a virtual machine change in the FusionCompute to change the host hot migration
operation. The following description is not a limitation ( C/D ).
A , the state of the virtual machine must be "running"
B , the destination host is not in maintenance mode
C , can not mount the "shared" type of disk
D , the virtual machine can not use the "raw device" type of data storage
207 FusionCompute , the administrator CNA two card host through a main standby mode
of binding, the binding of a transmission rate equal to the transmission rate of the two Ethernet
ports and . B
A , True
B , False
208. The description of the extensive network access characteristics of cloud computing is
correct () . 【Multiple choices】ABCD
A. Through the network, users can use self-purchased cloud computing resources through
different terminals.
B. Through the network, users can use self-purchased cloud computing resources at any time.
C. Through the network, users can view the status of self-purchased cloud computing resources
at any time.
D. Through the network, users can use self-purchased cloud computing resources in different
locations.
209. When a virtual machine on a physical host fails, it does not affect other virtual machines on
the physical host. Which feature of virtualization technology is this? A
A. Isolation
B. Partition
C. Independence
D. Package
210. Which of the following scenarios does virtualization apply to? 【Multiple choices】ACD
A. A company has ten business systems, and the utilization of host resources carrying these
services is less than 20%.
B. A scientific research institution uses a customized operating system to ensure the
confidentiality of scientific research results
C. An enterprise needs a high-load, intensive computing environment
D. The daily use of the desk surface of a unit employee is highly similar
211. The following description about Virt-manager is correct ( BD ). [multiple choice]
A. Virt-manager is a KVM virtual machine management command set
B. Virt-manager is an open source KVM virtual machine management tool
C. Virt-manager is a commercial KVM virtual machine management tool
D. Virt-manager is a KVM virtual machine graphical management tool
212. In a NAS environment, multiple hosts simultaneously writing to one file can cause data
consistency problems. A
A. True
B. False
213. If virtual machine A and virtual machine B are running on different physical servers, which
physical device will be used in the process of communication? ( multiple choice ) ABCD
A. Virtual network card
B. Virtual switch
C. Physical switch
D. Physical network card
214. A virtual machine can have multiple virtual network cards at the same time, corresponding
to different virtual switches A.
A. True
B. False
215. In Huawei FusionCompute , the following description about the template format is incorrect
(A).
A. Ovf format template contains only one ovf file and one vhd file.
B. Ova format template export contains only one file
C. virtual machine template format is divided into ova and ovf two kinds
D. .ovf is the description file of the virtual machine , .vhd is the disk file of the virtual machine.
216. The following way to create a virtual machine template is incorrect ( D ) .
A. Template cloning as a template
B. Virtual machine cloned as a template
C. Convert the virtual machine to a template
D. Snapshot to template
217. Virtual machine hot migration refers to moving virtual machines in the same cluster from
one physical server to another in the state of a virtual machine. B
A. True
B. False
218. In Huawei FusionCompute , the following description about virtual machine snapshot
recovery is incorrect ( B ) .
A. Use the existing snapshot of the virtual machine to restore the virtual machine's data to the
state of the snapshot creation time.
B. If the virtual machine deletes the port group where the virtual machine NIC is located after the
snapshot is created, the deleted port group will also be restored when the virtual machine is
restored using the snapshot.
C. If a disk mode of a virtual machine is "independent - persistent" or "independent - non-
persistent" , the data of the disk is not restored when the virtual machine is restored using the
snapshot.
D. Multiple snapshots can exist in a virtual machine
219. In FusionCompute , the QoS parameters that can be set for the virtual machine do not
include: A
A. GPU
B. Disk IOPS
C. Memory
D. Network
E. CPU
220. When the use of templates for rapid deployment of virtual machines, resulting virtual
machine configuration information is consistent with the template A
A. True
B. False
221. voice recognition, image recognition, emotion accompanying the application of artificial
intelligence robot is A
A. True
B. False
222. The following description of big data and cloud computing is ( D ) .
A. Cloud computing refers to a collection of data that cannot be captured, managed, and
processed by conventional software tools within a certain time frame.
B. Big data is a pay-as-you-go model that provides usable, portable, on-demand network access
C. Cloud computing cannot function as the underlying computing resource for big data processing
D. Big data can be used as a type of cloud computing service for users to choose on demand
223. On Huawei FusionCompute , the user logs in to the VM using VNC and finds that it cannot
operate normally. The card is stuck (such as unable to open files) . The optimal cause of this fault
is ( C ) .
A. Virtual machine damage
B. The service link is unstable
C. Management link instability
D. Storage link instability
224. In Huawei FusionCompute , the correct description of "role" is ( A ) .
A. If a "user" has multiple "role" , the "operational authority" it has depends on the "priority" with
the highest priority.
B. A "role" can have one or more different "operating systems"
C. "Operation rights" of "role" cannot be modified
D. A "user" can only have one "role"
225. In Huawei FusionCompute , what functions will be affected after the virtual machine is
bound to a USB device? [Multiple choices] CD
A. Virtual machine resource expansion
B. Virtual machine restart
C. Virtual machine hot migration
D. Cluster scheduling strategy
226. When you bind a disk to a VM in the Huawei FusionCompute , you must not take a snapshot
of the disk when you create a snapshot. When you use the snapshot to restore the VM, the disk
is not restored. All data is required. Which type of disk should I choose if I write to the disk
permanently ? B
A. Independent - non-persistent
B. Independence - lasting
C. Independence
D. Subordinates
227. Huawei FusionCompute , the memory resources used by the virtual machine,
and CPU resources can only be provided by the same cluster, and therefore, the virtual machines
actually available computing resources can not exceed the maximum resources available to all
hosts within the cluster sum B
A. True
B. False
228. Huawei FusionCompute , if only one physical network ports bound network port, the
physical network interface can not be removed directly A
A. True
B. False
229. In Huawei FusionCompute , the following description of the security group rules is incorrect
(B).
A. When a virtual machine has multiple NICs, you can configure a security group for each NIC.
B. After creating a security group and adding rules, the virtual machine can communicate with
the outside world.
C. All virtual machine NICs in the same security group will use this security group rule for access
control.
D. The essence of a security group is the collection of rules

230. In Huawei FusionCompute , if the Windows virtual machine has a blue screen, what can the
system do? 【Multiple choices】ACD
A. HA virtual machine
B. Using a snapshot to recover a virtual machine
C. Restart the virtual machine
D. No processing
231. In Huawei FusionCompute , the description of the login VM is correct ( BC ) . [multiple choice]
A. The virtual machine does not have an IP address, and the administrator can log
in through VNC , so VNC gets rid of the dependence on the network.
B. If the operating system of the virtual machine is windows , the administrator can log in to the
virtual machine through the remote desktop.
C. The administrator can log in to the virtual machine of any operating system through VNC .
D. If the operating system of the virtual machine is Linux , the administrator can log in to the
virtual machine through the remote desktop.
232. In the Huawei FusionCompute , to enable the virtual machine to migrate
between CNA hosts of different CPU models , the function to be enabled is ( B ) .
A. Cluster GuestNUMA strategy
B. Cluster IMC strategy
C. Cluster I/O ring adaptation
D. Cluster HANA optimization
233. In Huawei FusionCompute , the following description about virtual machine storage hot
migration is incorrect ( B ) .
A. Storage hot migration can be performed between different storage devices
B. Storage hot migration can be performed between different virtual disks
C. Storage hot migration can be performed between different storage resources
D. Storage hot migration can be performed between different data stores
234. Huawei FusionCompute , the resource cluster is constituted by the host and storage and
network resources associated with the A
A. True
B. False
235 , cloud computing quantifiable service refers to the use of time and is in accordance with the
amount of charge to customers. A
A , TRUE
B , FALSE
236 , the cloud is the product of development of Internet technology and computing, so the
cloud must take account of the network ( A )
A , TRUE
B , FALSE
237. In Huawei FusionCompute , a virtual machine of the Linux operating system is created . In
this scenario, host OS
Running at ( B )
A , VNA
B , CNA
C , VRM
D , Linux virtual machine

238 , KVM virtualized architecture includes KVM module, QEMU and Libvirt , the following
description is not correct about these modules ( C )
A , KVM module is mainly responsible for Vcpu creation and virtual memory allocation
B , the KVM the QEMU + may constitute a virtualization technology solutions solutions
C , Libvirt + QEMU can constitute a virtualization technology solutions program
D , QEMU is mainly responsible for I/O operation simulation
239. The virtual machine generally has a corresponding configuration file, and records
the information such as the specification and name of the virtual machine . A
A , TRUE
B , FALSE
240 , the following description is incorrect ( A )
A , each file system block corresponds to a non-contiguous area on the physical disk
B. The file is stored on the file system and mapped by the file system to the file system block.
C , the file system block corresponds to the logical area of LVM
D , the logical area is mapped to the physical area of the disk through LVM
241. In Huawei FusionCompute , the management VLAN ID used by the VRM cannot be
changed. B
A , TRUE
B , FALSE
242. After using virtio , the NIC speed of the windows virtual machine is 10Gbps B
A , TRUE
B , FALSE
243. Where is the memory multiplexing function enabled in Huawei FusionCompute ? D
A . Host
B . operating system
C . virtual machine
D . Cluster
244. In Huawei FusionCompute , when the virtual machine is in the "running" or "stopped" state,
the user can
To increase or decrease the number of vCPUs of the virtual machine B
A , TRUE
B , FALSE
245. In Huawei FusionCompute , which of the following factors does DRS perform virtual
machine migration? (multiple choice) AD
A. Memory
BI/O
C. Network traffic
[Link]

246. The following is incorrect about the CPU resource and memory resource Qos description
is D
A . Memory resource QOS is used to ensure that key business virtual machines can get enough
memory resources.
B. CPU shares and CPU reservations only work when each virtual machine competes for
computing resources.
C. The CPU QoS of the virtual machine is used to ensure that the computing resources of the
virtual machine are properly allocated.
D. Memory resource QoS can only be used after the memory multiplexing switch is enabled.
247. With the attention of the "Internet" and the rise of big data and cloud computing , related
technologies are springing up.
Everyone's vision, which is widely used and attention is Docker , following on Docker statement
is incorrect B
A . Docker can package the underlying environment of the application, ensuring that applications
can still run normally after migration
B . Docker needs to create a virtual layer, virtual operating system, etc. on the host or host
operating system, and then proceed
installation
Docker starts faster than [Link] compared to other virtual machine technologies
[Link] runs with a container, which is a running instance created from Image .
248. The following description about the Huawei FusionCompute architecture is incorrect ( D )
A . CNA provides computing resources for virtual machines
B . VRM can be run on CAN or it can be deployed on a separate physical machine
C . VRM provides administrators with a management portal
D . CNA can manage cluster networks, storage and computing resources // clusters all
249. Huawei FusionCompute supports batch add a host, the host administrator fill in the
information in the template provided by the system and one-time import () A
A , TRUE
B , FALSE
250. The storage resource types supported by Huawei FusionCompute are ( ABCDE ) (multiple
choice)
A . FusionStorage
B . Advanced SAN
C . NAS
D . IP SAN
E . FC SAN
251. After deploying Huawei FusionCompute according to the attack , IT automatically creates a
cluster. What operations can the administrator do with the cluster? (multiple choice) ABC
A . Move to the specified cluster folder
B . Modify name
C . Add description
D . Export to local
252. The cloud service purchased by the user contains the application running environment, but
there is no application and related data. This model
Formula belongs to ( B )
A , SaaS
B , PaaS
C , NaaS
D , IaaS
253 . The following options do not reflect the cloud on-demand self-service feature ( D )
A. The engineer purchased a cloud server in Huawei Public Cloud according to his own needs.
B , engineers will buy their own cloud server CPU from the 2 Ge upgraded to 4 Ge
C , the engineer changed the operating system of the cloud server he purchased
from Linux to Windows.
D. The engineer received the notification message from the server provider one week before the
cloud server expired.
254. Which operating system can format the disk to NTFS ? B
A . Linux
B. Windows
[Link]
[Link]
1. In Huawei Fusioneompute, the administrator can view the DVS port connected to the virtual machine.
OA. TRUE
OB. FALSE (Right Answers)

Answer: F

2. When creating a port group in Huawei FusionCompute, which of the following operation is incorrect?
❑ A. Set the VLAN ID to "5000'71409d total 4095 04095 Right Answers)
❑ B. Set the port group name to 'Test'
❑ C. Set the port type to wnormal"llaccess normal trunk relay
❑ D. Add 'This is the test port' in the description.

Answer: A

4 The memory resources and CPU resourcesused by VMs in Huawei FusionCompute can only be prowled by the same cluster Therefore, Namaximum amount of computing resources that a virtual machine can use cannot exceed the sum of
resources available to all hosts in the cluster
OA TRUE
o B FALSE {Right Answers)

Answer: F

2Z The administrator adds a storage interface to the host in FusionCompute to achieve the docking of host and storage device_ Which of the following storage types do not need to add a storage interface? (Multiple Choices)
❑ A FC-SAN storage (Right Answers)
111 B IP-SAN storage
111 a Local hard disk (Right Answers)
❑ D Local memory disk [Right Answers)

Answer: ACD

23. When installing FusionCampute, which of the following is the proper order of installation?
D A First install the VRM on a physical server, and then add the host through VRM_ After the host is added successfully. it is the CNA host_
E B. Install the CNA host first, then install the Installer on the CNA host and install the VRM through the Installer
D C. Install the Installer on the PC first, then install the CNA host and VRM through the Installer (Right Answers)
❑ D. Use mirroring to install the server as a CNA host, and then use commands to create a VRM virtual machine on the host_

Answer: C

24. In Huawei FusionSphere, what kind of storage resource is added to a host, then one disk of a VM corresponds to one LUN in the storage? (Multiple Choices)
El A_ FusionStorage (Right Answers)
D D. Advanced SAN {Right Answers)
111 c. EC.-SAN
0 a IRSAN

Answer: AB

25. In FusionSphere, each VM can have multiple virtual network interface cards_
❑ A. True Right Answers)
❑ B. False

Answer: A
26. When creating a port group in FusionCompute, which of the following operation is wrong?
❑ A. Set the name of the port group as "ceshi"
❑ B_ Set the port type as "Normal"
❑ C. Set VLAN ID as "6000" (Right Answers)
❑ D. Add 'This is a test port" in the description

Answer: C

27. Where can be the DRS function enable on the FusionCompute?


❑ A. Cluster (Right Answers)
❑ B. Host
❑ C. Virtual Machine
❑ D. Operating System

Answer: A

28. It can set the MTU value as 10000 in FusionCompute networking pool.
❑ A. True
❑ B. False (Right Answers)

Answer: B

29. In FusionCompute, clonal VMs and cloned VMs have the same configuration at the time of cloning, but they do not have the same data.
❑ A. True
❑ B. False (Right Answers)

Answer: B

30. Cloud computing is defined as a model, not just as a technology. This model can be either a business model or a service model.
❑ A. True (Right Answers)
❑ B. False

Answer: A

31_ Which of the fallowing are the virtual exchange modes provided by Huawei virtual switches in FusionSphere?
❑ A. Normal Mode (Right Answers)
❑ B. Through Mode (Right Answers)
❑ C. SR-IOV through Mode (Right Answers)
❑ D. VF-TRUNK

Answer: ABC
32. It can use the physical host optical drive to install the operating system far VM in Huawei FusionSphere_
E A. True Right Answers)
❑ EL False

Answer: A

33. Create a new disk in FusionCompute. Which of the following is incorrect?


❑ A. Set the disk type as "normal" and set the disk mode as ''standalone - non-persistent'
❑ B. Set the disk mode as "standalone - non-persistent" and change the raw device mapping to "support" Right Answers)
❑ C. Set the configuration mode of disk as 'simplification" and set the disk mode as ''standalone - persistent"
❑ D. Set the configuration mode of disk ad 'simplification" and set the disk mode as "standalone - non-persistent"

Answer: B

34 In the Huawei server nrtualintion solution, the virtual network interface card of each virtual machine is connected to the port of the virtual switch To Rate the configuration and management of multiple ports at the same time, ports wrth the same
network attributes are distributed to the same port group
❑ A True {Right Answers)
❑ B False

Answer: A

35 FusionCompute can perceive the use of global physical resources during the running of a virtual hire and use intelligent scheduling algorithms to calculate the optimal host for virtual machine operation and run the virtual machine on the best host
through hot migration and other means This improves the overall business experience
❑ A True {Right Answers)
❑ B False

Answer: A

36.1n FusionSphere, the type of a disk is 'shared'. What are the correct statements about this disk? (Multiple Choices)
❑ A. This disk can only be bound to one virtual machine
❑ B. This disk can be bound to multiple virtual machines 1Right Answers)
❑ C. The virtual machine on which this disk is mounted does not support full thermal migration Right Answers)
❑ ❑. The virtual machine on which this disk is mounted does not support Snapshot function

Answer: BC

37. In FusionCampute, you can view which port of the DVS is connected to the vm_
❑ A. True (Right Answers)
❑ EL False

Answer: A

38. What are the correct descriptions of port groups in FusionSphere? (Multiple Choices)
❑ A. Port group is a kind of policy mechanism. These policies are used to manage the network connected to the port group. (Right Answers)
❑ B. A port group is a distributed Virtual switch
❑ C. The virtual port contained in the port group has the same attributes (Right Answers)
❑ ❑ _ There are two types of ports in the port group, they are normal and relay_ I Right Answers)

Answer: ACD
39. A snapshot in FusionSphere is a record of the data and status of a VM disk at a curtain time. Which of the following scenarios applies to the snapshot? (Multiple Choices)
❑ A. Create a snapshot for the VM before patching the VM operating system (Right Answers )
❑ B. Create a snapshot of the virtual machine where the application resides before upgrading the application (Right Answers)
❑ C. Create a snapshot of the virtual machine before deleting the virtual machine
❑ D. Create a snapshot of the virtual machine before shutting it down

Answer: AB

40_ What are the ways to deploy virtual machines on the FusionCompute?
❑ A. Copy
❑ B. Template conversion (Right Answers)
❑ C. Create directly (Right Answers)
❑ fr Cloning (Right Answers)

Answer: BCD

41. In Huawei cloud computing, which of the following technology does the VPC's network security isolation function not rely on?
❑ A. Hardware firewall
❑ B. Software firewall
❑ C. Switch
❑ D. Elastic IP (Right Answers)

Answer: D

42. About the descriptions of the storage-related concepts in Huawei FusionSphere, which is wrong?
❑ A. A physical storage device can be used as a storage resource
❑ B. The storage device corresponds to a logical unit in the physical storage. such as a LUN
❑ C. The capacity of data storage cannot be increased or decreased (Right Answers)
❑ D. VHD is a virtual machine disk file format

Answer: C

43. Which of the following does not belong to the VM thermal migration limitations in FusionCompute?
❑ A. Does not support the migration of mounted disks of "shared" type and the disk of linked clone virtual machines
❑ B. Does not support non-persistent disks and the migration of VM disks enabled iCache function
❑ C. Does not support the thermal migration of virtual machines with a status of 'faulty"
❑ D. Does not support the thermal migration of virtual machines with a status of "running" (Right Answers)

Answer: D
44. In FusionCompute, you need to modify a disk cif a VM. Which of the following operations can be implemented?
❑ A. Change the disk configuration mode from simplification to normal
❑ B. Change the mode of the disk from slave to standalone - persistent (Right Answers)
❑ C. Change the capacity of the disk from 80G to 80
❑ D. Modify the status of the disk from available to unavailable

Answer: B

45. What is service model of cloud computing for the basic resources such as rental processing capacity, storage space, and network capacity?
❑ A. Infrastructure as a Service (laaS) (Right Answers)
❑ B. Platform as a Service (PaaS)
❑ C Software as a Service (SaaS)
❑ D. Data as a Service (DaaS)

Answer: A

46. Through FusionSphere's memory reuse technology, the total memory used by all virtual machines on the entire physical server can exceed the total physical memory of the server
❑ A Tote (Right Answers)
❑ B. False

Answer: A

47. In Huawei FusionSphere, what is wrong about the description of raw device mapping?
❑ A. Disk performance is good using raw device mapping
❑ B. A data store that uses raw device mapping can only correspond to one disk
❑ C. The operating system is recommended to be installed on a disk that uses raw device mapping (Right Answers)
❑ D. A data store that uses raw device mapping can only correspond to a LUN on the SAN storage

Answer: C

dB In Huawei Fusion Sphere, the thin provisioning of wrtualized storage is completely independent of the operating system and hardware Therefore, as long as the virtual mirroring management system ed, the virtual storage thin provisioning function
can be Funded
❑ A True (Right Answers)
❑ B False

Answer: A

49 In FusionCompute, when the administrator checks the disk status, the administrator finds that the actual capacity is smaller than the capacity What causes this phenomenon?
❑ A. The disk type is "shared"
❑ The disk mode is "simplification" (Right Answers)
❑ c The disk status is 'unavailable"
❑ D The disk mode is 'slave"

Answer:

50. After the VRMs are deployed by host and backup, FusionCompute can be accessed through the floating IP address.
If the network Is normal, the floating IF' address is always inaccessible. Which of the following is the most likely point of failure?
❑ VRM master no-de fails
❑ B. VRM standby node fails
❑ C. There is a problem with one of the VRM master nodes or standby nodes
❑ D. Both the host and backup VRM nodes are faulty (Right Answers)

Answer: D
51 In the FusionSphere softer nrtualization solution, if the server has a small number of physical network adapters, consider merging multiple planes and togically isolate the planes through VLANs For example, th plane and the management
plane share the same physical network card but use different VLANs for isolation
❑ A True (Right Answers)
❑ B False

Answer: A

52. After FusionCompute is deployed, a user virtual machine on host computer can log in VNC window but can't operate properly and is stuck (can't click to open file, etc.).
The host has three network ports, which connect management, service and storage these three different network planes_ Which is the most likely cause of the failure?
❑ A. Management link interruption
❑ B. Service link interruption
❑ C. Storage link interruption (Right Answers)
❑ D. The virtual machine is damaged

Answer: C

53. Which device in the traditional network corresponds to DVS in Huawei FusionSphere?
❑ A. Splitter
❑ B. Layer 3 switch
❑ C. Layer 2 switch lRight Answers)
❑ IHub

Answer: C

54. Which are the limitations of storage device raw device mapping in FusionCompute? (Multiple choice)
❑ A. Does not support linked cloning (Right Answers)
❑ B. Does not support storage thin provisioning (Right Answers)
❑ C. Does not support storing incremental snapshots (Right Answers)
❑ D. Can't be used as a shared disk

Answer: ABC

55 When use template to deploy virtual machine in FusionCompute, you need to implement the following guirements When you create snapshot for virtual machine, the data or the disk is not taken snapshot When you use the snapshot to restore
virtual machine, the data on the disk is not restored At the same time, you want all Virtual machine data is permanently written to disk
Which disk mode should you choose,
❑ A Dependent
❑ 8 Independence
❑ C Independence—Durable (Right Answers)
❑ D Independent—Nondurable

Answer: C

56. The snapshot feature of the FusionCompute, which is correct? (Multiple choices.)
❑ A A virtual machine can create up to H snapshots The created snapshots can only be manually deleted
❑ B. The storage type of the virtual machine disk is advanced SAN storage, FusionStorage, nrtualized 1.31 hard disk, vhrtualized SAN storage or when the NAS is stored, the virtual machine supports the snapshot function (Right Answers)
❑ C If nrtual machine is set to Slave, the snapshot is not taken when the snapshot is created
▪ Can't operate virtual machine during online incremental snapshot creation [Right Answers)

Answer: BD

57 In FusionSphere, which is correct about the communication between virtual machines?


❑ A_ The two virtual machine that belong to the same port group on the network card communicate with each other without going through the physical network
❑ B. Two virtual machines running on the same host communicate with each other without going through the physical network
❑ C. The two virtual machines running on the same host and the network card belong to the same port group do not need to pass through the physical network (Right Answers)
❑ a Two virtual machines running on the same host and the network card do not belong to the same port group communicate with each other without going through the physical network

Answer: C
58. Which of the following statements about Huawei virtual switch are correct?
❑ A. Huawei Virtual Machine Switch is Open Source Open vSwitch
❑ B. Huawei Distributed Switch has multiple virtual ports_ Each port has its own attribute Right Answers)
❑ G Huawei virtual switches are divided into standard virtual switches and distributed virtual switches
❑ D. The virtual switch function of the intelligent network card is also provided by the Huawei virtual switch.

Answer: B

59 The description of the production template m FusionCompute Which is wrong?


❑ A 'Virtual machine to template" converts the virtual machine directly to template All parameters are currently configured use this mrtual machme The virtual machine will no longer exist after conversion
❑ B The Virtual machine cloning to template' is copy the virtual machine as template and support adjustment of some parameter configurations, which may be slightly different from the origin virtual machine The virtual machine can still be used
normally after cloning is completed
❑ 'Template cloning to template" is copy the template as a new template and support adjustment of some parameter configuration It can be slightly different from the ongnal template The onginal template still exists after cloning. complete
❑ D When use virtual machine to create a template, the status of the virtual machine can be "running'. {Right Answers)

Answer: D

61). In Huawei FusionSphere, the disk size is not automatically reduced after data is deleted inside the virtual machine. The next time the user rewrites the data, it will use these internally released spaces.
❑ A- True (Right Answers)
❑ 13- False

Answer: A

St What is the typical procedure for an administrator add storage to host in FusionCompute?
❑ A Add Host Storage Interface -> Associate Storage Resource -> Scan Storage Device -> Add Data Storage (Right Answers)
❑ B Associating Storage Resources Add Host Storage Interface -> Scan Storage Device -> Add Data Storage
❑ C Add Data Storage -> Add Host Storage Interface -> Associate Storage Resource -> Scan Storage Device
❑ D Add Host Storage Interface -> Associate Storage Resources -> Add Data Storage -> Scan Storage Devices

Answer: A

6Z Which is the correct relationship between the physical switch port mode and the port group type in the FusionCompute?
❑ A Common access port group for physical switches (Right Answers)
❑ B. Common trunk corresponding to the port group for physical switches
❑ C access of the physical switch to the port group
❑ a trunk of the physical switch trunk corresponding to the port group Right Answers)

Answer: AD

63. What are the ways to implement memory reuse in Huawei FusionSphere?
❑ A. Memory replacement Right Answers)
❑ B. Memory increased
❑ a Memory sharing 1Right Answers)
❑ D. Memory bubbles 'Right Answers)

Answer: ACD
64_Huawei FusionCompute CPU QoS features, which parameters can be configured? (Multiple choices)
❑ A Shares (Right Answers)
❑ B. Percentage
❑ C. Reserve (Right Answers)
❑ 0_ Limitations (Right Answers)

Answer: ACD

65. The QoS function of FusionCompute does not support the traffic limitation between virtual machines in the same host
❑ A. True
❑ B. False (Right Answers)

Answer: B

66_ Which of the fallowing functions is provided by CNA in FusionCompute? (Multiple choices)
❑ A. Manage the dynamic adjustment of resources within the cluster.
❑ B. Provide virtual computing capabilities (Right Answers)
❑ C_ Manage the virtual machines on the compute nodes_ (Right Answers)
❑ D. Manage computing, storage and network resources on the compute nodes. (Right Answers)

Answer: BCD
67. Use the existing template in the FusionCompute to create virtual machine that is consistent with the template specifications to implement the rapid deployment of virtual machines.
❑ A. True (Right Answers)
❑ B. False

Answer: A

68. Which does not support data storage of disk expansion in FusionCompute?
❑ A_ Local hard disk (Right Answers)
❑ B. Virtualized SAN storage
❑ C. NAS storage
❑ a FusionStorage

Answer: A

69. In FusionCompute, which functions can be enabled by the user to improve the I/O performance of large, multi-queue of 10-intensive services?
❑ A. Cluster I/O ring adaptation (Right Answers)
❑ B. Cluster HANA optimization
❑ C. Cluster GuestNUMA policy
❑ D. Cluster 1MC strategy

Answer: A
70_ When add storage resource to Huawei FusionCompute_ select the resource 'Advanced SAN", you must set the storage multipath type to "Huawei".
❑ A. True (Right Answers)
❑ B. False

Answer: A

71 The function of the operation log in FusionSphere is to supervise the operation of the administrator in real time to ensure the security of the system
❑ A. True
❑ B False (Right Answers)

Answer: B

12. In FusionCompute, which is the correct about ID ring?


❑ A.. The main purpose of turning on I/O ring is maximize the performance of the storage device. Right Answers)
❑ B. In the same cluster, administrators can turn on I/O ring function for some hosts according to their needs.
❑ C. In the same cluster, administrators can turn on I/O rings for some virtual machine according to their needs.
❑ D. Immediately after the I/O ring function is enabled in the same cluster

Answer: A

73. Create a virtual machine in FusionSphere. Which is correct statement about the network card of virtual machine?
❑ A_ There is a fundamental difference between virtual network card and physical network_ A virtual network card does not require MAC address_
❑ B. In the indualized network. the MAC address and P address of the virtual network card can be manually specified Right Answers)
❑ C. In the virtualized network, the MAC address and IF' address of the virtual network card are automatically assigned by the VRM.
❑ D. In the virtualized network, the IP address of the virtual network card needs to be manually specified

Answer: B

74. FusionSphere installation includes tool installation and manual installation.


❑ A. True Right Answers)
❑ B. False

Answer: A

T6. In FusionCompute set the host failure control policy to 'infra nrtual machine cluster recovery' After a host in the cluster fails, the virtual machine on this host will automatically migrate to other hosts in the cluster
❑ A True
❑ 5 False (Right Answers)

Answer: B

76. The CPU source reservation in the FusionCompute refers to the highest computing capacity that the virtual machine can obtain. The CPU source limit refers to the minimum computing capacity that the virtual machine can obtain.
❑ A True
❑ B False fRightAnswers)

Answer: B

77 Virtualization is a kind of resource management technology It abstracts and converts various physical resources,such asservers,networks, memory and storage It breaks the uncutable barriers between the physical structures and it allows users to
apply these resources better than the original configuration
❑ A True (Right Answers)
❑ B False

Answer: A

78 The description of HA in Huawei FusionSphere, which is wrong,


❑ A This function support automatic restart after virtual machine failure
❑ B If the virtual machine data is stdred in shared storage. unsaved data will not be lost if failure occurs (RightAnswers)
❑ C- The system periodically detects the status of the virtual machine_ When the failure of the physical server causes the failure of the virtual machine, the system will migrate the virtual machine to another physical server and restart to ensure that the
virtual machine can recover quickly
❑ D The current system can detect the cause of wtual machine failures, including physical hardware failures and operating system failures

Answer: B
79. In Huawei FusionSphere, when add shared storage for multiple hosts, which of the following operations are correct? (Multiple choices)
E A. When the shared storage type is IF' SAN. ensure that the host storage network and the storage service interface are connected. Plight Answers)
▪ Check the corresponding host when add data store (Right Answers)
D C. Check all hosts when associating storage devices
❑ D. Check all hosts when initializing storage resources

Answer: AS

80. Which of the following are not the default roles in FusionManager system?
El A. administrator
El B. operator
❑ C. super_administrator (Right Answers)
❑ D. user
El E. auditor

Answer: C

81. The following statements about VNC, which are correct? (Multiple choices)
E A. VNC needs to support Linux operating system
E B. VNC is a lightweight remote control computer software Right Answers)
E C. The controlled computer needs to install the corresponding software as VNC server 1Right Answers)
E a Hosts that initiate control requests need to install the corresponding software as VNC sewer

Answer: BC

82. In FusionCompute for virtual machine cloning, which conditions must be cloned for the virtual machine? (Multiple choice)
LI A. The virtual machine ID for the cloned virtual machine has been obtained
El B. When cloning virtual machine online, only one virtual machine can be cloned at one time. Batch cloning is not supported.
El C. The virtual machine has tools and the tools are running normally 'Right Answers)
El a The disk of the virtual machine must be created on the virtualized data storage or FusionStorage, and the shared disk cannot be mounted (Right Answers)

Answer: CD

83 In FusionCompute, configure the IMC model can ensure that the host within a duster to the virtual macfine no prairie the same CPU function set, even lithe host of the actual CPU model is different also won't because the CPU is not compatible with
Me wtual machine failure caused by migration
D A True {Right Answers)
D B False

Answer: A

84. In the cloud computing, what is the so-called east-west traffic of the data center? (Multiple choices)
LI A. Interactive traffic between multiple data centers Right Answers)
❑ EL Data center-to-user traffic
El C. Data Center internal interactive traffic Right Answers)
LI D. Data Center External Traffic

Answer: AC
85. Which of the following concepts belong to the FusionSphere Virtualization Network? (Multiple choices)
❑ A. vNIC / Right Answers)
❑ B. DVS (Right Answers)
❑ C. Uplink (Right Answers)
❑ D. Port group (Right Answers)

Answer: ABCD

86. In FusionSphere, which of the following is a description of VM hot migration?


❑ A. Drfferent source CPUs from diffefent vendors do not affect hot migration (Right Answers)
❑ B. Memory compression transmission technology used to improve migration efficiency
❑ C. During the VM migration, user services will not be interrupted
❑ a Migrate virtual machines within and between clusters

Answer: A
87 In FusionCompute, Tools is the drrver for the VM After the bare VM is created and the operating system is installed. tools pronded by Huawei must be installed on the VM to improve the I/O processing performance of the VM and implement the VM
Hardware monitoring and other advanced features Tools are independent of the operating system type and versFon used by the virtual machine
❑ A True
❑ B False (Right Answers)

Answer: B

88. What are the ways in which administrators log in to virtual machines in Huawei FusionSphere?
❑ A. If the operating system of the VM is windows, the administrator can log in to the VM through Remote Desktop. (Right Answers)
❑ EL If the operating system of the VM is Linux, the administrator can log in to the VM through Remote Desktop_ (Right Answers)
❑ C_ Administrators can log in through the VUC to install a virtual machine that is running an operating system (Right Answers)
❑ D. The virtual machine does not have an IP address, and the administrator can also log in va VNC. Therefore, VNC is not reliant on the network.

Answer: ABC

89. In FusionCompute, under the 'VLAN Pool" menu, which of the following operations can be implemented?
❑ A. In the same DVS, add 10 VLAN pools, and each VLAN pool has the same VLAN ID
❑ B. Add 1 VLAN pool under DVS, and the starting VLAN ID of the VLAN pool is set to 100 (Right Answers)
❑ C. Add 1 VLAN pool under DVS, and the starting VLAN ID of the VLAN pool is set to 0
❑ D. Add 1 VLAN Pool under DVS, and the End VLAN ID of VLAN Pool is set to 4096

Answer: B

90. In FusionComputie, what is the incorrect way to create a template?


❑ A. The virtual machine is converted to a template
❑ B. Snapshots to Templates Right Answers)
❑ C. Cloning a virtual machine as a template
❑ D. Template cloning as a template

Answer: B
91. What network capabilities can VPC provide? (Multiple choices)
❑ A. Elastic IP (Right Answers)
❑ B. Security group iRight Answers)
❑ C. VLB (Right Answers)
❑ D. Virtual Routing Function (Right Answers)

Answer: ABCD

92. When VMs are hot migrated in FusionCompute, what conditions must be met by VMs and hosts?
❑ A. The running status of the virtual machine is 'stopped"
❑ B. The source host and target host network are connected iRight Answers)
❑ C. The running status of the virtual machine is "running" (Right Answers)
❑ D. The source and target hosts use the same shared storage RRight Answers)

Answer: BCD
93 The memory swap in FusionCompute refers to the virtual storage of external memory to a rftual marline, and the temporarily unused data on the virtual machine is stored on the e rnal storage When the system needs to use this data, it is
exchanged with the data reserved in memory
❑ A I rue
❑ B False (Right Answers)

Answer: B

94. In Huawei FusionSphere, the resources of The cluster are mainly composed of hosts that are included, and the storage and network resources associated with the hosts also belong to the cluster.
❑ A True (Right Answers)
❑ B False

Answer: A

95. In FusionSphere, what type of network device can the gateway address of the virtual machine be set on?
❑ A. Layer 3 switch iRight Answers)
❑ B. Layer 2 switch
❑ C. Virtual Switch
❑ D. One layer of physical equipment

Answer: A

96_ Which of the fallowing are features of FusionSphere? (Multiple choices)


❑ A. Apply on-demand resources (Right Answers)
❑ B. Widely compatible with various hardware and software iRight Answers)
❑ C. Automatic scheduling (Right Answers)
❑ D. Rich Operations Management Right Answers)

Answer: ABCD
97. In FusionCompute, what is the correct order to use IP SAN type storage?
1_ Add storage resources
2_ Add a storage interface on the host
3_ Add data storage
4_ Create a disk
❑ A_ 1-2-34
❑ B_ 1-34-2
❑ C_ 2-1-3-4 (Right Answers)
❑ D..4-2'-1-3

Answer: C

98. In FusionCompute, if multiple virtual machines use the same shared disk, data may be lost if data is written at the same time. If you use a shared disk, you need to ensure that the application software controls access to the disk.
A. True (Right Answers)
El B. False

Answer: A

99. When a fault is encountered in FusionSphere, which of the following processing order is correct.?
❑ A_ Information Collection - Fault Diagnosis - Fault Location - Troubleshooting (Right Answers)
❑ B. Fault Diagnosis - Information Collection - Fault Location - Troubleshooting
❑ C_ Fault Diagnosis - Fault Location - Information Collection - Troubleshooting
❑ a Information Collection - Fault Location - Fault. Diagnosis — Troubleshooting

Answer: A

100_ In FusionCompute, hosts can be added in batches_ All host information needs to be set in the template and imported at one time.
❑ A. True (Right Answers)
❑ B. False

Answer: A

101_ The following tools used for information collection and health check in FusionSphere are as follows:
❑ A_ FusionSphere SOI
❑ B. FusionCare (Right Answers)
❑ C. UpdateTool
❑ FusionManager
❑ E_ FusionCompute

Answer: B
102. When creating a port group in FusionCompute, setting the VLAN ID to 10 represents which of the following statements? (Multiple choices)
❑ A. Forward packets after passing the label with VLAN 10 in this port group (Right Answers)
❑ B. After VLAN 10 packets are tagged on packets that have not been tagged with VLAN tags through this port group Right Answers)
❑ C. Drop packets with non-VLAN 10 tags passing through this port group (Right Answers)
❑ D. After the packet with the non-VLAN 10 tag passed through this port group is changed to VLAN 10 and forwarded

Answer: ABC

103_ In Humvei FnsionSphere, the computing resources on the host are 0arlualized to form a computing resource pool_ The computing resources of all hosts in the same cluster form a computing resource pool_
❑ A. True Might Answers)
❑ B. False

Answer! A

104. What are the data storage methods used in I-luawei FusionSphere? (Multiple choices)
❑ A. SAN
▪ Virtualized data storage {Right Answers)
❑ C. NonNirtualized data storage {Right Answers)
❑ D. Raw device mapping {Right Answers)

Answer: BCD

105. Virtualizatian technology can be used to virtualize a physical server into multiple virtual machines, which improves the physical servers hardware performance.
❑ A. True
❑ El False {Right Answers)

Answer: B

108. In the following project scenario, the customer purchases senters, switches, storage, and TCs. It requires the compan existing office desktops lobe completely migrated from he PC to the cloud. Which are the required in the following of the
employees can use the account passwords to log in to the cloud office desktop through the TC or SC? (Multiple choices)
❑ A Fusion Compute (Right Answers)
❑ B. Fusion Storage
❑ a Fusion Manager
❑ a Fuson Access (Right Answers)
❑ E. Fusion Network

Mower: AD

107 FusionCompute uses virtual machine QoS. technology to ensure visual machine resource allocation, isolates the rnter ton between visual machines due to different services,and meets the qw nts of different services for u hine
performance which could maximizes resource reuse and reduces cos
❑ A True (Right Answers)
❑ B False

Answer: A

108_ In FusionCompute, what are the following functions provided by VRM? (Multiple choices}
❑ A. Manage the block storage resources in the cluster. {Right Answers)
❑ B. Manage the network resources (IPNLAN/DHCP) in the cluster and assign IP addresses to the virtual machines. (Right Answers)
❑ C. Through the unified management of virtual resources and user data. external services such as elastic computing, storage. and IP are provided. {Right Answers)
❑ Et Manage computing resources on the compute nodes.

Answer: ABC
169. Which of the following technologies belong to the cloud computing technology system? (Multiple choices)
❑ A. Vinualization Technology (Right Answers)
❑ B. Storage Technology 1Right Answers)
❑ C. Network Technology {Right Answers)
❑ D. Distributed Technology {Right Answers)

Answer: ABCD

110. In FusionCompute, what functions can be set to enable virtual machines to migrate between hosts of different CPU types?
❑ A Cluster VC ring adaptation
❑ B. Cluster HANA optimization
❑ C. Cluster GuestNUMA policy
❑ ❑. Cluster IMC strategy (Right Answers)

Answer: ❑

111. In FusionCompute, the QoS parameters that can be set for the Viol do not include:
❑ k Memory
❑ B. CPU
❑ C. GPU Right Answers)
❑ D. Disk lOPS
❑ E Network

Answer: C

112_ When users install the following OS on the VM, can the disk be formatted as NTES?
❑ A Linux
❑ B. UVP
❑ C. Windows {Right Answers)
❑ D. Unix

Answer: C

113. When deploying a VRM using the FusionCompute Installation Wizard tool, which form is used to deploy a VRM virtual machine?
❑ A. ISO file auto answer installation
❑ H. Importing Template Files into Virtual Machines (Right Answers)
❑ C PXE automatic installation
❑ ❑_ Automatically create a virtual machine, automatically mount the ISO file installation

Answer:

114.1n Huawei Fusion Sphere. which of the following functions can be implemented for disk thin provisioning? (Multiple choice)
❑ A. The virtual storage thin provisioning is completely independent of the operating system and hardware. Therefore, as long as the nrtual image management system is used, virtual storage thin prwisi can be prwded 044(0/inswers)
❑ B. Providing early warning of data storage capacity You can set a threshold. When the storage capacity exceeds the threshold, an alarm is generated. (Right Answers)
❑ a Provides virtual disk space monitoring and recovery (Right Answers)
❑ B_ Currently does not support virtual machine disk recovery in NTFS format

Answer: ABC
115. In Huawei FusionSphere, which of the following types of storage can be added as storage resources and associated with hosts? (Multiple choice)
❑ A. SAN storage (Right Answers)
❑ B. NAS storage (Right Answers)
❑ C. Local disk
❑ D. Local memory disk

Answer: AB

116. In FusionCompute, do the following operations on the hardware of the virtual machine. What can be effective immediately?
❑ A. Delete the network card (Right Answers)
❑ B. Increase CPU
❑ C_ Reduce CPU
❑ D. Increase memory

Answer: A

117. When a virtual machine in FusionCompute mounts a local mirror file and installs an operating system, you can close the VNC window at any time without affecting mirror reading.
❑ A. True
❑ B. False (Right Answers)

Answer: B

118_ What is the format of the virtual disk file in FusionCompute?


❑ A_ OVF
❑ B_ VMDK
❑ C. VHD (Right Answers)
❑ DHT

Answer: C

119. In FusionSphere, virtual machines can communicate with other virtual machines only after they have established contact with the physical network.
❑ A. True
❑ B. False (Right Answers)

Answer: B

120. When creating a port group in FusionCompute, which of the following statements represent setting the VLAN ID to 0?
❑ A. Set the VLAN tag of packets passing this port group to 0
❑ B. Only packets with VLAN 0 tags are allowed to pass through this part group
❑ C. Allow 0 packets with VLAN-tagged to pass through this port group
❑ D. Do not make any changes to the packets passing through this part group Right Answers)

Answer: D
121. When deploying a VRM, what type of storage is generally recommended for deploying VRM?
❑ A. Local disk 1Right Answers)
❑ B. FC SAN
❑ C. IP SAN
❑ D. NAS

Answer: A

122 FusionManager supports hacking up the data of each management node_ If the file is required to be stored in a non-local environment, which component must he configured?
❑ A Log server

❑ EL Backup server

❑ C. Backup software
FIN server 1Right Answers)

Answer:

123. In the cloud computing, which of the following is referred to the so-called data center north-south traffic?
❑ A. Interactive traffic between multiple data centers
❑ B. Data center-to-user traffic IRight Answers)
❑ C. Data Center internal interactive traffic
❑ D. Data Center External Traffic

Answer: B
124 Which of the following descnption about snapshot feature of the FusionCompute is correct? (Multiple choice)
▪ A A nasal machine can create up to 8 snapshots The created snapshots can only be manually deleted
▪ B The nasal machine supports the snapshot funthon only when the storage type of the nasal machine disk is AoVanced SAN storage, FusionStorage, nasalized local hard disk, nasalized SAN storage, or NAB storage plight Answers)
111 C If the VM dsk is set to "Slave", the snapshot is not taken when the snapshot is created
111 D Cannot Operate Virtual Machine during Onlpne Incremental Snapshot Creation (Right Answers)

Answer: BD

125. In the following FusionCompute maintenance items, which of the following is not necessary to check every day?
❑ A. Alarms on the FusionCompute
❑ B. Health inspection report
❑ C. Indicator status of servers, switches, and storage devices
❑ D. Air quality t Rig ht Answers]

Answer:

126. What does a virtual switch connect to a physical network through in FusionSphere7
❑ A. Uplink (Right Answers)
❑ B. Port group
❑ C. Virtual Network Card
❑ iNIC

Answer: A
127. Storage virtualization technology can improve storage utilization and provide storage resources for multiple virtual machines.
❑ A. True (Right Answers)
❑ B. False

Answer: A

128. What is incorrect about the description of the CPU QoS technology in the FusionCompute?
-
❑ A. Control the use of CPU resources of the virtual machine by adjusting "reserve", share", and "limitation"
❑ B The role of "share" is to guarantee the lower limit of the computing power of the virtual machine. that is. how much resources can be used at least (Right Answers)
❑ C. The role of "share' is to balance and adjust resources according to the relative CPU share of multiple virtual machines when computing resources are insufficient.
❑ D. The role of "Restrictions" are the maximum resources that a virtual machine can use

Answer: B

129_ In Huawei FusionSphere, which of the following statements about the hot migration of VM storage is incorrect?
❑ A_ Storage hot migration can be performed between different data stores
❑ B. Storage hot migration can be performed between different storage resources
❑ C. Storage hot migration can be performed between different storage devices
❑ D. Storage hot migration is limited to different storage resources (Right Answers)

Answer: D

130_ What are the optional modules in the overall architecture of Huawei FusionSphere products? (Multiple choice)
❑ A. FusionCompute (Right Answers)
❑ B. FusionStroage (Right Answers)
❑ C. FusionNetwork
❑ B. FusionCloud

Answer: AB

131_ In cloud computing, customers need to access the resources or applications they need through the network_
❑ A True (Right Answers)
❑ B. False

Answer: A

132. Create virtual machines by importing virtual machines in FusionCompute. Which of the following file formats does not support the creation of virtual machines?
❑ A. .ova
❑ B. .xml
❑ C. .vmdk {Right Answers)
❑ D..ovf

Answer: C

133. In FusionCompute, each virtual machine can bind multiple USB devices. Which of the following features will be affected when a virtual machine is bound to a USB device? (Multiple choice)
❑ A. Virtual Machine Restart
❑ B. Hot migration of virtual machines (Right Answers)
❑ C. Cluster scheduling policy (Right Answers)
❑ D. Capacity Expansion of Virtual Machines

Answer: BC
134. Which of the following options is not included in FusionSphere's hardware infrastructure layer?
❑ A. Server
El B. Storage
• Network
❑ D. Security
El E. Power supply Ri g ht Answe rs

Answer: E

135 In Huawei FusionSphere, the memory and CPU resources used by a visual machine can only be provided by the same cluster Therefore, the maximum amount of computing resnurcaswhich visual machines can actuaiyusa cannot exceed the su
of the resources available to all hosts in the cluster
111 A True
111 B False {Right Answers)

Answer: B

136. In FusionCompute. which of the following operation can be done on the FusionCompute management interface without installing Tools on the virtual machine?
E A Create a snapshot
E B. Migration
E C. Close {Right Answers)
E D. Sleep

Answer: C

137_ The clone of a rtual machine in the Fusionaompute refers to creating a new vrtual machine based on its own vrtual machine_ The specification of the virtual machine is not supported during creation.
❑ A. True
❑ B_ False 4Right Answers

Answer: B

13.8 When the cloud computing service provider provides various services, the customer only needs to put forward the demand, and the Bernce provider will immediately prowl& the resources or applications required by the customer, and when the
customer needs to expand or reduce the capacity, they can make corresponding changes on the basis of the anginal service Which of the charactenstics of cloud computing can the above content reflect,
❑ A Pan-network access
❑ B Resource pooling
DC. Measurable bermes
❑ D Rape: elastic expansion {Right Answers)

Answer: D

139. In Huawei FusionSphere. all hosts at the same site belong to at least one cluster.
El A. True
O B. False Right Answers)

Answer: EI

140. In Huawei FusionSphere, which of the following options are correct for adding a storage interface to a host? (Multiple choice)
111 A. Select one of the hosts and add a storage interface on the configuration page Right Answers)
LI B. You can add storage interfaces for hosts in batches
111 C. When adding a storage interface to a host, the VLAN ID can be omitted
111 D. Storage interfaces cannot be added when using FC-SAN (Right Answers)

Answer: AD
141. In the cloud computing, how can protect the customers information security?
❑ A. Using advanced security technologies (Right Answers)
❑ El_ Physically isolate each customers resources or applications in the data center
❑ C. Create a small data center for each customer individually
❑ D. Do not allow customers to share any resources

Answer: A

142. When a virtual machine is cloned in FusionCompute. the status of the virtual machine can be "in progress''.
❑ A. True (Right Answers )
❑ B. False

Answer: A
143. If VM template creation has been completed in FusionCompute, the password of the VM deployed using this template is the password of the template.
El A. True
El B. False (Right Answers)

Answer: B

144. In FusionCompute, if a virtual machine is bound to a host, which of the following functions will be affected? (Multiple choice)
❑ A Snapshot
❑ B_ DRS (Right Answers)
❑ C. Hot migration (Right Answers)
❑ D. Memory hot add

Answer: BC

146. When collecting the FusionSphere running logs, what are the components that do not need to be collected?
❑ A. UHM
CIB. VRM
❑ C. CNA
VM (Right Answers)

Answer: D

146. Which of the following description is wrong about the basic concepts of FusionManager?
❑ A. Region is a region, such as Asia Pacific
❑ B. DC is a data center concept, such as Beijing, Hong Kong, and Tokyo data centers
❑ C. Zone is an independent Layer 2 network area in the data center
❑ D. Cluster is the data center virtualization network isolation boundary (Right Answers)

Answer: D
147. In FusionCompute, administrators can move hosts. Which of the following options are the moving path? (Multiple Choice)
❑ A. Moving from site to cluster (Right Answers)
▪ Moving from a cluster to another cluster (Right Answers)
❑ C. Moving from site to site
❑ D. Moving from a cluster to a site (Right Answers)

Answer: ABD

148. Which of the following statement is wrong about the FusionCompute maintenance mode?
❑ A. After the host enters maintenance mode, it cannot perform operations such as power off or restart on the host. (Right Answers )
❑ B. Before the host enters maintenance mode, it is recommended to shut down or remove the virtual machine on the host before performing maintenance on the host.
❑ C. It is not possible to create, start, or move to a virtual machine on the host in maintenance mode.
❑ D. After the host enters maintenance mode, the VM on the host does not participate in the computing resource scheduling policy of the cluster to which it belongs.

Answer: A

149. Which of the following is the cornerstone of Huawei FusionCloud cloud computing solution?
❑ A. FusionAccess
❑ B. FusionSphere /Right Answers)
❑ C. Fusionlnsight
❑ D. FusionCube

Answer: B

150. In FusionSphere. the definition of major accidents, which option does not include?
❑ A. Suddenly happened
❑ B. A wide range of influence
❑ C_ The scope is large
❑ D. Long recovery time (Right Answers)
❑ E. Serious consequences for the safe operation and service quality of the network

Answer: D

151. Before installing tools on the virtual machine in FusionCompute, which of the following precondition is incorrect?
❑ A. The virtual machine has been installed the operating system
❑ B. The virtual machine does not have other versions of Tools installed
❑ C. The remaining space of the virtual machine system disk must be greater than 32MB
❑ D. If the operating system of the virtual machine is Windows 2008 and Windows 7, you need to use the Administrator user to install Tools
❑ E. The status of the virtual machine is ''stopped" (Right Answers)

Answer: E
152. Which of the following does not belong to the cloud computing service mode?
D A. Software as a Service
D B. Platform as a Service
D C. Infrastructure as a Service
LI D. Measurable service Right Answers)

Answer: D

153. What types of storage resources can be supported in FusionCompute? (Multiple Choice}
▪ FC SAN Right Answers)
1:1 B. IP SAN tRight Answers)
EI C. NAS Right Answers)
❑ 11 Advanced SAN (Right Answers)
❑ E. FusionStorage Right Answers)

Answer: ABODE
154 In FusionCompute, the administrator hinds the two NICs of the CNA host through active/standby mode The data transmission rate is equal to the sum of the transmission rates of the two network ports
OA TRUE

13 FALSE (Right Answers)

Answer: F

155. Which statement is incorrect about clusters, hosts, and virtual machines in FusionSphere?
El A_ The same host can belong to different clusters
El FL Virtual machines can be migrated across clusters
❑ C_ The basis for judging whether several hosts belong to the same cluster is to see if these hosts use the same shared storage -Right Answers)
111 0. The cluster consists of multiple hosts and their associated storage and network resources

Answer: C

156. In Huawei FusionSphere, which of the following components mainly provides resource virtualization and virtualized resource pool management functions?
❑ A. Fusionmanager
❑ B. FusionCube
❑ C_ FusionCompute tRight Answers)
❑ D. Fusionstorage

Answer: C

157_ Business administrators in FusianManager can create virtual machine templates.


OA. TRUE
OB. FALSE Right Answers)

Answer: F

158 In Huawei cloud computing, when a snapshot is created, the current disk is set to read-only The system automatically creates a delta disk in the data storage where the disk resides Subsequent editing of the disk data IS saved on the delta disk,
that is, the delta disk Indicates the diffefence between the current status of the disk and the status of the last time the snapshot was taken When you create another snapshot of this disk, the current delta disk is set to read-only, and the system
creates another delta disk in the datastore
OA. TRUE
O B FALSE (Right Answers)

Answer: F
159. A company has set up a desktop cloud environment for employees to use only. Which cloud computing deployment mode does it belong to?
E A. Public cloud
❑ B. Private cloud (Right Answers)
7 C. Government Cloud
E Hybrid Cloud

Answer: B

160. The desktop cloud is also known as the "PC in the cloud." What is the underlying core technology?
❑ A. Distributed Management Technology
LI B. Desktop Protocol Technology
❑ C. Virtualizatian Technology (Right Answers)
E D. Mobile terminal technology

Answer: C

161. In Huawei FusionCornpute, which statement is correct about management roles?


❑ A. A "role" can have one or more different "operation rights" Right Answers)
❑ B. A "user" can only have one "role"
❑ C. If a "user" has multiple "role", the "operational authority" it has will depend on the priority of the best "role'
E D. "Operating rights" of "Role" cannot be modified

Answer: A

162_ What technologies are used in Layer 2 security isolation of VPCs in Huawei cloud computing?
❑ A. VLAN t Rig ht Answers)
1:1 B. Security group
❑ C. ACL
❑ D. VPN

Answer: A
163 In Huawei FusionSphere, decentralized domain-based management means that In the adnunietrator new, resource clusters can be &Med into domains such as clusters_By adding different users to the domain, configure different permissions for
users, so that different users can have different permissions for different resource clusters such aniewing and mod(ying permissions
OA TRUE plight Answers)
0 B FALSE

Answer: T

164. What kind of virtualization can be divided into in the implementation way? (Multiple choice)
❑ A. Full virtualization Right Answers.)
LI B. Paravirtualization Right Answers)
El C. Hardware virtualization
❑ D. Hybrid virtualization

Answer: AB
166_ Which of the following elements cannot be included in the application template in FusionManager?
❑ A. Virtual Machine
❑ B_ Network
❑ C_ Virtual Load Balancer
❑ a Virtual Router (Right Answers)

Answer:
166. Which of the following statements is wrong about cloud computing architectures and traditional IT architectures?
❑ A. Traditional IT relies on hardware reliability to achieve high system availability by eliminating single points of failure through the infrastructure.
❑ B. Compared with traditional IT architecture, cloud computing architecture does not require high reliability of hardware.
❑ C. Traditional IT adopts Scale-up, which expands or increases the number of servers per device module.
❑ D. The traditional IT architecture uses server clusters, while the cloud computing architecture uses data marts. (Right Answers)

Answer:

167_ Which of the following does not belong to the operation log level in the FusionSphere system?
❑ A_ High risk
❑ B. Danger
❑ C. Important (Right Answers)
❑ D. General
❑ E. prompt

Answer: C
168. Administrators in FusionManager can be assigned two main roles: ServiceAdmin and OperationAdmin. Which statement is correct about these two roles? (Multiple Choice)
❑ A. OperationAdmin focuses on business operations
❑ B. ServiceAdmin focuses on resource pool construction, management, and maintenance
❑ C. ServiceAdmin focuses on business cperations (Right Answers)
❑ D. OperationAdmin focuses on resource pool construction, management, and maintenance (Right Answers)

Answer: CD

169. Which statement is correct about the installation of VRM in FusionCompute?


❑ A. VRM is recommended to be installed in different clusters
❑ B. VRM can use tools unified installation. can also manually install plight Answers)
❑ C. VRM needs to be installed with CAN
❑ D. VRM is recommended to be installed on virtualized shared storage so that if the host fails, it can be migrated to other hosts

Answer: B

170. Which description is correct about the hypervisor?


❑ A_ Hypervisor is Virtualization
❑ B_ Hypervisor is essentially an operating system
❑ c_ Hypervisor is the key to virtualizing physical hardware (Right Answers)
❑ D_ Hypervisor carries a lot of drivers, so Hypervisor does not need to install drivers and patches

Answer: C
171. Which of the fallowing does not belong to the category of data center?
D A. Server
El B. Currency (Right Answers)
El C. Network
El 2 Storage

Answer: B

172 After installing FusionCompute using the tool, the system will automatically create a cluster What operation can the administrator do to the cluster? (Multiple Choice)
❑ A Modify the name (Right Answers)
111 B. Delete (Right Answers)
❑ C Copy
❑ D Add host (Right Answers)

Answer: ADD

173. FusionSphere warning level from high to low arrangement. which is correct?
0 A. Important - Urgent - Secondary - Prompt
❑ B. Urgent - Important - Prompt - Secondary
❑ C. Prompt - Secondary - Important - Urgent
❑ D. Urgent - Important - Secondary - Prompt (Right Answers)

Answer: D

174. Which of the following functions are supported by the FusionManager?


❑ A. Unified management of heterogeneous virtualization platforms (Right Answers)
❑ B. Unified monitoring of heterogeneous hardware {Right Answers)
❑ G. Secure network isolation capabilities (Right Answers)
❑ a Multi-tenant management capabilities (Right Answers)

Answer: ABCD

175_ To monitor the 881,10F an the FusionManager needs to use the SNMP protocol or SSH protocol. Therefore. what basic information should be collected before accessing the server? (Multiple Choice)
O A. Server P address (Right Answers)
❑ EL Server SNMP port number {Right Answers)
0 a Server SSH usomame and password {Right Answers)
0 a SNMP version number {Right Answers)

Answer: ABCD

176 In the Huawei FusionSphere solution, when the compute node is powered off, the system can pull the virtual machine with the HA attribute on the compute node to other compute nodes Which of the following options is not necessary to implement
,
the function
111 A The virtual machine with the HA attribute on the node uses the same network segment IP (Right Answers)
111 B virtual machine is not bound to the machine
111 C The duster which the node belongs to is enabled HA
111 D Nodes connect to the same shared data store

Answer: A
177. In Huawei FusionSphere, which of the following types of storage can be added as storage resources and associated to the host? (Multiple Choice}
❑ [Link]-SAN storage (Right Answers)
❑ B. P-SAN storage (Right Answers)
❑ C. Local hard drive (Right Answers)
❑ D. Local memory disk (Right Answers)

Answer: ABCD

118_ Where is the ❑RS feature turned on in FusionSphere?


❑ A. Cluster (Right Answers)
❑ B. Host
❑ C. Virtual machine
❑ D. Operating system

Answer: A
179 After the VRM is deployed on she active and standby dances,you can the FusionCompute through a floating IP address The network is normal the floating IP address can't access all the time, hich of the following is the most likely point of
,
failure
❑ A The SAM master node is faulty
❑ B The VRM standby rode is faulty
❑ C One of the VRM master nodes or standby nodes has a problem
❑ D Both the active and standby VRM nodes are faulty_ (Right Answers)

Answer: D

180 . Which of the following descriptions about VPC is wrong?


❑ A. VPC provides an isolated network environment
❑ B. VPN can be used in VPC
❑ C. Security groups can be used in VPC
❑ D. VPC does not provide NAT service (Right Answers)

Answer: B
181 The FusionSphere solution mrtualizes hardware resources by deploying mrtualization software on the server, so that multiple physical server resources can be consolidated into one high-performance virtual machine to work
❑ A True
❑ B False (Hight Answers)

Answer: B

182_ Cloud computing is a model, not just a technology, it can be either a business model or a service model.
❑ A. True (Right Answers)
❑ B. False

Answer: A
lel When it comes to system scalability, Scale Up and Scale Out are two typical extension modes_ Which of the following statements about the two extension modes are wrong? (Multiple Choice)
❑ A. When Scale Up expand. focus on improving the performance of a single node, the entire system is easy to achieve performance bottlenecks
❑ B. Cloud computing generally uses Scale Up mode to expand (Right Answers)
When Scale Out expand, the number of nodes is increased, and the system performance is improved overall
❑ D_ The traditional telecommunications industry generally uses the Scale Out mode for expansion_ (Right Answers)

Answer: ED

184 Hypennsor is a middleware software layer running between the underlying physical server and the operating system, allowing multiple operating systems and applications to share hardware, and VMS is used to manage the Hype or
❑ A. Two
❑ El False (Right Answers)

Answer: Et
185. After the FusionManager monitors the server configuration, you can perform some maintenance actions on the hardware. Which of the following actions cannot be performed on hardware through FusionManager?
❑ A. power on and off
❑ B. safely re-start
❑ C. safely power off
❑ D. PXE loading (Right Answers)

Answer: D

186. In the operation and maintenance management tool of FusionSphere. the objects that can be monitored by the Alarm function do not include:
❑ A. server
❑ B. storage
❑ C. switch
❑ D. virtualization platform
❑ E. TC {Right Answers )

Answer: E

187_ Cloud computing virtualization technology can improve resource utilization, which of the following are included? (Multiple Choice)
❑ A_ Virtual machine resource adjustment (Right Answers)
❑ B_ Memory reuse (Right Answers)
❑ C_ Improve server utilization (Right Answers )
❑ EL Application automatic deployment

Answer: ABC

188 What solutions does the Huawei cloud computing FusionCloud brand include? (Multiple Choice)
❑ A_ FusionSphere Infrastructure Virtualization (Right Answers)
❑ FusionServer Huawei server
❑ C. FusionAccess cloud access management (Right Answers)
❑ D. Fusionlnsight big data processing (Right Answers)

Answer: ACD
189 _ Which of the following descriptions of VPC is wrong?
A, VPC provides isolated network environment
B. VPN can be used in VPC
C_ Security groups can be used in VPC
D, VPC does not provide NAT service

Answer: D

190. In the mode of the host storage virtualization layer + file system. after the storage device is mounted an the host, the file system is created an the mounted LUN.
❑ A. True (Right Answers)
❑ B. False

Answer: A

191 On the same host as Fusioncompute, the smart network card and the common network card cannot be mixed_
❑ A_ True (Right Answers)
❑ B. False

Answer: A
192 . In Huawei's fusionsphere solution, if you want the virtual machine to automatically perform HA after the host is down, switch to another host. Which of the following conditions is not necessary?
❑ A. The host belongs to the same cluster
❑ B. The cluster which the host belongs to is enabled HA.
❑ C. The host connects to the same shared data store
❑ D. All virtual machines requiring HA on the host use the same network segment IP (Right Answers)

Answer: D

193 . You can install the FusionManager in multiple ways. When the FusionManager is deployed in a VMware virtualization environment, which method da you need to install?
❑ [Link] image (Right Answers)
❑ B. Template file
❑ [Link] automatic installation
❑ D. Both ISO image and template file can be

Answer: A
194 . One task in FusionAccess is an operation on the system. All tasks are managed by the FusionAccess task center and support the scheduled operation management of the task.
❑ A. True (Right Answers)
❑ B. False

Answer: A

195 . Which of the following are the components of FusionCompute? (Multiple Choice)
❑ A. Ultra VR component
❑ B. VRM component (Right Answers )
❑ C. FusionCompute component
❑ D. CNA component (Right Answers )

Answer: BD

196 . The virtual desktop list that the FusionAccess end user sees on the Web Interface page is actually stored in which component?
❑ A. WI
❑ B. HDC
❑ G. AD
❑ D. Database (Right Answers)

Answer: D
197. In the process of installing FusionCompute. you need to set the IP address of the host management network port and the IP address of the VRM management. What is the correct description of the two?
❑ A. Use the host management network port IP to cascade multiple sites
❑ B. Add multiple hosts to the cluster using the VRM management IP address.
❑ C. Use the VRM management IP address to access the FusionCompute web portal page. (Right Answers)
❑ D. The host management network port IP address is the VRM management IP address.

Answer: C

198. The TC device in Huawei's cloud computing solution supports multiple operating systems. Which operating system does the CT3100 support?
❑ A Linux (Right Answers)
❑ B. WES7
❑ a Windows
❑ D. FreeBSD

Answer: A

199 . FusionManager can uniformly manage heterogeneous virtualization products, such as VMware vCenter and Huawei FusionCompute and so on.
❑ A True (Right Answers)
❑ B_ False

Answer: A
200 Which of the following descriptions of VRM is wrong?
❑ A. The scope of management of a VRM is the management scope of a site.
❑ B. Multiple VRMs can be cascaded to provide unified Portal to manage multiple site resources.
❑ C. It is recommended to bind the VRM node VM to the host where it is located.
❑ D. The active and standby VRM nodes can be deployed to the same host on the management cluster_ Night Answers)

Answer: D

201 . In order to solve the early problems of poor virtual desktop experience, poor compatibility, and difficult management, which of the following protocol does have independently developed by Huawei?
❑ [Link]
❑ [Link]
❑ [Link]
❑ [Link] (Right Answers)

Answer: D
202 . An enterprise is ready to deploy the Huawei desktop cloud solution. The number of terminal users is about 800. Please recommend a deployment mode suitable for the enterprise.
❑ A. Standard desktop cloud, the network configuration is E9000+IP SAN 10GE
❑ B. Desktop cloud machine. the network configuration is RH2288H+FusionStorage lOGE {Right Answers)
❑ C. Desktop cloud machine, the network configuration is E9000+FusionStorage lOGE
❑ D. FusionSphere virtualization, the network configuration is RH2288H+IP SAN lOGE

Answer: B
203 . In the FusionAccess branch deployment scenario, if the branch office and the headquarters network are interrupted, users in the branch office cannot access the desktop cloud system.
❑ A. True
❑ B. False (Right Answers)

Answer: B

204 _ When configuring FusionCompute, which function configuration does the modifying host storage multipath belong to?
❑ A Host and cluster management (Right Answers)
❑ B. Storage Management
❑ C. Network Management
❑ D. System Management

Answer: A

205 . In the process of installing the FusionCompute CNA component using the ISO image file, which parameter cannot use the default value, must be manually configured?
❑ A. Hard Drive
❑ B. Network
❑ C. Hostname
❑ D. Password (Right Answers )

Answer: D

206 _ When deploying VRM, what kind of storage is generally recommended to VRM deployed on?
❑ A_ Local disk Might Answers)
❑ 13_FC SAN
❑ C_IID SAN
❑ D_NAS

Answer: A
207 After the DRS is enabled in the cluster, FusionCompute can measure resources based on various factors to achieve resource scheduling Which of the following is not a measure?
❑ A CPU
❑ B Disk (Right Answers)
❑ C Memory
❑ D CPU and memory

Answer: B

208 . FusionManager supports multiple interfaces. Which of the following interfaces is not designed for integrated management by third-party operating platforms?
❑ A. REST interface
❑ B. SOAP interface
❑ [Link] interface
❑ [Link] interface 'Right Answers)

Answer: ❑

209 Which of the following descriptions of the functions of each component of FusionAccess is wrong?
❑ A. Web Interface provides end user access interface entry
▪ HDA is deployed in Windows and Linux user VMs to implement HDP access and report status and connection information to the HDC {Right Answers)
❑ CLIC is the terminal used to access the desktop
❑ [Link] controls the startup and restart of the virtual machine through WIA

Answer: 19

210 The E5000 server supports a variety at different compute node blades When an enterprise running application only requires general computing performance, but requires big data storage, which of the following compute nodes is the most
veneWriete 9
❑ A CH121
❑ B CH222 (Right Answers)
❑ CCE240
❑ D CH242

Answer: B

211 . The FusionManager is positioned to solve the problem of resources unified management of which level?
❑ A. Host level
❑ B. Cluster level
❑ C. Site level
❑ D. Data Center Level {Right Answers)

Answer: D
212 In order to ensure data security, an enterpnse desktop cloud administrator wants to prohibit desktop users horn using USB storage denceo Which of the following measures most appropriate?
❑ A- Physically disable the TC thence USB port
❑ Et Set the desktop cloud policy to prohibit the use of USB storage devices (Right Answers)
❑ c. Develop a corporate system that prohibit the use of USB storage devices
❑ D. Administrator regularly supervises

Answer: B

213 . What is the overall name of Huawei Cloud Computing Solution?


❑ A. FusionCloud {Right Answers)
❑ B. FusionSphere
❑ C. FusionCube
❑ a FusionAccess

Answer: A
214 What is the main value of DPM in FusionCompute?
1:1 A. Improve computing performance
El B. Energy saving and environmental protection Right Answers)
El C. Improve machine usage
❑ D. Eliminate performance bottlenecks

Answer: B.
215 When deploying a Fusion Compute, if a host has more than 4 Ethernet po is recommended to set the etho and ethl as management plane network ports at the same time, and bind after the FusionCompute is installed What kind of method is
generally used to bind the management plane network port?
❑ A Load grouping based on source and destination MAC
❑ B Active and standby (Right Answers)
111 C Load grouping based on polling
❑ D Load grouping based on source destination port

Answer: B

216 .1n the cloud data center. the cloud system automatically adjusts according to the pressure of the server and transfers some semces from the stressN1 server to the less tr 1 server to maintain the average pressure drstribution. Mich technology
of cloud computing is embodied in this adjustment process?
❑ A. Memory reuse
❑ B. Linked clone
❑ C. Dynamic resource adjustment
❑ balancing (Right Answers)

Answer: D

21? . FusiorAccess has two types of desktop distribution methods: standard distribution and fast release. Which step is the difference between the two approaches?
E A Create a business resource (Right Answers)
E B. Make a template-
E C. Create a visual machine user
E D. Create network resources

Answer: A

218 After a company uses cloud computing technology to build a visualized data center, IT support personnel are greatly reduced Which value of cloud computing is reflected?
D A Data security
El B. Improve resource utilization
E C. Saving maintenance costs Right Answers)
❑ D Unified management

Answer: C

219. Which virtual machine needs to be deployed when using FusionManager to provide virtual frewall, load balancing and DHCP functions?
❑ [Link]
❑ B. FusionManager
❑ CVSAM l Right Answers)
❑ DPVM

Answer: C
220 When it comes to system scalability, Scale Up and Scale Out are two typicy extension modes Scale Up uses a scale-out e When the scale. expanded, the resources such as computing, storage, and network are balanced and extended,
which is more conducive to deploying a large-scale cloud computing environment-
▪ A True
111 B False (Right Answers)

Answer: B

221 Four virtual machines in the FusionCompute share the same parent image through link don es After the parent image is upgraded, the four virtual machines cannot sense the upgrade changes and still use the pre-upgrade image
0 A True
❑ B False (Right Answers)

Answer: B
779 . Which of the following components does not belong to the Hadoop layer of the Fusioninsight architecture?
▪ HDFS
❑ B. HBase
❑ a Miner (Right Answers)
❑ EL Hive

Answer: C

223 The virtual machine quick release process in the desktop cloud refers to the :aguel machine allocation (binding} process. not including the virtual machine creation process
❑ A True
❑ B False Wight Answers)

Answer: B

224 The configuration management function of FusionAccess includes the configuration of the FusionAccess management system, such as the connection with the FusionCompute, time synchronization, domain information, audit rules, and ITA
component database port configuration
❑ A True {Right Answers)
❑ B False

Answer: A

225. The virtual machine runs on the host and can read the disc data in the physical optical drive of the host.
❑ A. True jRight Answers)
❑ B. False

Answer: A

226. Which of the switch modules of the E9000 server can support 10GE and EC networks at the same time?
❑ A.CX310
❑ B.CX311 tRight Answers).
❑ C.CX611
❑ D.CX710

Answer: B

227. What is the main function can the Huawei Desktop Controller of FusionAccess component achieve?
❑ A_ Used for desktop access gateway proxy, isolated internal and external networks
❑ B. Used for WEB access load balancing
❑ a Protocol gateway hr desktop access, internal and external network isolation, transmission encryption
❑ D. Record the relationship between the user and the desktop and synchronize the usage status and connection status of the virtual desktop in real time. (Right Answers)

Answer: D

228 . When the user VM OS is Windows Server 2008 R2. which resources of the VM cannot be adjusted online?
❑ A. vRAM
❑ EL CPU
❑ C. vrylainboard (Right Answers)
❑ Ef_ vNIC

Answer: C
229 _ Fusionlnsight does not support single sign-on.
❑ A_ True
❑ B False (Right Answers)

Answer: B

230 . The FusionSphere solution consists of several components. From the positioning paint of view, where is the logical location of FusionCompute?
❑ A. Above FusionManager
❑ B. Between FusionManager and physical devices (Right Answers)
❑ C. Above FusionAccess
• FusionCompute contains two components, FusionManager and FusionAccess.

Answer: B
231 . Which of the following is correct of the FT technology and HA mechanism in FusionCompute?
❑ A. From the length of business interruption. FT is longer than HA
❑ B. HA refers to the redundant configuration of the primaryand standby dual machine. When the primary virtual machine fails, the standby virtual machine quickly takes over the primary virtual machine.
❑ C. HA migration virtual machine can ensure uninterrupted business
❑ D. FT technology requires real-time data synchronization between primary and standby dual virtual machines (Right Answers)

Answer: D

232 _ FusionAccess consists of multiple components_ Which of the following is not a required component?
❑ A_ TSM (Right Answers)
❑ B_ HDC
❑ C_ ITA
❑ D_ WI

Answer: A

233 . VPC network security isolation function does not depend on which of the following technologies is implemented?
❑ A. Hardware firewall
❑ B. Software firewall
❑ C. Switch
❑ D. Elastic IP (Right Answers)

Answer: D

234 . The 4U 3.5-inch high-density disk enclosure of the Huawei storage device is connected to the controller enclosure through which interface to achieve capacity expansion?
❑ A. GE interface
❑ B. FC interface
❑ C. SAS interface
❑ D. MINI SAS HD interface (Right Answers)

Answer: D

235 . The operating system running an top of the virtual machine is called the guest operating system. which is the Guest OS_
❑ A. True (Right Answers)
❑ B. False

Answer: A
236 . A virtual machine disk does not support increasing disk capacity online. Which of the following data storage types might the virtual machine use?
❑ A. Virtualize local disk
❑ B. FusionStorage
❑ C. Virtualized SAN storage
❑ D. NAS storage (Right Answers)

Answer: D

237 . What is the main function of the FusionAccess component Web Interface implementation?
❑ A. Provide the end user's access interface entry (Right Answers)
❑ B. Desktop access login load balancing
❑ C. Protocol gateway for desktop access, internal and external network isolation. transmission encryption
❑ D. Interact with the HDA in the VM to collect the VM status and access status reported by the HDA.

Answer: A

238 . Huawei's storage device's 41_.1 3.5-inch high-density hard disk supports online replacement of hard disks.
❑ A. True (Right Answers)
❑ B. False

Answer: A

239 , Which of the following is the description of FusionAccess asset management, which is wrong?
❑ A_ Asset management through ITA management PORTAL
❑ B. The operation of binding the user to the virtual desktop relationship becomes ''attach"
❑ C_ Identify the virtual desktop with a domain account IRight Answers)
❑ D. FusionAccess can create virtual desktops and assign them to. users.

Answer: C

240 . During the installation of the CNNA component of FusionCompute, if the host has 4 network cards, how do I configure the Network parameters?
❑ A. Configure an IP address for eth0 and bind it to ethl right away.
❑ B. Configure an IP address for each network port.
❑ C. Configure an IP address for eth0 others are not configured. (Right Answers)
❑ D. Use DHCP to automatically obtain the host IP address.

Answer: C

241 . When configuring a physical network device, which method is generally used to isolate different network planes in Huawei cloud computing solutions?
❑ A. Port
❑ B. IP address
❑ C. MAC
❑ D. VLAN (Right Answers)

Answer: D
242 HyperDP is the backup management software of Huawei FusionSphere_ Which level of backup is it mainly used for?
El
A_ Storage level
LI a Host level
❑ C_ Virtual machine level (Right Answers)
El D. OS system level

Answer: C
243 Which of the following is not a function provided by FusionManager?
El A_ Heterogeneous virtualization management
❑ B. Heterogeneous hardware device monitoring
El C. Unified management of multiple data centers
❑ D Virtualization server (Right Answers)

Answer: D

244 _ Fusionlnsight Hive supports encryption and the encryption algorithm can be customized_
10 A True (Right Answers)
❑ B_ False

Answer: A

i
245 _ "Raw device logical volume''. the most direct way to store virtualization, simple management and support for storage advanced features_
I=1 A_ True
❑ 8_ False (Right Answers)

Answer: B

246 _ When installing CNA nodes in batches, it is recommended to set the host's BIOS to which option to boot from?
❑ A_ Hard disk
❑ B_ Network (RightAnswers)
❑ C. Optical drive
❑ ID_ USB

Answer: B
247 . An enterprise has a data center in multiple cities. Huawei FusionCompute virtualization environment is deployed in each data center. Which method is recommended?
El A. Deploy a local-FusionManager in each data center to manage a single data center resource. and then deploy a set of top-FusionManager in a data center to manage the resources of the multi-data center. (Right Answers)
El B. Deploy a set of top-FusionManager management data center resources in each data center
El C. Deploy a set of local-FusionManager management data center resources in each data center
El D. Deploy a set of All-in-one FusionManager management data center resources in each data center

Answer: A

248 . A user rents a virtual machine from cloud service provider for daily use, and returns the virtual machine to the cloud service provider when traveling, which reflects the key characteristics of cloud computing?
❑ A. On-demand self-service
❑ B. Location-independent resource pool
❑ C. Pay by usage (Right Answers )
❑ D. Rapid flexibility

Answer: C
249 . A desktop virtual machine may not belong to any virtual machine or desktop group.
El A. True
O B. False Right Answers)

Answer: 13

260 If you need to install the FusionCompute qn Huawei server, you need to know the IP address of the BMC system and the IP address of the host mar ement network port The following description of the two, which is correct ,
0 A Both are the same IP address
▪ B The EMC system IP address is used to add CNA node host to the FusionCompute
0 C. The host management network port IP address is used to remotely install the operating system to the physical host.
0 CI The IP address of the BMG system can be added to the FusionGompute to facilitate the host to automatically power on and off- (Right Answers)

Answer

251 . The core concept of MapReduce is to decompose a large computing task into each node of the cluster, make full use of cluster resources and shorten the running time.
❑ A True IRight Answers)
❑ B False

Answer: A

252 . What kind of technical solution does Huawei use far the scenario in Fusionlnsight?
O A. Office Cloudization
O B. IT infrastructure cloudization
O C. Enterprise Big Data Processing Platform Right Answers)
O D. Enterprise application cloudization

Answer: C

253 After the Furl onManager la installed, you need to initialize the FusionManager If an error occurs during the configuration process, which command should be run first to stop the process and then reconfigure?
0 A. fmconfig
❑ B stopALL (Right Answers)
0 c retest
0 D restartALL

Answer: R

254 In Huawers cloud computing solution, what is the main function of FusionStorage in the desktop cloud integrated machine deployment?
▪ A Provide infrastructure nrtualization capabilities Focusing on computing, storage, and network nrtualizatron, heterogeneous hardware resources are aggregated into resource pools, and various resource scheduling and semce guarantee capabilities
are encoded in resource pools
❑ B. Provide cloud management functions Fronds external infiastructure distnbution, cross-cluster resource scheduling, application distnhution and application scaling
❑ C Provide high performance distributed storage capabilities High concurrency of 10 access by pooling serer Ask resources and multi-node redundant storage of data (Right Answers)
▪ Provide unified discovery, automatic configuration and fault monitoring capabilities for hardware devices

Answer: C

255 . Which of the following does not belong to the main function of the thin terminal management system TOM?
DA. TO version upgrade
O B. TO anti-virus management Right Answers)
❑ C. Information monitoring
LI D. Log management

Answer: B
256 _ When deploying Huawei desktop cloud_ end users must use thin terminal access_
❑ A. True
D B. False Right Answers)

Answer: B

257. The same data storage space is recommended to be added to different FusionCompute sites to improve storage space utilization.
O A. True
O B. False CRight Answers)

Answer: B

258 . The VDC in the FusionManager has very powerful functions. Which of the following descriptions of the VDC is wrong?
O A. VDC is the virtual resource boundary assigned to the tenant
O B. VDC can specify the resource quota used by the tenant to limit the tenant 's calculation, network and storage usage.

O C. VDC provides secure tenant network isolation environment Right Answers)


O D. VDC is a software-defined data center and multi-tenant can use virtualized resources independently.

Answer: C
259. FusionCompute uses a variety of memory multiplexing technologies. Memory sharing technology refers to multiple mrtual machines that can read and write to the same physical memory space of the host.
❑ A True
❑ B False (Right Answers)

Answer: B

260. An enterprise is a large-scale professional video production company. Based on data security considerations, it is now ready to deploy what Huawei desktop cloud solutions?
❑ A GPU sharing
El a GPU hardware virtualization
El a GPU passthrough Right Answers)
El D. GPU mapping

Answer: C

261 . Host storage virtualization layer + file system mode, where is the virtual machine template placed on the storage model?
O A File system (Right Answers)
LI B. Common block layer
O C device driver layer
O D. Physical layer

Answer: A

252 Building a green cloud data center requires not only software platforms, servers, storage and network equipment, but also Me
the overall security design, the underlying green energy-efficient design and the integrated delivery capabilities of E2E
❑ A True (Right Answers)
❑ B False

Answer: A

263 A data center in a company deploys both FusionCompute and VMware Center- For this cenano, it is recommended to deploy which of the following software to uniformly manage the vgrtualizati on resources of the data center?
❑ A Top-Manager
111 B Alkm-One FusionManager (Right Answers)
111 c FusionCompute
❑ D. FusionManager

Answer: El

264 An enterprise uses eight RH22881-I servers and one OceanStor 35800 V3 to deploy Huawers desktop cloud ice network plane adopts 106E networking If you are the enterprise ITadministrator, for the costefectrys consideration, which of
the following switches is recommended to carry the management network plane traffic of the desktop cloud solution,
D A 35700-28C-EI-243 (Right Answers)
❑ B S5700-52C-PWR-EI
❑ C S6700-24-8
❑ D 36700-48-8

Answer: A
265 . Which of the following is true about the FusionCompute cascading management architecture?
❑ k Any VRM node can be set as a cascade domain controller
❑ B. There is only one cascade domain controller in a cascaded domain center RRight Answers)
❑ C. Sites set up as cascading domain controllers must be manually joined to the cascading domain
❑ D. The VRM node virtual machine of the cascaded site needs to be created on the virtualized SAN storage.

Answer: B
266 During the installation of GNA using the batch deployment tool, if there are both hard disks and USB flash drives on the host, where will the tool automatically install the host operating system?
❑ A The first hard drive
❑ The first partition of the first hard disk
❑ G 1158 disk (RightAnswers)
❑ D. Randomly choose the installation location

Answer: C

267_ Where is the logical location of FusianAccess in Fusioneloud, the overall cloud computing solution of Huawei?
❑ A Between the physical device and FusionSphere
❑ B. On the FusionCompute RRight Answers)
❑ C Parallel to FusionStorage
❑ D. On the FusionManager

Answer: B

268 The Huawei desktop cloud terminal user can customize the power management policy of the virtual desktop on the Web Interface login page Which of the following is not the virtual de op power management policy prowled by Huawei Cloud
,
Desktop
❑ A Disable automatic shutdownhestart/sleep
111 B Prohibit shutdown {Right Answers)
❑ c Allow automatic shutdown/restart
❑ D /vow automatic sleep

Answer: B

269. Which of the following scenario-9 does not apply to Storm?


❑ A. Real-time analysis
❑ B. Continuous calculation
❑ G. Online machine learning
❑ D. Large amount of data offline analysis Right Answers)

Answer:

270. Which of the following options was not specified when the FusionCompute cluster was created?
❑ A. Cluster HA strategy
❑ B. Memory reuse strategy
❑ C. Memory resource control strategy (Right Answers)
❑ D. GuestNUMA strategy

Answer: C
271 E-commerce website platform, the business traffic is relatively balanced, the data processing is in the cloud ennronment built by the company itself when the trafc coming from the holiday increases, the same resource processed from which
cloud service prowler ,
❑ A Public cloud
❑ B Prrvate cloud
❑ C Government Cloud
▪ Hybrid cloud (Right Answers)

Answer:

272 Which one does the application management in Fusialtilanager not include?
❑ A. Application Archive 1Right Answers)
❑ B. Application online
❑ C. Application deployment
❑ ❑. Application modeling

Answer: A
273 . The branch office desktop cloud can realize the access of theyrtual desktop branch to ensure the access network quality. At the same time, the branch virtual desktop is locally managed by the branch structure and has no relationship with the
headquarters management
❑ A Tme
❑ B False (Right Answers)

Answer: B

274 . The main function of the FusionAccess component AccessGateway implementation?


❑ A. When the user accesses, interacts with the WI, provides access information for it, and supports the entire access process of the user-
s EL Interact with the HDA in the WM to collect the virtual machine status and access status reported by the HDA_
❑ C_ Protocol gateway_ internal and external network isolation, transmission encryption for desktop access_ Right Answers)
❑ D. Record the relationship between the user and the desktop and synchronize the usage status and connection status of the virtual desktop in real time.

Answer: C

275 Which of the fallowing is not a benefit of virtualization?


❑ A. Improve hardware utilization
❑ El._ Reduce energy consumption
❑ C_ Improve server performance t Right Answers)
❑ 2 Operating system and hardware decoupling

Answer: C
276 . Which of the descriptions of network virtual switching technology is wrong?
❑ &The physical switch-based Virtual switch migration is flexible, and the virtual machine migration does not affect the Virtual machine's snapshot technology application_ (Right Answers)
❑ EL Software-based*tual switching technology does not rely on advanced hardware features, migration is more flexible
❑ C. Intelligent network card-based switching can reduce server CPU consumption
❑ ft Data exchange between virtual machines can be realized by physical switches

Answer: A

277 In the fallowing description of the E9000 server management module, which is wrong?
❑ A One chassis can be configured with two mmaiOs to run in primary and backup made.
❑ B. mmaio needs to be inserted and removed offline_ (Right Answers)
❑ C. mmaia management module follows the IPMI v2.0 specification.
▪ MM910 provides remote anioff function

Answer: B
218 FusionAccess has a complete service disaster recovery capability When the OSLO is not deployed, what measures can be taken to ensure that the users desktop service operation and maintenance after the disaster continues?
El A Virtual machine backup and restore technology
111 B Storage backup and restore technology
▪ C TC active detection, desktop switching technology Might Answers)
❑ D Virtual site disaster recovery technology

Answer: C

279 . FusionStorage is a distributed storage system developed by Huawei. What is the distributed feature?
El A Aggregate huge disks to provide large-capacity storage
❑ B. Provide a large number of snapshot copies
❑ C. Integrate multiple general-purpose server disks to provide SERVER SAN 1Right Answers)
❑ a Provide efficient array self-healing ability

Answer: C

280 . The FusionAccess component HDA is supported on Windows and Linux user virtual machines.
El A. True
El B. False Right Answers)

Answer: B

281 F.:a:Access consists of multiple components, all of which can be deployed in virtual machines General components are recommended to be deOoyed as primary and backup nodes Which component is recommended for single point
deployment?
111 A HOC
111 B
111 C
111 ID Loggeter Right Answers)

Answer: D

282 The storage advanced functionality provided by the "storage device virlualizaticn" approach relies on the capabilities of the storage device_
❑ A_ True (Right Answers)
DB. False

Answer: A

283. Which of the following descriptions of the user's login to the virtual desktop is wrong?
❑ A. Users can view their own virtual desktops through the browser.
❑ B. Users can start, log in, and restart the virtual desktop assigned to them_
❑ a FusionAccess manages the status of all virtual desktops
El D. Users can delete the virtual desktop assigned to themselves on the WI login page. Right Answers)

Answer: D
284 _ FusionCompute creates a cluster by default_ What is the name of the cluster?
❑ DefaultCluster
❑ B. FimtCluster
❑ C MenegementCluster (Right Answers)
❑ D. Administrator

Answer: C

285 . Which of the following is suitable for HDFS?


❑ A_ Store a large number of small files
❑ a Real-time reading
❑ C_ Need to modify the data frequently
❑ a Streaming reading (Right Answers)

Answer: D

286. The VRM component is the management hub of FusionCompute. It is responsible for the scheduling, distribution, and automatic deployment of IT services, and can be cascaded.
❑ A. True
❑ B. False (Right Answers)

Answer: El

287 . The index of the Hive table is built in the HBase table. which can greatly improve the query_
❑ A True (Right Answers)
False

Answer: A

288 . HBase is a distributed database, so it does not need to rely on HDFS to run.
❑ A. True
❑ B. False (Right Answers)

Answer: B

289 . Which of the following scenarios is not the least suitable for Spark?
❑ A_ Nearline or near real time
❑ a Data mining
❑ C. Off-line analysis of large amounts of data (Right Answers)
❑ D_ Machine learning

Answer: C
290 Which of the following descriptions about the storage used by FusionCompute is wrong?
❑ A When the storage deecele NAS storage, you need to configure the shared directory (that., data storage) and the list of hosts allowed to access as planned
❑ B When using the data storage prowled by the shared storage, the data storage should be added to all hosts in the same cluster at the same time to ensure that the migration of the virtual machine within the cluster is not affected by the data
storage
❑ C Management node virtual machine supports the use of nrtualized data storage It is recommended to use the nrtuabzed data provided by the local hard disk or SAN storage (Right Answers)
❑ D When the storage type is local storage, only the remaining space of the disk where the host operating system is located, and other unpartitioned bare disks can be used as data storage.

Answer: C

291 . Which of the following descriptions of FusionCompute is wrong?


❑ A. FusionCompute is the virtualization component of FusionSphere.
❑ B. FusionCompute realizes virtualization of x88 servers, storage, and networks to form an IT elastic resource pool.
❑ C. FusionCompute enables the scheduling and distribution of IT services and automatic deployment 'IRight Answers)
❑ D. FusionCompute is the cornerstone of the FusionSphere solution.

Answer: C

292 The FusionManager supports different deployment modes_ Which one is responsible for resource access. configuration monitoring, and maintenance when the Top-Level deployment is adopted'

❑ A Top FusionManager

❑ B Local FusionManager (Right Answers )

❑ G FusionManager

❑ D FusionManager

Answer: B

293 The OceanStor 5600 v3 storage device supports AC and DC power failure protection.
❑ A. True (Right Answers)
❑ B. False

Answer: A

294. Which of the following options does not belong to 4 V features of the big data?
❑ A. Volume
❑ B. Variety
❑ C. Value
❑ D. Valid ( Right Answers)

Answer: D

295 . Network virtualization is mainly to solve the problem of virtual machine communication after computing virtualization.
❑ A. True (Right Answers)
❑ B. False

Answer: A

296. When deploying a Huawei cloud computing solution, generally deploy the server BMC network, and which of the following network planes are deployed together?
❑ A. Storage network plane
❑ B Business network plane
❑ C Management network plane (Right Answers)
❑ D. Disaster recovery network plane

Answer: C
297 . In the FusionManager. there are mainly two types of users. Which of the following functions belongs to the tenant's scope of responsibility?
❑ A. Access to the virtualized environment
❑ B. Create a VDC
❑ C. Create a VPC (Right Answers)
❑ D. Create a virtual machine template

Answer: C

298 . When the desktop cloud is deployed on the E9000 server, the virtual machine can directly access the GPU of the E9000 blade, that is, a GPU can only be used by one virtual machine.
❑ A True (Right Answers)
❑ B. False

Answer: A

299. Storage virtualization is the deployment of a logical layer on tap of a discovery device to control storage resources through a logical layer.
❑ A True (Right Answers)
❑ B. False

Answer: A

300 . When the number of hosts that need to install CNA is small, which method is recommended to install?
❑ A_ Batch deployment tools
❑ B. ISO image file (Right Answers)
❑ C. Installation Wizard Tool
❑ D. USB boot installation

Answer: B
301 The FusionManager supports hardware device management and monitoring. For the device alarm information, which method is generally used to collect?
❑ A. IPMI
❑ B. SSH
❑ C. SDK
❑ a SNMP (Right Answers)

Answer: D

302 _ Which of the following is not a key technology for Fusionlnsight's reliable operation and maintenance?
❑ A_ Fault detection
❑ B_ Power failure protection
❑ C. Data encryption tRight Answers)
❑ D_ Online disk change

Answer: C
303. In FusionCompute, which option of the cluster must be set before the virtual machine can be migrated between hosts of different CPU types?
❑ A. Open the cluster's DRS
❑ B. Turn on cluster DPM
❑ G. Open the IMC mode of the cluster (Right Answers)
❑ D. Turn on the HA function of the cluster.

Answer: C
304 When the VRM is deployed in activelstandby made, you need to configure an quorum IP address_ What happens when the arbitration IP is completely invalid?
❑ A_ The VRM master/slave switchover occurs, and the VRM does not affect the system management after the switchover.
❑ ET The standby node of the VRM is dropped, and does not affect the master node_
❑ G. Both VRM nodes will be standby nodes. which will prevent VRM from managing the system. (Right Answers)
❑ D. Two VRM nodes are cyclically performing the activeIstandby switchover, which will prevent VRM from managing the system.

Answer: C

305 Which of the following does the FusionAccess Linked Clone ❑esktop feature not include?
❑ A. Map the parent and differential volume combinations to a linked clone volume for the virtual machine to use
❑ B. Linked-clone desktop pool provides desktop maintenance functions such as unified software updates and unified system restore
❑ C. Linked clones have the advantages of fast virtual machine creation and small disk storage footprint.
❑ a Linked clone desktops have higher computational processing power than ordinary vutual machines (Right Answers)

Answer: D

306 _ From a technical perspective, cloud computing includes cloud devices and cloud services, has the same components which required to virtualize data centers.
❑ A. True -Right Answers)
❑ B. False

Answer: A

307 Internet company data is generally structured data.


❑ A. True
❑ B. False (Right Answers)

Answer: B

308 An entemnse has a VMware Center environment and is ready to introduce Huawei FusionSphere solutions Which of the following functions of the FusionSphere components is most suitable for the enterprise to manage the two environments
unrbed manner,
❑ A FusionManager heterogeneous wtualization management function (Right Answers)
❑ B FusionCompute server nrtualintion function
❑ C FusionManager multi-tenancy function
❑ D FusionCompute multi-site function

Answer: A

309. Which way does FusionManager use to interact with FusionCompute?


❑ [Link] Driver Right Answers)
❑ B_Fusioneompute SDK
❑ [Link] API
❑ [Link] s ion Compute SOAP

Answer: A
310 CPU wtualization refers to the creation at multiple vGPUs on a physical GPC Each virtual machine directly accesses some physical resources of the physical CPU by binding to the vGPLI, thereby realizing the victual machine sharing CPU
capability, and can be applied to any type of graphics card
❑ A True
❑ B. False (Right Answers)

Answer: B
311 Which of the following is not a component of VRM in Fusioneompute?
❑ A_BRM
❑ [Link]
El CLOG
❑ EINNA {Right Answers)

Answer: I3

312 A company builds a cloud computing servce platform to provide users with virtual machine resources to purchase_ Which cloud computing deployment model does the company belong to?
17I A_ Public cloud Sight Answers)
❑ B. Private cloud
111 C. Government Cloud
❑ O. Hybrid cloud

Answer: A

313 Which of the following is not a problem faced by traditional data processing systems?
❑ A. High storage casts
❑ B. Insufficient network bandwidth plight Answers)
El C. Single data source
❑ a Insufficient data processing performance under large data volume

Answer: B
314 An enterprise is a traditional Internet data center service prowler with a self-kilt data center When the company is considering transitioning to the cloud computing industry, which of the following cloud computing business models are most likely to
,
be selected
❑ A lass (Right Answers)
111 B Paas
111 C Sass
111 B. DaaS

Answer: A

315 A company builds an IT system and uses ualization platform to abstractly combine physical servers into multiple virtual servers to improve resource utilization and reduce enterprise investment costs Which genre does the company use for
cloud computing,
❑ A big divide into small (Right Answer.)
111 B gather more with less
▪ C One virtual multiple
111 B. All in one

Answer: A

316 . The desktop connection protocol HOP used by FusionAccess has more peripheral support and better multimedia performance than the ROP protocol, but its occupied bandwidth is larger than the ROP protocol.
❑ A True
❑ B False (Right Answers)

Answer: B

317 A company's cloud computing environment is built by itself, and the resources are combined into mrtual desIdops for the company employees lo use The usage model belongs to PaaS
7 A. True
111 B. False Right Answers)

Answer: B

31B . When deploying the FusionCompute, it is recommended to deploy the active and standby VRMs directly on the physical host to improve the performance of the management node.
El A. True
17 5 False (Right Answers)

Answer: B
319 _ Which of the following is not part of the Fusionlnsight architecture?
❑ DataFarrn
❑ B_ VRM (Right Answers)
❑ C_ Hadoop
❑ D_ Manager

Answer: B

320 FusionCube uses an innovative architecture to solve I/O performance bottlenecks. What is the architecture?
❑ A. Computing, network and storage integration architecture
❑ B. Linear expansion architecture
❑ C. Software and hardware integration architecture
❑ D_ Distributed Server SAN Architecture (Right Answers )

Answer: D

32'1. Which of the following descriptions of VPC is wrong?


❑ A. VPC provides isolated network environment
❑ B. VPN can be used in VPC
❑ C. Security groups can be used in VPC
❑ VPC does not provide NAT service (Right Answers)

Answer: D
322 . When deploying a VRM using the FusionCompute installation wizard, you can configure the management VLAN and set the VLAN ID. If not checked, which is the default management VLAN used by VRM?
❑ A. the VLAN which Host management network card belongs to
❑ B. VLAN 0 (Right Answers)
❑ C. VLAN 1
❑ D. Randomly select VLAN

Answer: B

323 Fusionlnsight does not support user rights management.


❑ A_ True
❑ 13_ False (Right Answers)

Answer: B
324 _ Which of the fallowing descriptions of the requirements for the CPU configuration of the Huawei cloud computing solution host is wrong?
❑ A Intel or AMD X86 architecture 32-bit, 64-bit CPU {Right Answers)
❑ B. CPU supports hardware virtualization technology
❑ C. Turn on virtualization in the BIOS
• The CPU numbers of the compute nodes in the same cluster are inconsistent

Answer: A
325 . The cloud service provider installs the operating system. middleware and application software on the virtual machine. and then provides the overall resource to the user, this cloud computing business model is SaaS.
❑ A. True (Right Answers)
❑ B. False

Answer: A

326 _ From a business perspective, which of the following is the cloud computing similar to?
❑ k Gas station
❑ B_ Water pipe
❑ C. Information Power Plant (Right Answers)
❑ D_ Reservoir

Answer: C
327 _ The four fans of the RH2288H server support hot swap_
❑ A. True (Right Answers)
❑ B_ False

Answer: A

328 _ What are the main function does the FusionAccess component LoadBalance implement?
❑ A. Provide the end users access interface entry
❑ 11 Desktop access login load balancing (Right Answers)
❑ C. Protocol gateway for desktop access, internal and external network isolation, transmission encryption
❑ D_ Installed in each users virtual desktop to provide connectivity between the terminal and the virtual desktop

Answer: B

329 Which of the following is the main data for telecom operations?
❑ A_ Structured data (Right Answers)
❑ B. Unstructured data
❑ C. Semi-structured data
❑ D_ Virtual structured data

Answer: A

330 . Cloud computing is an Internet-based computing approach in which shared hardware and software resource pools and information can be provided to computers or other devices as needed.
❑ A. True (Right Answers)
❑ B. False

Answer: A
331 . Which CPU virtualization technology is the future development trend?
❑ A. Full virtualization
❑ B. Paravirtualization
❑ C. Hosting virtualization
❑ D. Hardware-assisted virtualization (Right Answers)

Answer: D
332. Which of the following description of SPARK is correct? (Multiple Choice)
❑ A. High performance memory iterative computing framework (Right Answers)
❑ B. One-stop solution for memory computing (Right Answers)
❑ C. Support multi-language rapid development application (Right Answers)
❑ D. Poor performance

Answer: ABC

333. What are the current products of Fusionlnsight? (Multiple choice)


❑ A. Fusionlnsight HD (Right Answers)
❑ B. Fusionlnsight Farmer (Right Answers)
❑ C. Fusionlnsight Miner (Right Answers)
❑ D. Fusionlnsight MPPDB (Right Answers)

Answer: ABCD

334 . Which of the following are the connection topologies of Huawei switch stacks? (Multiple choice)
❑ A. Chain connection (Right Answers)
❑ B. Ring connection (Right Answers)
❑ C. Tree connection
❑ D. Fully interconnection

Answer: AB

335 . Which of the following categories does hardware-assisted virtualization include? (Multiple choice)
❑ A. Processor-assisted virtualization (Right Answers)
❑ B. 10-assisted virtualization (Right Answers)
❑ C. Network-assisted virtualization (Right Answers)
❑ D. Trusted Execution Technology (Right Answers)

Answer: ABCD
336 _ Which of the following virtual switching technologies can be implemented on the server? (Multiple choice)
❑ A. VxLan (Right Answers)
❑ B. VMDID (Right Answers)
❑ [Link]-I0V (Right Answers)
❑ [Link]

Answer: ABC

337 . A company provides a variety of resources for customers to use, which of the following forms belong to laaS? (Multiple choice)
❑ A. Network storage serAce (Right Answers )
❑ B. Application system
❑ C. Development platform
❑ a bare virtual machine (Right Answers)

Answer: AD

338. Which of the following eras has the infrastructure experienced? (Multiple choice)
❑ A. Distributed computing
❑ B. Mainframe computing (Right Answers)
❑ C. PC era (Right Answers)
❑ D. The era of cloud computing (Right Answers)

Answer: BCD

339 . What value can it bring to the analytics business by using the Fusionlnsight platform? (Multiple choice)
❑ A. High reliability (Right Answers)
❑ B. High security (Right Answers)
❑ C. Easy to manage (Right Answers)
❑ D. Easy to develop (Right Answers)

Answer: ABCD

340 . Which of the following descriptions about VM Motion are wrong? (Multiple choice)
❑ A. Can be migrated on different series of CPUs from different manufacturers (Right Answers)
❑ B. Us memory compression transfer technology to improve migration efficiency
❑ C. Live Migration can guarantee no disruption to the business (Right Answers)
❑ D. can migrate virtual machines inside and between physical machines

Answer: AC
341 . Which of the following templates does FusionManager support? (Multiple choice)
❑ A. Service template (Right Answers)
❑ B. Virtual machine template (Right Answers)
❑ C. Configuration template
❑ D. Alarm template

Answer: AB

342 . Which of the following are FusionCompute features? (Multiple choice)


❑ A. Storage resource raw device mapping RDM (Right Answers)
❑ B. Cluster autonomous HA mechanism (Right Answers)
❑ C. Affinity scheduling based on NUMA architecture (Right Answers)
❑ D. Virtual machine remote mount optical drive (Right Answers)

Answer: ABCD
343 . What value can virtualization technology bring? (Multiple Choice)
❑ A. Improve server utilization (Right Answers)
❑ B. Application load peak-to-valley (Right Answers)
❑ C. Improve HA capacity (Right Answers)
❑ D. Big data mining

Answer: ABC

344 . What are the characteristics of the FusionSphere architecture? (Multiple Choice)
❑ A. Efficiency (Right Answers)
❑ B. Security (Right Answers)
❑ C. Fusion (Right Answers)
❑ D. Open (Right Answers)

Answer: ABCD

345 . What are the two factors in the FusionAccess USBKEY authentication feature? (Multiple Choice)
❑ A. USBKEY hardware itself (Right Answers)
❑ B. Domain account
❑ C. User fingerprint
❑ D. PIN code (Right Answers)

Answer: AD
346 _ What information can be obtained through the northbound interface of the FusionManager? (Multiple Choice)
❑ A_ Cluster information (Right Answers)
❑ B. Virtual machine information (Right Answers)
❑ c_ Virtual network information (Right Answers)
❑ D Topology information (Right Answers)

Answer: ABCD

347 _ What are the nature of virtualization? (Multiple Choice)


❑ A_ Partition (Right Answers)
❑ B_ Isolation (Right Answers)
❑ c_ Package (Right Answers)
❑ D. Hardware independence (Right Answers)

Answer: ABCD

348 _ What are the HA mechanism used in FusionCompute? (Multiple Choice)


❑ A_ Centralized control HA mechanism (Right Answers)
❑ B_ Brain splitting mechanism
❑ C_ Differential Control HA Mechanism
❑ D_ Cluster autonomous HA mechanism (Right Answers)

Answer: AD

349 . During the installation process of FusionAccess, you need to configure the Windows OS infrastructure host. Which of the following components are installed on the Windows OS infrastructure host? (Multiple Choice)
❑ A. GaussDB
❑ B. ITA (Right Answers)
❑ C. HDC
❑ D Logger (Right Answers)

Answer: BD

350. Which of the following descriptions are correct about the VDC and VPC in FusionManager? (Multiple Choice)
❑ A. VDC is the virtual resource boundary allocated to the user, which is the resource boundary that the tenant can use. (Right Answers )
❑ B. VPC is a virtual private cloud, which is a private network isolation area created in the VDC. (Right Answers)
❑ C_ Multiple VPCs can be included in one VDC (Right Answers)
❑ D. The network in VPC is specified by the administrator. and the tenant can only use the network created by the administrator. (Right Answers)

Answer: ABCD

351 .What are the steps in the basic installation of FusionCompute? (Multiple Choice)
❑ A_ Install the host (Right Answers)
❑ B_ Install VRM (Right Answers)
❑ C. Install VSAM
❑ D_ Install PVM

Answer: AB
352 . The cloud computing environment concentrates data in the cloud data center, bringing all-round security to customers. What are the main aspects? (Multiple Choice)
❑ A. Network transmission encryption (Right Answers )
❑ B. Data encryption storage (Right Answers)
❑ C. Virtual machine antivirus (Right Answers )
❑ D. Terminal access authentication (Right Answers)

Answer: ABCD

353 . Which of the following technologies belong to the cloud computing technology system? (Multiple Choice)
❑ A. Virtualization technology (Right Answers)
❑ B_ Storage technology (Right Answers)
❑ C. Network technology (Right Answers)
❑ D_ Distributed technology (Right Answers)

Answer: ABCD

354 . Which types of networking isolation can Fusionlnsight achieve? (Multiple Choice)
❑ A_ Work node isolation
❑ B. Cluster business plane (Right Answers)
❑ C. Cluster management plane (Right Answers)
❑ D. Out-of-cluster maintenance network (Right Answers)

Answer: BCD
355 . Huawei cloud computing solutions use a variety of different network virtualization technologies. Which of the following descriptions are correct? (Multiple Choice)
❑ A. Ordinary virtual network card must be handled by Domain° network I / 0 activities (Right Answers)
❑ B. VMDq supports lossless thermal migration (Right Answers)
❑ C. VMDq NIC throughput is better than SR-IOV
❑ D. In SR-IOV technology scenario, support hot migration, snapshot

Answer: AB

356 . What are the participants in the cloud computing industry? (Multiple Choice)
❑ A. Cloud service provider (Right Answers)
❑ B. Cloud device provider (Right Answers)
❑ C. Cloud users (Right Answers)
❑ D. Cloud Service Developer

Answer: ABC

357. Which of the following description is wrong about VxLAN? (Multiple Choice)
❑ A. Realize decoupled configuration of virtual network and physical switch
❑ B. Does not support network equipment utilization (Right Answers)
❑ C. Maximum support 4K virtual network identifiers VNI (Right Answers)
❑ D. Realize virtual machine migration across physical Layer 3 networks

Answer: BC
358 . What are the types of mainstream virtualization architectures in the industry? (Multiple Choice)
El A. Hosting virtualization (Right Answers)
111 B. Bare metal virtualization (Right Answers)
El C. Full virtualization
111 D. Operating system virtualization (Right Answers)

Answer: ABD
359 . In the Huawei cloud computing solution, which of the following components can be deployed on a physical machine or on a virtual machine? (Multiple Choice)
0 A. CAN
O B. VRM (Right Answers)
O C. FusionManager (RightAnswers)
O D. VSAM

Answer: BC

360 . What are the display interfaces supported by the TC thin terminal devices used in Huawei cloud computing solutions? (Multiple Choice)
O A DVI (Right Answers)
❑ B. HDMI
O C. VGA (Right Answers)
• PCI-E

Answer: AC

361 . What are the deployment models for cloud computing? (Multiple Choice)
111 A. Public cloud (Right Answers)
El B. Private cloud (Right Answers)
❑ C. Government Cloud
El D Hybrid cloud (Right Answers)

Answer: ABD
362. Which of the following descriptions is wrong about Huawei FusionCube?
❑ A. FusionCube integrates computing, storage, network, virtual platform, database and application software to achieve one-stop solution
1:1 B. The core of the FusionCube Fusion is distributed computing software (FusionCompute + FusionManager + FusionStorage).
1:1 C. FusionCube is a Huawei-developed solution from the underlying hardware to the upper-layer distributed cloud computing software, providing end-to-end thin management deployment.
El D. FusionCube virtualizes multiple external SAN storages to provide distributed high-performance storage pools to solve 10 performance bottlenecks (Right Answers )

Answer: D

363 . What are the reliability of Fusionlnsight data? (Multiple Choice)


111 A_ Cross-data center data backup (Right Answers)
❑ B. Third-party backup system integration (Right Answers)
Ei C. Fast fault detection (Right Answers)
❑ D. Online disk replacement online (Right Answers)

Answer: ABCD
3E4. Which of the following components are open source components used by FusionInsight? (Multiple Choice)
❑ A. HDES (Right Answers)
❑ B. Manager
❑ C. HBase (Right Answers)
❑ D. Hive (Right Answers)

Answer: ACD
365 Which of the following descriptions are correct about the virtual memory of the virtual machine, (Multiple Choice)
❑ A VMM needs to save the mapping relationship between physical memory address and virtual memory address
❑ B The use of virtual memory is tile same as the use of physical memory,you can use it without conversion (Right Answers)
❑ C Physical memory can be dinded into multiple memory blocks. and each virtual machine is allocated only one virtual memory block (Right Answers)
❑ D The nrtual memory address and the physical memory address are one-to-one correspondence Mer using the memory multiplexing technology, the amount of available .Art1W memory is less than or equal to the amount of physical memory
(Right Answers)

Answer: BCD

366. When deploying Huawei cloud computing solutions, what aspects of the previous planning and design are generally involved? (Multiple Choice)
❑ A_ Architecture design (Right Answers)

❑ EL Component design (Right Answers)


❑ C. Network design (Right Answers)
❑ D. Storage design (Right Answers)

Answer: ABM

367 . In the cloud data center, what types of virtual switching technologies do virtual machines include? (Multiple Choice)
❑ A. Software-based virtual switch (Right Answers)
❑ B. Virtual switch based on intelligent network card (Right Answers)
❑ C. Virtual switch based on physical switch (Right Answers)
❑ D. Virtual switch based on InfiniBand network card

Answer: ABC

368 What are the main features of the FusionAccess virtual application component SBG? (Multiple Choice)
❑ A_ A solution for publishing applications that makes application nrtualLzation (Right Answers)
❑ EL Support centralized control and management in the data center, can be published as a service anywhere, without requiring users to install the application locally(Right Answers)
❑ C. The application eventually runs on the backend server. which borrows the Windows Server terminal seance mechanism to create a session for each access user. (Right Answers)
❑ The application displays the published application through the web interface, and the user can directly click and use (Right Answers)

Answer: ABC]

369 . The OceanStor 5800 v3 storage device adopts full redundancy design. Which modules are mainly redundant? (Multiple Choice)
❑ A Controller (Right Answers)
❑ B. Fan (Right Answers)
❑ G. Power supply (Right Answers)
❑ B. BBLJ (Right Answers)

Answer: ABCD
370 . Which resources can FusionCompute perform QoS control on? (Multiple Choice)
❑ A. CPU Right Answers)
❑ B. Memory, (Right Answers)
❑ C. Network Right Answers)
❑ D. Storage Right Answers)

Answer: ABCD
371 Huawei can provide cloud computing solution from end-to-end and from software to hardware Which of the following hardware components are optional in Huawei cloud computing solution? (Multiple Choice)
❑ A Server
❑ B. Load balancing donee (Right Answers)
❑ C. Firewall )Right Answers)
▪ TC thin terminal (Right Answers)

Answer: BCD

372. What are the restrictions on raw device [napping of storage resources in FusionCompute? (Multiple Choice)
❑ A. Linked clones are not supported Right Answers)
❑ B. does not support storage thin provisioning (Right Answers)
❑ C. Storage incremental snapshots are not supported tRight Answers)
❑ D. Storage hot migration is not supported RRight Answers)

Answer: ABCD
373 FusionCompute uses storage thin provisioning to improve storage utilization and reduce storage costs If 120GB of physical storage is configured with 4 virtual machines, which of the following virtual machine disk capacity allocation schemes are
feasible? (Unit GB, temporarily do not consider the actual storage situation) (Multiple Choice)
❑ A 10 20 30 40 Right Answers)
❑ B 10 100 20 200 Might Answers)
❑ C 120 120 120 120 Right Answers)
❑ 0 30 30 30 30 (Right Answers)

Answer: ABCD

374. To monitor the server on the FusionManager, you need to use SNMP or SSH. Therefore, what basic information should you collect before accessing the server? (Multiple Choice)
❑ A Serer IP address (Right Answers)
❑ EL Servers SNMP port number (Right Answers)
❑ Server SSH username and password (Right Answers)
❑ SNMP version number (Right Answers)

Answer: ABCD

375 What is Huawei desktop cloud solution consist of ((Multiple Choice)


❑ A. FusionAccess Right Answers)
❑ B. FusionSphere Right Answers).
❑ C. FusicinInsight
❑ D. IC terminal 1Right Answers)

Answer: ADD

376 . Which of the following parameters can be selected and set when using FusionAccess to issue a virtual machine? (Multiple Choice)
❑ A Virtual machine specifications (Right Answers)
❑ B. Virtual machine network (Right Answers)
❑ C_ Virtual machine disk (Right Answers)
❑ ❑. Virtual machine naming rules Right Answers)

Answer: ABCD
377. What are the main features of the E9000 server? (Multiple Choice)
❑ A. Flexible networking (Right Answers)
❑ B. High computational density (Right Answers)
❑ C. High storage density (Right Answers)
❑ D. Computing. storage and network convergence (Right Answers)

Answer: ABCD

378 . Which of the following descriptions are correct about the functions of the FusionManager core components? (Multiple Choice)
❑ A. UHM is a unified hardware management component responsible for heterogeneous hardware monitoring (Right Answers)
❑ B. IRM is an integrated resource management component responsible for heterogeneous virtualized resource management (Right Answers)
❑ C. Fault Service provides alarm query management (Right Answers)
❑ D. AME is an application management engine component responsible for application automation management (Right Answers )

Answer: ABCD

379. What are the business models of cloud computing? (Multiple Choice)
❑ A. laaS (Right Answers)
❑ B. PaaS (Right Answers)
❑ C. Seas (Right Answers)
❑ D. DaaS

Answer: ABC

380 . What devices and systems can Huawei manage with unified management technology? (Multiple Choice)
❑ A. Network security equipment (Right Answers)
❑ B. Storage and server (Right Answers)
❑ C. Virtualization resources (Right Answers)
❑ D. Application software

Answer: ABC

381 . What are the virtual hardware involved in creating a virtual machine? (Multiple Choice)
❑ A. CPU (Right Answers)
❑ B. Memory (Right Answers)
❑ C. Hard disk (Right Answers)
❑ D. Network card (Right Answers )

Answer: ABCD
382. What are the reliability of the Fusionlnsight system? (Multiple Choice)
❑ A. No single point of failure in the business (Right Answers)
❑ B. Management node HA (Right Answers)
❑ C. Cross-DC disaster recovery/backup (Right Answers)
❑ D. Third-party backup system integration (Right Answers )

Answer: ABCD

383 . In the cloud data center, what are the virtual hardware of the business host? (Multiple Choice)
❑ A. CPU (Right Answers )
❑ B. Memory (Right Answers )
❑ C. Hard disk (Right Answers)
❑ D. Network card (Right Answers)

Answer: ABCD
384 . Which of the following descriptions of Huawei S series box switch stacks are correct? (Multiple Choice)
❑ A. Only switches of the same model can be stacked (Right Answers)
❑ B. Different sub-series switches implement different stacking methods. (Right Answers )
❑ C. Some switches do not support stacking. (Right Answers )
❑ D. All series of switches support stacking

Answer: ABC

385 . What aspects of virtualization does computing virtualization technology include? (Multiple Choice)
❑ A. CPU virtualization (Right Answers)
❑ 8. Memory virtualization (Right Answers)
❑ C. Hard disk virtualization
❑ D. 10 virtualization (Right Answers )

Answer: ABD

386. What are the factors that contribute to the generation of cloud computing? (Multiple Choice)
❑ A. Demand push (Right Answers)
❑ B. Technological progress (Right Answers)
❑ C. Business model shift (Right Answers )
❑ D. Industry change

Answer: ABC
387 . Which of the following descriptions are correct about the affinity adjustment of FusionCompute based on NUMA architecture? (Multiple Choice)
❑ A. When the virtual machine resources are allocated. the hardware NUMA architecture is perceived. and the resources in the same Node are preferentially selected. (Right Answers)
❑ B. When the resources required by a virtual machine cannot be provided by one Node, the virtual machine resource allocation fails.
❑ C. Resource allocation dynamic adjustment. not static setting (Right Answers)
❑ D. Allocate Node resources with close distance according to the principle of proximity

Answer: AC

388 . Which of the following modules belong to the component of controller enclosure of the OceanStor 5800 v3 storage device? (Multiple Choice)
❑ A. Power module (Right Answers)
❑ B. Management module (Right Answers)
❑ C. Disk module
❑ D. Interface module (Right Answers)

Answer: ABD

389 Which of the following types of networks can be used in a VPC? (Multiple Choice)
❑ A_ Direct network (Right Answers)
❑ a Routing network (Right Answers)
❑ C_ Internal network (Right Answers)
❑ D. Closed network

Answer: ABC

390 _ What are the implementation method of storage virtualization? (Multiple Choice)
❑ A_ bare device + logical volume (Right Answers)
❑ B. Storage device virtualization (Right Answers)
❑ C_ Host Storage Virtualization + File System (Right Answers)
❑ D_ Host storage

Answer: ABC

391 . What are the key features of cloud computing? (Multiple Choice)
❑ A. On-demand self-service (Right Answers)
❑ B. Location-independent resource pool (Right Answers)
❑ C. Pay by usage (Right Answers)
❑ D. Rapid flexibility (Right Answers)

Answer: ABCD
392 _ What are the main functions of FusionAccess? (Multiple Choice)
❑ A_ Asset management, managing the relationship between users and virtual machines (Right Answers)
❑ B_ User access, users can view and operate their own virtual machine (Right Answers)
❑ C. Desktop transfer, using virtual machine through desktop link protocol (Right Answers)
❑ D. Resource scheduling, management scheduling, cloud platform computing, storage resources

Answer: ABC
393 Huawei cloud computing software can be pre-0eployed on specific hardware, and the software and hardware are combined to form an all-in-one machine and sold to customers Which Nthe following Huawei servers support the alkn-one deployment
mode,(Multiple Choice)
❑ A E9000 (Right Answers)
❑ B RI-15885
❑ C RH2288H )Right Answers)
❑ D X8000

Answer: AC

394 Which of the following licensing mode does FusionAccess desktop cloud solution include? (Multiple Choice}
❑ A Number of users Right Answers)
Number of concurrent users (Right Answers)
❑ G. Number of virtual desktops
❑ a Number of physical servers

Answer: AB

395. The weakest data redundancy capability of the following RAID levels is 0_
1:1 A. RAID 1
❑ I±1. RAID 6
❑ C. RAID 0 Right Answers)
❑ D. RAID 5

Answer: C

396_ Which of the following is not included in the NAS architecture?


❑ A. Volume Management Module
❑ B. Status check module
❑ C. File system
❑ D. Network interface Right Answers)

Answer: D
397. For scenes such as archives that need to store large amounts of data for a long time without frequently reading. which type of disk is recommended to choose?
❑ A SAS disk
▪ NL-SAS disk
▪ SATA disk Right Answers)
❑ a SSD disk

Answer: C

398. SATA disks are disks that use the parallel interface type. and SAS disks are disks that use the serial interface type.
OA. TRUE
O B. FALSE ( Right Answers)

Answer: F
393. In RAID 5 and RAID 6, the number of disks allowed to fail is ().
❑ A. 3. 2
❑ B. 2, 1
❑ C. 1 2 (Right Answers)
❑ D. 2, 3

Answer: C
400. The following can achieve computer virtualization in the era of cloud computing 1.0 and improve resource utilization is ()_
❑ A. KVM
❑ B. Xen (Right Answers)
❑ C. Hyper-v
❑ D. OpenStack

Answer: B

401. After KVM uses Virtio. the correct description for I/O forwarding process is (). (Multiple Choice)
❑ A. I/O request is sent directly by the front-end driver to the back-end driver (Right Answers)
❑ B. I/O request no longer passes QUEM forwarding
❑ C. V0 request forwarding efficiency will increase (Right Answers)
❑ D. I/O request requires KVM module forwarding

Answer: AC

402. If a company uses a hybrid cloud, the device tha: can't be used as a demarcation point between the public cloud and the private cloud is 0. (Multiple Choice)
❑ A, Core switch (Right Answers )
❑ B. Firewall
❑ C. Virtual switch (Right Answers )
❑ D. Flow cleaning equipment

Answer: AC

403. Open source virtualization technologies are all type I virtudzed. Closed source virtualization technologies are all type II virtualization_
0 A. TRUE
0 B. FALSE (Right Answers)

Answer: F

404. The correct description of the type I (bare metal) computing virtualization features are (). (Multiple Choice)
❑ A. The application can run directly on VMM
❑ B. Hypervisor runs directly on top of physical hardware (Right Answers)
❑ C. Both applications and virtual machines can run directly an the Host OS
❑ D. The application cannot run directly on the Host Machine (Right Answers)

Answer: BD
405. In Huawei FusionCompute, the correct step to delete storage resources is 0.
1_ Delete or virtual machine disk
2_ Unlink the host
3_ Delete storage resources
4_ Destroy the data store
❑ A 3->2->4->1
❑ B_ 2->4->1->3
❑ C. 1->2->3->4
❑ D_ 1->4->2->3 (Right Answers)

Answer: 13
406. Configuring the IP SAN for the host is usually necessary to configure the host on the storage device to map the host to the IP SAN.
❑ A. ISCSI Target
❑ B. ISCSI Server
❑ C. !SCSI Client
❑ D. ISCCSI Initiator (Right Answers)

Answer: D

407. The essence of the internet of things is the Internet. If there is hardware or products connected to the network, data interaction can be called the internet of things.
A . TRUE
B . FALSE

Answer: A

408. In Huawei FusionCompute, FusionStorage can be used as virtualized storage.


A . TRUE
B . FALSE

Answer: B

409_ In computing virtualization, the operating system running in a virtual machine is called Host OS.
A . TRUE
B . FALSE

Answer: B

410. With the development of Al technology, almost all technologies are now related to artificial intelligence. Which of the following is the application field of Al now? (Multiple Choice)
❑ A. Appease the robot (Right Answers)
❑ B. Voice recognition (Right Answers)
❑ C. Image Identification (Right Answers)
❑ D. NLP (Neuro-Linguistic Programing) (Right Answers)

Answer: ABCD
411. In Huawei Fusioncompute administrators can discover storage devices by scanning or manually refreshing.
❑ TURE
❑ B. FALSE (Right Answers)

Answer: B

412. In Huawei FusionCompute, after a host in the cluster fails, the virtual machine on the host is automatically migrated to other hosts in the cluster.
❑ A. TURE
❑ B. FALSE (Right Answers)

Answer: 13

413. The correct description about CIFS is ft


❑ A. CIFS supports multi-user access. (Right Answers)
❑ B. CIFS has low reliability requirements for network transmission. It can use either TCP/IP protocol or UDP protocol.
❑ C. CIFS requires Client must install dedicated software.
❑ D. CIFS retains file format features.

Answer: A

414. In Huawei FusionCompute, if the server has fewer physical N1Cs, consider deploying multiple planes together. Use VLANs to logically isolate planes.
OA. TRUE (Right Answers)
OB. FALSE

Answer: T

415. The following is about the cluster in Huawei FusionCompute. the incorrect description of the host and virtual machine is 0.
❑ A. Determining whether a host belongs to the same cluster depends on whether you use unified shared storage.
❑ B. A cluster consists of multiple hosts and their associated storage and network resources.
❑ C. Virtual machines can be migrated across clusters. (Right Answers)
❑ D. Hosts can move between different clusters.

Answer: C

416. In Huawei FusionCompute, the configuration mode of virtual machine disk that save the most storage space is 0_
❑ A. Ordinary
❑ B. Independence - lasting
❑ C. Streamlining (Right Answers)
❑ D. Independent - non-persistent

Answer: C
417_ The correct description of virtualized storage and non-virtualized storage is 0.
❑ A. Virtualized storage is more secure than non-virtualized storage.
❑ B. The compatibility of virtualized storage is better than non-virtualized storage.
❑ C. The read and write performance of non-virtualized storage is better than virtualized storage. (Right Answers)
❑ D. Non-virtualized storage is more scalable than virtualized storage.

Answer: C

418. Which of the following technologies or devices cannot isolate broadcasts? (C)
❑ A. Router
❑ B. VLAN
❑ C. Hub (Right Answers)
❑ D. Firewall

Answer: C

419. Memory multiplexing technology is a prerequisite for memory resource QoS implementation.
❑ A. TURE (Right Answers)
❑ B. FALSE

Answer: A

420. Which of the following description about the VIMS file system is incorrect?
❑ A. VIMS is compatible with FC SAN, IP SAN and local disk.
❑ B. VIMS is the technical foundation for the storage migration such as thin disk. snapshot, advanced features.
❑ C. VIMS is a high-performance cluster file system
❑ D. VIMS is an industry-wide storage virtualization file system. (Right Answers)

Answer: D
421. SAN provides a "bare disk" with no file system built to the host. It depends on the operating system of the host when build the file system on it.
OA. TRUE
OB. FALSE (Right Answers)

Answer: F

422. About the description of the differences between physical switches and virtual switches, which is incorrect?
❑ A. Virtual switch runs on a physical server. Physical switches have separate hardware.
❑ B. The virtual switch cannot operate on the VLAN tag. The physical switch can operate on the VLAN tag. (Right Answers)
-
❑ C. Virtual switch cannot be con figured with a Layer 3 interface. A physical switch can be configured with a Layer 3 interface_
❑ D. The normal operation of the virtual switch also requires certain hardware resources.

Answer: B
421 In Huawei Fusion Compute, which of the following description of the relationship between the number of virtual machines and DVS is correct? (Multiple Choice}
❑ A When a virtual machine has a network card, the network card can only be associated with one DVS. (Right Answers)
❑ B When a virtual machine has multiple network cards, each network card can be associated with a DVS. (Right Answers)
❑ C When a virtual machine has multiple network cards_ multiple network cards can be associated with the same DVS. (Right Answers)
❑ D When a virtual machine has a network card, the network card can be associated with multiple DVSs_

Answer: ABC

424. A Huawei switch port is configured as follows:


Interface (GigabitEhernet 010!1)
Port link-type trunk
Port trunk allow-pass elan 16 17
According to the above configuration. which of the following statement is correct?
❑ A. Data frarnescontaining the elan 16 tag will be stripped and forwarded as they pass through the port.
❑ EL Data frames that do not contain any labels are discarded when they pass through the port_
❑ C. When data frames that do not contain any label passes through the port, the label of VLAN 16 or VLAN 17 is added and forwarded.
❑ D. Data frames containing VLAN 17 tags are reserved and forwarded as they pass through the port. (Right Answers)

Answer: D

425. In Huawei FusionCompute, which of the following description about the CPU QoS technology is incorrect?
❑ A. "reservation" is to ensure the lower limit of the virtual machine computing power. That is. the minimum amount of resources used.
❑ B. The role of 'share" is when the computing resources are insufficient, according to the relative CPU share value of multiple virtual machines for the balance and adjustment of source
❑ C. The role of the 'restriction' is to specify the maximum number of runs on the host_ (Right Answers)
❑ D. By adjusting "reservation", "share', "restrictions" implement control over virtual machine CPU resource usage

Answer: C

426. In Huawei Fusion Compute. For the convenience of unified management, each DVS needs to be configured with a management IP address.
OA_ TRUE
OFT FALSE Right Answers)

Answer: F
427 MAORI intelligence is a new technology science that studies and develops theories, methods, techniques, and application systems for extending atrficial intelligence Which of the following statement about artificial intelligence is wrong,
▪ A Artificial intelligence,¢ not social
❑ e Artificial intelligence is the physical process of unconscious mechanical.
C C Artificial intelligence has no creative creativity unique to human consciousness.
C D Artificial intelligence is a technology for information exchange through items through the network (Right Answers)

Answer:

428. n Huawei FusionCompute, when the virtual machine installs the operating system by mounting the local image file, the administrator can close the MSC window at any time. It does not affect the reading of the image.
OA. TRUE ( Right Answers)
0 B FALSE

Answer: T

429. Which of the following description of memory reuse is incorrect?


❑ A Memory multiplexing technology can make the sum of virtual machine memory specifications larger than the sum of physical server specifications memory_
❑ B Memory multiplexing technology can make the sum of the virtual machine use greater than the turn of the physical server specification memory_ 'Right Answers)
❑ C. After memory reuse function is turned on, the memory reuse rate is inversely proportional to the actual memory usage of each virtual machine.
❑ D. The memory reuse single-item technology contains memory bubbles, memory swap and memory sharing.

Answer: B

430 In Huawei FusionCompute, which of the following description of virtual machine HA is correct? (Multiple Choice)
❑ A Virtual machine HA fit notion can quickly recover business when a failure curs (Right Answers)
❑ B When the system detects a blue screen of the virtual machine and configures the processing policy to HA. the system selects another normal compute node to rebuild virtual machine I
Right Answers)
❑ C After HA is enabled in the cluster the virtual machine can be rebuilt on other hosts after the host fails IMAM Answers)
❑ 1:1 If resources are reserved- in the cluster, when a failure occurs, the virtual machine with the HA attribute can be successfully rebuilt on other compute nodes_

Answer: ABC
431. Which of the following scenarios does the snapshot not apply to?
❑ A. Business devastating test
❑ B. Business data is saved for a long time 1Right Answers)
❑ C. Business patch upgrade
❑ D. Major changes in business

Answer: B

432. Which of the following techniques on the switch can increase the link rate?
❑ A. LDAP
❑ B. LACP IRight Answers)
❑ C. VLAN
❑ D. VXLAN

Answer: B
433. Which of the following description of virtualization is incorrect? (Multiple Choice):
❑ A. Network virtualization refers to a distributed virtual switch. (Right Answers)
❑ B. Storage vnualization refers to distributed storage (Right Answers)
❑ G. In cloud computing, laaS layer virtualization can be divided into computing wrtualization, storage virtualization and network wrtualization.
❑ Q_ Computing virtualization includes CPU virtualization, memory virtualization and ICI wrtualization_

Answer: AB

434. CPU wrtualization technology can be divided into full wrtualization, parmirtualization, software wrtualization and hardware-assisted virtualization.
OA. TRUE
0 B. FALSE Right Answers)

Answer: F

435. In Huawei FusionCompute, the virtual machines that use non-virtualized storage do not support snapshots.
OA. TRUE
0 B. FALSE RRight Answers)

Answer: F

436. loT devices can be connected to the Internet and can be controlled via the Internet.
OA. TRUE Right Answers)
0 B. FALSE

Answer: T

437 Some virtualization technologies are open source Some are closed source The same is for cloud computing management platforms Open source cloud computing management platforms need to be implemented using open source 'Actualization
technology
OA. TRUE
B FALSE {Right Answers)

Answer: F
438. In Huawei FusionCompute. DVS supports multiple dynamic routes in addition to static routes.
OA. TRUE
0 B. FALSE (Right Answers)

Answer: F

439 . In Huawei FusionCompute. the default alarm level does not include?
❑ A. common (Right Answers)
❑ B. emergency
❑ C. prompt
❑ D. secondary
❑ E. important

Answer: A

440. The configuration of a Huawei switch port is as follows:


Interface GigabitEhernet 01011
Port link-type access
Port default vlan 16
According to the above configuration, which of the following statement is correct?
❑ A. This port adds a vlan 16 tag to the data frame that will pass.
❑ B. This port only allows data with vlan 16 tags to pass
❑ C. This port will strip the vlan 16 label of the passed data frame and forward it. (Right Answers)
❑ D_ The port does not do anything with the passed data frames.

Answer: C
441. In Huawei FusionCompute, which of the following deployment methods is recommended to improve the reliability of VRM?
❑ A. active and standby deployment (Right Answers)
❑ B. single node deployment
❑ C. hybrid deployment
❑ D. double live deployment

Answer: A

442. Which of the following is not a feature of Big Data 4V?


❑ A. Value
❑ B. Varitey
❑ C. Valid (Right Answers)
❑ D. Volume

Answer: C
443. Which of the following statements about cloud computing and the Internet of Things is wrong?
❑ A. Without the support of cloud computing the Internet of Things cannot transmit data. (Right Answers)
❑ B. Cloud computing is the cornerstone of the development of the Internet of Things, and the Internet of Things continues to promote the development of cloud computing.
❑ C. Cloud computing can provide enough storage space for massive data of the Internet of Things
❑ D. If there is no cloud computing as the basic support, the efficiency of the Internet of Things will be greatly reduced.

Answer: A

444. Which of the following operations can take effect immediately in Huawei FusionCompute?
❑ A_ Directly read and write to the newly bound disk
❑ B_ Installation Tools
❑ C_ Disk volume reduction
❑ D_ Delete the network card (Right Answers)

Answer: D
445 . Virtual switches play an important role in communicating between virtual machines and are an indispensable component.
OA. TRUE (Right Answers)
0 B. FALSE

Answer: T

446 In Huawei FusionCompute, the description of the "shared" type disk, which is correct? (Multiple choice).
❑ A. The virtual machine bound to this type of hard disk does not support the snapshot function. (Right Answers)
❑ B. This type of hard disk can only be bound to one virtual machine.
❑ C. The virtual machine does not support changing the data storage for such a hard disk (Right Answers)
❑ D. This type of hard disk can be bound to multiple virtual machines (Right Answers )

Answer: ACD

447 . The following about NFS description, which is right?


❑ A. NFS client does not need to install special software
❑ B. NFS cannot set user permissions
❑ C. NFS supports multi-user access {Right Answers)
❑ D. NFS is a stateful protocol

Answer: C

448. Memory multiplexing technology cannot be implemented?


❑ A. Turn on the memory multiplexing technology. The higher the multiplexing ratio. the better the performance of the virtual machine. (Right Answers)
❑ B. Turn on the memory multiplexing technology to increase the deployment degree of virtual machines on the physical host.
❑ C. If the user virtual machine memory usage is high. you can optimize it by modifying the memory reuse ratio.
❑ D. Turn on the memory multiplexing technology, the total memory of all virtual machines created by the user can exceed the physical memory.

Answer: A
449_ The function of the Internet of Things is simply to collect data generated by various things.
(..„)A. TRUE
0 B. FALSE (Right Answers )

Answer: F

450 _ Which device is capable of routing and forwarding in a physical network?


El A Hub
D B. Layer 2 switch
D C. Router (Right Answers)
D D. Physical Server NIC

Answer: C

451. In cloud computing, the network can be divided into two parts: virtual network and physical network.
OA_ TRUE (Right Answers)
0 B_ FALSE

Answer: T

452. In FusionCompute. the following description of deleting a security group, which is wrong?
❑ A. The authorization behavior between the security group to be deleted and other security groups does not affect the deletion operation.
O B. There is no virtual machine in the security group. If there is a virtual machine in the security group, you need to remove the virtual machine from the security group.
0 C. After the security group is deleted. all security group rules in the group are deleted at the same time. (Right Answers )
O D. When a security group to which a virtual machine belongs is deleted. other security groups are not affected by the virtual machine.

Answer: C

453. Intelligent memory multiplexing technology (memory bubble, memory swap. memory sharing) can be customized to turn onfoff any of the functions according to customer needs.
OA. TRUE
OB. FALSE (Right Answers)

Answer: F

454 . In Huawei FusionCompute, you need to modify a certain disk of the virtual machine. Which of the following operations can be implemented?
El A. Change the disk capacity from 80GB to 8GB
❑ B. Change the configuration mode of the disk from ''Lite" to "Normal"
0 C. Change the mode of the disk from "slave" to "independent-persistent" (Right Answers)
111 D. Change the status of the disk from "available" to "not available"

Answer: C

456_ In Huawei FusionCompute, DPM must rely on DRS to be used.


A TRUE (Right Answers)
0 El. FALSE

Answer: T
456. The fallowing description of iSCSI and Fibre Channel, which is wrong?
El A. The FC protocol is completely heterogeneous with the existing Ethernet, and the compatibility is poor_
❑ B_ iSCSI runs on Ethernet based on TCP/IP protocol and can be seamlessly integrated with existing Ethernet
❑ C_ FC transmission distance is farther than TCP/IP (Right Answers)
❑ EL From the transport layer, the Fibre Channel transmission uses the FC protocol, and the iSCSI uses the TCP/IP protocol.

Answer: C

457_ Which of the following is not part of snapshot management?


El A_ Copy the snapshot (Right Answers)
El B_ Modify the snapshot
El C. Create a snapshot
❑ D_ Delete the snapshot

Answer: A

458_ Using templates in Huawei FusionCompute can deploy multiple virtual machines in batches.
OA_ TRUE (Right Answers)
If fr FALSE

Answer: T

459. In Huawei Fusion compute, all virtual machine NICs that are added to the same security group are filtered by the security group. To improve security, you need to add the same NIC to multiple security groups.
OA. TRUE
0 B. FALSE (Right Answers )

Answer: F

460 _ A virtual machine can have multiple virtual network cards at the same time, corresponding to different virtual switches.
0 A TRUE (Right Answers)
r.D Et FALSE

Answer: T

461. Huawei Fusioncompute does not support which of the following virtual machine disk file format?
El A_ WEE (Right Answers )
111 B. VHD
❑ C. RAW
El D. OCOW2

Answer: A
462_ The rules in the security group will be deleted along with the security group.
C., A_ TRUE
(2) B_ FALSE (Right Answers)

Answer: F

463_ What types of storage virtualization can be divided into? (Multiple choice)
❑ A. Application level virtualization
❑ B_ Block level virtualization (Right Answers)
❑ C. Page level virtualization
❑ D_ File level virtualization (Right Answers)

Answer: BD

464 _ The process of creating a file system on a disk is often referred to as?
❑ A_ Package
❑ B. Formatting (Right Answers )
❑ C_ RAID
❑ D. Partition

Answer: B

465. The necessary conditions for the virtual machine to communicate normally with other virtual machines are? (Multiple choice)
❑ A. Configure the fixed IP address for the virtual machine
❑ B. Configure the virtual machine with the correct IP address (Right Answers)
❑ C. Configure the virtual machine with the correct MAC address (Right Answers)
❑ D. Configure the gateway address for the virtual machine

Answer: BC

466_ In Huawei FunsionCompute, which can be performed on VRM? (Multiple choice)


❑ A partition RAID for disk array
❑ B. Converting virtualized storage to non-virtualized storage
❑ C. Manually add storage devices for virtual machines (Right Answers)
❑ D_ Add SAN storage as non-virtualized storage (Right Answers)

Answer: CD
467 . The VLAN ID (excluding 0) configured for DVS in Huawei FunsionCompute needs to exist on the physical switch. Otherwise, the normal communication of the virtual machine will be affected.
OA. TRUE
0 B. FALSE (Right Answers )

Answer: F
468 .1f the virtual machine is to communicate with other virtual machines. which of the following options is necessary?
❑ A Need to configure port binding on the physical server
❑ EL Need to configure port binding on the physical switch
❑ C. Need to network the physical server where the virtual machine is located
❑ a Need to add at least one network card to the virtual machine Right Answers)

Answer: CI

469 . The service mode described in the picture is?


▪ laaS iRight Answers)
❑ B. DaaS
❑ G. PaaS
❑ 2 SaaS

Answer: A

470. Which of the following methods does the physical switch generally support for remote management? (Multiple selection)
❑ A. Telnet (Right Answers)
❑ B. SSL
❑ C Web (Right Answers)
❑ a. SSH (Right Answers)

Answer: ACD

471 The following about Hypervisor description, which is wrong?


❑ A. In virtualization, Hypervisor and VMM are a concept
❑ B. In virtualization, Hypervisor can run directly on the Host Machine
❑ C. In virtualization, Hypervisor is able to monitor the status of the Guest Machine
❑ ❑. In virtualization, only the Hypenrisar has direct access to physical resources_ 1Right Answers)

Answer: B

472 Which of the following scenarios is not recommended to enable memory multiplexing?
❑ A Ordinary office cloud host
❑ B. Telecom Business Hall
❑ C. Graphics workstation -Right Answers)
❑ ❑. Bank window office

Answer: C
473 NUMA is a memory architecture designed for multiprocessor computers The memory access time depends on the location of the memory relative tolhe processor Under NUMA, the processor accesses its own local melnorytaster. than nonlocal
memo) (Me memory. located in another processor or shared memory between processors)
OA. TRUE (Right Answers)
0 B FALSE

Answer: T
474_ Which of the following is the north-south traffic? (Multiple choice)
El A. Traffic generated by virtual machine hot migration
El B. Traffic between virtual machines that access each other across data centers (Right Answers)
E] C. Traffic generated by customers accessing data center services over the Internet (Right Answers)
El D. Traffic between virtual machines in the data center

Answer: BC

475. What can be done in Huawei FusionCompute? (Multiple choice)


El A. Convert virtual machines from other virtualization platforms into virtual machines available for FusionCompute
111 B. Clone a virtual machine (Right Answers)
El C. Create a virtual machine (Right Answers)
❑ D. delete virtual machine (Right Answers)

Answer: BCD

416 _ Packets in the cloud computing virtual network need to be routed through routers in the physical network_
0A_ TRUE
e B. FALSE (Right Answers)

Answer: F

477. !SCSI is a standardized protocol based on the protocol and SCSI instruction set and is widely used in many storage networks using the architecture.
El A. FC IP SAN
El B. TCP/IP FC SAN
1=1 C. FC FC SAN
El D. TCP/IP IP SAN (Right Answers)

Answer: D

478. Cloud computing is the product of the development of parallel computing, grid computing and distributed computing. Which is the correct description of the relationship between the four?
❑ A. Distributed computing completely replaced grid computing
❑ B. Cloud computing is a kind of distributed computing
❑ C. Parallel computing. network computing and distributed computing are all cloud computing (Right Answers)
❑ D. Grid computing completely replaces parallel computing

Answer: C

479. In Huawei FusionCompute, the traditional network device corresponding to DVS is?
❑ A_ Router
• Hub
111 C_ Layer 2 switch (Right Answers)
El D. Layer 3 switch

Answer: C
480. The following description of the cloud computing resource pooling characteristics. which is correct?
❑ A Cloud computing resource pooling features are prerequisites for broad network access
❑ a Cloud computing resource pooling features can put the CPU and hard disk into the same resource pool.
❑ C. Cloud computing resource pooling features can shield the difference between similar resources (Right Answers)
❑ D. Claud computing resource pooling features must rely on virtualization technology to achieve

Answer: C
481. Templates can be used to quickly deploy virtual machines. Currently. templates can only be created by converting or cloning virtual machines.
OA. TRUE
OB. FALSE (Right Answers)

Answer: F

482 _ In Huawei FusionCompute, a virtual machine can have multiple virtual NICs_
0 A_ TRUE 1Right Answers.)
B_ FALSE

Answer: T
481 During the snapshot creation process, other operations can be performed on the virtual machine_
OA. TRUE
0r B. FALSE (Right Answers)

Answer: F
484 _ If virtual machine A can ping virtual machine B, which of the following results can be inferred?
❑ A. Virtual machine A and virtual machine Buse the same network segment
❑ B_ Both virtual machine A and virtual machine B are configured with the correct IP address (Right Answers)
❑ C. Virtual machine A and virtual machine B use different network segments
❑ B. Virtual machine A and virtual machine B are running on the same physical host

Answer: B
485. In Huawei FusionCompute, which of the following description about hot migration is wrong?
❑ A. Hot migration includes virtual machine hot migration and disk hot migration
❑ B. Using the technology of fast copying and sharing storage of memory data during virtual machine hot migration to ensure the data remains unchanged before and after virtual machine migration
❑ C. Storage hot migration can only be migrated within the same storage device under storage virtualization management (Right Answers)
❑ D. Virtual machine hot migration types are divided into changing hosts, changing data storage and changing host and data storage.

Answer: C

486. In Huawei FusionCompute, the DRS rule does not take effect on the virtual machine bound to the USB device.
0 k TRUE (Right Answers)
0 B. FALSE

Answer: T
487. In Huawei FusionCornpute, the way to create a virtual machine is? (Multiple choice)
❑ A. Other virtual platform import
❑ B. Deploy using templates (Right Answers)
❑ C. Use an existing virtual machine clone (Right Answers)
❑ D. Create a new virtual machine directly (Right Answers)

Answer: BCD

488. Common Disk Arrays include? (Multiple choice)


❑ A. MAID (massive arrays of Idle disks)
❑ B. RAID (Right Answers)
❑ C JBOD (Just a bunch of Idle disks) (Right Answers)
❑ D. SBOD (Switch of bunches Idle disks)

Answer: BC

489. Memory reuse is a resource allocation scheme that increases the density of virtual machines on a single host, reduces costs and sacrifices performance for density.
OA. TRUE
OB. FALSE (Right Answers)

Answer: F

490 . FC SAN, which of the following is not the advantage of IP SAN?


❑ A. bandwidth extension is convenient
❑ B. low construction cost
❑ C. transmission distance is far
❑ D. transmission efficiency is high (Right Answers)

Answer: D

491 Which of the following is true about type II (host) virtualization?


❑ A. VMM runs in the Guest Machine
❑ B. VMM runs directly on Host Machine
❑ C. VMM runs on the Guest OS
❑ D. VMM runs on the Host OS (Right Answers)

Answer: D
492 _ Which of the following is correct about KVM and Xen? (Multiple choice)
❑ A Xen virtual machine can be converted to KVM virtual machine Fight Answers)
❑ B. Domain 0 and Domain U are concepts in KVM
❑ C. KVM and Xen are both open source Hypervisors (Right Answers)
❑ D. KVM and Xen can run in the same Host OS

Answer: AC
493. When installing Huawei FusionCompute, on which storage is it recommended to deploy VRM?
❑ A_ NAS
❑ B_ FC SAN
❑ C. IP SAN
❑ D. Local disk (Right Answers)

Answer: D

494 _ Which of the fallowing description about the template is incorrect?


❑ A. After the virtual machine is cloned as a template, the virtual machine still exists_
❑ B. Customizable parameters when deploying virtual machines using templates
❑ C. After the template is converted to a virtual machine, the template no longer exists.
❑ D. Templates can be used across virtualization platforms (Right Answers)

Answer: D

495 _ Different types of hardware of the same type in cloud computing can form a resource pool.
0 A_ TRUE (Right Answers)
m
i B. FALSE

Answer: T

496 . Which of the following description about Huawei virtual switch is correct?
❑ A. The virtual switching function of the intelligent network adapter is also provided by Huawei virtual switch_
❑ B. Huawei virtual switch is open vSWitch of open source (Right Answers)
❑ C. If Huawei distributed switches have multiple virtual ports, each port has its own attributes.
❑ D. Huawei virtual switches are divided into standard virtual switches and distributed virtual switches.

Answer: B

497 . Which of the following description of thermal migration and cold migration is incorrect?
❑ A. Hot migration is to transfer the running virtual machine from one host to another. and the business will not be interrupted during the migration.
❑ B. In the performance test-reliability test, there are tests for virtual machine migration. including hot migration, cold migration, migration duration. and service interruption duration.
❑ C. Cold migration is to migrate the virtual machine in the stopped state from one host to another, and the service will be interrupted during the migration.
❑ D. hot migration and cold migration will migrate memory data and disk data (Right Answers )

Answer: D
498 . In Huawei FunsionCompute, which of the following description about virtual machine migration is incorrect?
❑ A communication between the source host and the destination host is normal_
❑ B. destination storage as a different storage device
❑ C. virtual machine status is "running" (Right Answers)
❑ ❑. destination host must have sufficient resources

Answer: C

499. The Huawei FunsionGompute, which of the following description about the host storage interface is incorrect?
❑ A supports manual addition and batch addition to add interfaces (Right Answers)
❑ B. Multi-path transfer of storage can be achieved by adding multiple storage interfaces
❑ a The IF' address of the storage interface can be on the same network segment as the management plane_
❑ ❑. Local hard disk and FC SAN can be docked with the storage device without adding a storage interface_

Answer: A
500 A virtual machine generally consists of wrtual machine configuration information and disk files Users can move two files to run virtual machines on di event physical hosts What are foe
the characteristics of cloud computing in the above d ription,
(Multiple choice)
❑ A Partition (Right Answers)
❑ B isolation (Right Answers)
❑ C independent (Right Answers)
❑ D Package (Right Answers)

Answer: ABCD

501 Which of the following is not KVM (Kernel-Based Virtual Machine} management tools?
❑ A. GEM Right Answers)
❑ B. Virsh instruction set
❑ C. Virt-Manager
❑ D. Libvirt

Answer: A

502 Which of the following description about virtualization is correct?


❑ A. Virtualization and non-virtualization cannot exist in one data center at the same time
❑ B. Applications that can run on physical machines must also run on virtual machines.
❑ C. Virtualization can improve the uniformity of hardware resources iRight Answers)
❑ D. Virtual machines that use different types of virtualization technologies can convert between each other

Answer: C

503 . In computing virtualization, which of the following are to allocate CPU and memory for virtual machines? (Multiple choice}
❑ A. Hypenrisor {Right Answers)
❑ B. VMM {Right Answers)
❑ C Guest OS
❑ I Host OS

Answer: AB
504 KVM virtual machines can be created through a graphical interface or created using the command line_
❑ A. True Right Answers)
E B. False

Answer: A

505 . Using virtualization technology can vigualize a physical server into multiple virtual machines, thereby improving the hardware performance of the physical server.
El A. True
El EL False 1Right Answers)

Answer: B

506 . In the Linux virtual machine, which can manage the logical volume?
E A. OVM
E B. LVM (Right Answers)
❑ C. PVM
❑ D. DVM

Answer: B
507 In Huawei FusionCompute, which of the following descriptions about port groups and security groups are incorrect,
❑ A virtual machine NIC is connected to a virtual port of the port group, and a virtual machine NIC is associated with a security group A port group is a collection of one or more virtual ports on a DVS, and a security group is a collection of one or mor
rules C A DVS can have multiple pod groups, and one VM can be protected by multiple security groups D The security group is based on the port group to protect the virtual network card of virtual machine

Answer: D

506 . Which of the following network file sharing protocols is supported by NAS? (Multiple choice)
El A. CIFS Right Answers)
▪ NFS (Right Answers)
El C. NTFS
El D. F I N

Answer: AB

509 The switch can be divided into an access switch, an aggregation switch, and a core switch according to the use, and the virtual switch belongs to the aggregation switch_
LI A_ True
D B. False (Right Answers)

Answer: El

510 Which function can VLAN implement in actual work?


El A. Virtual machine IXUS belonging to the same VLAN uses the IP address of the same address segment. otherwise It will not communicate property. (Right Answers)
❑ IS After the virtual machines of the two departments use different VLANs, they can no longer communicate with each other_
❑ C. Virtual machines belonging to the same VLAN can use IP addresses of different address segments and can discover each other using broadcasts
111 D. Virtual machines belonging to different VLANs can use the same IP address without address conflicts

Answer: A
511. If two virtual machines can ping each other, the network device that will be used during the communication process is Q.
❑ A. Distributed virtual machine switches
❑ B. Physical switch
❑ C. Physical NIC
❑ D. Virtual network card (Right Answers)

Answer: D

512. In KVM, there are two ways for a virtual machine NIC to connect to a physical network, namely () and 0.
❑ A_ bridge, address translation (Right Answers )
❑ 13_ address conversion, straight through
❑ C_ bridging, straight through
❑ straight through, bridge

Answer: A

513 . In Huawei FusionCompute. which of the following descriptions about security groups and rules are incorrect?
❑ A. Changes of security group rules need to be manually applied to virtual machines in the security group (Right Answers)
• must first create a security group to add rules
❑ C. security group rejects all by default before adding rules
❑ D. The prerequisite for deleting a security group is that there is no virtual machine in the security group.

Answer: A

514 . When you use a template to quickly deploy a virtual machine, you do not need to install an operating system or configure it, so you save a lot of time and effort.
❑ A True (Right Answers)
❑ B. False

Answer: A

515 . In Huawei FusionCompute, which of the following description about CPU resource QoS is incorrect?
❑ A. CPU reservation defines the minimum computing resource allocated when multiple virtual machines compete for physical CPU resources.
❑ B. CPU quotas define multiple virtual machines to allocate computing resources by priority when competing for physical CPU resources (Right Answers)
❑ C. CPU shares define multiple virtual machines to allocate computing resources proportionally when competing for physical CPU resources
❑ D. The CPU reservation only works when a virtual machine competes for computing resources. If there is no contention, there is a need for the virtual machine to monopolize the physical CPU resources.

Answer: B

516. Huawei Fusion Compute, which of the following description of memory multiplexing is incorrect?
❑ A. The administrator can turn the memory alternate function on or off at any time.
❑ B. The internal sum of all virtual machines after the memory reuse function is turned off is less than or equal to the sum of the actual available physical memory.
❑ C. Using memory reuse can degrade virtual machine performance {Right Answers)
❑ D. Turn off memory multiplexing requires that the memory reuse rate of all hosts in the cluster is less than or equal to 100%.

Answer: C
517 . Which of the following description about the security group application scenario is incorrect?
O A. By setting security group rules, you can process permission control of folders in a virtual machine. (Right Answers)
O B. By setting security group rules, you can allow only remote logins to virtual machines by specific IP addresses.
O C. By setting security group rules, you can protect virtual machines from being accessed.
O D. By setting security group rules, you can make the virtual machine unable to access the FTP server.

Answer: A

518. Which of the description about the snapshot is incorrect?


El A. A virtual machine can create multiple snapshots. When a virtual machine is restored using a snapshot. the subsequent snapshot will be invalidated. (Right Answers)
E Et Snapshots can save virtual machine settings as well as save virtual machine disk data
El C. All virtual machines on a host can only create one memory snapshot at the same time
E a Snapshots can save the state of vrtual machine memory

Answer: A

519 When you deploy a virtual machine quickly using the same Window template, the generated SIDs may be consistent, which will result in failure when installing some special software
1:1 A True (Right Answers)
111 B. False

Answer: A

520 . In the OpenStack solution. which module does the load provide for persistent block storage?
0 A. Swift if object storage
E B. Glance // fast storage
E C. Nova,/ compute node life cycle
O D. Cinder (Right Answers)

Answer: D

521 In Huawei FusionCompute, when multiple vrtual machines write to the same shared disk at the same time, in order to prevent data loss, the application software needs to ensure access control to the disk
111 A_ True Wight Answers)
111 EL False

Answer: A

522 Which of the following description about Huawei FusionCompute HA is mooned,


❑ A ff the data of the virtual machine is saved in the shared storage, the saved data will not be lost when the failure occurs
111 B This function supports automatic restart after virtual machine failure (Right Answers)
111 c system cycle detects the status of the virtual machine When the physical server fails and the virtual machine fails, the system can migrate th ual machine to another physical server to restart, ensuring that the virtual machine can recover
quickly.
ED administrators can set different HA policies according to the importance of the virtual machine

Answer: B

523. Setting the port group vlan ID to 10 in Huawei FusionCompute means O. (Multiple choice)
❑ A. forwards the data frame with the VLAN 10 label passing through the portgroup and then forwards it. (Right Answers)
❑ B. Forwards the data frame with the VLAN 10 label through the port group and then forwards it to the VLAN ID.
❑ G. discards data frames with non-VLAN 10 labels passing through the port group (Right Answers)
❑ D. Forwards the data frame with no VLAN tag on the port group and labels it with VLAN 10 (Right Answers)

Answer: ACD
524. In Huawei FusionCompute, which of the following description about the IMG function is incorrect?
El A. It is recommended to enable the 'MC function when the CNA host CPU models in the cluster are inconsistent.
EI B. The IMG cannot be used to ensure that the VMs are successfully migrated between hosts of different CPU types, which needs to confirm according to the real scene.
IMG only supports migration from a lower version of the CPU feature set to a higher version {Right Answers)
El D. It is recommended to enable the IMC function when the CNA host memory frequency is inconsistent in the cluster.

Answer: C
525 _ In Huawei FusionCompute, the operation of creating a disk using IP SAN includes
1. Create a storage resource
2. Add a storage port on the host
3. Add a data store
4. Create a disk
The correct sequence of operations is 0.
❑ A. 1-3-4-2
❑ B. 4-2-1-4
❑ C. 1-2-3-4
❑ D. 2-1-3-4 (Right Answers)

Answer: D

526 . Common external storage solutions have (). (Multiple choice)


❑ A. DAS
❑ B. NAS {Right Answers)
❑ C. NFS
❑ D SAN (Right Answers)

Answer: BD
527 . SSD disk is a mechanical hard disk, which has the advantages of fast reading and writing speed, low power consumption and light weight, but it has a service life limit.
❑ A. True
❑ B. False (Right Answers)

Answer: El

528 _ Among the following RAID levels. the highest disk space utilization is ().
❑ A. RAID 0 (Right Answers)
❑ B. RAID 6
❑ C_ RAID 1
❑ D_ RAID 5

Answer: A

529 The user applied for a cloud hard disk on the public cloud in Huawei. The service mode belongs to ().
❑ A_ laaS (Right Answers)
❑ B_ DaaS
❑ c_ PaaS
❑ D_ SaaS

Answer: A
530 . Which of the following description of the role of the VLAN is incorrect?
El A. Enhance network security
O B. Increase physical switch interface bandwidth Right Answers)
O C. Isolate the broadcast domain
O D. Improve the robustness of the network

Answer: B

531 _ CPU resource QoS and memory reuse technology are all based on the use of different strategies to rationally allocate resources_
O A. True 1Right Answers)
O B. False

Answer: A

532 Which of the fallowing requirements can he achieved by Huawei FusionCampute DRS rules?
❑ A After the Windows virtual machine has a blue screen, the system automatically restarts
❑ El A host in the cluster is unavailable, and the virtual machine running on the host is automatically migrated to the odd host
❑ C Require a virtual machine to run on a specific hest (Right Answers)
❑ 6 When the virtual machine configuration does net meet the business requirements, the management system automatically adds CPU resources to the virtual machine

Answer: C

533 . Which of the following scenario is not suitable for improving the memory reuse ratio?
O A. Memory reuse has reached 150% in commercial scenarios Plight Answers)
O B. Reduce customer hardware procurement costs
EI C. While ensuring performance, customers require a single host to deploy the largest number of virtual machines.
O D. Virtual machine memory utilization is low

Answer: A

534. In Huawei FusionCompute, after the computing resource scheduling automation function is enabled, the virtual machine may be migrated due to (). (Multiple choice)
D - A Windows virtual machine has a blue screen and the processing strategy is "HA virtual machine" (RightAnswers)
El B. An application running on a virtual machine crash
El C. The administrator manually migrates according to the system prompts. (Right Answers)
❑ D. The system automatically migrates according to the scheduling policy (Right Answers)

Answer: ACD

535 Which of the following does virtual NUMA include? (Multiple choice)
D A Load balancing, considering the node'association in the scheduling process, the node has a corresponding relationship with the physical node, and the VCPU accesses the local content to the maximum extent (Right Answers)
0 B_ Place the site. view the vane, machine NUMA topology. select the physical ryas mode VCPU and memory, then the VCPU and memory relationship and physical reality in node (Right Answers)
0 c Topology rendering, NUMA is identified in the virtual machine and the guestOS and application NUMA -optimization functions take effect (Right Answers )
17 D Dynamic migration, when the affinity between the VCPU and the physical node changes, triggering its corresponding Vnode memory for migration (Rig hi Answers)

Answer: ABCD

536 Fog computing is a dstnbuted computing model that extends the concept of cloud computing to the edge of the network to support mobile and loT and geographically distributed applications Which of the following statement about fog calculation is
incorrect?
❑ A Fog computing can quickly generate big data and reduce latency at the edge of the network
D B Fog computing can achieve shat-term data cache, reducing network pressure
D C Fog computing grandee higher reliability for network and physical device security than cloud computing (Right Answers)
D 13 Fog calculations reduce the bandwidth consumed in the core Internet and limit the movement of data to the local network

Answer: C
537_ Which of the following options are not part of artificial intelligence?
O A. Computing power
O B. Perceptual analysis {Right Answers)
0 C. Big data
1:1 D. Scene

Answer: B

538 Artificial intelligence is a new technical science that studes and develops concepts, methods, techniques and application systems for simulating the extension and expansion of artificialintelligence Which of the following statements about artificial
intelligence is incorrect,
❑ A Artificial intelligence does not have the dynamic creatm y unique to human consciousness
❑ B intelligence is a technology in which items communicate with each other through networks to exchange information Sight Answers)
❑ C Artificial intelligence is not social
❑ D is the physical process of unconscious mechanical

Answer: B

539 _ Set the port group VLAN ID to 0 in Huawei FusionCompute to represent Q.


O A. Set the vlan tag of the data frame that passes the port group to 0.
O B. Only data frames with vlan 0 tags are allowed to pass through this port group
O C. Allow 0 data frames with vlan tags to pass through this port group
O D. No modifications are made to the data frames passing through this part group (Right Answers)

Answer: D

540 . In Huawei FusionCompute. which of the following description of the measurement factor for computing resource scheduling is incorrect?
❑ A. When set to 'CPU", the scheduling condition is triggered when the CPU condition is met.
111 B. When set to "memory", the memory condition is met, that is. the scheduling policy is triggered.
❑ C_ When set to "CPU and memory" the CPU or memory conditions is met to trigger the scheduling policy_
❑ a When set to "CPU and memory". the CPU and memory conditions are met, and then trigger the scheduling policy_ (Right Answers)

Answer: D.

541 . In Huawei FusionCompute, virtual machines using raw device mapping type data storage do not support O. (Multiple choice)
111 k Snapshot Right Answers)
❑ B. CPU hot add
❑ C. Storage thin provisioning lRight Answers)
❑ D. Storage hot migration

Answer: AC

542 _ Which of the following description of the relationship between virtualization and cloud computing is correct? (Multiple choice)
❑ k Without cloud computing, virtualization has no value_
El B. Virtualization is a technology, cloud computing is a service model, and virtualization doves the development of cloud computing. {Right Answers)
El C. Without virtualization, cloud computing has no value {Right Answers)
Virtualization is one of the important technologies for implementing cloud computing_ (Right Answers)

Answer: BCD
543. Which of the following belong to the major drivers for the emergence and development of %ArMalization technologies?
❑ A. the emergence of the Internet
❑ B. reduce the failure rate of hardware resources
❑ C. make full use of hardware resources lRight Answers)
❑ D. I mprove the identification of hardware resources

Answer: C
544. Virlualization is divided into computing virtualization, storage indualization, and network virtualization, corresponding to cloud hosting, cloud storage, and cloud network of cloud computing.
❑ A. True (Right Answers)
❑ B. False

Answer: A

545 . The characteristics of virtualization include partitioning, isolation, encapsulation and independence.
❑ A. True ;Right Answers)
❑ B. False

Answer: A

546 . Which of the following options belong to KVM? (Multiple choice)


❑ A Libvirt (Right Answers)
❑ B. Domain 0
❑ C. QEMU Right Answers)
❑ D. Eal

Answer: AC

547 . Which of the following options belong to open source virtualization technology?
❑ A. FusionCompute
▪ vSphere
❑ C KVM (Right Answers)
❑ Hyper-v

Answer: C
548 . Which of the following description about cloud computing on-demand self-service features is correct?
❑ A. The cloud computing service provider only needs to prepare all the servces, and the remaining work is completely completed by the users themselves.
❑ Br Users need to solve all problems themselves in the process of using cloud computing_
❑ After the user has determined the cloud computing service that he needs, he can complete the application of the cloud computing resource by himself (Right Answers)
❑ a When users use cloud computing resources, they do not need to explain to the service provider_

Answer: C

549 The reason why computing virtualization technology can improve application reliability is (Multiple choice) A The mrtual machine and hardware decoupling that host the application can be migrated between multiple physical hosts using a virtual
machine. B Using computer virtualization technology, the virtual machine hostrng the application can be automahcaIly assigned to a physical host with sufficient resources C Using computing virtualization technology, multiple applications can run
simultaneously on a single physical host D Use virtualization technology to automatically adjust nrtualization specifications Answer AB
❑ A select this to commit (Right Answers)

Answer: A
550 . In Huawei FusionCompute, the system disk of the virtual machine cannot be unbound.
❑ A. True
❑ B. False (Right Answers)

Answer: B

551 . Which of the following descriptions about distributed storage is correct?


❑ A. Distributed storage disks come from x86 architecture disk arrays
❑ B. Distributed storage disks come from personal PCs
❑ C. Distributed storage disks come from x86-based servers (Right Answers)
❑ D. Distributed storage disks come from x86 architecture virtual machines

Answer: C

552. Which of the following description about RAID is correct? (Multiple choice)
❑ A. Compare RAID6 to RAID5, data recovery ability is stronger, but the disk read and write ability is reduced
❑ B. When one disk is damaged. other disks in RAIDS can still work normally. and disk I/O performance is not affected. (Right Answers)
❑ C. RAID is to improve the 110 performance of the storage system by concurrently reading and writing data on multiple disks (Right Answers)
❑ D. RAID can be regarded as a storage space composed of two or more disks, and the available capacity is the sum of the capacities of the disks.

Answer: BC

553 . RAID 6 enhances disk fault tolerance based on RAID 5, allowing 2 disks to fail, but requiring no less than 4 disks.
❑ A. True (Right Answers)
❑ B. False

Answer: A

554. In the following description, which one meets the characteristics of virtualized packaging? (Multiple choice)
❑ A. The configuration file of the virtual machine will contain information such as the CPU type and quantity. (Right Answers)
❑ B. The virtual machine can be migrated from one physical host to another. (Right Answers)
❑ C. Multiple virtual machines can run simultaneously on one physical host.
❑ D. If a virtual machine has multiple hard disks, each hard disk will generate a corresponding disk file. (Right Answers)

Answer: ABD

555 . Which of the following is not a CPU resource CloS parameter in FusionCompute?
❑ A. CPU resource quota
❑ B. CPU resource limit
❑ C. CPU resource reservation
❑ D. CPU resource reuse (Right Answers)

Answer: D
556 _ Which description is correct about the main purpose of turning on the NUMA function?
❑ A_ Optimize the memory. access performance of the virtual machine (Right Answers)
❑ B_ Maximize the computing ability of the physical host CPU
❑ C. Maximize the reuse rate of physical machine memory
❑ D. Maximize the computing ability of the virtual machine's vCPU

Answer: A
557. In FusionCompute, when adding shared storage far multiple hosts, which of the following operations are correct? (Multiple Choice)
❑ A. Check all hosts when associating storage devices
❑ B. Check the corresponding host when adding data storage (Right Answers )
❑ C. When the shared storage type is IP SAN, ensure that the storage network of the host and the service interface of the storage are connected. (Right Answers)
❑ D. Check all hosts when initializing storage resources

Answer: BC

558. Which description about NUMA is wrong?


❑ A. Guest NUMA is to enhance the performance of the application by presenting the NUMA structure to the virtual machine and enabling the Guest OS and its internal applications to recognize the NUMA structure.
❑ B. NUMA technology makes CPU access similar to Node memory speed and access to other Node memory speed
❑ C. Host NUMA mainly provides a CPU load balancing mechanism to solve the VM performance bottleneck caused by the imbalance of CPU resource allocation. (Right Answers)
❑ D. Host NUMA guarantees VM access to local physical memory, reducing memory access latency and improving VM performance

Answer: C

651 Which of the following options do not reflect the cloud on-demand self-service feature?
❑ A_ The engineer purchased a cloud server in Huawei Public Cloud according to his awn needs_
❑ B. The engineer upgraded the cloud server CPU he purchased from 2 to 4
❑ C. The engineer changed the operating system of the cloud server he purchased from Linux to Windows.
❑ 0 The engineer received a notification message from the server provider one week before the cloud server expired. (Right Answers)

Answer: D

560 _ For FusionCompute, the IP address of a Windows virtual machine is found to be 0.0 0.0. What is the possible reason?
❑ k The virtual machine's IP address is manually set
❑ B_ The virtual machine's IP address is manually set to 0_0_0_0
❑ a The virtual machine's IP address is assigned to DHCP
❑ D_ The virtual machine is not installed Tools (Right Answers)

Answer: D

561 _ In FusionCompute, which description about the bare device hardware is wrong?
❑ A. The best disk performance using bare device mapping
❑ B. The operating system is recommended to be installed on a disk that uses bare device mapping. {Right Answers)
❑ C. A datastore smart using bare device mapping corresponds to a LUN on the SAN storage
❑ D_ A data storage using bare device mapping can only correspond to one disk

Answer: B
562. In FusionCompute, which of the following description about storage related concepts is wrong?
❑ k A physical storage device can be used as a storage resource
❑ B_ Logical units in the physical storage corresponding to the storage device, such as LUNs
❑ C_ The data storage can be IP SAN. FC SAN. NAS etc. {Right Answers)
❑ D. VHD is the virtual machine disk file format

Answer: C

563. In FusionCompute, you can create a snapshot for the CNA host.
❑ A. True
❑ B. False (Right Answers)

Answer: B

564. The virtual machine changes the host hot migration operation in the FusionCompute. which of the following description is not a limitation?
❑ A. The status of the virtual machine roust be "Running"
❑ B. The destination host cannot be in maintenance mode
❑ C_ Cannot mount a "shared" type of disk (Right Answers )
❑ D. Virtual machines cannot use data storage of the "raw device" type

Answer: C

565. Which descriptions are correct about the extensive network access characteristics of cloud computing? (Multiple choices)
❑ A. Through the network, users can use self-purchased cloud computing resources through different terminals. (Right Answers)
❑ B. Through the network, users can use self-purchased cloud computing resources at any time. (Right Answers)
❑ C. Through the network, users can view the status of self-purchased cloud computing resources at any time. (Right Answers)
❑ D. Through the network, users can use self-purchased cloud computing resources in different locations. (Right Answers)

Answer: ABCD

566 . When a virtual machine on a physical host fails, it does not affect other virtual machines on the physical host. Which feature of virtualization technology is this?
❑ A. Isolation (Right Answers)
❑ B. Partition
❑ C. Independence
❑ D. Encapsulation

Answer: A

567. Which of the following scenarios does virtualization apply to? (Multiple Choice)
❑ A. There are ten business systems in a company. and the utilization of host resources carrying these services is less than 20%. (Right Answers)
❑ B. A scientific research institution uses a customized operating system to ensure the confidentiality of scientific research results
❑ C. An enterprise needs high load. Intensive computing environment (Right Answers)
❑ D. The daily use of the desk surface of a unit employee is highly similar (Right Answers)

Answer: ACD
568 _ Which of the following descriptions are correct about Virt-manager? (Multiple Choice)
❑ A. Viii-manager is a KVM virtual machine management command set
❑ B. Virt-manager is an open source KVM virtual machine management tool (Right Answers)
❑ C. Virt-manager is a commercial KVM virtual machine management tool
❑ Virt-manager is a KVM virtual machine graphical management tool (Right Answers)

Answer: BD

569 . In a NAS environment, multiple hosts simultaneously writing to one file can cause data consistency problems.
❑ A. True (Right Answers )
❑ B. False

Answer: A

570. If virtual machine A and virtual machine B are running on different physical servers, which physical device will be used during communication? (Multiple Choice)
❑ A. Virtual NIC (Right Answers)
❑ B. Virtual switch (Right Answers)
❑ C. Physical switch (Right Answers)
❑ D. Physical NIC (Right Answers)

Answer: ABCD

571 . A virtual machine can have multiple virtual network cards at the same time. corresponding to different virtual switches.
❑ A_ True (Right Answers)
❑ 13. False

Answer: A

572. In Huawei FusionCampute, which of the following description about the template format is wrong?
❑ A Ovf format template contains only one ovf file and one vhd file (Right Answers)
❑ 13. Ova formatted template contains only one file after export
❑ C. The virtual machine template format is divided into ova and Tn.
❑ D. _ovf is the virtual machine's description file, and _vhd is the virtual machine's disk file.

Answer: A

573. Which of the fallowing way to create a virtual machine template is wrong?
❑ A. Template cloning as a template
❑ B. Virtual machine clone as template
❑ C. Virtual machine is converted to template
❑ D. Snapshot is converted to template (Right Answers)

Answer: D
574 . Virtual machine hot migration refers to moving virtual machines in the same cluster from one physical server to another in the state at a virtual machine.
El A. True
E False iRight Answers)

Answer: B

575 In Huawei FusionCompute, which of the following description about virtual machine snapshot recovery is wrong,
▪ A Use the existing snapshot of thenftual machine to restore the virtual machine's data to the state of the snapshot creation time
▪ B If the virtual machine deletes the port group where the virtual machine NIC is located after the snapshot is created, the deleted port group will also be restored when the virtual machine is restored using the snapshot Right Answers)
▪ C If a disk mode of a nrtual machine is "independent-persistent" or "independent-non-persistent", the data of the disk is not restored when the virtual machine is restored using the snapshot
▪ D Multiple snapshots can exist in a virtual machine

Answer: B

575, When a virtual machine is quickly deployed using a template. the generated virtual machine configuration information is consistent with the template_
❑ A True iRight Answers)
El EL False

Answer: A

577. Voice recognition. Image recognition. Emotional companion robots are all applications of artificial intelligence.
El A. True RRight Answers)
El B. False

Answer: A
578. Which of the fallowing description about big data and cloud computing is correct?
E A Cloud computing refers to data collection that can no longer he captured with regular software tools within a certain time frame_ Management and processing
111 B. Big data is a pay-per-use model that is available. Portable. CM-demand network access
E a Cloud computing cannot function as the underlying computing resource for big data processing
E a Big data can act as a type of cloud computing service for users to choose on demand (Right Answers)

Answer:

519. In Huawei FusionCompute, the VNC logs into the VM and finds that it cannot be operated normally. There is jammed (such as the file cannot be opened). What is the possible reason of this fault?
111 A. Virtual machine damage
111 B. The service link is unstable
❑ C_ Management link instability Wight Answers)
❑ a Storage link instability

Answer: C

580. In Hume' FusionCompute, what functions will be affected after the virtual machine is bound to a USE device? (Multiple Choice)
7 A. Virtual machine resource expansion
❑ B. Virtual machine restart
111 c. Virtual machine hot migration (Right Answers)
❑ D. Cluster scheduling strategy (Right Answers)

Answer: CD
581 When you bind a disk to a virtual machine in Huawei FusionCompute, you need to perform the following requirements When a virtual machine creates a snapshot, the disk is not snapshot When the virtual machine is restored by using the
napshot, the disk is not restored All data is required to be permanently written to this disk Which mode of disk should choose,
❑ A Independent- non-persistent
▪ B Independent-persistent (Right Answers)
▪ C Independence
▪ D Subordinates

Answer: B

582_ In Huawei FusionCompute, if there is only one physical network port in the hound network port, the physical network part cannot he directly removed_
E A True 1Right Answers)
E B. False

Answer: A
683. In Huawei FusionCompute, which of the following description about the security group rules is wrong?
❑ A. When a virtual machine has multiple NICs, you can configure a security group for each NIC.
❑ B. After creating a security group and adding rules. the virtual machine can communicate with the outside world. (Right Answers)
❑ C. All virtual machine NICs in the same security group will use this security group rule for access control
❑ D. The essence of a security group is the collection of rules

Answer: B

584. In Huawei FusionCompute. if the Windows virtual machine has a blue screen, what can the system do? (Multiple Choice)
❑ A. HA virtual machine (Right Answers)
❑ B. Using a snapshot to recover a virtual machine
❑ C. Restart the virtual machine (Right Answers)
❑ D. No processing (Right Answers)

Answer: ACD

585 . In Huawei FusionCompute, which of the descriptions about the login VM method are correct? (Multiple Choice)
❑ A. The virtual machine does not have an IP address, and the administrator can log in through VNC, so VNC gets rid of the dependence on the network.
❑ B. If the operating system of the virtual machine is windows, the administrator can log in to the virtual machine through the remote desktop. (Right Answers)
❑ C. Administrators can log in to any virtual machine with any operating system installed through VNC (Right Answers)
❑ D. lithe operating system of the virtual machine is Linux, the administrator can log in to the virtual machine through the remote desktop.

Answer: BC

586. In Huawei FusionCompute, to enable VMs to be migrated between CNA hosts of different CPU models, what function need to be enabled?
❑ A. Cluster GuestNUMA policy
❑ 6. Cluster IMC policy (Right Answers)
❑ C. Cluster I/O ring adaptation
❑ D. Cluster HANA optimization

Answer: B

587. In Huawei FusionCompute, which of the following description about virtual machine storage hot migration is wrong?
❑ A. Storage hot migration can be done between different storage devices
❑ B. Storage hot migration can be done between different virtual disks (Right Answers)
❑ C. Storage hot migration can be performed between different storage resources
❑ D_ Storage hot migration can be done between different data store

Answer: B
588. In Huawei FusionCompute, the resources of the cluster consist of the host and its associated storage and network resources.
❑ A. True (Right Answers)
❑ B. False

Answer: A

589. Cloud computing's quantifiable service refers to charging customers for usage time and usage.
❑ A. True (Right Answers)
❑ El. False

Answer: A
590. Cloud computing is the product of the development of the Internet and computing technology, so cloud computing must be inseparable from the network.
❑ A. True (Right Answers)
❑ B. False

Answer: A

591. In Huawei FusionCompute, a virtual machine of the Linux operating system is created. In this scenario, host GS running on 0.
❑ A VNA
❑ B. CNA {Right Answers)
❑ C. VRM
❑ D. Linux virtual machine

Answer: B

592. KVM virtualization architecture includes KVM module, QEMU and Libvirt, which of the following description about these modules is wrong?
❑ A. KVM module is mainly responsible for Vcpu creation and virtual memory allocation.
❑ B. KVM+QEMU can form a set of virtualization solutions
❑ C. Libvirt+QEMU can form a virtualized solution (Right Answers)
❑ D. QEMU is mainly responsible for I/O operation simulation

Answer: C

593. The virtual machine generally has a corresponding configuration file, and records the virtual machine's specifications, name, and other information.
❑ A. True (Right Answers)
❑ B. False

Answer: A

5 94 . Which of the following description is wrong?


❑ A. Each file system block corresponds to a non-contiguous area on the physical disk (Right Answers)
❑ B. The file is stored on the file system and mapped by the file system to the file system block
❑ C. The file system block corresponds to the logical area of LVM
❑ D. Logical area mapped to the physical area of the disk through LVM

Answer: A

595. In Huawei FusionCompute. the management ALAN ID used by the VRM cannot be changed.
❑ A. True
❑ B. False (Right Answers)

Answer: B

596. After using virtio. the NIC speed of the windows virtual machine is 10Gbps_
❑ A. True
❑ B. False (Right Answers)

Answer: B
591 In Huawei FusionCompute. where to enable the memory multiplexing function?
❑ A Host
❑ 13_ operating system
❑ C_ virtual machine
❑ ID. Cluster (Right Answers)

Answer:
598 In Huawei FusionCompute, users can increase or decrease the number of CPUs of a virtual machine when the virtual machine is in the Running or Stopped state
❑ A True
❑ B Fake {Right Answers)

Answer: B

599. In Huawei FusionCompute. which of the following factors does ❑RS perform virtual machine migration? (Multiple Choice)
❑ A Memory (Right Answers)
❑ B. I/O
❑ C Network traffic
❑ ❑. CPU (Right Answers)

Answer: AD

600. Which of the following description about CPU resources and memory resources Qos is wrong?
❑ A Memory resources Q0S is used to ensure that critical business virtual machines get enough memory resources.
❑ B. CPU shares and CPU reservations only work when each virtual machine competes for computing resources.
❑ C. The CPU QoS of the virtual machine is used to ensure that the computing resources of the virtual machine are properly allocated.
▪ Memory resource QoS can only be used after the memory multiplexing switch is turned on. {Right Answers)

Answer: ❑

601 With the ''Internet' being valued and the rise of big data Cloud computing Related technologies have mushroomed into everyone's field of vision_ Among them, Docker is widely used and valued Which of the following statement about Docker is
wrong,
❑ A Docker can package the underlying environment of the application, ensuring that each application vn% still function after migration
❑ B Docker needs to create a nrtual layer and virtual operating system on the host or host operating system and then install it (Right Answers)
❑ C Docker starts faster than other virtual machine technologies
❑ D Docker runs with a container, which is a running instance created from Image

Answer: B

602 . Which of the following description about Huawei FusionCompute architecture is wrong?
❑ A CNA provides computing resources for virtual machines
❑ VRM can run an CAN or it can be deployed on a separate physical machine
❑ a VRM provides administrators with a management portal
❑ D. CNA can manage cluster networks. Storage and computing resources RRight Answers)

Answer: 13

-603 Huawei FusionCompute supports adding hosts n batches_ The administrator fills in the host information according to the template provided by the system and imports it at one time_
❑ A. True (Right Answers)
❑ B False

Answer: A
604. After Huawei FusionCompute is deployed in accordance with the attack, IT automatically creates a cluster. What can the administrator do with the cluster? (Multiple Choice)
❑ A Move to the specified cluster folder (Right Answers)
❑ B. Modify name (Right Answers)
❑ C. Add description (Right Answers)
❑ ❑. Export to local

Answer: ABC

605. The cloud service purchased by the user contains the application running environment, but there is no application and related data. This model belongs to ().
❑ A SaaS
❑ B. PaaS 1Right Answers)
• NaaS
❑ D. laaS

Answer: B
iTB - TTT training HCIA – Cloud Question Bank

======================

Q1) Which of the following does not reflect the self- service feature of cloud computing? (Single answer)

a) Engineer A purchases an ECS from HUAWEI CLOUD to meet his/her own requirements
b) Engineer B changes the operating system of the ECS purchased by himself/herself from Linux to
Windows
c) Engineer C increases the number of CPUs of the ECS purchased by himself/herself from 2 to 4.
d) Engineer D receives an SMS notification from the ECS provider one week before the ECS expires.

Q2) Which of the following is about the on-demand self-service feature of cloud computing? (Single
answer)

a) Users do not need to communicate the service providers at all when using cloud computing
resources.
b) After determining the required cloud computing service, users can apply for cloud computing
resources by themselves.
c) The cloud computing service providers only need to prepare the cloud services and users will
complete remaining process all by themselves.
d) When using cloud computing resources, the users need to solve all by problems by themselves.

Q3) Which of the following are true about the ubiquitous network access feature of cloud computing?
(Multiple answers)

a) With network connections, users can use purchased cloud computing resources from different
terminals.
b) With network connections, users can use purchased cloud computing resources at different
places.
c) With network connections, users can connections, users can use purchased cloud computing
resources anytime.
d) With network connections, users can view the status of purchased cloud computing resources
anytime.

Q4) Which of the following is true about the resource pooling feature of cloud computing? (single answer)

a) The resource pooling feature of cloud computing shields the difference between resources of the
same type.
b) The resource pooling feature of cloud computing allows CPUs and disks to be added to the same
resource pool.
c) The resource pooling feature of cloud computing is the prerequisite for the ubiquitous network
access feature.
d) The resource pool feature of cloud computing depends on the virtualization technology

1|Page
Q5) Which of the following are true about the fast and elastic scaling feature of cloud computing?
(Multiple answers)

a) Engineer A purchases an ECS on HUAWEI CLOUD.


b) Engineer B increases the number of CPUs of an ECS purchased on HUAWEI CLOUD from 2 to 4.
c) Engineer C increases the number of ECSs in a cluster to 10 during the Double 11 (November 11)
shopping festival and restores the number of ECSs to 4 one week later.
d) An ECS purchased by engineer D is reclaimed after it expires due to no renewal.

Q6) The measurable service feature of cloud computing refers to charging based on time and usage.

a) True
b) False

Q7) Cloud computing is a product of Internet and computing technologies development. Therefore, cloud
computing is indispensable of network connections.

a) True
b) False

Q8) There are many milestone events in milestone events in the development of the Internet. Which of
the following is true about the time sequence of the milestone events? (Single answer)

a) the Establishment of TCP/IP protocol --> Birth of ARPANET -> "www officially open to the public -
-> Birth of DNS
b) Birth of DNS --> Establishment of the TCP/IP protocol Birth of ARPANET -> "www officially open
to the public
c) "www officially open to the public →Birth of DNS --> Establishment of the TCP/IP protocol →Birth
of ARPANET
d) Birth of ARPANET --> Establishment of the TCP/IP protocol --> Birth of DNS → "www officially
open to the public

Q9) Which of the following is true about cloud computing? (single answers)

a) Cloud computing is a technology that enables users to obtain IT resources anytime and anywhere.
b) Various IT resources of cloud computing can be used only after being paid.
c) The IT resources of cloud computing can be used only through network connections.
d) During the process of obtaining IT resources, users need to repeatedly negotiate with cloud
computing service provider.

Q10) which of the following can implement computing virtualization and improve resource utilization in
the era of cloud computing 1.0? (Multiple answers)

2|Page
a) KVM.
b) Open Stack.
c) Hyper-V
d) Xen

Q11) When a cloud computing service provider offers cloud services to a customer, the customer needs
only to inform the provider of the required resources or applications. Then the provider will provide the
resources or applications immediately. When the customer needs to expand or reduce the capacity, the
service provider can change the resources or applications accordingly. Which feature of cloud computing
is reflected by the preceding description? (single answer)

a) Ubiquitous network access.


b) Resource pooling
c) Measurable service
d) Fast and elastic scaling
e) On-demand self-services

Q12) Hybrid cloud is a deployment mode that integrates features of the public cloud and private cloud.
he industry cloud is a form of hybrid cloud.

a) True
b) False

Q13) Which of the following is the difference between the public cloud and the private cloud? (single
answer)

a) The public cloud has industry attributes, but the private cloud does not.
b) The private cloud has industry attributes, but the public cloud does not.
c) The public cloud is open to the public, while the private cloud is only open to specific users.
d) Public cloud services the need to be paid, while private cloud services are free of charge.

Q14) The cloud services purchased by a user include an application running environment, but do not
contain any application or related data. This mode is ( ). (Single answer)

a) laaS.
b) PaaS.
c) SaaS.
d) Naas

Q15) Which of the following belongs to the SaaS mode of HUAWEI CLOUD? (Single answer)

a) Elastic cloud server (ECS)


b) Facial recognition
c) Elastic Volume Service (EVS)
d) Object Storage Service (OBS)

3|Page
Q16) laaS in cloud computing refers to ( ). (Single answer)

a) Information as a Service
b) Infrastructure as a Service
c) Industry as a Service
d) Instruction as a Service

Q17) On HUAWEI CLOUD, a user has applied for an ECS that has only the operating system installed. This
servicer. mode is ( ). (Single answer)

a) laaS
b) PaaS
c) SaaS
d) NaaS

Q18) Which of the following are true about the cloud computing deployment modes? (Multiple answers)

a) The private cloud is deployed on the premises of enterprises and used by internal employees.
b) The public cloud is generally constructed by carriers or cloud service providers. It sells or leases
services to the public.
c) The hybrid cloud is generally constructed by carriers or cloud service providers. It integrates the
features of the public cloud and private cloud. It sells or leases services to the public.
d) The industry cloud generally has attributes of a certain industry, which is a large private cloud" or
"small public cloud".

Q19) A user applies for an ECS on HUAWEI CLOUD. Which of the following about ECS are true? (Multiple
answers)

a) The operating system of the ECS can be provided by HUAWEI CLOUD or created by the user.
b) If an IP address is configured for the ECS, the service mode is PaaS. Otherwise, the service mode
is laaS.
c) You can log in to the ECS through a PC or a mobile phone.
d) Running of the ECS requires the local
e) hardware resources of the user.

Q20) If an enterprise deploys a hybrid cloud, which of the following devices cannot be used to set the
boundary between the public cloud and private cloud? (Multiple answers)

a) Virtual switch
b) Core switch
c) Firewall
d) Traffic cleaning device

Q21) Which of the following is true about virtualization? (single answer)

a) Applications that can run on physical machines can also run on VMs.
b) VMs with different virtualization technologies can be mutually converted.
c) virtualization improves the unification of hardware resources.
d) virtualization and non-virtualization resources cannot coexist in one data center.

4|Page
Q22) Generally, a VM has a configuration file that records the specifications and name of the VM.

a) True
b) False

Q23) Which of the following is an open-source virtualization technology? (single answer)

a) Hyper-V
b) KVM
c) vSphere
d) Fusion Compute

Q24) Which of the following are false about virtualization? (Multiple answers)

a) In cloud computing, virtualization at the laaS layer consists of computing virtualization, storage
virtualization and network virtualization.
b) Computing virtualization includes CPU virtualization, memory virtualization, and I/O
virtualization.
c) Storage virtualization refers to distributed storage.
d) Network virtualization refers to distributed virtual switches.

Q25) Which of the following belong to computing virtualization? (Multiple answers)

a) CPU virtualization
b) Memory virtualization
c) Disk virtualization
d) Network virtualization
e) I/O virtualization

Q26) The main reason for the rapid development of virtualization is that the VM outperforms the physical
machine and has a wider application scope.

a) True
b) False

Q27) Cloud computing is a product of parallel computing, grid computing, and distributed computing.
Which of the following is true about their relationship? (single answer)

a) Distributed computing completely replaces grid computing.


b) Grid computing completely replaces parallel computing.
c) Cloud computing is a type of distributed computing.
d) Parallel computing, grid computing, and distributed computing all belong to cloud computing

Q28) The main driving force behind the emergence and development of virtualization technologies is ( ).
(single answer)

a) Make full use of hardware resources.


b) Emergence of the Internet
c) Enhance the identification of hardware resources.
d) Reduce the failure rate of hardware resources.

5|Page
Q29) Which of the following belongs to the host machine role in Huawei FusionCompute architecture?
(single answer)

a) UVP
b) KVM
c) VRM
d) CNA

Q30) In Huawei FusionCompute, a VM running Linux is created. In this scenario, the host OS runs in ( ).
(single answer)

a) VRM
b) Linux VM
c) CNA
d) VNA

Q31) In computing virtualization, the operating system running in a VM is referred to as the host OS.

a) True
b) False

Q32) In computing virtualization, the hypervisor is an intermediate software layer running between the
physical server and the OS. It monitors the status of the host OS

a) True
b) False

Q33) Which of the following is false about the hypervisor? (single answer)

a) In virtualization, only the hypervisor can directly access physical resources.


b) In virtualization, the hypervisor can monitor the status of the guest machine.
c) In virtualization, the hypervisor can directly run on the host machine.
d) In virtualization, the hypervisor and VMM are the same concept.

Q34) Which of the following are true about the relationship between the host machine and guest
machine? (Multiple answers)

a) With the virtualization technology, one host machine can run multiple guest machines.
b) With the virtualization technology, one guest machine can use resources of multiple host
machines.
c) With the virtualization technology, one host machine can run only one hypervisor.
d) With the virtualization technology, one guest machine can run only on the host machine where it
is created.

6|Page
Q35) Which of the following are true about the type I (bare metal) computing virtualization? (Multiple
answers)

a) Applications can directly run on VMM.


b) Applications and VMs can directly run on the host OS.
c) The hypervisor directly runs on physical hardware.
d) Application cannot directly run on the host machine.

Q36) Which of the following is true about the type II (hosted) virtualization? (single answer)

a) VMM runs on the host OS.


b) VMM directly runs on the host machine.
c) VMM runs on the guest OS.
d) VMM runs on the guest machine

Q37) Open-source virtualization technologies are all type I virtualization. Closed source virtualization
technologies are all type II virtualization.? (single answer)

a) True
b) False

Q38) If a VM on a physical host is faulty, other VMs on the physical host are not affected. Which of the
following feature of the virtualization technology is reflected by the preceding description? (single
answer)

a) Partition
b) Isolation
c) Encapsulation
d) Independence

Q39) Which of the following are used to allocate CPU and memory resources to VMs in computing
virtualization? (Multiple answers)

a) Host OS
b) Guest OS
c) VMM
d) Hypervisor

Q40) Computing virtualization technologies can be classified into type I and type II virtualization or full
virtualization and paravirtualization from different perspectives.

a) True
b) False

Q41) A VM consists of the VM configuration file and disk file. Users can move the two files to run the VM
on different physical hosts. Which features of cloud computing are reflected by the preceding description?
(Multiple answers)

7|Page
a) Encapsulation
b) Isolation
c) Independence
d) Partition

Q42) Which of the following are true about the encapsulation feature of virtualization? (Multiple answers)

a) Multiple VMs can concurrently run on a physical host.


b) If a VM has multiple disks, each disk generates a corresponding disk file.
c) The VM configuration file contains information such as the CPU type and quantity.
d) VMs can be migrated from one physical host to another.

Q43) Which of the following best demonstrate the advantages of virtualization? (Multiple answers)

a) With the virtualization technology, multiple applications can concurrently run on the
b) operating system of a physical host.
c) With the virtualization technology, the CPU usage of a physical host keeps around 65%.
d) With the virtualization technology, VMs can be migrated between hosts.
e) With the virtualization technology, multiple VMs can concurrently run on a physical host.

Q44) Virtualization is applicable to which of the following scenarios? (Multiple answers)

a) A company has 10 service systems. The resource usage rate of the hosts running the service
systems is less than 20%.
b) All employees in a company almost use the same office desktop applications.
c) A scientific research institute uses a customized operating system to ensure the confidentiality of
scientific research results.
d) An enterprise requires a high-load and compute-intensive environment.

Q45) The reasons why the computing virtualization technology can improve application reliability are ( ).
(Multiple answers)

a) VMs that run applications are decoupled from hardware, enabling VMs to migrate between
physical hosts.
b) The computing virtualization technology enables multiple applications to concurrently run on the
same physical host.
c) The computing virtualization technology can automatically adjust VM specifications.
d) The computing virtualization technology can automatically allocate VMs that run applications to
physical hosts with sufficient resources.

Q46) Which of the following are true about the relationship between virtualization and cloud computing?
(Multiple answers)

a) Virtualization is one of the technologies to implement cloud computing.


b) Virtualization is a technology. Cloud computing is a service mode. Virtualization promotes the
development of cloud computing.

8|Page
c) Without cloud computing, virtualization has no value.
d) Without virtualization, cloud computing has no value.

Q47) The virtualization technology can improve hardware resource utilization and reduce O&M costs.
Cloud computing also has these advantages. Therefore, cloud computing and virtualization technologies
are inseparable from each other.

a) True
b) False

Q48) Some virtualization technologies are opensource and some are closed-source. So does the cloud
computing management platform. The open-source cloud computing management platform needs to be
implemented by opensource virtualization technologies.

a) True
b) False

Q49) The CPU virtualization technologies can be classified into full virtualization, paravirtualization,
software virtualization, and hardware-assisted virtualization.

a) True
b) False

Q50) Which of the following are true about KVM virtualization? (Multiple answers)

a) The host OS can be Linux.


b) The host OS can be Windows.
c) The guest OS can be Linux.
d) The guest OS can be Windows.

Q51) Which of the following are true about Kernel-based Virtual Machine (KYM)? (Multiple answers)

a) KVM is an open-source virtualization technology


b) KVM belongs to type I virtualization
c) KVM belongs to type II virtualization
d) KVM is a module in the Linux kernel.

Q52) Which of the following are true about KVM and Xen? (Multiple answers)

a) KYM and Xen are open-source hypervisors.


b) Domain 0 and Domain U are concepts in KVM.
c) KVM and Xen can run in the same host OS.
d) Xen VMs can be converted to KVM VMs.

Q53) Kernel-based Virtual Machine (KVM) is an open-source full virtualization solution.

9|Page
a) True
b) False

Q54) Which of the following belong to the Kernel-based Virtual Machine (KVM) architecture? (Multiple
answers)

a) Libvirt.
b) Domain 0.
c) QEMU.
d) ESXi.

Q55) Kernel-based Virtual Machine (KVM) VMs can run on other virtualization platforms after being
converted.

a) True
b) False

Q56) Which of the following is not a Kernel-based Virtual Machine (KVM) management tool?

a) Libvirt.
b) Virsh command set.
c) Virt-Manager.
d) QEMU.

Q57) QEMU functions as a hardware Simulator in KVM. It is a unique technology of the Linux operating
system.

a) True
b) False

Q58) Which of the following operations can be performed in Huawei FusionCompute? (Multiple answers)

a) Create VMs.
b) Delete VMs.
c) Convert VMs on other virtualization platforms to VMs that can be used by FusionCompute
d) Clone VMs

Q59) In Huawei FusionCompute, users can manage VMs in which of the following modes? (Multiple
answers)

a) Log in to the CNA and run commands for management


b) Log in to the VM for management
c) Log in to the VRM and use the GUI for management.
d) Log in to the CNA and use the GUI for management.

Q60) You can create a KVM VM on the GUI or by running commands.

a) True
b) False

10 | P a g e
Q61) Which of the following are true about the function of Libvirt in Kernel-based Virtual Machine (KVM)?
(Multiple answers)

a) Libvirt is one of the KVM management tools.


b) The Libvirt APls can be called to operate KVM VMs in multiple programming languages.
c) Libvirt is customized for KVM.
d) Libvirt is an indispensable part of the KVM architecture.

Q62) Which of the following are true about Virtio? (Multiple answers)

a) Virtio is an I/O paravirtualization solution.


b) Virtio is an I/O full virtualization solution.
c) Virtio improves I/O forwarding efficiency.
d) After Virtio is used, OEMU is not required.

Q63) If KVM uses Virtio, which of the following are true about the I/O forwarding process? (Multiple
answers)

a) The I/O requests need to be forwarded by the KVM module.


b) The I/O requests are directly sent by the frontend driver to the backend driver.
c) The forwarding efficiency of I/O requests increases.
d) The I/O requests are not forwarded through OEMU.

Q64) With Virtio, the NIC transmission rate of a Windows VM is 10 Gbit/s.

a) True
b) False

Q65) A user applies for an EVS disk on HUAWEI CLOUD. This service mode is ( ).

a) laaS
b) PaaS
c) Saas
d) DaaS

Q66) Which of the following is true about distributed storage? Like: VSAN

a) Disks of distributed storage are from x86 disk arrays.


b) Disks of distributed storage are from x86 VMs.
c) Disks of distributed storage are from x86 servers.
d) Disks of distributed storage are from PCs.

Q67) In Huawei FusionCompute, FusionStorage can be used as a virtualized storage device.

a) True
b) False

Q68) In Huawei FusionCompute, which of the following is false about the uplink links?

a) The uplink is between the DVS and physical NIC of the host. One host has only one uplink.

11 | P a g e
b) An uplink can correspond to one physical network port or the logical port that binds multiple
physical network ports.
c) Multiple DVSs cannot share an uplink.
d) A host can have multiple uplinks connected to different DVSs.

Q69) In Huawei FusionCompute, which of the following is false about port groups and security groups?

a) One DVS can have multiple port groups. One VM can be protected by multiple security groups
b) Security groups protect VMs based on port groups.
c) A port group is an aggregation of virtual ports on a DVS. A security group is a set of rules.
d) A VM NIC is connected to a virtual port in a port group. A VM NIC is associated with a security
group.

Q70) Which of the following is false about iSCSI and Fiber Channel?

a) At the transmission layer, fiber channel transmission uses the Fiber Channel (FC) protocol and
iSCSI uses the TCP/IP protocol.
b) iSCSI runs on the Ethernet based on the TCP/IP protocol and can be seamlessly integrated with
the existing Ethernet.
c) The Fiber Channel (FC) protocol is completely heterogeneous with the existing Ethernet and the
compatibility is poor.
d) The transmission distance of FC is longer than that of the TCP/IP.

Q71) The service mode shown in this picture is ( ).?

a) laaS
b) PaaS
c) SaaS
d) DaaS

Q72) In Huawei FusionCompute, which of the following storage virtualization features are supported?

a) Thin provisioning
b) Storage live migration
c) Snapshot
d) Disk capacity expansion

12 | P a g e
Q73) Which of the following VM disk file formats is not supported by Huawei FusionCompute?

a) VMDK
b) QCOW2
c) RAW
d) VHD

Q74) SATA disks use parallel Single ports and SAS disks use serial ports

a) True
b) False

Q75) Which of the following is recommended for the archive room where a large amount of data needs
to be stored for a long time and does not need to be read frequently?

a) SSD disk
b) SAS disk
c) SATA disk
d) NL-SAS disk

Q76) SSDs are mechanical hard disks, featuring fast read/write speed, low power consumption, and light
weight. However, SSDs have limited service life.

a) True
b) False

Q77) Which of the following are true about RAID?

a) A RAID group can be regarded as storage space consisting of two or more disks. The available
capacity of a RAID group is the sum of the capacity of disks in the group.
b) RAID improves the I/O. The performance of a storage system by concurrently reading and writing
data on multiple disks.
c) When a disk is damaged, other disks in RAID 5 can still work properly, and the disk I/O
performance is not affected.
d) Compared with RAID 5, RAID 6 has stronger data recovery capability, but weaker read/write
capability of disks.

Q78) In RAID 5 and RAID 6, the number of faulty disks that can be tolerated is ( ), respectively.

a) 1, 2
b) 2, 3
c) 2, 1
d) 3, 2

13 | P a g e
Q79) After the disks in an array form a RAID group, the server connected to the disk array cannot directly
access the RAID group. Therefore, you need to divide the disk array into logical LUNs before allocating
them to the server.

a) True
b) False

Q80) Based on RAID 5, RAID 6 enhances the fault tolerance capability of disks and allows two disks to be
faulty at the same time. The minimum number of disks in a RAID 6 group is 4.

a) True
b) False

Q81) The universal storage space unit mapped to the host in the disk array is ( ), which is the logical space
created based on RAID.

a) Storage pool
b) Volume
c) LUN
d) Partition

Q82) RAID 1 can replace data backup. Data mirroring is used to improve the fault tolerance of disk arrays.
The data recovery cost is the smallest among all.

a) True
b) False

Q83) Which of the following RAID levels has the highest disk space usage?

a) RAID 0
b) RAID 1
c) RAID 5
d) RAID 6

Q84) Which of the following RAID levels has the weakest data redundancy capability?

a) RAID 0
b) RAID 1
c) RAID 5
d) RAID 6

Q85) Common categories of disk arrays include ( ).

a) RAID
b) JBOD (Just a Bunch of Disks)
c) SBOD (Switched Bunches of Disks)
d) MAID (Massive Arrays of Idle Disks)

Q86) The common external storage solutions include ( ).

a) DAS

14 | P a g e
b) SAN
c) NAS
d) NFS

Q87) Compared with SAN, which of the following is not an advantage of NAS?

a) The file system of NAS supports a single file with higher specifications.
b) NAS supports more files.
c) Block data transmission is optimized.
d) File sharing is optimized.

Q88) NAS has its own file system. After accessing NAS through the network sharing protocol, the
application server can read and write the files in the file system.

a) True
b) False

Q89) When configuring IP SAN for a host, you need to configure ( ) for the host on the storage device to
map the host to the IP SAN.

a) iSCSI Server
b) iSCSI Client
c) iSCSI Initiator
d) iSCSI Target

Q90) Compared with FC SAN, which of the following is not an advantage of IP SAN?

a) Low construction cost


b) Long transmission distance
c) High transmission efficiency
d) Convenient bandwidth expansion

Q91) Which of the following is not included in the NAS architecture?

a) Status verification module


b) File system
c) Volume management module
d) Network port

Q92) In a NAS environment, data inconsistency may occur when multiple hosts write data to one file at
the same time.

a) True
b) False

15 | P a g e
Q93) Which of the following network file sharing protocols are supported by NAS?

a) NTFS
b) NFS
c) CIFS
d) FTP

Q94) iSCSI is a standard protocol based on the ( ) protocol and SCSI instruction set. It is widely used in
many storage networks of the ( ) architecture.

a) FC, FC SAN
b) TCP/IP, FC SAN
c) TCP/IP, IP SAN
d) FC, IP SAN

Q95) Which of the following is false about differences between SAN and NAS?

a) NAS has its own file system, but SAN does not.
b) SAN provides block-level data transmission and storage services, while NAS provides file- level
transmission and storage services.
c) SAN is a network architecture, while NAS is a network file storage device.
d) SAN can expand storage space, but NAS devices cannot be expanded.

Q96) SAN provides a host with a raw disk where no file system is created. The file system to be created
depends on the operating system of the host.

a) True
b) False

Q97) Storage virtualization can be classified into ( ).

a) Block-level virtualization
b) Page-level virtualization
c) File-level virtualization
d) Application-level virtualization

Q98) In Huawei FusionCompute, if only one physical network port is in a bound port, the physical network
port cannot be removed directly.

a) True
b) False

Q99) In Huawei FusionCompute, ( ) can only be used as nonvirtualized storage.

a) SAN
b) NAS
c) Local disk

16 | P a g e
d) FusionStorage

Q100) In Huawei FusionCompute, you can perform which of the following operations on the VRM?

a) Divide RAID groups for disk arrays.


b) Manually add a storage device to a VM.
c) Add SAN storage as non-virtualized storage.
d) Convert virtualized storage to non-virtualized storage.

Q101) In Huawei FusionCompute, common NICs can be bound in ( ) modes.

a) Active/Standby.
b) Load sharing based on round-robin.
c) Load sharing based on source and destination MAC addresses.
d) Load sharing based on source and destination port groups.

Q102) In Huawei FusionCompute, VMs using non-virtualized storage do not support the snapshot
function.

a) True
b) False

Q103) Which of the following is false about the figure?

a) Files are stored in the file system and mapped to the file system block by the file system.
b) The file system block corresponds to the logical extent of LVM.
c) The logical extent is mapped to the physical extent of the disk through LVM.
d) Each file system block corresponds to discontinuous extents on the physical disk

Q104) Which of the following is true about virtualized storage and nonvirtualized storage?

a) Virtualized storage is more secure than non-virtualized storage


b) The read and write performance of non-virtualized storage is better than that of virtualized
storage.
c) The scalability of non- virtualized storage is better than that of virtualized storage.
d) The compatibility of virtualized storage is better than that of non-virtualized storage.

Q105) In a Linux VM, ( ) is used to manage logical volumes.

a) DVM
b) LVM
c) PVM
d) OVM

Q106) The virtualization technology can virtualize a physical server into multiple VMs, improving the
hardware performance of the physical server.

a) True
b) False

17 | P a g e
Q107) Which of the following is true about NFS?

a) No special software needs to be installed on the NFS client.


b) NFS is a stateful protocol.
c) NFS supports multi-user access.
d) The user permission cannot be set for NFS

Q108) The process of creating a file system on a disk is usually called ( ).

a) RAID
b) Partition
c) Formatting
d) Encapsulation

Q109) In Huawei FusionCompute, Tools installed for VMs are irrelevant to the operating system types and
versions of the VMs.

a) True
b) False

Q110) In Huawei FusionCompute, which of the following is false about the host storage ports?

a) You can manually add storage ports or add storage ports in batches.
b) Multiple storage ports can be added to implement multi-path transmission.
c) Local disks and FC SAN devices can be interconnected with storage devices without adding storage
ports.
d) The IP addresses of the storage ports can be on the same network segment as that of the
management plane.

Q111) In Huawei FusionCompute, the correct procedure for deleting storage resources is ( ).

1. Delete or migrate the VM disk.


2. Disassociate the host.
3. Delete the storage resources.
4. Destruct the datastore.

a) 1->2->3->4
b) 1->4->2->3
c) 2->4->1->3
d) 3->2->4->1

Q112) In Huawei FusionCompute, the default alarm levels do not include ( ).

a) Critical

18 | P a g e
b) Moderate
c) Major
d) Minor
e) Warning

Q113) Disk partitions are divided by the operating system on physical disks.

a) True
b) False

Q114) In Huawei FusionCompute, the management VLAN ID used by VRM cannot be changed.

a) True
b) False

Q115) Which of the following is false about the VIMS file system?

a) VIMS is a high-performance cluster file system.


b) VIMS is the technical basis of advanced features such as thin provisioning disk, snapshot, and
storage migration.
c) VIMS is compatible with FC SAN, IP SAN, and local disks.
d) VIMS is a universal storage virtualization file system in the industry

Q116) In Huawei FusionCompute, system disks of VMs cannot be detached.

a) True
b) False

In Huawei

Q117) FusionCompute, which of the following deployment modes is recommended to improve VRM
reliability?

a) Single-node deployment
b) Active/Standby deployment
c) Active-active deployment
d) Hybrid deployment

Q118) In Huawei FusionCompute, which of the following are true about the relationship about quantities
of VMs and DVSs?

a) If a VM has multiple NICs, each NIC can be associated with a DVS.


b) If a VM has multiple NICs, multiple NICs can be associated with the associated with same DVS.
c) If a VM has one NIC, the NIC can be associated with only one DVS.
d) If a VM has one NIC, the NIC can be associated with multiple DVSs.

19 | P a g e
Q119) The prerequisites for communication between a VM and other VMs are ( ).

a) Configure a fixed IP address for the VM.


b) Configure the gateway address for the VM.
c) Configure a correct IP address for the VM.
d) Configure a correct MAC address for the VM.

Q120) In Huawei FusionCompute, the VLAN ID (except 0) configured for a distributed virtual switch (DVS)
must exist on the physical switch. Otherwise, VM communications will be abnormal.

a) True
b) False

Q121) In Huawei FusionCompute, a DVS can be configured with static routes and multiple types of
dynamic routes.

a) True
b) False

Q122) In Huawei FusionCompute, a management IP address must be configured for each DVS to facilitate
unified management of DVSs.

a) True
b) False

Q123) In Huawei FusionCompute, the IP address of a Windows VM is [Link]. The possible cause is ( ).

a) The IP address of the VM is allocated using DHCP.


b) The IP address of the VM is manually set.
c) Tools is installed on the VM.
d) The IP address of the VM is manually set to [Link].

Q124) Which of the following traffic types belong to southbound and northbound traffic?

a) Traffic generated by mutual access between VMs in a data center.


b) Traffic generated when customers access services in a data center through the Internet.
c) Traffic generated during VM live migration.
d) Traffic generated by mutual access between VMs across data centers.

Q125) Which of the following statements about VLAN functions is false?

a) Isolates broadcast domains.


b) Enhances network security.
c) Increases the interface bandwidth of physical switches.
d) Improves network robustness.

20 | P a g e
Q126) Which of the following remote management methods are supported by physical switches?

a) Telnet.
b) SSL.
c) SSH.
d) Web.

Q127) Data packets in a cloud computing virtual network must be routed and forwarded by routers in a
physical network.

a) True
b) False

Q128) In practice, which of the following functions is supported by VLANs?

a) If VMs in two departments use different VLANs, the VMs cannot communicate with each other.
b) VMs in different VLANs can use the same IP address. No IP address conflict occurs.
c) VMs in the same VLAN can use IP addresses in different IP address segments and can discover
each other through broadcast.
d) VMs in the same VLAN must use IP addresses in the same IP address segment. Otherwise,
communications between the VMs will fail.

Q129) If VM A and VM B run on different physical servers, which of the following physical devices is used
during communications?

a) Virtual switch
b) Virtual NIC
c) Physical NIC
d) Physical switch

Q130) A VM can have multiple virtual NICs, which correspond to different virtual switches.

a) True
b) False

Q131) The port configuration of a Huawei switch is as follows: interface XGigabitEthemet0/0/4 port link-
type trunk port trunk allow-pass vlan 16 17 Which of the following statements is true based on the
preceding configuration?

a) Data frames with the VLAN 16 tag will be untagged and forwarded when passing through this
port.
b) Data frames with the VLAN 17 tag will be forwarded with the tag retained when passing through
this port.
c) Data frames without any tags will be discarded when passing through this port.
d) Data frames without any tags will be tagged with VLAN 16 or VLAN 17 when passing through this
port and then forwarded.

21 | P a g e
Q132) Which of the following technologies can increase the link rate on a switch?

a) VLAN
b) VxLAN
c) LACP
d) LDAP

Q133) On a physical network, which of the following devices supports route forwarding requests?

a) Physical server NIC


b) Hub
c) layer 2 switch
d) Router

Q134) The port configuration of a Huawei switch is as follows: interface GigabitEthernet0/0/1 port link-
type access port default vlan 16 Which of the following statements is true based on the preceding
configuration?

a) This port does not perform any operation on the data frames that pass through it.
b) This port removes the VLAN 16 tag from the data frames and forwards the data frames.
c) This port adds the VLAN 16 tag to the data frames that pass through it.
d) This port allows only the data frames with the VLAN 16 tag to pass through.

Q135) In KVM, there are two methods for connecting VM NICs to a physical network: ( ).

a) Bridge connection and direct connection.


b) Bridge connection and address translation.
c) Address translation and passthrough.
d) Passthrough and bridge connection.

Q136) If a VM needs to communicate with other VMs, which of the following operations is mandatory?

a) Add at least one NIC for the VM.


b) Connect the physical server where the VM is located to the Internet.
c) Configure port binding on the physical server.
d) Configure port binding on the physical switch.

Q137) If two VMs can ping each other, which of the following network devices will certainly be used during
communications?

a) Distributed virtual switch (DVS)


b) Virtual NIC
c) Physical switch
d) Physical NIC

22 | P a g e
Q138) If VM A can ping VM B, which of the following inferences is true?

a) VM A and VM B run on the same physical host.


b) VM A and VM B use the same network segment.
c) VM A and VM B are configured with correct IP addresses.
d) VM A and VM B use different network segments.

Q139) Virtual switches are indispensable to successful communications between VMs.

a) True
b) False

Q140) Which of the following technologies or devices cannot isolate broadcast domains?

a) VLAN
b) Hub
c) Router
d) Firewall.

Q141) Switches are classified as access switches, aggregation switches, and core switches. Virtual switches
belong to aggregation switches.

a) True
b) False

Q142) Core services of an enterprise are deployed on multiple VMs in cluster mode. High availability (HA)
policies can be configured for the VMs to improve service reliability.

a) True
b) False

Q143) VM live migration is a prerequisite for implementing VM HA.

a) True
b) False

Q144) In Huawei FusionCompute, which of the following statements about VM HA are true?

a) After the HA function is enabled in a cluster, if a host in the cluster becomes faulty, VMs on the
host can be rebuilt on other hosts in the cluster.
b) When the system detects a BSOD on a VM and the handling policy configured for this error is HA,
the system creates the VM on a normal compute node.
c) VM HA can quickly recover services if a fault occurs.
d) If a fault occurs, HA-enabled VMs can be successfully rebuilt on other compute nodes as long as
there are reserved resources in the cluster.

Q145) In practice, resources must be reserved for hosts in a cluster to ensure that VM HA can be
performed properly

23 | P a g e
a) True
b) False

Q146) In Huawei FusionCompute, which of the following are trigger conditions for VM HA?

a) The host where the VM is located is faulty.


b) Applications on the VM break down.
c) A BSOD occurs on Windows VMs.
d) The datastore where the VM is located is faulty.

Q147) In Huawei FusionCompute, which of the following operations can be performed by the system if a
Blue Screen of Death (BSOD) occurs on a Windows VM?

a) No processing is performed.
b) Restarting the VM
c) Restoring the VM using a snapshot.
d) Performing VM HA

Q148) In Huawei FusionCompute, after the automatic computing resource scheduling function is enabled,
which of the following are possible causes for VM migration?

a) The system automatically migrates VM according to the scheduling policy.


b) a A BSOD occurs on a Windows VM and the handling policy is HA.
c) The administrator manually migrates a VM.
d) Applications on a VM break down

Q149) In Huawei FusionCompute, the Data Replication Service (ORS) migrates VMs based on the following
factors: ( )

a) CPU
b) Memory
c) I/O
d) Network traffic

Q150) In Huawei FusionCompute. Database Performance Monitor (DPM) depends on DRS.

a) True
b) False

Q151) In Huawei FusionCompute, which of the following statements are true about adding shared storage
for multiple hosts?

a) When the shared storage is IP SAN, make sure that the storage network of the host is connected
to the service ports of storage.
b) Select the corresponding host when adding a datastore.
c) Select all hosts when associating storage devices.
d) Select all hosts when initializing storage resources.

Q152) In Huawei FusionCompute, which of the following statements is true about adding storage ports to
hosts?

24 | P a g e
a) Select a host and add a storage port on the host configuration page.
b) Storage ports can be added to hosts in batches.
c) The VLAN ID can be set to 0.
d) If FC SAN is used, users do not need to add storage ports.

Q153) In Huawei FusionSphere, which of the following functions are supported by thin provisioning?

a) Virtual storage thin-provisioning is irrelevant to the OS and hardware. Disk thin-provisioning can
be provided as long as the virtual image management system is used.
b) This function enables alarms over datastore usage. If the data usage exceeds the preset threshold,
an alarm will be reported.
c) This function enables disk space monitoring and reclaiming.
d) NTFS VMs do not support this function.

Q154) In Huawei FusionCompute, where can the memory overcommitment function be enabled?

a) OS
b) VM
c) Host
d) Cluster

Q155) Which of the following statements about memory overcommitment is false?

a) Memory overcommitment technologies include memory ballooning, memory swapping, and


memory sharing.
b) Memory overcommitment technologies allow the total memory size of VMs to be greater than
the total memory size of the physical server.
c) After memory overcommitment is enabled, the memory overcommitment ratio is inversely
proportional to the actual memory usage of each VM.
d) Memory overcommitment technologies allow the used memory size of VMs to be greater than
the total memory size of the physical server.

Q156) Any of intelligent memory overcommitment functions (memory ballooning, memory swapping, and
memory sharing) can be enabled or disabled based on customer requirements.

a) True
b) False

Q157) Memory overcommitment is a resource allocation solution. It reduces costs and improves VM
density on a single host at the cost of performance.

a) True
b) False

25 | P a g e
Q158) Which of the following statements about memory overcommitment is false?

a) After memory overcommitment is enabled, the total memory size of all VMs created by users can
exceed the physical memory.
b) Enabling memory overcommitment improves VM deployment density on physical hosts.
c) When memory overcommitment is enabled, a higher overcommitment ratio indicates higher VM
performance.
d) If the memory usage of a user VM is high, the memory overcommitment ratio can be adjusted to
optimize the memory usage.

Q159) In which scenario should the memory overcommitment ratio not be increased?

a) The VM memory usage is low.


b) The memory overcommitment ratio reaches 150% in commercial scenarios
c) The customer requires that the maximum allowed number of VMs be deployed on a single host
while ensuring performance.
d) Customers' hardware procurement costs need to be reduced.

Q160) In which scenario is the memory overcommitment function recommended to be disabled?

a) Common office VMs


b) Telecom customer service center
c) Bank counters
d) Graphics-capable workstations

Q161) Which of the following is not a method for creating a VM template?

a) Converting a VM to a VM template
b) Cloning a VM to a VM template
c) Cloning a VM template to a VM template
d) Converting a snapshot to a VM template

Q162) When users use a Windows template to quickly deploy VMs, the generated SIDs may be the same.
As a result, some special software may fail to be installed.

a) True
b) False

Q163) Which of the following statements about templates is false?

a) After a template is converted to a VM, the template will no longer exist.


b) Parameters can be customized when a VM is deployed using a template.
c) A template can be used across virtualization platforms.
d) After a VM is cloned as a template, the VM still exists.

Q164) In Huawei FusionCompute, which of the following statements about the template format is false?

a) The VM template formats include .ova and .ovf


b) After a template in .ova format is exported, the template contains only one file.
c) The .ovf file is the VM description file, and the .vhd file is the VM disk file.

26 | P a g e
d) An .ovf template only contains one .ovf file and one .vhd file.

Q165) In Huawei FusionCompute, which of the following operations is supported when users modify a
disk of a VM?

a) Change the disk mode from Dependent to Independent & persistent.


b) Change the disk capacity from 80 GB to 8 GB.
c) Change the disk status from Available to Unavailable.
d) Change the disk configuration mode from Thin provisioning to Ordinary.

Q166) When users use a template to quickly deploy a VM, the generated VM configuration information is
the same as that in the template.

a) True
b) False

Q167) When users use a template to quickly deploy a VM, they do not need to install the operating system
or perform related configurations.

a) True
b) False

Q168) Templates can be used to quickly deploy VMs. Currently, users can create templates only by
converting or cloning VMS.

a) True
b) False

Q169) In Huawei FusionCompute, which of the following is not a QoS parameter of CPU resources?

a) CPU quota
b) CPU limitation
c) CPU reservation
d) CPU overcommitment

Q170) In Huawei FusionCompute, which of the following statements about CPU resource QoS is false?

a) CPU quota defines the proportion based on which CPU resources to be allocated to each VM when
multiple VMs compete for physical CPU resources.
b) CPU limitation defines the priority based on which CPU resources to be allocated to each VM
when multiple VMs compete for physical CPU resources.
c) CPU reservation takes effect only when VMs compete for resources. If the CPU resources are
sufficient, a VM can exclusively use physical CPU resources on the host if required.
d) CPU reservation defines the minimum CPU resources to be allocated to each VM when multiple
VMs compete for physical CPU resources.

27 | P a g e
Q171) If a VM of a customer requires a CPU clock speed of at least 2 GHz, which of the following methods
should be used?

a) CPU limitation
b) CPU reservation
c) CPU quota
d) CPU overcommitment

Q172) CPU resource QoS and memory overcommitment technologies are used to allocate resources
appropriately based on different policies.

a) True
b) False

Q173) Which of the following statements about CPU resource QoS and memory resource QoS is false?

a) CPU QoS of a VM is used to ensure that the computing resources of the VM are properly allocated.
b) CPU quota and CPU reservation take effect only when VMs compete for computing resources.
c) Memory QoS is used to ensure that key service VMs can obtain sufficient memory resources.
d) Memory QoS can be used only when memory overcommitment is enabled.

Q174) Memory overcommitment is the prerequisite for implementation of memory resource QoS.

a) True
b) False

Q175) An e-commerce service VM requires memory of at least 8 GB to cope with service traffic bursts
during holidays. Which of the following technologies can be used to meet this requirement?

a) Memory overcommitment
b) Memory QoS
c) VM live migration
d) Rapid VM deployment

Q176) Which of the following statements about creating a new disk on Huawei FusionCompute is false?

a) Set the disk type to Common and set the disk mode to Independent & nonpersistent.
b) Set the disk mode to Independent & nonpersistent and change the value of Raw Device Mapping
to Supported.
c) Set the disk configuration mode to Thin provisioning and set the disk mode to Independent &
persistent.
d) Set the disk configuration mode to Thin provisioning and set the disk mode to Independent &
nonpersistent.

Q177) Huawei FusionCompute DRS rules do not take effect for VMs with USB devices attached.

a) True
b) False

28 | P a g e
Q178) Which of the following operations can be performed under the VLAN Pool menu on Huawei
FusionCompute?

a) Add ten VLAN pools with the same VLAN ID to the same OVS.
b) Add one VLAN pool to the DVS and set the start VLAN ID of the VLAN pool to 100.
c) Add one VLAN pool to the DVS and set the start VLAN ID of the VLAN pool to 0.
d) Add one VLAN pool to the DVS and set the end VLAN ID of the VLAN pool to 4096.

Q179) Which of the following requirements can be met by using Huawei FusionCompute ORS rules?

a) A VM runs on a specified host.


b) If a host in the cluster is unavailable, VMs running on the host are automatically migrated to other
hosts.
c) If a BSOD occurs on a Windows VM, the system automatically restarts the VM.
d) If the VM configuration does not meet service requirements, the management system
automatically allocates more CPU resources to the VM.

Q180) Which of the following statements about creating a template on FusionCompute is false?

a) Convert a VM to a VM template: All parameters of the template are from the VM. The VM does
not exist after the conversion.
b) Clone a VM to a VM template: All parameters of the template are from the VM, but some
parameters can be modified during the cloning process. The VM is still available after the cloning
is compete.
c) Clone a VM template to a VM template: ALL parameters of the new template are from the original
VM template, but some parameters can be modified during the cloning process. The original VM
template is still available after the cloning is compete.
d) The VM used for creating a template can be in the Running state.

Q181) Which of the following is not a prerequisite for installing Tools for a VM on FusionCompute?

a) The OS has been installed on the VM.


b) Tools of a different version has not been installed on the VM.
c) The available free space of the system disk is greater than 32 MB.
d) You have obtained the password of user Administrator if the VM runs the Windows Server 2008
or Windows 7 OS.
e) The VM is in the Stopped state.

Q182) In Huawei FusionCompute, if a VM is in the Running or Stopped state, users can increase or
decrease the number of vCPUs of the VM as required.

a) True

29 | P a g e
b) False

Q183) Which of the following is not included in the snapshot management functions?

a) Creating a snapshot
b) Modifying a snapshot
c) Deleting a snapshot
d) Copying a snapshot

Q184) Which of the following statements about snapshots is false?

a) Snapshots can be used to store VM settings and VM disk data.


b) Snapshots can be used to store the VM memory status.
c) Multiple snapshots can be created for a VM. If a VM is restored using a snapshot, the later
snapshots become invalid.
d) Only one memory snapshot can be created for all VMs on a host at a time.

Q185) During the creation of a snapshot, users can perform other operations on the VM.

a) True
b) False

Q186) Which of the following scenarios are snapshots inapplicable to?

a) Critical service change


b) Service patch installation
c) Destructive testing of services
d) Long-term storage of service data

Q187) In Huawei FusionCompute, which of the following statements about memory overcommitment is
false?

a) The VM performance deteriorates on a host that has the memory overcommitment function
enabled.
b) The memory overcommitment function can be disabled only when the memory overcommitment
ratio of all hosts in the cluster is less than or equal to 100%.
c) After memory overcommitment is disabled, the total memory size of all VMs is less than or equal
to the total available physical memory size.
d) Administrators can enable or disable the memory overcommitment function anytime.

Q188) Which of the following statements about live migration and cold migration is false?

a) Cold migration is to migrate a stopped VM from one host to another. During the migration,
services are interrupted.

30 | P a g e
b) Live migration is to migrate a running VM from one host to another. During the migration, services
are not interrupted.
c) The reliability test in performance tests includes the tests on the VM migration, such as live
migration, cold migration, migration duration, and service interruption duration.
d) Memory data and disk data are migrated during live migration and cold migration.

Q189) Which of the fallowing QoS parameters can be set for VMs on FusionCompute?

a) Memory
b) CPU
c) GPU
d) Disk IOPS
e) Network

Q190) In Huawei FusionCompute, which of the following statements about snapshot-based VM


restoration is false?

a) A VM can have multiple snapshots.


b) If the port group where VM NICs belong is deleted after a snapshot is created for the VM, the
deleted port group will be restored when the VM is restored using the snapshot.
c) If the disk mode of a VM is Independent & persistent or Independent & nonpersistent, the data
on the disk will not be restored when the VM is restored using a snapshot.
d) A created snapshot of a VM can be used to restore the VM data to the state when the snapshot
was created.

Q191) Which of the following statements about snapshots is false?

a) A consistency snapshot will be to be created if disk I/O pressure is high. You are advised to create
a consistency snapshot when the disk I/O pressure is low.
b) After a snapshot is generated, incremental disks take space of the datastore where the disks are
located. To prevent storage resource insufficiency, control the number of snapshots.
c) Another snapshot can be created for a VM when a snapshot is being created for the VM.
d) Snapshots do not store information about passthrough devices such as USB/GPU/SSD or GPU
virtualization devices.

Q192) VM live migration is to migrate VMs from one physical server to another physical server in the same
cluster when the VM is powered off.

a) True
b) False

Q193) In Huawei FusionCompute, which of the following statements is false about the conditions for VM
live migration?

a) The source host and the destination host communicate with each other properly.
b) The destination host has sufficient resources.

31 | P a g e
c) The VM is running.
d) The type of the destination storage device is different from that of the source storage device.

Q194) Which of the following statements about the live migration application scenario is false?

a) If a host is faulty or overloaded, the VMs running on it can be migrated to another host to prevent
service interruption.
b) If the service load is too light on multiple hosts, the VMs can be migrated to a smaller number of
hosts to consolidate the host resources used. This decreases the number of hosts that need to be
running and reduces power consumption.
c) VMs at a graphics- capable workstation can be live migrated after being bound to an image
processor.
d) During host maintenance, VMs running on the host can be migrated to other hosts to ensure
normal service running.

Q195) In Huawei FusionCompute, which of the following statements about live migration is false?

a) Live migration includes VM live migration and disk live migration.


b) During VM live migration, the host can be changed, the datastore can be changed, or both the
host and datastore can be changed.
c) Storage live migration can be performed only in the same storage device under storage
virtualization management
d) Rapid memory data replication and shared storage are used during VM live migration to ensure
data consistency before and after the migration.

Q196) O&M engineers can migrate VMs on a physical server to be upgraded to other servers to prevent
service interruption during system maintenance performed by a carrier.

a) True
b) False

Q197) Which of the following statements about Non-Uniform Memory Access (NUMA) is false?

a) Guest NUMA presents the NUMA topology to VMs to enable the guest OS to allocate resources
to applications running on it based on logical NUMA nodes, thereby improving application
performance.
b) Host NUMA provides the CPU load balancing mechanism to eliminate the VM performance
bottleneck due to unbalanced CPU resource allocation.
c) Host NUMA ensures that VMs access only the local physical memory, which reduces memory
access latency and improves VM performance.
d) With NUMA, the speed of CPU access to memory on the same node is basically the same as that
of access to memory on another node.

Q198) Which of the following are included in virtual NUMA?

32 | P a g e
a) Topology presentation: NUMA is identified in the VM to make NUMA optimization of the guest
OS and applications effective.
b) Initial placement: Based on the VM NUMA topology, select a physical node to place the vCPU and
memory, so that the relationship
c) Load balancing: During the scheduling, the association between nodes and the mapping between
vNodes and physical nodes are considered to maximize the speed of vCPU access to local memory.
d) Dynamic migration: When the affinity relationship between the vCPU and physical node changes,
memory on the corresponding vNode will be migrated.

Q199) Which of the following statements about the purpose of enabling the NUMA function is true?

a) Optimize the memory access performance of VMs.


b) Maximize the CPU computing capability of the physical host.
c) Maximize the vCPU computing capability of VMs.
d) Maximize the memory overcommitment ratio of the physical host.

Q200) NUMA is a multiprocessor-based computer memory design. The memory access time depends on
the relative location of memory to the processor. In NUMA, the speed of a processor to access its own
local memory is faster than that to access a non-local memory (memory located on another processor or
memory shared by processors).

a) True
b) False

Q201) Which of the following statements about the NUMA Topology Adjustment switch is false?

a) If the optimal NUMA topology cannot be calculated, the VM behavior is consistent with the switch
status.
b) After the switch is set to OFF, interleaving access occurs on NUMA nodes during VM memory
access, resulting in performance loss.
c) After this switch is set to ON, the system sets VM NUMA affinity and physical NUMA affinity during
automatic adjustment to maximize VM memory access performance.
d) After this switch is set to ON, VMs may not be scheduled to the specified nodes, and CPUs and
memory are evenly allocated to bound nodes during manual adjustment.

Q202) Which of the following statements about security groups are true?

a) A security group, similar to a firewall, is used to set network access control for a single or multiple
VMs. It is an important security isolation method.
b) A security group is a logical group.
c) Security groups are used to protect VM security.
d) When a VM is created, a security group is generated at the same time.

Q203) In Huawei FusionCompute, which of the following statements about security groups and rules is
false?

a) A security group must be created before rules can be added.

33 | P a g e
b) Only a security group that contains no VMs can be deleted.
c) The changes to security group rules can only be manually applied to VMs in the security group.
d) By default, a security group rejects all access requests before rules are added to it.

Q204) Which of the following statements about the application scenarios of security groups is false?

a) Security group rules can be configured to prohibit VMs from accessing the FTP server.
b) be configured to allow only the specified IP addresses to remotely log in to VMs.
c) Security group rules can be configured to disallow access to VMs.
d) Security group rules can be configured to control the permissions on folders in a VM.

Q205) In Huawei FusionCompute, all VM NICs added to the same security group are filtered by the rules
of this security group. To

Q206) If a security group is deleted, the rules in the security group will be deleted as well.

a) True
b) False

Q207) In Huawei FusionCompute, which of the following statements about security group rules is false?

a) A security group is essentially a set of rules.


b) All VM NICs in the same security group use this security group rule for access control.
c) VMs can communicate with external networks only after a security group is created for the VMs
and rules are added to the security group.
d) If a VM has multiple NICs, a security group can be configured for each NIC.

Q208) In Huawei FusionCompute, which of the following statements about deleting a security group is
false?

a) A security group can be deleted properly even if it is authorized to access other security groups.
b) The security group to be deleted cannot contain any VMs. If a VM exists in the security group, the
VM must be removed from the security group before the security group can be deleted.
c) After a security group is deleted, all security group rules in the group will be deleted as well.
d) When a security group to which a VM belongs is deleted, the effects of other security groups on
this VM are not changed.

Q209) Which of the following is not included in the 4V features of big data?

a) Volume
b) Value
c) Variety
d) Valid

Q210) Fog computing is a distributed computing model that extends cloud computing concepts to
network edges to support low latency and distributed applications in mobile and internet of Things (loT)
fields. Which of the following statements about fog computing is false?

34 | P a g e
a) Fog computing can quickly generate big data at the edge of a network to reduce the latency.
b) Fog computing can reduce the bandwidth consumed by the core Internet and restrict the
movement of data to the local network.
c) Fog computing delivers higher network reliability and physical device security than cloud
computing.
d) Fog computing can temporarily cache data to reduce network pressure.

Q211) The function of loT is only to collect the data generated by everything.

a) True
b) False

Q212) Artificial intelligence (Al) is a new science of researching and developing theories, methods,
technologies, and application systems to imitate and enhance human intelligence. Which of the following
statements about Al is false?

a) Al does not have initiative and creativity peculiar to human consciousness.


b) Al is not social.
c) Al is an unconscious, mechanical, and physical process.
d) Al is a technology in which objects are interconnected through the network to exchange
information.

Q213) The 3GPP plenary meeting held in 2018 officially approved the standalone (SA) variant of the fifth
generation of mobile communications (5G) new radio (NR) specifications. Since then, the independent
deployment of 5G networks is supported. The uRLLC and mMTC technologies in 5G are mainly applied to
loT.

a) True
b) False

Q214) The nature of IoT is the Internet. As long as hardware or products are connected to the Internet
and data interactions exist, it can be called an IoT.

a) True
b) False

Q215) Which of the following does not belong to the elements of AI?

a) Big data
b) Perceptual analysis capability
c) Computing capability
d) Scenario

Q216) Which of the following statements about big data and cloud computing is true?

a) Cloud computing is a broad term for data sets so large or complex that traditional data processing
applications are inadequate.
b) Big data uses the pay-per-use mode, which supports available, convenient, and on demand
network access.
c) Big data can be used as a type of cloud computing service for users to choose.

35 | P a g e
d) Cloud computing cannot provide the underlying computing resources used for big data
processing.

Q217) Sound recognition, image recognition, and companion robots are all Al applications.

a) True
b) False

Q218) As Internet+ gains more and more attention and big data and cloud services become popular, more
and more advanced technologies are on the rise. Docker is one of the most widely used and important
technologies. Which of the following statements about Docker is false?

a) Before installing Docker, a virtualization layer and virtual operating system must be created on
the host machine or the host machine operating system.
b) Docker can be used to package the underlying environment of applications to ensure that
applications can still run properly after migration.
c) Docker is booted faster than other VM technologies.
d) Docker uses containers to run applications. Containers are running instances created from images.

Q219) Which of the following statements about the relationship between cloud computing and IoT is
false?

a) Cloud computing is the cornerstone of IoT development, and IoT promotes the development of
cloud computing.
b) Data transmission in IoT depends on cloud computing.
c) The IoT operating efficiency will be greatly reduced if there is no support from cloud computing
technologies.
d) Cloud computing provides sufficient storage space for massive da a in the IoT.

Q220) Which of the following statements about Virtual Network Computing (VNC)are true?

a) VNC must support the Linux operating system.


b) VNC is a lightweight remote control computer software.
c) A controlled computer can function as a VNC server only when the corresponding software is
installed on it.
d) The host that initiates a control request can function as a VNC server only when the corresponding
software is installed on it.

Q221) In FusionCompute, virtual switches connect to a physical network ().

a) Uplink
b) Port group
c) Virtual NIC
d) iNIC

36 | P a g e
Q222) In FusionCompute, which of the following operations can take effect immediately?

a) Deleting a NIC
b) Installing Tools
c) Reducing disk capacity
d) Directly reading and writing data on a newly attached disk

Q223) The storage virtualization technology improves storage utilization and provides storage resources
for multiple VMs

a) True
b) False

Q224) In Huawei FusionCompute, which of the following statements about the CPU QoS technology is
false?

a) Adjust the CPU reservation, quota, and limitation to control the CPU usage of VMs.
b) CPU reservation is used to ensure the minimum VM computing capability that is the minimum
number of resources that can be used.
c) CPU quota is used to balance and adjust resources based on the relative CPU quotas of multiples
VMs when computing resources are insufficient.
d) CPU limitation is used to specify the maximum number of VMs that can run on a host.

Q225) In Huawei FusionCompute, the gateway address of a VM is set on which of the following network
devices?

a) Layer 3 switch
b) Layer 2 switch
c) Virtual switch
d) Layer 1 physical device

Q226) In Huawei FusionCompute, the uplink is used to ( ).

a) Assign IP addresses to VMs.


b) Manage MAC address of VMs.
c) Connect a virtual network to a physical network
d) Check the status of vNICs.

Q227) In Huawei FusionCompute, snapshots can be created for Computing Node Agent (CNA) hosts.

a) True
b) False

Q228) In Huawei FusionCompute, which of the following functions will be affected after a USB device is
attached to a VM?

a) Restarting a VM

37 | P a g e
b) VM live migration
c) Cluster scheduling
d) VM resource capacity expansion

Q229) In FusionCompute, the administrator binds the two NICs of the CNA host through active/standby
mode. The data transmission rate is equal to the sum of the transmission rates of the two network ports

a) True
b) False

Q230) In Huawei FusionCompute, after a user logs in to a VM using VNC, operations on the VM fail. For
example, files cannot be opened. Which of the following is the most possible cause of this problem?

a) The management link is unstable.


b) The service link is unstable
c) The storage link is unstable
d) The VM is damaged.

Q231) In Huawei FusionCompute, when a compute node is powered off, the system can start HA-enabled
VMs on the compute node from other compute nodes. Which of the following is not a prerequisite for
using this function?

a) HA-enabled VMs on a compute node use IP addresses on the same network segment.
b) The VM is not bound to the host.
c) HA is enabled for the cluster to which the compute node belongs.
d) The source and destination compute nodes share the same datastore.

Q232) In Huawei FusionCompute, VM flavors cannot be modified during VM cloning.

a) True
b) False

Q233) During the installation of Huawei FusionCompute, which of the following storage is VRM
recommended to be deployed on?

a) Local disk
b) FC SAN
c) IPSAN
d) NAS

Q234) In Huawei FusionCompute, multiple VMs can be deployed in batches using a template.

a) True
b) False

Q235) Which of the following statements about the cluster, host, and VM in Huawei FusionCompute is
false?

a) Hosts can move between different clusters.


b) VMs can be migrated across clusters.

38 | P a g e
c) Whether multiple hosts belong to the same cluster depends on whether they use the same shared
storage.
d) A cluster consists of multiple hosts and their associated storage and network resources.

Q236) In Huawei FusionCompute, which of the following are the methods for creating VM?

a) Importing a VM from other virtualization platforms


b) Deploying a VM using a template
c) Cloning a VM from an existing VM
d) Creating a new VM

Q237) In Huawei FusionCompute, if a host in a cluster becomes faulty, VMs on the host are automatically
migrated to other hosts in the cluster.

a) True
b) False

Q238) Which of the following methods is used for installing VRM VMs using FusionCompute Installer?

a) Automatic installation of an ISO file.


b) Importing a template file to a VM
c) Automatic installation using PXE
d) Automatic VM creation and ISO file mounting

Q239) In FusionCompute, which of the following is not a method for creating a template?

a) Converting a VM to a VM template
b) Converting a snapshot to a VM template
c) Cloning a VM to a VM template
d) Cloning a VM template to a VM template

Q240) In Huawei FusionCompute, administrators can scan

Q241) In Huawei FusionCompute, which of the following data storage types does not support disk capacity
expansion?

a) Non-virtualized local disk


b) Virtual SAN
c) NAS
d) FusionStorage

Q242) In Huawei FusionCompute, which of the following statements about storage is false?

a) A physical storage device can serve as storage resources.


b) A storage device corresponds to a logical unit in physical storage, for example, a LUN.
c) A datastore can be IP SAN, FC SAN, or NAS.
d) A VM disk file is in VHD format.

39 | P a g e
Q243) In Huawei FusionCompute, when multiple VMs write data to the shared disk at the same time, the
application software must control access to the disk to prevent data loss.

a) True
b) False

Q244) In Huawei FusionCompute, the resources in a cluster consist of hosts and associated storage and

Q245) When FusionCompute uses Internet Protocol storage area network (IP SAN) storage, the steps for
creating disks include:

1. Create storage resources.

2. Add storage ports on the host.

3. Add datastores.

4. Create disks.

The operation sequence should be: ()

a) 1-2-3-4
b) 1-3-4-2
c) 2-1-3-4
d) 4-2-1-3

Q246) In Huawei FusionCompute, when viewing the disk status, the administrator finds that the value of
Used Capacity (GB) is less than that of Capacity (GB). The possible cause is: ( )

a) The disk type is Shared.


b) The disk mode is Thin provisioning.
c) The disk status is Unavailable.
d) The disk mode is Dependent.

Q247) In Huawei FusionCompute, which of the following statements about VM storage live migration is
false?

a) Storage live migration can be performed between different datastores.


b) Storage live migration can be performed between different storage resources.
c) Storage live migration can be performed between different storage devices.
d) Storage live migration can be performed between different virtual disks.

Q248) In Huawei FusionCompute, after data in a VM is deleted, the disk size will not be automatically
reduced. When users write data to the VM next time, the space released by the VM will be used.

a) True
b) False

Q249) The VM disk file format on FusionCompute is ( ).

40 | P a g e
a) OVF
b) VMDK
c) VHD
d) DHT

Q250) In Huawei FusionCompute, when mounting a local image file to a VM to install the OS, the
administrator can close the VNC window anytime without

Q251) In Huawei FusionCompute, which of the following VM disk configuration modes requires the least
physical storage space?

a) Independent & persistent


b) Independent & nonpersistent
c) Thin provisioning
d) Ordinary

Q252) In Huawei FusionCompute, which of the following statements about shared disks are true?

a) A disk of this type can be attached to only one VM.


b) A disk of this type can be attached to multiple VMs.
c) The VM does not support datastore change for this type of disks.
d) The VM with a disk of this type attached does not support the snapshot function.

Q253) Which of the following storage resource types are supported by Huawei FusionCompute?

a) FC SAN
b) IP SAN
c) NAS
d) Advanced SAN
e) FusionStorage

Q254) In Huawei FusionCompute, memory and CPU resources used by VMs can only be provided by the
same cluster. Therefore, the maximum number of available

Q255) After Huawei FusionCompute is deployed using the unified installation and deployment tool, the
system automatically creates a cluster. What operations can administrators perform on the cluster?

a) Changing the cluster name.


b) Exporting the cluster to a local directory
c) Adding cluster description
d) Moving the cluster to a specified folder

Q256) In Huawei FusionCompute the VLAN ID of a port group is set to 10, which indicates ( ).

a) The system will untag the data frames with the VLAN 10 tag that pass through the port group and
then forward the data frames.
b) The system will add the VLAN 1 O tag to the data frames without a VLAN tag that pass through
the port group and then forward the data frames.
c) The system will discard the data frames with a tag other than VLAN 10 that pass through the port
group.

41 | P a g e
d) The system will change the tag of data frames with a non-VlAN-10 tag that pass through the port
group to VLAN 10 and then forward the data frames.

Q257) In Huawei FusionCompute, administrators can view the DVS ports connected to VMs.

a) True
b) False

Q258) In Huawei FusionCompute, users can create VMs by importing a VM template file. Which of the
following file format is not supported?

a) ova
b) qwcow2
c) vmdk
d) ovf

Q259) Which of the following operating systems allows users to format disks in New Technology File
System (NTFS) format?

a) Linux
b) UVP
c) Windows
d) Unix

Q260) In Huawei FusionCompute, which of the following is not a restriction for VM live migration?

a) The shared disk cannot be attached


b) The VM cannot use raw device mapping (RDM) datastores.
c) The VM must be in the Running state.
d) The destination host is not in maintenance mode.

Q261) ???????????????????

Q262) When attaching a disk to a VM on Huawei FusionCompute, users have the following requirements:
When a snapshot is created for the VM, no snapshot is created for the disk. When a VM is restored using
the snapshot, the disk is not restored and all data is written to the disk permanently. Which of the
following modes of disks should be selected?

a) Dependent
b) Independent
c) Independent & persistent
d) Independent & persistent

Q263) Huawei FusionCompute allows users to add hosts in batches. The administrator fills in host
information based on the template provided by the system and imports the host information at a time.

a) True
b) False

42 | P a g e
Q264) Which of the following statements about Huawei FusionCompute HA is false?

a) This function enables a VM to reboot whenever the VM encounters with a failure.


b) If VM data is stored in the shared storage, the unsaved data will not be lost if a fault occurs.
c) With HA enabled, the system periodically detects the VM status If detecting a VM fault caused by
a physical server fault, the system automatically migrates the VM to another physical server and
restarts the VM to allow rapid restoration of the VM services.
d) Administrators can set different HA policies based on importance of VMs.

Q265) In Huawei FusionCompute, port groups are classified as common port groups, trunk groups, and
hybrid port groups.

a) True
b) False

Q266) Which of the following operations for creating port groups in Huawei FusionCompute is false?

a) Set the name of the port group to test.


b) Set the port type to Common.
c) Set the VLAN ID to 5000.
d) Enter "This is a test port." in the description

Q267) In Huawei FusionCompute, the VLAN ID of a port group is set to 0, which indicates ( ).

a) The VLAN tag of the data frames that pass through the port group will be set to 0.
b) Only data frames with the VLAN 0 tag can pass through the port group
c) Data frames with a VLAN tag are not allowed to pass through the port group.
d) The data frames that pass through the port group Will not be modified.

Q268) In Huawei FusionCompute, the virtual NICs of each VM are connected to the ports of the virtual
switch. To facilitate simultaneous configuration and management of multiple ports, the ports with the
same network attributes are added to the same port group.

a) True
b) False

Q269) Which of the following statements about port groups in Huawei FusionCompute are true?

a) One port group can be configured with multiple IP addresses.


b) A Port group functions as a distributed virtual Switch.
c) All virtual ports in a port group have the same attributes
d) There are two types of port groups: common port groups and trunk port groups.

Q270) In Huawei FusionCompute, if there are just a few physical NICs on the server, multiple planes can
be co-deployed and logically isolated by using VLANs.

a) True
b) False

43 | P a g e
Q271) In Huawei FusionCompute, which of the following are not supported by the VMs that use raw
device mapping (ROM) storage?

a) Snapshot
b) Thin provisioning
c) Storage live migration
d) CPU hot-add

Q272) Which of the following statements about hypervisors is true?

a) Hypervisor is virtualization.
b) A hypervisor is an operating system.
c) A hypervisor is a key technology in computing virtualization.
d) A hypervisor contains a large number of drivers Therefore, drivers and patches do not need to be
installed for the hypervisor.

Q273) In Huawei FusionCompute, which

a) If the VM runs the Windows operating system, the


b) If the VM runs the Linux operating system, the
c) The administrator can
d) If a VM does not have an IP address, The administrator can log in to the VM using VNC.

Q274) In Huawei FusionCompute, what network device does a DVS correspond to?

a) Router
b) Layer 3 switch
c) Layer 2 switch
d) Hub

Q275) Memory swapping in memory overcommitment means that external storage is virtualized into
memory for VMs to use, Data that is not used temporarily is stored in external storage. If the system needs
such data, the system exchanges the data with the data reserved in memory.

a) True
b) False

Q275) Which of the following statements about the Huawei FusionCompute architecture is false?

a) CNAs can manage the network, storage, and computing resources of a cluster.
b) VRM provides a management portal for administrators.
c) CNAs provide computing resources for VMs.
d) VRM can be deployed on a CNA or a dedicated server.

44 | P a g e
Q277) In Huawei FusionCompute, users can configure DRS rules

Q278) In Huawei FusionCompute, which of the following operations can be performed on a VM even if
Tools is not installed on the VM?

a) Restarting the VM
b) Forcibly stopping the VM
c) Stopping the VM
d) Converting the VM to a VM template when the VM is powered on

Q279) In Huawei FusionCompute, if a VM is bound to a host, which of the following functions will be
affected?

a) Snapshot
b) DRS
c) Hot migration
d) Memory hot-add

Q280) Huawei FusionCompute is able to check the usage of global physical resources during VM running,
calculate the optimal host for the VM based on the intelligent scheduling algorithm, and enable the VM
to run on the optimal host by means of live migration, thereby improving the overall service experience.

a) True
b) False

Q281) In Huawei FusionCompute, which of the following statements about VM NICs is true?

a) Virtual NIC and physical NIC are two different NIC types. A virtual NIC does not require a MAC
address.
b) The MAC address and IP address of a virtual NIC can be manually configured.
c) The MAC address and IP address of a virtual NIC are automatically allocated by VRM.
d) The IP address of a Virtual NIC must be manually configured

Q282) In Huawei FusionCompute, if VMs need to be migrated between CNA hosts with different CPU
models, which of the following functions must be enabled?

a) Cluster I/O ring adaptation


b) Cluster HANA optimization
c) Cluster GuestNUMA policy
d) Cluster IMC policy

Q283) In Huawei FusionCompute, which of the following statements about the IMC function is false?

a) You are advised to enable the IMC function when the CPU models of CNA hosts in the cluster are
inconsistent.

45 | P a g e
b) If the IMC function is enabled, VMs cannot be migrated between hosts with different CPU models.
Determine whether to enable the IMC function based on the site requirements.
c) IMC only supports the VM migration from an earlier CPU generation to a later CPU generation.
d) You are advised to enable the IMC function when the memory sizes of CNA hosts in the cluster
are inconsistent

Q284) In Huawei FusionCompute, which of the following statements about roles is true?

a) A role can have one or more operation permissions.


b) A user can be attached to only one role.
c) If a user is attached to multiple roles. The operation permissions of the user depend on the role
with the highest priority.
d) The operation permissions of a role cannot be modified.

Q285) In Huawei FusionCompute, which of the following statements about raw device mapping is false?

a) ROM disks deliver the best performance among all disk types.
b) An ROM datastore corresponds to only one disk.
c) It is recommended that the operating system be installed on an ROM disk.
d) An ROM datastore can only correspond to a LUN on SAN storage.

Q286) In Huawei FusionCompute, VMs can have multiple virtual NICs.

a) True
b) False

Q287) In Huawei FusionCompute, which of the following statements about the fac tors affecting
computing resource scheduling is false?

a) When both CPU and memory are configured as the factors. The scheduling policy is triggered only
when the CPU and memory conditions are met.
b) When CPU is configured as the only factor, the scheduling policy is triggered when the CPU
conditions are met.
c) When memory is configured as the only factor, the scheduling policy is triggered when the
memory conditions are met.
d) When both CPU and memory are configured as the factors, the scheduling policy is triggered
when either the CPU conditions or the memory conditions are met.

Q288) ??????????????????????

Q289) Assume that three VMs (A, B, and C) run on the host that uses a single-core physical CPU whose
clock speed is 2.8 GHz, their respective quotas are set to 100, 200, and 400, and their respective CPU
reservation values are set to 700 MHz, 0 MHz, and o MHz. What is the computing capability of VM C when
the three VMs are running at full CPU load?

a) 700 MHz
b) 300 MHz
c) 1400 MHz

46 | P a g e
d) 600 MHz

Q290) Virtualization features include partitioning, isolation, encapsulation, and independence.

a) True
b) False

Q291) The KVM virtualization architecture includes the KVM module, QEMU, and Libvirt. Which of the
following statements about these modules is false?

a) The KVM module is responsible for creating vCPUs and allocating virtual memory.
b) The QEMU module is responsible for simulating I/O operations.
c) Libvirt and OEMU can form a virtualization solution.
d) KVM and OEMU can form a Virtualization solution.

Q292) Which of the following statements about Virt-manager are true?

a) Virt-manager is a graphical management tool for KVM VMs.


b) Virt-manager is a KVM VM management command set.
c) Virt-manager is an open-source KVM VM management tool.
d) Virt-manager is a commercial KVM VM management tool.

Q293) In cloud computing, there are virtual networks and physical networks.

a) True
b) False

Q294) With the development of Al, almost all technologies involve Al. Which of the following scenarios
is Al applicable to?

a) NLP (Neuro-Linguistic Programming)


b) Voice recognition
c) Companion robot
d) Image recognition

Q295) loT devices may be connected to the Internet and can be controlled through the Internet.

a) True
b) False

Q296) In the OpenStack solution, which of the following modules provides persistent block storage?

a) Cinder
b) Swift
c) Nova
d) Glance

Q297) Which of the fallowing statements about the common Internet file System (CIFS) is true?

a) CIFS has low requirements on network transmission reliability. The TCP/IP or UDP protocol can be
used.

47 | P a g e
b) CIFS requires the client to have dedicated software installed.
c) CIFS supports multi-user access.
d) CIFS retains the file format characteristics.

Q298) Which of the fallowing are the features of the cloud computing 1.0 era?

a) Focuses on virtualization products.


b) Standardizes and automates resource services.
c) Supports agile application development and lifecycle management.
d) Adopts virtualization technologies to improve resource utilization.

Q299) In the cloud computing, hardware of the same type of different models can form a resource pool.

a) True
b) False

Q300) Virtualization includes computing virtualization, storage virtualization, and network virtualization,
which correspond to elastic cloud servers (ECSs), Elastic Volume Service (EVS) disks, and cloud networks
in cloud computing respectively.

a) True
b) False

48 | P a g e
HCIA BIGDATA H13-711 V2.0 EXAM DUMPS
HDFS
Q1
Which of the following are distributed storage components in the Hadoop
platform? CD
A. MapReduce
B. Spark
C. HDFS
D. HBase

Q2
In HDFS, data blocks are stored with multiple replicas. If a data block on a
node is lost, you need to manually copy a data replica to the node.
F
128MB -OneBlock

Q3
Which of the following HDFS component is responsible for storing user data?
B
A. NameNode
B. DataNode
C. ZooKeeper
D. JobTracker

Q4
NameNodes of HDFS store metadata of file systems T

Q5
Which statements about HDFS are correct? ACD
A. HDFS consists of NameNodes, DataNodes, and Clients.
B. Metadata on the standby NameNode of HDFS is directly synchronized from the
active NameNode. F
C. HDFS stores the first replica on the nearest node.
D. HDFS is ideal for Write Once Read Many (WORM) tasks.

Q6
Which statements are correct about the functions of the standby NameNode in
HDFS? AC
^^^^A. Hot spare for the active NameNode
^^^^B. The standby NameNode does not have specific memory requirements. ^^^^C.
The standby NameNode helps the active NameNode merge edit logs, reducing the
startup time of the active NameNode.
^^^^D. The active and standby NameNodes must be deployed on the same node.

Q7
Which statement is correct about uploading files from a client to HDFS?
B
^^^^A. The file data of the client is transmitted to DataNodes via NameNodes.
^^^^B. The client divides files into multiple blocks and writes data blocks
to each DataNode based on the DataNode address sequence. ^^^^C. The client
writes files to each DataNode based on the DataNode address sequence, and
then the DataNodes divide files into multiple blocks.
^^^^D. The client only uploads data to one DataNode, and the NameNode copies
blocks.
1.
block1 = 0 [Link]=ip1 block2 = 2
[Link]=ip2 block3 = 2
[Link]=ip3
2. array
address_list = [ip1,ip2,ip3]

Q8
In HDFS, the NameNode manages metadata, and the client reads metadata from the
metadata disk of the NameNode every time when the client sends a read request
to obtain the location information about the file that is being read in the
DataNode.
NameNode memory

Q9
Which of the following statements are correct about HDFS Federation? ACD
^^^^A. A namespace uses a block pool to manage data blocks.
^^^^B. A namespace uses multiple block pools to manage data blocks. ^^^^C. The
disk space of each block pool is physically shared, but the logical space is
isolated.
^^^^D. The NameNode and namespace can be scaled-out.

Q10
When the Client writes files to HDFS, the NameNode determines the location
where the first replica is written to, and the DataNode determines the location
where other replicas are written to. F

Q11
Which of the following statements is correct about the HDFS DataNode in
FusionInsight HD? B
^^^^A. Data validity is not checked.
^^^^B. The DataNode periodically sends its block information to the
NameNode.
^^^^C. Blocks stored on different DataNodes must be different.
^^^^D. Blocks on a DataNode can be the same.

Q12
which of the following commands is used to check the integrity of data
blocks in HDFS. A
^^^^A. hdfs fsck /
^^^^B. hdfs fsck / -delete
^^^^C. hdfs dfsadmin -report
^^^^D. hdfs balancer -threshold 1

Q13
Which is the default block size of HDFS in FusionInsight HD? C
^^^^A. 32 MB
^^^^B. 64 MB
^^^^C. 128 MB
^^^^D. 256 MB

Q14
How many copies of a block are stored in HDFS of FusionInsight HD by default?
A
^^^^A. Three copies
^^^^B. Two copies
^^^^C. One copy
^^^^D. Uncertain

Q15
MapReduce
Which one is not a feature of MapReduce in Hadoop? C
^^^^A. Easy to program
^^^^B. Outstanding scalability
^^^^C. Real-time computing
^^^D. High fault tolerance

Q16
Which of the following computing tasks is MapReduce good at dealing with?
B
^^^^A. Iterative computing
^^^^B. Offline computing
^^^^C. Real-time interactive computing
^^^^D. Stream computing

Q17
YARN manages cluster resources based on Resource Manager. Which of the
following are main functions of YARN? AB
^^^^A. Cluster resource scheduling
^^^^B. Application program management
^^^^C. Log management -- node manager
^^^^D. None of the above

Q18
Which is the encapsulation of the YARN resources in Hadoop? C
^^^^A. Memory
^^^^B. CPU
^^^^C. Container
^^^^D. Disk space

Q19
Which resources can be managed by YARN in Hadoop? AB
^^^^A. Memory
^^^^B. CPU
^^^^C. Network
^^^^D. Disk space
Q20
In Hadoop, you can set the [Link] parameter to
configure the memory size allocated to a container by YARN. F - AM'S
Memory

Q21
Which of the following is the correct sequence of the resource allocation
initiated by the YARN scheduler? C
^^^^A. Any host > Same rack > Local resources
^^^^B. Any host > Local resources > Same rack
^^^^C. Local resources > Same rack > Any host
^^^^D. Same rack > Any host > Local resources

Q22
If the number of replicas in HDFS is set as 3, file segments to be processed
must be transferred from hosts with three replicas every time when a task is
running. F

Q23
Which are the main features of the YARN scheduler? ABCD
^^^^A. Capacity assurance
^^^^B. Flexibility
^^^^C. Multi-leasing
^^^^D. Dynamic update of configuration files -- FusionInsight Manager

Q24
Which parameter should you configure to set the capacity of QueueA in
YARN to 30%? C
^^^^A. [Link]-limit-factor
^^^^B. [Link]-user-limit-percent
^^^^C. [Link]
^^^^D. [Link]

Q25
If a YARN cluster has sub-queues Default, QueueA, and QueueB, the capacity of
the sub-queues can be set to 60%, 25%, and 22%, respectively. F sub-queues +
QA+QB = 100%
60%+25%+22% = 97%

Q26
Which statement is incorrect if you set
[Link]-user-limit-percent to 50 in
YARN? B
^^^^A. When a user submits a task, the user can use 100% of QueueA resources.
^^^^B. Each user of QueueA can obtain a maximum of 50% of QueueA resources.
^^^^C. If tasks of two users of QueueA are running, tasks of the third user
can be executed only after the resources are released. ^^^^D. Each user of
QueueA obtains 50% of resources at least.

Q27
Which command is used to view information about an application of YARN in
Hadoop? D
^^^^A. container
^^^^B. application -attempt
^^^^C. jar
^^^^D. application

Q28
Which parameter should you configure to enable the YARN log aggregation
function in Hadoop? D
^^^^A. [Link]-dirs
^^^^B. [Link]-dirs
^^^^C. [Link]
^^^^D. [Link]-aggregation-enable

Q29
Spark
Both Spark and Hadoop are not applicable to iterative computing. F

Q30
In which programming language is Spark developed? D
^^^^A. C
^^^^B. C++
^^^^C. JAVA
^^^^D. Scala - 30000 lines

Q31
Which functions are provided by Spark? AD
^^^^A. Distributed memory computing engine
^^^^B. Distributed file system -hdfs
^^^^C. Distributed data warehouse -hive
^^^^D. Stream data processing

Q32
Resilient Distributed Datasets (RDDs) are generated in file systems compatible
with Hadoop, and then the generated RDDs can be partially upgraded by invoking
RDD operators. F -- read only

Which is not the transformation operation in Spark? D


^^^^A. join
^^^^B. distinct
^^^^C. reduceByKey
^^^^D. reduce
Q33
In Spark on YARN mode, the driver runs on the client only. F

Q34
Which is used to divide stages when Spark applications are running? D
^^^^A. task
^^^^B. taskset
^^^^C. action
^^^^D. shuffle

Q35
When a Spark application is running, the failure of a task can result in
application running failures. F

Q36
In Spark on YARN mode, executors cannot be initiated for tasks on nodes without
Node Manager. T

Q37
Shuffle divides the Spark job into multiple stages. F

Q38
Spark is a memory-based computing engine; therefore, data generated when
Spark applications are running is stored in memory. T
memory is not enough -> disk

Q31
An executor of Spark can run multiple tasks at the same time. T

Q32
In a Fusion Insight HD cluster, from which services can Spark read
data?
BCD
^^^^A. YARN
^^^^B. HDFS -FS
^^^^C. Hive -DW
^^^^D. HBase -DB

Q33
Spark Streaming performs better than Storm in real-time capability. F
Q34
Which of the following are permanent processes of Spark? AB
^^^^A. JobHistory
^^^^B. JDBCServer
^^^^C. SparkResource
^^^^D. NodeManager

Q35
HBase
HBase in FusionInsight HD supports dynamic extension of columns. T

Q36
Which of the following is the default underlying file storage system for
HBase in FusionInsight HD? A
^^^^A. HDFS
^^^^B. Hadoop
^^^^C. Memory
^^^^D. MapReduce

Q37
Which of the following scenario is HBase inapplicable to? A
^^^^A. The ACID feature is required - region
^^^^B. Massive sets of data ^^^^C. High
throughput
^^^^D. Semi-structured data

Q38
Which processes are contained in the HBase component of FusionInsight HD?
AC
^^^^A. HMaster
^^^^B. Slave
^^^^C. HRegionServer
^^^^D. DataNode
Hmaster - HRegionServer
Master - Slaves

Q39
HBase in FusionInsight HD needs to connect to HMaster during data read. F
0.96Version -Hbase -need use HMaster to read data after -
Hbase -nedd use Zookeeper to read data

Q40
How is the active HMaster of HBase selected? C
^^^^A. Selected randomly
^^^^B. Determined by RegionServer
^^^^C. Determined by ZooKeeper
^^^^D. HMasters are in active-active mode.
Q41
Which service process manages regions in Hadoop HBase? C
^^^^A. HMaster
^^^^B. DataNode
^^^^C. HRegionServer
^^^^D. ZooKeeper

Q42
The minimum processing unit of HBase in Fusion Insight HD is region. Where is
the routing information between the user region and Region Server stored? D
^^^^A. Zookeeper
^^^^B. HDFS
^^^^C. Master
^^^^D. Meta table
Meta table(zookeeper) -> user region(HRegionServer)

Q43
When HBase is deployed in a FusionInsight HD cluster with N nodes, how many (
) HMaster processes and ( ) RegionServer processes are recommended? C
^^^^A. 2, 2
^^^^B. 3, N
^^^^C. 2, N
^^^^D. N, N
active hmaster
standby hmaster
HA
50-60

Q44
Which of the following is not semi-structured data? C
A. HTML
B. XML
C. Bidimensional table
D. JSON
storage in hbase

Q45
For HBase in FusionInsight HD, a table is divided by SplitKey 9, E, a, z.
Thus, how many regions does the table have? C
^^^^A. 3
^^^^B. 4
^^^^C. 5
^^^^D. 6

Q46
Which of the following is the physical storage unit of regions in HBase?
B
^^^^A. Region
^^^^B. Column family
^^^^C. Column
^^^^D. Row

Q47
What is the storage format of HBase data? A
^^^^A. HFile
^^^^B. SequenceFile
^^^^C. HLog
^^^^D. TxtFile

Q48
Which statement about HFiles in HBase is incorrect? B
^^^^A. An HFile belongs to a region.
^^^^B. An HFile contains data of multiple column families.
^^^^C. An HFile contains data of multiple columns.
^^^^D. An HFile contains data of multiple rows.

Q49
What information does the KeyValue of HFiles in HBase contain?
^^^^A. Key
^^^^B. Value
^^^^C. TimeStamp
^^^^D. KeyType
ABCD

Q50
In FusionInsight HD, which component or service is not involved in HBase data
read process? C
^^^^A. ZooKeeper
^^^^B. HDFS
^^^^C. HMaster >0.96 Version
^^^^D. HRegionServer

Q51
In FusionInsight HD, where is the routing information about regions of
HBase metadata stored? B
^^^^A. Root table
^^^^B. ZooKeeper
^^^^C. HMaster
^^^^D. Meta table
Q52
In HBase, data is written to MemStores, HLogs, and HDFS, where will a data
writing success message be returned after the data is successfully written? B
^^^^A. MemStore
^^^^B. HLog
^^^^C. HDFS
^^^^D. Memory

Q53
An HBase table meg_table with RowKey for user ID and one column for user name.
KeyValues 001:Li, 001:Mary, and 001:LiLy are written to meg_table in sequence.
Then which is returned by the command 'scan
'meg_table',{VERSIONS=>2}'? D
^^^^A. 001:Li
^^^^B. 001:Lily
^^^^C. 001:Li,001:Mary,001:LiLy
^^^^D. 001:Mary, 001:LiLy
version number
001:Li timestamp xxx-xxx-01 version1
001:Mary timestamp xxx-xxx-02 version2
001:Lily timestamp xxx-xxx-03 version3

Q54
Which of the following is the purpose of periodically executing compaction for
HBase clusters? AB
^^^^A. To reduce the number of files in the same region and the same column
family.
^^^^B. To improve data read performance.
^^^^C. To reduce data of files in the same column family.
^^^^D. To reduce the number of files in the same region.

Q55
Which of the following statements is incorrect about region splitting in HBase?
C
^^^^A. Splitting does not essentially split files, but creates reference files.
^^^^B. Splitting is to reduce the size of data in a region so that a region is
split into two regions.
^^^^C. The table suspends services during the splitting.
^^^^D. The split region suspends services during the splitting

Q56
If a region in HBase is being split, when will one HFile be split to two
regions? C
^^^^A. During the splitting
^^^^B. During the flush
^^^^C. During the compaction
^^^^D. During the HFile splitting

Q57
During HBase data read, what data needs to be read? AC
^^^^A. HFile
^^^^B. HLog
^^^^C. MemStore
^^^^D. HMaster

Q58
Which of the following statements is incorrect about BloomFilter of HBase in
FusionInsight HD? A
^^^^A. BloomFilter is used to filter data.
^^^^B. BloomFilter is used to optimize random data read.
^^^^C. BloomFilter consumes more storage resources.
^^^^D. BloomFilter can be used to precisely determine which data does not
exist.

Q59
If you need to view the current user and his/her permission group of
HBase, which command should you run in the HBase shell? B
^^^^A. user_permission
^^^^B. whoami
^^^^C. who
^^^^D. get_user

Q60
Hive
Which of the following scenarios is Hive inapplicable to? A
^^^^A. Online data analysis in real-time
^^^^B. Data mining, such as user behavior analysis, interest zoning, and
regional display
^^^^C. Data summary, such as daily and weekly user clicks and click ranking
^^^^D. Non-real-time analysis, such as log analysis and statistics analysis

Q61
Which of the following storage formats are supported by Hive in
FusionInsight HD? BCD
^^^^A. HFile
^^^^B. TextFile
^^^^C. SequenceFile
^^^^D. RCFile
Q62
Which statement is incorrect about comparisons between Hive and conventional
data warehouses? B
^^^^A. Hive is HDFS-based; therefore, Hive can store as much data as possible
theoretically. However, conventional data warehouses can only store a limited
amount of data.
^^^^B. Hive is based on the big data platform; therefore, Hive delivers a
faster query speed than conventional data warehouses.
^^^^C. Hive metadata storage is independent of data storage, so metadata is
decoupled from data, thus the flexibility is improved. However, the
conventional data warehouse is in the opposite against Hive. ^^^^D. Hive
data is stored in HDFS, providing high fault tolerance and reliability.

Q63
Which statement is incorrect about the relationship between Hive and other
Hadoop components? D
^^^^A. Hive stores data in HDFS.
^^^^B. HQL can use MapReduce to execute tasks.
^^^^C. Hive functions as a data warehouse tool in Hadoop. ^^^^D. Hive
is strongly dependent on HBase.

Q64
Which statement is incorrect about Hive in FusionInsight HD? A
^^^^A. The Hive cluster is unavailable when one HiveServer fails.
^^^^B. The HiveServer receives requests from the client, parses and runs
HQL commands, and returns the query result.
^^^^C. MetaStore provides metadata services and depends on DBService.
^^^^D. At the same time, one HiveSever is in the active state, and the other is
in the standby state.

Q65
Which of the following is not the flow control feature of Hive in
FusionInsight HD? C
^^^^A. Controls the total number of established connections.
^^^^B. Controls the number of connections established by each user.
^^^^C. Controls the number of connections established by a specific user.
^^^^D. Controls the number of established connections during a specific period.

Q66
Which of the following statements is incorrect about common tables and external
tables in Hive? D
^^^^A. Common tables are created by default.
^^^^B. External tables associate the file paths on HDFS with tables. ^^^^C.
When a common table is deleted, the metadata and data in the table are deleted.
^^^^D. When an external table is deleted, only the data in the external table
is deleted but the metadata is not deleted.

Q67
Which of the following statements about Hive table creation is correct? A
^^^^A. The external keyword must be specified when an external table is
created.
^^^^B. Once a table is created, the table name cannot be changed.
^^^^C. Once a table is created, the column name cannot be changed.
^^^^D. Once a table is created, new columns cannot be added.
Q68
Which of the following methods cannot be used to load data to the Hive table? C
^^^^A. Load the files in the local path to the Hive table.
^^^^B. Load the files in HDFS to the Hive table.
^^^^C. Hive supports the insertion of a single record using insert into.
Therefore, you can insert a single record directly using the command line.
^^^^D. Insert the result sets of other tables into the Hive table.

Q69
What are the possible causes if the Hive service status is Bad on the
FusionInsight Manager portal? ABC
^^^^A. The DBService service is unavailable. HQL->SQL
^^^^B. The HDFS service is unavailable.
^^^^C. The MetaStore instance is unavailable. Metadata in hive ^^^^D. The
HBase service is unavailable.

Q70
Which of the following statements is incorrect about Hive log collection on
FusionInsight Manager? D
^^^^A. You can specify an instance to collect logs, for example, collecting
MetaStore logs.
^^^^B. You can specify a time period to collect logs, for example, collecting
logs from 2016-01-01 to 2016-01-10.
^^^^C. You can specify a node IP address to collect logs, for example,
downloading the logs of an IP address only.
^^^^D. You can specify a user to collect logs. For example, downloading the
logs generated by user A only.

Q71
Streaming
Which of the following statements is correct about the Supervisor of
FusionInsight HD Streaming? B
^^^^A. The Supervisor is responsible for resource allocation and task
scheduling. NIMBUS
^^^^B. The Supervisor receives tasks allocated by Nimbus, and starts or stops
Workers based on actual situation.
^^^^C. The Supervisor is a process running a specific service logic. ^^^^D.
The Supervisor is a component that receives and processes data in a topology.
Zookeeper

Q72
When the Streaming component of FusionInsight HD is being installed, how many
nodes must be equipped with the Nimbus role? B
^^^^A. 1
^^^^B. 2
^^^^C. 3
^^^^D. 4

Q73
The Streaming component of FusionInsight HD has a weak dependency on ZooKeeper
and can normally provide services even if ZooKeeper becomes faulty. F

Q74
In FusionInsight HD, which of the following methods can be used for
troubleshooting if you fail to use the Shell command of the Streaming client to
view or submit a topology? AB
^^^^A. View the abnormal stack on the client to check whether the client is
faulty.
^^^^B. View the run logs of the active Nimbus to check whether the Nimbus
server is abnormal.
^^^^C. View the Supervisor run logs to check whether the Supervisor is
abnormal.
^^^^D. View the Worker run logs.

Q75
After a topology is submitted using the Shell command of the Streaming client
in the FusionInsight HD system, the Storm UI shows that the topology does not
process data for a long time. What are the possible causes? ABC
^^^^A. The topology is too complex or the concurrency is too large. As a
result, the Worker startup takes a longer time than the waiting time of the
Supervisor.
^^^^B. The slot resource of the Supervisor is exhausted. After the topology is
submitted, no slot can be allocated to start the Worker process.
^^^^C. The topology service has a logic error and cannot run properly after
being submitted.
^^^^D. When the data volume is large, the topology processing speed is slow.

Q76
Flink
Flink is a unified computing framework that supports both batch processing and
stream processing. It provides a stream data processing engine that supports
data distribution and parallel computing. T

Q77
Which of the following scenarios is Flink inapplicable to? BD
^^^^A. Batch processing
^^^^B. Iterative computing spark
^^^^C. Stream processing
^^^^D. Data storage hdfs,hbase,hive
Q78
Flink applies to applications that require high-concurrency data processing and
a millisecond-level latency. T

Q79
Similar to Spark Streaming, Flink is a time-driven real-time streaming system.
F
Spark -> time driven
Flink,Streaming -> event driven

Q80
Flink can be deployed in local or cluster mode. Other deployment modes are not
supported. F ->Cloud AWS s3/DLI service

Q81
In Flink, the ( ) interface is used for stream data processing, and the
( ) interface is used for batch processing. B
^^^^A. Stream API, Batch API
^^^^B. DataStream API, DataBatch API
^^^C. DataBatch API, DataStream API
^^^^D. Batch API, Stream API

Q80
In the technical architecture of Flink, what is the computing engine for stream
processing and batch processing? B
^^^^A. Standalone
^^^^B. Runtime
^^^^C. DataStream
^^^^D. FlinkCore

Spark - Sparkcore
Flink - Runtime

Q81
The Flink program consists of Stream data and Transformation operators. T

Q82
Which of the following statements are incorrect about Flink windows? BD
^^^^A. The scrolling windows do not overlap in time.
^^^^B. The scrolling windows overlap in time.
^^^^C. The time points of the sliding windows overlap.
^^^^D. The time points of the sliding windows do not overlap.

Q83
Flink uses the checkpoint mechanism to ensure fault tolerance during
application running. T

Q84
The checkpoint mechanism of Flink continuously draws snapshots of streaming
applications, and the status snapshots of the streaming applications can only
be stored in the HDFS file system. F

Q85
Which of the following statements is incorrect about a Flink barrier? D ^^^^A.
A barrier is periodically inserted into the data flow and flows as part of the
data flow.
^^^^B. A barrier is the core of Flink snapshots.
^^^^C. A barrier separates the data of the current periodic snapshot from that
of the next periodic snapshot.
^^^^D. When a barrier is inserted, the data flow is temporarily blocked.

Q86
In Huawei FusionInsight HD, which of the following components does Flink
strongly depend on? ABC
^^^^A. YARN Flink in yarn
^^^^B. HDFS
^^^^C. ZooKeeper
^^^^D. Kafka

Q87
Loader
Loader supports only data import and export between relational databases and
HBase. F

Q88
Which of the following methods or interfaces are provided by Loader to
implement task management? ABCD
^^^^A. Web UI
^^^^B. Linux CLI
^^^^C. REST API
^^^^D. Java API

Q89
If a Loader job fails to be executed, the data imported during the job
execution will not be automatically deleted and must be manually deleted.
F
Q90
In the FusionInsight HD system, the Loader service functions properly if only
one Loader node in a cluster is faulty. T

Q91
Which of the following nodes need to communicate with external data sources
before and after a FusionInsight HD Loader job is running? C
^^^^A. Active Loader node
^^^^B. Node that runs the YARN service job
^^^^C. All of the above
^^^^D. None of the above

Q92
When Loader is used to import and export data, data processing must be
performed during Reduce. F

Q93
Which of the following statements is correct about Loader jobs in
FusionInsight HD? B
^^^^A. If the Loader service malfunctions after submitting a job to YARN, the
job fails to be executed.
^^^^B. If a Mapper task fails after Loader submits a job to YARN for execution,
the task can be automatically retried.
^^^^C. If a Loader job fails to be executed, junk data is generated and needs
to be manually cleared.
^^^^D. After Loader submits a job to YARN for execution, Loader cannot submit
other jobs before the job is executed.

Q94
Which of the following instances must be deployed together with the
Loader instance in FusionInsight HD? D
^^^^A. DataNode
^^^^B. RegionServer
^^^^C. ResourceManager
^^^^D. NodeManager

Q95
Which of the following operations cannot be performed on Loader on
FusionInsight Manager? D
^^^^A. Start the Loader instance.
^^^^B. View the Loader service status.
^^^^C. Configure Loader parameters.
^^^^D. Switch between active and standby Loader nodes.
Q96
After a Loader job in FusionInsight HD is submitted to YARN, the job cannot be
stopped manually. F

Q97
In FusionInsight HD, when Loader imports files from the SFTP server, which of
the following file types does not require code and data conversion and delivers
the most rapid speed? C
^^^^A. text_file
^^^^B. sequence_file
^^^^C. binary_file
^^^^D. graph_file

Q98
Which of the following target ends can FusionInsight HD Loader export
HDFS data to? ABCD
^^^^A. SFTP server
^^^^B. FTP server
^^^^C. Oracle database
^^^^D. DB2 database

Q99
Which of the following is the function of the connector when FusionInsight HD
Loader creates a job? C
^^^^A. Determine the conversion steps.
^^^^B. Provide optimization parameters to improve data import and export
performance.
^^^^C. Configure how jobs are connected to external data sources.
^^^^D. Configure how jobs are connected to internal data sources.

Q100
For Loader in FusionInsight HD, a connector can be allocated to only one job.
F

Q101
In FusionInsight HD, Loader jobs are input, converted, and output in sequence.
T

Q102
In FusionInsight HD, which of the following methods cannot be used to view the
execution result of a Loader job? D
^^^^A. Using the YARN task management page
^^^^B. Using the Loader UI
^^^^C. Using alarms on Manager
^^^^D. Using NodeManager
Q103
In FusionInsight HD, if dirty data is generated during the running of a Loader
job, the execution result of the Loader job must be failed. F

Q104
Flume
In FusionInsight HD, which component does not data flow of Flume pass by? D
^^^^A. source
^^^^B. channel
^^^^C. sink
^^^^D. topic

Q105
Flume data flows can be sent to different channels based on the header
information. T

Q106
Flume can monitor and transfer new files in a directory to implement quasi-
realtime data transmission. Which type of source is described above? A
^^^^A. spooling directory source
^^^^B. http source
^^^^C. exec source
^^^^D. syslog source

Q107
Which of the following is not the channel type of Flume? D
^^^^A. Memory Channel
^^^^B. File Channel
^^^^C. JDBC Channel
^^^^D. HDFS Channel

Q108
When Flume is used to transmit data, which of the following channel types is
recommended to prevent data loss caused by the restart of the Flume process? B
^^^^A. Memory Channel
^^^^B. File Channel
^^^^C. JDBC Channel
^^^^D. HDFS Channel

Q109
When the Flume process is cascaded, which of the following sink types are used
to receive data sent by the last-hop Flume? AB
^^^^A. avro sink
^^^^B. thrift sink
^^^^C. Hive sink
^^^^D. Null Sink

Q110
During data transmission, Flume deletes the events from the channel after Sink
obtains the data and writes the data to the destination. T

Q111
How many Flume Server nodes must be deployed in the same cluster when
FusionInsight HD is deployed? ............... Error! Bookmark not defined.
^^^^A .................................................................. 20
^^^^B .................................................................. 20
^^^^C .................................................................. 20
^^^^D .................................................................. 20

Q112
Multiple channels can be configured to transmit data in the
[Link] configuration file of Flume. T

Q113
kafka
Kafka is a distributed publish-subscribe messaging system. It forwards messages
but does not store messages. F

Q114
What is the role of the Kafka server in a Kafka cluster? D
^^^^A. Producer
^^^^B. Consumer
^^^^C. ZooKeeper
^^^^D. Broker

Q115
Which of the following statements is incorrect about Kafka in
FusionInsight HD? C
^^^^A. Kafka strongly depends on ZooKeeper. t
^^^^B. At least two Kafka instances must be deployed. t
^^^^C. The Kafka server can generate messages. f
^^^^D. A Consumer functions as a Kafka client and consumes messages. t

Q116
Which of the following statements are correct about Kafka in
FusionInsight HD? BD
^^^^A. When a Kafka Producer sends a message, the Consumer that consumes the
messages can be specified. f
^^^^B. When creating a topic, ensure that the number of replicas is less than
or equal to the number of active Broker instances. Otherwise, topic creation
fails. t
^^^^C. After Kafka is installed, the data storage directory cannot be
configured. f
^^^^D. Kafka stores metadata information to ZooKeeper. t

Q117
On FusionInsight Manager, if the insufficient Kafka disk capacity alarm is
received and the alarm is not caused by the disk hardware fault, the system
administrator needs to expand the capacity to resolve this problem. T

Q118
In the FusionInsight HD system, when creating a Kafka topic, you must set the
number of partitions and replicas. Multiple replicas enhance the disaster
recovery capability of Kafka services. T

Q119
Which of the following commands is used to view partition details of a topic in
Kafka? C
^^^^A. bin/[Link] --create
^^^^B. bin/[Link] --list
^^^^C. bin/[Link] --describe
^^^^D. bin/[Link] --delete

Q120
Which of the following statements are correct about Kafka in
FusionInsight HD?
ACD
^^^^A. When deleting a topic, ensure that [Link] of the
Kafka service is set to true.
^^^^B. Kafka installation and run logs are stored in /srv/Bigdata/kafka/.
^^^^C. If the ZooKeeper service is unavailable, the Kafka service is
unavailable.
^^^^D. You must create a topic as the admin user or a user in the kafkaadmin
group.

Q121
Which of the following is not the possible cause of the insufficient
Kafka disk capacity alarm? D
^^^^A. The configuration (such as number and size) of the disks for storing
Kafka data cannot meet the requirement of the current service traffic, due to
which the disk usage reaches the upper limit.
^^^^B. Data retention time is too long, due to which the data disk usage
reaches the upper limit.
^^^^C. The service plan does not distribute data evenly, due to which the usage
of some disks reaches the upper limit.
^^^^D. The Broker node is faulty.
Q122
zookeeper
Which of the following statements about ZooKeeper are correct? AC
^^^^A. Based on open source Apache ZooKeeper, ZooKeeper is used to resolve data
management problems that occur frequently in distributed applications.
^^^^B. ZooKeeper, as an underlying component, is depended on by other
components but does not depend on other components.
^^^^C. ZooKeeper must be deployed in Huawei FusionInsight HD.
^^^^D. The more ZooKeeper nodes, the better.

Q123
In the ZooKeeper service model, the Leader nodes work in active/standby mode,
and other nodes are Follower nodes. F

Q124
Which of the following statements about ZooKeeper is incorrect? A
^^^^A. If ZooKeeper is interrupted during message synchronization, ZooKeeper
can continue to synchronize data based on the transmission status before the
fault occurred. That is, resumable data transfer is supported.
^^^^B. ZooKeeper uses the custom atomic message protocol to ensure data
consistency among nodes in the entire system.
^^^^C. The Leader role is elected when the ZooKeeper cluster is started. ^^^^D.
After receiving a data change request, the Leader node writes the data to the
disk and then to the memory.

Q125
All ZooKeeper nodes can process read requests. T

Q126
When the number of nodes in a ZooKeeper cluster is five, how many nodes provide
the disaster recovery capability? C
^^^^A. 3
^^^^B. 4
^^^^C. 6
^^^^D. None of the above

Q127
Which of the following statements about ZooKeeper is incorrect? D ^^^^A. The
updates sent by the client are applied in the sequence of update sending.
^^^^B. If a message is received by more than half of the servers, the message
can be successfully written to the disk.
^^^^C. Data transfer either succeeds or fails. There is no middle status.
^^^^D. The number of ZooKeeper nodes must be an odd.

Q128
ZooKeeper nodes use ACLs to control access policies. ACLs can be applied to any
Znode in a cluster. F
Q129
Which of the following components must depend on ZooKeeper? ABD
^^^^A. HDFS
^^^^B. HBase
^^^^C. Spark
^^^^D. YARN

Q130
Which of the following statements about ZKFC is incorrect? B
^^^^A. As the client of a ZooKeeper cluster, ZKFailoverController (ZKFC)
monitors the state information about NameNodes.
^^^^B. The ZKFC process must be deployed on NameNodes and the Leader nodes of
ZooKeeper. all the nodes
^^^^C. The standby NameNode detects the status of the active NameNode using
ZooKeeper. Once the active NameNode breaks down, the standby
NameNode becomes the active one.
^^^^D. The ZKFC process of HDFS NameNodes connects to ZooKeeper and saves
information such as the host name to ZooKeeper.

Q131
Which module is responsible for storing FusionInsight Manager user data?
D
^^^^A. CAS
^^^^B. AOS
^^^^C. Kerberos
^^^^D. LDAP

Q132
The FusionInsight HD cluster contains multiple services. Each service consists
of several roles. Which of the following are service roles? BC
^^^^A. HDFS
^^^^B. NameNode
^^^^C. DataNode
^^^^D. HBase

Q133
Which of the following interfaces can be used for FusionInsight Manager to
interconnect with external management platforms? AD
^^^^A. SNMP
^^^^B. VPN
^^^^C. BGP
^^^^D. Syslog

Q134
Which of the following operations cannot be performed on a service using
FusionInsight Manager? C
^^^^A. Start, stop, and restart a service.
^^^^B. Add and uninstall a service.
^^^^C. Hide and display a service that is not frequently used.
^^^^D. View service status

Q135
Which of the following operations cannot be recorded in FusionInsight HD audit
logs? D
^^^^A. Clear alarms manually.
^^^^B. Start and stop service instances.
^^^^C. Delete service instances.
^^^^D. Query historical monitoring information.

Q136
Which of the following statements is incorrect about the function for
configuring services on FusionInsight Manager? C
^^^^A. Service-level configuration takes effect for all instances.
^^^^B. Instance-level configuration takes effect only for this instance.
^^^^C. Instance-level configuration takes effect for other instances. ^^^^D.
The saved configuration takes effect after the services are restarted.

Q137
Which of the following configurations is not supported by FusionInsight Manager
user rights management? D
^^^^A. Assign a role to a user.
^^^^B. Assign rights to a role.
^^^^C. Assign a role to a user group.
^^^^D. Assign rights to a user group.

Q138
Which of the following can FusionInsight Manager implement a health check for?
AB
^^^^A. Host
^^^^B. Service
^^^^C. Role
^^^^D. Instance

Q139
Which data is periodically backed up by FusionInsight Manager? ABCD
^^^^A. NameNode
^^^^B. LDAP
^^^^C. OMS
^^^^D. DBService

Q140
Which of the following statements are correct about FusionInsight HD cluster
upgrade? ABCD
^^^^A. During the upgrade, a manual switchover between active and standby
OMS nodes is not allowed.
^^^^B. The password of the root account for all the hosts in the cluster must
be the same.
^^^^C. Ensure that the network is normal and avoid upgrade exceptions caused by
network problems.
^^^^D. Capacity expansion cannot be performed during the observation period.

Q141
On the FusionInsight HD platform, which of the following components support
encryption of tables and columns? BC
^^^^A. HDFS
^^^^B. HBase
^^^^C. Hive
^^^^D. Flink

Q142
On the FusionInsight HD platform, HBase does not support secondary indexes. F

Q143
Which of the following statements are correct about the storage of a large
number of small files? ABC
^^^^A. In HDFS, storing a large number of small files brings great pressure to
NameNodes.
^^^^B. If HBase stores a large number of small files, the Compaction operation
wastes I/O resources.
^^^^C. Huawei HFS is suitable for storing a large number of small files.
Files can be stored in HDFS or MOB to meet site requirements.
^^^^D. None of the above

Q144
FusionInsight Manager supports the unified management of multiple tenants. T

Q145
Huawei has extensive experience in delivering big data solutions in various
industries, such as finance, public security, railway, and government. T

Q146
Which of the following statements about the reliability of FusionInsight
HD are correct? ABCD
^^^^A. All components without SPOF
^^^^B. HA of all management nodes
^^^^C. Health status monitoring of software and hardware
^^^^D. Network plane isolation

Q147
Which of the following products are included in the FusionInsight family?
ABDE [Link]
^^^^B. LibrA
^^^^C. Manager
^^^^D. Miner
^^^^E. Farmer
^^^^F. DWs
IT Certification Guaranteed, The Easy Way!

Exam : H13-611-ENU

Title : HCIA-Storage (Huawei


Certified ICT Associate -
Storage)

Vendor : Huawei

Version : V12.35

1
IT Certification Guaranteed, The Easy Way!

NO.1 Statement 1: DAS solutions are islands of storage and that is why it is easy to make backups.
Statement 2: Most SCSI devices today use HVD technology.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: D

NO.2 Which of the following is a valid iSCSI name that can be used to set up the iSCSI connection
between the initiator and target? (Multiple Choice)
A. [Link]. huawei.:name1
B. [Link]. [Link]:name1
C. eui.12345678ABC
D. eui.0123456789ABCDEF
Answer: BD

NO.3 SAS uses a point-to-point connection design to enable a dedicated link to be established
between two devices in the communication.
A. TRUE
B. FALSE
Answer: A

NO.4 In which layer in the architecture of a typical Big Data processing system does the data mining
and business intelligence process are performed?
A. Application/Presentation Layer.
B. Data Processing Layer.
C. Data Analysis Layer.
D. Data Storage Layer.
Answer: C

NO.5 Which of the following file system is most suitable for the storage of Big Data?
A. NTFS
B. EXT4
C. HDFS
D. BTRFS
Answer: C

NO.6 Match the correct functionalities together: (1) IaaS (2) Hybrid (3) SaaS (a) Combination of
public and private (b) Applications are hosted externally (c) Hardware is outsourced.
A. 1 - a; 2 - b; 3 - c
B. 1 - b; 2 - c; 3 - a
C. 1 - c; 2 - a; 3 - b
D. 1 - b; 2 - a; 3 - c

2
IT Certification Guaranteed, The Easy Way!

Answer: C

NO.7 Match the RAID level with the characteristics. (1) RADO (2) RAID 5 (3) RAID 10 (4) RAID 6 (a)
Cost effective (b) Allows double disk failure (c) Highest performance (d) No data protection
A. 1 - a; 2 - d; 3- b; 4 - c
B. 1 - d; 2 - a; 3- c; 4 - b
C. 1 - d; 2 - a; 3- b; 4 - c
D. 1 - a; 2 - b; 3 - c;4 - d
Answer: B

NO.8 Based on the understanding of the Generation stage of the lifecycle management of
information and data, identify the 3 types of sources in which data can be generated. (Multiple
Choice)
A. External System Generation.
B. Internal System Generation.
C. External Input.
D. Internal Input.
Answer: BCD

NO.9 Select the correct statements that describes Mean Time Between Failure (MTBF). (Multiple
Choice)
A. MTBF can accurately pinpoint the time of failures of the hard disks.
B. The higher the MTBF, the hard disk will have shorter lifespan expectancy.
C. MTBF is used to measure the reliability of hard disks.
D. MTBF is the predicted elapsed time between inherent failures of hard disks.
Answer: CD

NO.10 Which of the following are the 3 layers of SCSI Initiator Model? (Multiple Choice)
A. SCSI Link Layer.
B. SCSI Network Layer.
C. SCSI Middle Layer.
D. SCSI Device Driver Layer.
Answer: ACD

NO.11 Because they are cheap and still have a large capacity we can say that cMLC Solid State Disks
are ideal for storing MP3 files and JPGs at home.
A. TRUE
B. FALSE
Answer: A

NO.12 This device acts a multiport repeater, blindly regenerating and repeating any incoming
electrical signal out all other ports, even ignoring CSMA/CD rules.
Which of the following device fits the description?

3
IT Certification Guaranteed, The Easy Way!

A. L2 Switches
B. L3 Switches
C. Router
D. Hub
Answer: D

NO.13 Government regulations can sometimes mean that when data must be destroyed it means
that the physical media must be destroyed.
A. TRUE
B. FALSE
Answer: A

NO.14 Which of the following are the 3 layers of SCSI Target Model? (Multiple Choice)
A. Network Layer.
B. Port Layer.
C. Middle Layer.
D. Device Layer.
Answer: BCD

NO.15 What is Network Functions Virtualization (NFV)?


A. Decoupling of the data plane and control plane in networks.
B. Decoupling of network functions from hardware.
C. Decoupling of services from software.
D. Decoupling of network functions from virtualization.
Answer: B

NO.16 What are the advantages of SSDs over HDDs? (Multiple Choice)
A. Larger capacity
B. Faster read/write speed for random access
C. Better environmental adaptability
D. Longer service life
Answer: BC

NO.17 The disadvantage of full backup is that it requires the last full backup and the most recent
differential backup to fully restore data.
A. TRUE
B. FALSE
Answer: B

NO.18 Why storage systems has more than one storage controllers in the Dual Storage Controller
Architecture?
A. 2 controllers can complete a single I/O operation much faster.
B. To provide redundancy in case of failure of a single controller.

4
IT Certification Guaranteed, The Easy Way!

C. To have more energy savings since the performance is doubled.


D. Single storage controller architecture is obsolete.
Answer: B

NO.19 Storage Pools cannot be created with a single tier of disks.


A. TRUE
B. FALSE
Answer: B

NO.20 You are tasked to setup a SAN storage system that has the following requirements:
(1) To minimize the workload on server resources.
(2) Optimize the capabilities on storage system for deduplication.
Select the following options that fits the scenario above. (Multiple Choice)
A. Use NIC instead of HBA cards to minimize the host resource consumption during I/O operations.
B. Offload the storage processing tasks to the server to optimize the data deduplication.
C. Usage of TCP/IP offload engine technology to do processing on HBA cards on the server to
minimize the usage of server resources.
D. Adding hardware acceleration module to the storage system to optimize the performance of data
deduplication.
Answer: CD

NO.21 Which of the following statements is incorrect?


A. A logical volume can reside on multiple physical disks. Data storage can be physically
discontinuous.
B. A volume group is built on physical volumes. A volume group can contain one physical volume
group or multiple physical volumes.
C. Physical volumes reside on the lowest layer in the logical volume manager. Logical volumes and
volume groups are dependent on physical volumes.
D. Multiple volume groups can be created on the space of a logical volume.
Answer: D

NO.22 Data and Information are the same thing.


A. TRUE
B. FALSE
Answer: B

NO.23 Statement 1: OceanStor Dorado systems are designed for high performance environments.
Statement 2: OceanStor Dorado systems are so-called All Flash Arrays.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false
Answer: A

5
IT Certification Guaranteed, The Easy Way!

NO.24 It is common practice to create an extra copy of a backup tape that holds important data.
A. TRUE
B. FALSE
Answer: A

NO.25 It provides connection between sets of nodes and allows the connected devices(nodes) to
communicate with each other but it is not a device.
Which of the following fits the above description?
A. Host.
B. Network.
C. Storage Array.
D. Switch.
Answer: B

NO.26 A SAN always uses the same technology to connect to the infrastructure as a NAS.
A. TRUE
B. FALSE
Answer: B

NO.27 Huawei V3 series storage system hardware includes controller enclosures and disk
enclosures.
Which of the following statements about controller enclosures is correct?
A. When the external power supply fails, BBU modules provide backup power for all disks.
B. When the external power supply fails, BBUs can supply power to enable data synchronization from
the cache to disks in disk enclosures.
C. If BBUs become faulty, the service system will be interrupted.
D. When the power input is normal, BBUs are in the standby state.
Answer: B

NO.28 Select the features that are commonly available in High End storage systems. (Multiple
Choice)
A. Global Cache
B. Second-level Data Copying
C. SSD Optimization
D. ATA Drive Optimization
Answer: ABC

NO.29 Which of the following statements about RAID 6 is incorrect?


A. Frequently used RAID 6 technologies include RAID 6 P+Q and RAID 6 DP.
B. RAID 6 requires two-level parity.
C. RAID 6 requires at least three member disks.
D. RAID 6 can recover data after two member disks fail.
Answer: C

6
IT Certification Guaranteed, The Easy Way!

NO.30 Statement 1: Everytime a tape is used to restore data, some data will be lost.
Statement 2: Backup strategies that use tape as backup media typically have a high RTO.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: A

NO.31 Which of the following is correct? (Multiple Choice)


A. Only when a snapshot is activated will the system record all changes to the original LUN.
B. A snapshot needs to be removed from the LUN group to be fully unmapped.
C. SmartTier supports a High Performance, a Performance, a High Capacity and a Capacity Tier.
D. To write data to the secondary LUN of a clone pair, the pair must be split.
Answer: ABD

NO.32 A device can have one WWPN but multiple WWNN's.


A. TRUE
B. FALSE
Answer: B

NO.33 Which device allows segregation of collision domains but not broadcasting domains?
A. L2 Switches
B. L3 Switches
C. Router
D. Hub
Answer: A

NO.34 Select the correct statements that describes the properties of bus technology in ICT
architecture. (Multiple Choice)
A. Bus is a communication system that transfers data between internal components and external
components.
B. Bus can be divided into internal bus and external bus.
C. Bus technology are only available in serial form.
D. The CPU needs to go through the memory to directly access the Bus.
Answer: AB

NO.35 Statement 1: For RAID 2.0+ to work optimally multiple disk domains must be created.
Statement 2: A disk domain with 100 disks in it has better RAID 2.0+ protection and performance
charachteristics than a disk domain with 50 disks.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.

7
IT Certification Guaranteed, The Easy Way!

D. Both statements 1 and 2 are false.


Answer: C

NO.36 The only cable type that can be uses to connect disk enclosures is the mini SAS cable.
A. TRUE
B. FALSE
Answer: B

NO.37 What is the main purpose of hot swapping technology in disk enclosures?
A. To swap out the hard disks after proper shutdown of storage system
B. To swap out the hard disks without turning off the storage system.
C. To be able to swap out the disks when the temperature is too hot.
D. Maintain the temperature of the disks to prevent overheating.
Answer: B

NO.38 Which of the following statements is NOT true for a SAN solution?
A. Block based storage.
B. Long distance connections not possible.
C. Contains no Single Points Of Failure.
D. Multiple protocols possible.
Answer: B

NO.39 A backup set is a group of data that is backed up in a batch. A backup set can be used for
either full backup or incremental backup.
A. TRUE
B. FALSE
Answer: A

NO.40 Statement 1: a snapshot of a ThinLUN at creation does not occupy storage capacity. The
snapshot of a ThickLUN at creation immediately occupies storage capacity.
Statement 2: When a snapshot of a ThickLUN exists, there is always space available to store changes
to the original data.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D

NO.41 Statement 1: A company should know what the Cost Of Downtime is to determine the backup
strategy.
Statement 2: For the business continuity it is not important to determine the RTO.
A. Statement 1 and Statement 2 are both True.
B. Statement 1 is True; Statement 2 is False.

8
IT Certification Guaranteed, The Easy Way!

C. Statement 1 is False; Statement 2 is True.


D. Stament 1 and Statement 2 are both False.
Answer: B

NO.42 In order to make full use of storage resources, on which tier are SSDs usually configured in a
tiered storage system?
A. Capacity tier
B. Performance tier
C. High-performance tier
D. Offline storage
Answer: C

NO.43 In a NAS environment entire files are sent across the ethernet based network. The NAS server
however stores these files in the form as SCSI blocks mostly on multiple disks using RAID protection.
A. TRUE
B. FALSE
Answer: A

NO.44 Which is a typical application example of PaaS?


A. Webmail
B. Microsoft Office365
C. Microsoft Azure
D. Amazone Elastic Compute cloud
Answer: C

NO.45 A company that primarily has static data (like map data or JPG files) does not profit much
from the HUAWEI OceanStor V3 SmartTier functionality.
A. TRUE
B. FALSE
Answer: A

NO.46 In HUAWEI OceanStor V3, which licensed feature is best described as: periodically detects
hotspot data and promotes them from low-speed storage media to high-speed media.
A. SmartMove
B. SmartMig ration
C. SmartMotion
D. SmartTier
Answer: D

NO.47 What is the main purpose of backup battery units (BBU) in storage controllers?
A. To maintain the power for clock synchronization.
B. To power the interface modules.
C. To provide additional power to storage controller to speed up the I/O.

9
IT Certification Guaranteed, The Easy Way!

D. To ensure that the non completed I/O is not lost during power outage.
Answer: D

NO.48 What statement about the SATA and SAS technologies is true?
A. Both use serial communication.
B. SATA and SAS support the same maximum number of devices on the bus.
C. Both use full-duplex communication.
D. Both SATA and SAS are intelligent protocols with intelligent devices.
Answer: A

NO.49 Most data generated by the Internet industry is structured data, amounting to 80% of total
data.
A. TRUE
B. FALSE
Answer: B

NO.50 Which of the following is a valid protocol for a UNIX-based NAS server? (Multiple Choice)
A. CIFS
B. NFS
C. SMB
D. Novell Control Protocol
Answer: ABC

NO.51 Select the correct statements that describes the properties of Distributed Object Storage
Architecture. (Multiple Choice)
A. Metadata servers manages the access requests.
B. Does not support x86 servers.
C. Clients can pinpoint the location of targeted data without metadata servers.
D. Multi node concurrent I/O connection.
Answer: AD

NO.52 Cloud computing can be used to improve reliability.


A. TRUE
B. FALSE
Answer: A

NO.53 Storage array is a network device used to switching network signals or data. It can provide a
dedicated communication channel between any 2 nodes in the network that is connected.
A. TRUE
B. FALSE
Answer: B

NO.54 Which of the following are common RAID types. (Multiple Choice)

10
IT Certification Guaranteed, The Easy Way!

A. RAID 1
B. RAID 5
C. RAID 0+1
D. RAID 50
Answer: ABD

NO.55 To enable a Windows-based host to use the resources provided by a HUAWEI OceanStor V3
series storage device, perform the following operations:
1. Create a Disk Domain and a storage pool.
2. Create a host group and host.
3. Create a LUN group and LUN.
4. Configure an initiator on server and on storage device.
5. Connect the server to the storage device.
6. Format the logical disk.
7. Install the initiator software on server.
8. Mapping.
Place the steps in the proper order.
A. 2 -> 3 -> 1 -> 4 -> 5 -> 6 -> 7 -> 8
B. 1 -> 2 -> 3 -> 4 -> 5 -> 6 -> 7 -> 8
C. 2 -> 3 -> 1 -> 4 -> 8 -> 7 -> 5 -> 6
D. 7 -> 5 -> 1 -> 3 -> 2 ->4-> 8-> 6
Answer: D

NO.56 Which of the following items is NOT mandatory in a Fibre Channel SAN? (Multiple Choice)
A. Storage device
B. Fibre Channel switch
C. Fibre Channel HBA
D. Windows operating system
Answer: BD

NO.57 Statement 1: NAS systems must be interconnected using fiber optic cables.
Statement 2: A network protocol is the way in which an operating system accesses a file that is on a
network connected device.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: C

NO.58 Which of the following licenses requires at least two OceanStor systems that are connected
over a WAN/LAN?
A. SmartTier
B. RemoteReplication
C. HyperSnap

11
IT Certification Guaranteed, The Easy Way!

D. SmartThin
Answer: B

NO.59 In a clustered NAS architecture, which of the following allows multiple file system to be
consolidated and does not need to be managed separately?
A. Global Namespace.
B. Global Sharing.
C. Global Cache.
D. Global Concurrency.
Answer: A

NO.60 Statement 1: Deduplication reduces the amount of stored data.


Statement 2: Deduplication is performed on file level only.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.61 As the new storage administrator, you are tasked with the procurement of a new batch of
SSD drives to replace the older drives that has reached the end of life. You have the option of SLC,
MLC and TLC SSD.
Which of the following will be your choice with a limited budget and medium level of reliability
concerns? (Multiple Choice)
A. Purchasing the MLC SSD if within budget range for core applications and services for better
performance and reliability.
B. Purchasing all TLC SSD drives for the storage system for the best reliability and performance.
C. Purchasing all SLC SSD drives for maximum savings on cost regardless of reliability.
D. Purchasing SLC SSD drives that has lowest cost and reliability for storage purposes of non critical
applications.
Answer: AD

NO.62 Which of the following statements about reconstruction is incorrect?


A. RAID 0,1, 5, 6, and 10 support reconstruction.
B. Reconstruction requires hot spare disks.
C. Reconstruction affects system performance.
D. Reconstruction does not interrupt system services.
Answer: A

NO.63 Statement 1: LAN based backup strategies are preferred as they are the most cost efficient
method and offer the highest performance.
Statement 2: Any backup strategy should provide in storing production data and backup data in
different physical locations.
A. Statements 1 and 2 are both true.

12
IT Certification Guaranteed, The Easy Way!

B. Statement 1 is true and statement 2 is false.


C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: C

NO.64 ICT is a technological field that combines information technology and communication
technology.
A. TRUE
B. FALSE
Answer: A

NO.65 Which of the following statements about storage file systems is incorrect?
A. NAS file systems include CIFS and NFS.
B. NAS file systems allow multiple servers running different operating systems to share files stored
on public storage media.
C. CIFS provides a way for NAS storage devices to share files in the UNIX environment.
D. NFS provides a way for NAS storage devices to share files in the Linux environment.
Answer: C

NO.66 In HUAWEI OceanStor V3, which of the following are characteristics of virtual snapshot LUN?
(Multiple Choice)
A. Virtual snapshot is based on the pointers specified in a mapping table.
B. A snapshot LUN cannot be mapped to hosts.
C. A full data replication is unnecessary.
D. Data is located using a mapping table.
Answer: ACD

NO.67 Which statement is true about RAID 2.0+?


A. Chunks belonging to a file will never be written on the same physical disk.
B. RAID 2.0+ has a higher RAID overhead than traditional RAID types.
C. With RAID 2.0+ it is supported to select no hot spare disks.
D. RAID 2.0+ allows for a complete enclosure to fail without causing data loss.
Answer: C

NO.68 Which of the following describe DAS? (Multiple Choice)


A. A storage device connects to a host using the SCSI-based bus architecture.
B. DAS is unfavorable to storage resource sharing.
C. The host CPU has a work load when storing data.
D. Long-distance transmission is supported between a host and a storage device.
Answer: ABC

NO.69 In HUAWEI OceanStor V3, which of the following statements about mapping a snapshot is
true?

13
IT Certification Guaranteed, The Easy Way!

A. Mapped snapshots are always Read-Only.


B. Snapshots optionally can be mapped to multiple hosts.
C. Snapshots can only be mapped to a the same host the original LUN was mapped to.
D. All of the answers are true
Answer: B

NO.70 What is best described as: the time it takes for the desired data to be beneath the read head
when the head is on the correct track?
A. Rotational latency
B. Rotational speed
C. Seek time
D. Throughput
Answer: A

NO.71 Which of the following are the 3 layers of components that storage systems are made up of?
(Multiple Choice)
A. Storage Analysis
B. Storage Solution
C. Storage Software
D. Storage Hardware
Answer: BCD

NO.72 Which of the following statements about RAID 10 are correct? (Multiple Choice)
A. RAID 10 applies to scenarios with demanding requirements for speed and fault tolerance.
B. RAID 10 requires at least four member disks.
C. In RAID 10, if two member disks in the RAID 1 group fail, data read proceeds normally.
D. Data is mirrored and then striped in RAID 10.
Answer: ABD

NO.73 Statement 1: VMware and XEN are examples of server virtualization applications.
Statement 2: Amazon S3 and Microsoft Azure are examples of a PaaS implementation.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.74 Which of the following is NOT true for a tape library?


A. Should be in the same datacenter as the production data for easy restores.
B. Can be a disk based Virtual tape library.
C. Ideally allows remote connections using FC and/or iSCSI.
D. Backup software will allow multiple backup jobs to run simultaneously.
Answer: A

14
IT Certification Guaranteed, The Easy Way!

NO.75 What are components of an ICT infrastructure? (Multiple Choice)


A. Hosts and Servers
B. Software
C. Network switches
D. Backup Devices
Answer: ACD

NO.76 Which of the following operating systems supports the CIFS protocol natively?
A. Win7
B. Solaris
C. FreeBSD
D. AIX
Answer: A

NO.77 Big Data refers to the process of collecting, processing and analyzing vast amount of data and
information to gain valuable insights.
A. TRUE
B. FALSE
Answer: A

NO.78 Which of the following is not a port type defined by Fibre Channel?
A. E-Port
B. F-Port
C. G-Port
D. NL-Port
Answer: D

NO.79 In HUAWEI OceanStor V3, what statement is true about SmartThin LUNs?
A. Space will be reclaimed in all Windows operating systems when data is deleted in the OS.
B. A Thin LUN cannot be converted into a Thick LUN.
C. SmartThin must be enabled on all LUNs of a storage pool.
D. SmartThin LUNs consume just a little storage capacity at the time they are created.
Answer: D

NO.80 In a SCSI connection, it is responsible to send SCSI commands to the target.


Which of the following fits the above description?
A. Target.
B. Initiator.
C. LUN.
D. Storage.
Answer: B

15
IT Certification Guaranteed, The Easy Way!

NO.81 Which of the following statements are characteristics of pre-copy technology? (Multiple
Choice)
A. Migrates data from a suspected faulty disk to a hot spare disk immediately after the error count of
the suspected faulty disk exceeds the preset threshold.
B. Reduces the occurrence of reconstruction.
C. Improves system reliability.
D. Reduces system performance.
Answer: ABC

NO.82 Which of the following is the common physical size division of the surface of the hard disk?
(Multiple Choice)
A. Track.
B. Sector.
C. Cylinder.
D. Partition.
Answer: ABC

NO.83 The failure of an SSD is more predictable than that of other disk technologies.
A. TRUE
B. FALSE
Answer: A

NO.84 The central backup question is: How much loss can be tolerated determines how much to
invest in backup?
A. TRUE
B. FALSE
Answer: A

NO.85 Which of the following statements about block virtualization technology for Huawei storage
systems are correct? (Multiple Choice)
A. Data is distributed to all disks, fully leveraging the read/write processing capability of a storage
system.
B. A RAID group is formed in the unit of physical disks.
C. A CKG is the unit used in applying for space, releasing space, and relocating data.
D. Data reconstruction efficiency improves significantly.
Answer: AD

NO.86 It is an electronic device controlled by a motor that moves the hard drive head arm.
Which of the following component fits the above description?
A. Actuator.
B. Spindle.
C. Platter.
D. Motor.

16
IT Certification Guaranteed, The Easy Way!

Answer: A

NO.87 A zone in a FC switch determines which ports of the FC switch can be connected together.
A. TRUE
B. FALSE
Answer: A

NO.88 Select which of the following which is not a properties of Distributed Object Storage
Architecture.
A. Automatic load balancing.
B. Online expansion.
C. Global namespace.
D. Centralized nodes.
Answer: D

NO.89 Statement 1: The retention period determines how many times per day a backup must be
made.
Statement 2: Incremental backups take a lot of time to complete.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: D

NO.90 When does data become information?


A. When it has been stored in the right file format.
B. When it has been stored in a digital form.
C. When the company understands the data and learns from it.
D. All of the above.
Answer: C

NO.91 You are the storage administrator of a media company that stores a lot of media files such as
videos. You are asked to propose a proper storage architecture for a new storage system that stores
all the video and graphic files of the company. The requirement is that it could run on commodity
hardware in a distributed manner for unstructured data. Choose which one of the following
architecture would be the better option.
A. Block Storage Architecture.
B. Clustered NAS Storage Architecture.
C. Distributed Storage Architecture.
D. Distributed Object Storage Architecture.
Answer: D

NO.92 When the RTO is 10 minutes the traditional Tape Backup method cannot be used.

17
IT Certification Guaranteed, The Easy Way!

A. TRUE
B. FALSE
Answer: A

NO.93 Which of the following are correct steps in a LAN based backup job? (Multiple Choice)
A. Agent on application server sends data to the backup device.
B. Agent on application server sends data to backup media server.
C. Backup media server sends data to the backup device.
D. Backup server sends a "start-backup" command to the backup device.
Answer: BC

NO.94 Huawei OceanStor V3 series storage system hardware includes controller enclosures and disk
enclosures.
Which of the following statements about controller enclosures are correct? (Multiple Choice)
A. A controller enclosure does not have disks. Disks are installed in disk enclosures.
B. A controller enclosure consists of controller modules, fan, BBU modules, power modules and/or
interface modules.
C. A controller enclosure is the core of a storage system.
D. A controller enclosure processes storage services and manages the disk enclosures connected to
it.
Answer: BCD

NO.95 Which of the following disk interface technologies use serial interface technology? (Multiple
Choice)
A. ATA
B. SATA
C. SAS
D. IDE
Answer: BCD

NO.96 HyperReplication for HUAWEI OceanStor V3 can use FC links between the data centers. iSCSI
links are not supported.
A. TRUE
B. FALSE
Answer: B

NO.97 Which of the following is not a component of a backup system?


A. Backup software
B. Backup media
C. Backup server
D. Backup policy
Answer: D

18
IT Certification Guaranteed, The Easy Way!

NO.98 Statement 1: Virtual Tape libraries allow for a highly scaleable backup strategy as storage can
be added later.
Statement 2: Virtual Tape Libraries should be used when remote datacenters are NOT available.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.99 Which of the following storage devices are non volatile? (Multiple Choice)
A. RAM
B. Hard Disk
C. Magnetic Tape
D. DVD
Answer: BCD

NO.100 Match the operating system with the protocol.


The operating systems include:
1. Windows
2. Linux
3. Apple OSX;
The protocols incude:
A - NFS
B - CIFS
C - SMB
A. 1 - A; 2 - C; 3 - A.
B. 1 - B+C; 2 - A; 3 - A.
C. 1 - A+D; 2 - A+B; 3 - A.
D. 1 - C; 2 - A+D; 3 - A.
Answer: B

NO.101 The restore time objective (RTO) specifies the time needed to recover the data and servers
after after a disaster has occured.
A. TRUE
B. FALSE
Answer: B

NO.102 Select the correct statements about the structure and functions of the hard disk
components. (Multiple Choice)
A. Disk platter is responsible of storing data in binary form.
B. The actuator is responsible of moving the Read/Write arm.
C. The spindle is responsible for sending commands to the disk head.
D. The disk connector is responsible of connection and rotation of the platter.
Answer: AB

19
IT Certification Guaranteed, The Easy Way!

NO.103 Statement 1: Fiber optic cables must be bended with a minimum radius of 10 centimeters.
Statement 2: Bends and dirt causes the light signal to be weaker and the sensor cannot detect the
light pulse then.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: C

NO.104 Which of the following are existing Solid State Disk types? (Multiple Choice)
A. DLC
B. eMLC
C. TLC
D. SLC
Answer: BCD

NO.105 Which of the following allows direct physical access to end users?
A. Network Switch.
B. Storage Array.
C. Backup System.
D. Clients.
Answer: D

NO.106 What is not a deciding parameter for Information LifeCycle Management?


A. How long data should be kept.
B. The amount of data.
C. The format in which the data must be kept.
D. What to do with data that is no longer required.
Answer: B

NO.107 Which of the following are attached to the storage system serially? (Multiple Choice)
A. ATA Drive.
B. SAS Drive.
C. NL-SAS Drive.
D. IDE Drive.
Answer: BC

NO.108 Which are characteristics of the HUAWEI OceanStor V3 hardware? (Multiple Choice)
A. SAN and NAS convergence
B. SSD and HDD convergence
C. No need for heterogeneous convergence anymore
D. Primary and Backup convergence

20
IT Certification Guaranteed, The Easy Way!

Answer: ABD

NO.109 The recovery point objective (RPO) is used to identify how much time lies between two
backups.
A. TRUE
B. FALSE
Answer: A

NO.110 Storage cache can optimize the speed of the storage system.
A. TRUE
B. FALSE
Answer: A

NO.111 Connecting an OceanStor 5300 V3 to three disk enclosures requires....... SAS cables.
A. 3
B. 6
C. 9
D. 12
Answer: B

NO.112 Statement 1: We have a a RAIDS protected group of disks. The protection level increases if
we add more disks to the group.
Statement 2: With a RAID 10 set the number of disks must be greater than 8 to always survive a dual
disk failure.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D

NO.113 For all operating systems there is a specific version of Huawei Ultra Path multipathing
software.
A. TRUE
B. FALSE
Answer: B

NO.114 What is the main difference between mechanical drives such as SAS with solid state drives
(SSD)?
A. The presence of mechanical parts.
B. The performance of the hard drive.
C. The capacity of hard drive.
D. The lifespan of hard drive.
Answer: A

21
IT Certification Guaranteed, The Easy Way!

NO.115 In an ICT infrastructure the servers can run different operating systems like Windows, Linux,
AIX.
A. TRUE
B. FALSE
Answer: A

NO.116 A user is having intermittent problems connecting to their shared network storage. A
network technician is able to determine that there is a problem within the network cabling in
between the workstation and the switch. All other users are able to connect successfully to the
network.
Which of the following is the MOST likely cause?
A. Patch cable is a crossover cable instead of straight-through.
B. Cable has been cut somewhere within the wall.
C. Crosstalk and interference are occurring.
D. Cable is not connected at the patch panel.
Answer: C

NO.117 Statement 1: FCoE is preferred over iSCSI because it uses fiber optic cables that can be much
longer than Ethernet cables.
Statement 2: FCoE is preferred over iSCSI because we do not need any Ethernet switches anymore.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D

NO.118 Statement 1: Creating an incremental backup is faster than creating a differential backup.
Statement 2: Restoring from an incremental backup is faster than from a differential backup.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.119 Grid storage employs the combination of large scale serial distributed storage to provide
even distribution of storage across all nodes.
A. TRUE
B. FALSE
Answer: B

NO.120 After the Ultra Path is installed on an application server, its operating system can
automatically identify the disks mapped from a storage device without being restarted.
A. TRUE
B. FALSE

22
IT Certification Guaranteed, The Easy Way!

Answer: B

NO.121 Because of the addition of the Data Center Bridging technology, today iSCSI is, just as FC, a
lossless protocol.
A. TRUE
B. FALSE
Answer: A

NO.122 A traditional RAID 10 set always has an even number of disks.


A. TRUE
B. FALSE
Answer: A

NO.123 Which of the following is true about NAS? (Multiple Choice)


A. Offers a uniform way to access files over an network.
B. Traffic between the NAS device and the workstation should be separated from traffic from the
workstation and the internet.
C. NAS storage capacity is dedicated to the NAS device.
D. NAS storage capacity can be block based storage.
Answer: ABC

NO.124 Storage controllers are only connected to disk enclosures within the SAN network.
A. TRUE
B. FALSE
Answer: B

NO.125 Select the correct statements that describes the properties of Distributed Storage
Architecture. (Multiple Choice)
A. The storage nodes are centralized.
B. The storage nodes are non centralized.
C. Concurrent I/O access.
D. Non concurrent I/O access.
Answer: BC

NO.126 Which of the following would best describe a virus?


A. When an employee goes against the company's ICT code of practice e.g. leaving workstation
logged on.
B. A piece of malicious code that is written by programmers and is used to corrupt data and systems.
C. When individuals or organizations break the law through using computers illegally access a
computer system.
D. Misuse of information provided by ICT systems for personal or malicious intentions.
Answer: B

NO.127 Which of the following statements is incorrect?

23
IT Certification Guaranteed, The Easy Way!

A. A RAID group is like a physical volume that consists of multiple disks.


B. One logical volume can be created on a physical volume.
C. Multiple logical volumes can be created on a physical volume.
D. A LUN can reside on multiple RAID groups.
Answer: D

NO.128 Which of the following statements about HUAWEI OceanStor V3 SmartTier dynamic storage
tiering technology is NOT true?
A. The SmartTier calculates and analyzes the activity level of data.
B. The SmartTier automatically and dynamically matches data from different activity levels with
storage media of different characteristics.
C. The SmartTier data relocation activities are based on configured policies.
D. Data statistics, analysis, and relocation activities of the SmartTier affect service continuity and
data availability.
Answer: D

NO.129 Which of the following is not involved in the SCSI Protocol Addressing?
A. Host ID.
B. BUS ID.
C. Device ID.
D. LUN ID.
Answer: A

NO.130 The maintenance network port is used, by the DeviceManager, for daily management.
A. TRUE
B. FALSE
Answer: B

NO.131 Given this scenario. A company wants replication of data between two data centers that are
2000 km apart.
Which replication method is most recommended?
A. Asynchronous
B. Synchronous
C. Both Asynchronous and Synchronous will work.
D. Synchronous but ONLY if the link is a high speed 8 Gb/s fiber optical connection.
Answer: A

NO.132 When a RAID configuration is in a degraded state it means that no data has been lost yet.
A. TRUE
B. FALSE
Answer: A

NO.133 Select the statements that are correct about the functions of network devices. (Multiple

24
IT Certification Guaranteed, The Easy Way!

Choice)
A. Routers do not separate the network into different broadcast domains.
B. Routers do not forward the broadcast frames in the network.
C. LAN switches place each port into a separate collision domain.
D. Hubs allow the separation of collision domains.
Answer: BC

NO.134 Cloud technology refers to the process of migrating all the local servers to an external online
datacenter for data protection purposes.
A. TRUE
B. FALSE
Answer: B

NO.135 Situation: Disk Domain A has 40 disks, Disk Domain B has 20 disks. True or False: the rebuild
time for a failed disk in Disk Domain B is longer than for a failed disk in Disk Domain A.
A. TRUE
B. FALSE
Answer: A

NO.136 Which of the following statements about the differences between DAS and SAN is incorrect
?
A. SAN uses the Fibre Channel or iSCSI protocol and therefore offers better scalability.
B. DAS and SAN are both external storage and can achieve storage resource sharing easily.
C. DAS applies to small and medium LANs that have general storage capacity requirements and only a
small number of servers.
D. SAN applies to mid-range and high-end storage application environments such as key databases,
centralized storage, mass storage, backup, and disaster recovery.
Answer: B

NO.137 Statement 1: Synchronous replication is often possible over distances of more than 100 km.
Statement 2: Asynchronous replication must be used when the host has a file system that is Linux
based.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: D

NO.138 What is effect of having foreign dust particles within the disk drives?
A. No effect as the disk has automatic surface cleaning.
B. It reduces the magnetic effect of the platter causing the disk to slow down.
C. Data may not be able to be written onto the platter.
D. The dust particle will change the content of data stored on the platter.

25
IT Certification Guaranteed, The Easy Way!

Answer: C

NO.139 What is a storage array?


A. A system that handles the communication of data from end users to its storage location and
provide confirmation on successful storage.
B. A system that manages the network functions and carries the data traffic from host to storage.
C. A system that has the management software that can provide access to its sets of hard drives or
tape libraries for the purpose of data access and storage.
D. A system that handles the interconnection of hosts to disks drives and allows hosts to directly
access the disks and use it as local drives.
Answer: C

NO.140 Statement 1: The higher the number used to indicate the RAID level, the higher the
overhead Statement 2: RAID 10 stripes the data, then mirrors the stripe set.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D

NO.141 What is NOT a parameter used to identify a hard disk?


A. Block size
B. Bandwidth
C. Rotations per minute
D. Latency
Answer: B

NO.142 Which of the following statements about SAS is false?


A. SAS is a point-to-point, full-duplex, and dual-port interface.
B. SAS drivers are incompatible with SATA controllers.
C. SAS features high performance and high reliability compared with SCSI.
D. SAS offers powerful scalability compared to SATA.
Answer: B

NO.143 An intelligent backup strategy involves multiple backup policies on the same production
data i.e. with different retention periods and different schedules.
A. TRUE
B. FALSE
Answer: A

NO.144 Which of the following is the end that receives and processes the SCSI commands?
A. LUN.
B. Storage.

26
IT Certification Guaranteed, The Easy Way!

C. Target.
D. Initiator.
Answer: C

NO.145 Which command is used to query the version of a Red Hat Linux 5 operating system?
A. show version
B. find version
C. cat version
D. uname -a
Answer: D

NO.146 When the RPO is minutes instead of hours the best backup method is traditional Tape
backup.
A. TRUE
B. FALSE
Answer: B

NO.147 Application program interface (API) is a set of routines, protocols, and tools for building
software applications.
A. TRUE
B. FALSE
Answer: A

NO.148 What is included in every backup job? (Multiple Choice)


A. Cost of Downtime.
B. Retention period.
C. Application that uses the data.
D. Backup type (full, incremental, differential).
Answer: BD

NO.149 What applies to unstructured data? (Multiple Choice)


A. After being written, the data is not often modified.
B. Uncertain value.
C. Large capacity, rapid growth.
D. Long-term storage required.
Answer: ABCD

NO.150 Which of the following statements about switched fabric topology in Fibre Channel SANs is
NOT true?
A. It is the most widely used topology that supports a maximum of 127 devices.
B. Multiple pairs of nodes connecting to switches can communicate simultaneously.
C. The fault of one node in a zone does not affect services on nodes in other zones.
D. The switches leverage zoning to manage network structure and provide the best interconnection

27
IT Certification Guaranteed, The Easy Way!

form.
Answer: A

NO.151 The mount command is used in Linux-based clients to connect the client to the NFS share.
A. TRUE
B. FALSE
Answer: A

NO.152 Statement 1: NAS solutions are always file based.


Statement 2: NAS solutions are mostly limited in distance because Ethernet cables are used.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: A

NO.153 If a disk domain has multiple disk types then the storage pools in that disk domain also
MUST have multiple disk types in them.
A. TRUE
B. FALSE
Answer: B

NO.154 Which of the following statements about LAN-based backup is incorrect?


A. Instruction flows are transmitted over the LAN whereas data flows are not.
B. The backup agent affects the performance of application servers.
C. Backup data is based on LANs, affecting network performance.
D. Backup jobs must be separately maintained, complicating management and maintenance.
Answer: A

NO.155 Which of the following are deployment modes of cloud computing? (Multiple Choice)
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. E-Government cloud
Answer: ABC

NO.156 SAN is a storage architecture that connects storage device and application servers through
network.
A. TRUE
B. FALSE
Answer: A

NO.157 Currently all OceanStor V3 devices support SAS at 12 Gb/s.


A. TRUE

28
IT Certification Guaranteed, The Easy Way!

B. FALSE
Answer: A

NO.158 Which of the following is an example of unstructured data? (Multiple Choice)


A. Images
B. SQL Databases
C. NoSQL Databases
D. Video
Answer: AD

NO.159 Statement 1: An ICT infrastructure should be built with high end equipment and be located
in one site.
Statement 2: A server is a rackmounted enterprise version of a desktop computer and typically has
more than one hard disk installed.
A. Statement 1 and Statement 2 are both True.
B. Statement 1 is True; Statement 2 is False.
C. Statement 1 is False; Statement 2 is True.
D. Stament 1 and Statement 2 are both False.
Answer: C

NO.160 Which of the following methods provides the best RTO?


A. Disk-To-Tape
B. Disk-To-Disk-To-Tape
C. Replication
D. Virtual Tape Library
Answer: C

NO.161 Which of the following is NOT the characteristics of the active-active mode of a storage
controller?
A. Two controllers process the I/O requests from application servers concurrently.
B. If a controller becomes faulty, the other takes over the work of the faulty controller without
disrupting ongoing services.
C. The primary controller processes the I/O requests from application servers and the secondary
controller is in the idle state.
D. The active-active mode achieves load balancing, full utilization of resources, and system
performance improvement.
Answer: C

NO.162 Depending on the amount of data to be backed up, which of the types are actual backup
methods? (Multiple Choice)
A. Real-time backup
B. Full backup
C. Incremental backup

29
IT Certification Guaranteed, The Easy Way!

D. Differential backup
Answer: BCD

NO.163 A hybrid cloud is an environment where a public and private cloud solution is used
simultaneously
A. TRUE
B. FALSE
Answer: A

NO.164 Incremental backup requires the last full backup and each incremental backup to fully
restore data. Data reconstruction is therefore slower compared with full backups.
A. TRUE
B. FALSE
Answer: A

NO.165 In a good Disaster Recovery Plan there are no single points of failure, not even with any
single person.
A. TRUE
B. FALSE
Answer: A

NO.166 Statement 1: Multimode optic cables are usually longer than single mode cables.
Statement 2: Sharp cable bends lead to weaker signal at the end of the cable.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: C

NO.167 Which of the following statements about the coffer disks of the HUAWEI V3 series storage
systems are correct? (Multiple Choice)
A. Coffer disks store cache data to prevent data loss after a power failure.
B. BBUs supply power to cache and coffer disks in the event of unexpected power failure.
C. Coffer disks cannot be used to save service data.
D. The first 2 disks in a controller enclosure are coffer disks.
Answer: AB

NO.168 You need to manually set free disks as hot spare disks in a Huawei OceanStor V3 storage
system when you use RAID 2.0+.
A. TRUE
B. FALSE
Answer: B

NO.169 In a RAID 5 group comprised of three disks, if 10110110 and 11010011 are written to the

30
IT Certification Guaranteed, The Easy Way!

same stripe on the two data disks, respectively, 01100101 is calculated using the XOR function and
then written to the parity disk.
A. TRUE
B. FALSE
Answer: A

NO.170 SmartThin provided by HUAWEI OceanStor V3 storage systems is a technology that manages
storage space by allocating storage resources on demand. Based on virtualization, SmartThin reduces
physical storage resources to be deployed, maximizing storage space use efficiency.
A. TRUE
B. FALSE
Answer: A

NO.171 Which is NOT the limitation of DAS, compared with SAN?


A. Poor scalability
B. Large investment
C. Difficult resource sharing
D. Decentralized management
Answer: B

NO.172 Which of the following best describes SDN?


A. Using a software program to manage your network.
B. The virtualization of network services to achieve better efficiency and scalability.
C. Decoupling of the data plane and control plane in networks.
D. Using hardware to manage the network.
Answer: C

NO.173 HUAWEI OceanStor V3 SmartTier can be used to position files to be on specific disk drive
types.
A. TRUE
B. FALSE
Answer: A

NO.174 Based on the new industrial revolution, what are the changes in the trend of ICT? (Multiple
Choice)
A. ICT trend is changing slowly with little significant changes.
B. The initial phases of ICT focuses on office automation but slowly changed towards changing
business flows.
C. ICT is slowly being replaced by other new technologies such as IT and CT.
D. ICT has become the core in the production systems in the recent yeans.
Answer: BD

NO.175 Which of the following statements about LAN-free backup is incorrect?

31
IT Certification Guaranteed, The Easy Way!

A. Backup data flows do not consume LAN resources.


B. The backup agent does not affect the performance of application servers.
C. Backup performance is improved compared to LAN- based backups.
D. Network performance is not affected.
Answer: B

NO.176 Which of the following statements about Disaster Recovery is NOT true?
A. Some data loss must be accepted.
B. After a disaster access to the data, on the remote site, can be immediate.
C. Applications to work with the recovered data is in place.
D. There are still traditional backup strategies in place.
Answer: A

NO.177 Statement 1: Port zoning is preferred for zoning a FC switch when there are a lot of changes
to the patch points.
Statement 2: Alias zoning is a user friendly version of soft zoning.
A. Statement 1 and 2 are true
B. Statement 1 is true; Statement 2 is false
C. Statement 1 is false; Statement 2 is true
D. Statement 1 and 2 are false
Answer: C

NO.178 Which of the following disks has the best performance in terms of speed?
A. NL-SAS
B. SAS
C. SSD
D. SATA
Answer: C

NO.179 It is the interconnection via the Internet of computing devices embedded in everyday
objects, which enables them to send and receive data.
Which of the following fits the statement above?
A. Cloud.
B. Big Data.
C. Social Media.
D. Internet Of Things.
Answer: D

NO.180 The storage controller can only provide processing and caching functions.
A. TRUE
B. FALSE
Answer: B

32
IT Certification Guaranteed, The Easy Way!

NO.181 Dual-switch networking is widely applied in Fibre Channel SANs.


Which of the following are its characteristics? (Multiple Choice)
A. Two Fibre Channel switches are deployed in a SAN for connecting to the two controllers of a
storage device.
B. Per host two fibre channel ports should be available. The two Fibre Channel ports connect to two
Fibre Channel switches.
C. The ports on the two Fibre Channel switches connecting to the hosts and storage device must
reside in the same zone.
D. As multiple paths exist, the dual switch networking mode supports link redundancy but does not
support load balancing.
Answer: ABC

NO.182 In HUAWEI OceanStor V3, for synchronous replication to be successful, all host applications
must be pauzed during the replication update process.
A. TRUE
B. FALSE
Answer: B

NO.183 It is a hard-disk failure that occurs when a read-write head of a hard disk drive comes in
contact with its rotating platter, resulting in permanent and usually irreparable damage to the
magnetic media on the platter surface.
Which of the following fits the above description?
A. Electrical Failure.
B. Bad Platter Area.
C. Bad Sector.
D. Head Crash.
Answer: D

NO.184 If no data migration plan is set, with SmartTier enabled, there will be no data movement at
all between tiers.
[Link]
[Link]
Answer: A

NO.185 Which of the following is not a characteristic of the Cloud?


A. Ubiquitous Access.
B. Shared pool of configurable resources.
C. On Demand Self Service.
D. Quick analysis of vast amount of data.
Answer: D

NO.186 Which is the correct formation order of the following elements in RAID 2.0+?
A. LUN -> CK -> CKG -> Extent -> LD

33
IT Certification Guaranteed, The Easy Way!

B. LD -> CKG -> CK -> Extent -> LUN


C. LD -> CK -> CKG -> Extent -> LUN
D. LD -> Extent -> CKG -> CK -> LUN
Answer: C

NO.187 The HyperSnap functionality can be used to improve or optimize a company's backup
strategy.
A. TRUE
B. FALSE
Answer: A

NO.188 It is a device which manages the physical disk drives and presents them to the users as
logical units.
Which of the following device fits the above description?
A. Host.
B. Storage NIC.
C. Storage Controller.
D. Storage Cache.
Answer: C

NO.189 In a Red Hat Linux 5 operating system, which command is used to mount the sdb5 in the dev
directory to the sdb5 in the mnt directory?
A. cat /dev/sdb5 /mnt/sdb5
B. In /dev/sdb5 /mnt/sdb5
C. mount /dev/sdb5 /mnt/sdb5
D. df /dev/sdb5/mnt/sdb5
Answer: C

NO.190 In HUAWEI OceanStor V3, HyperSnap of a LUN uses the Copy On Write method to keep
track of changes blocks
A. TRUE
B. FALSE
Answer: A

NO.191 In Windows 2012 deleting data from a volume, based on a Thin LUN, means that NO storage
space will be reclaimed by the HUAWEI OceanStor V3.
A. TRUE
B. FALSE
Answer: B

NO.192 Which one of the following component is responsible for rotating the disk platter in the disk
drive?
A. Spindle.

34
IT Certification Guaranteed, The Easy Way!

B. Actuator.
C. Control Circuit Board.
D. Read/Write Arm.
Answer: A

NO.193 Multipathing software is only needed in SAN solutions with just a single switch.
A. TRUE
B. FALSE
Answer: B

NO.194 When determining hard disk performance, which of the following are relevant. (Multiple
Choice)
A. Rotational speed.
B. Seek time.
C. Transfer time.
D. Transfer rate.
Answer: ABD

NO.195 Many companies gather so much data that they cannot extract the right information from
the data.
A. TRUE
B. FALSE
Answer: A

NO.196 Which of the following statements are true for a NAS solution? (Multiple Choice)
A. Cable length is around 10 m.
B. Block size is configurable.
C. CIFS and NFS are both commonly used protocols.
D. NAS clients are connected to the NAS server using Ethernet switches.
Answer: CD

NO.197 Storage controllers can be separated from the chassis of disk enclosures. It does not need to
be integrated in design with the disk enclosures.
A. TRUE
B. FALSE
Answer: A

NO.198 Which of the following are the supported data storage architecture of modern storage
array? (Multiple Choice)
A. File Storage.
B. Object Storage.
C. Block Storage.
D. Fusion Storage.

35
IT Certification Guaranteed, The Easy Way!

Answer: ABC

NO.199 Data is the record that reflects the attributes of objective things and is the physical
manifestation of information.
A. TRUE
B. FALSE
Answer: A

NO.200 What are the main considerations when you are buying HDDs? (Multiple Choice)
A. Capacity
B. Rotational speed
C. Average access time
D. Sector size
Answer: ABC

NO.201 Statement 1: RAID 2.0+ offers better protection against data loss than traditional RAID and
it performs much better.
Statement 2: To rebuild a RAID 2.0+ protected failed drive takes a lot of time as all drives are involved
in the rebuild of the spare disk.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: B

NO.202 Which of the following occurs after muItipathing software is installed on a host?
(Multiple Choice)
A. Maps a LUN to the host.
B. Avoids logical errors from occurring in the operating system as a result of multiple reachable paths
to the same LUN.
C. Improves link reliability and prevents the failure of a single link from causing a system failure.
D. Sets up connection between a storage device and the host.
Answer: BC

NO.203 The components of a storage device are redundant, including controller modules,
management modules, BBU modules, interface modules, power modules, and fan modules.
Component redundancy ensures system reliability.
A. TRUE
B. FALSE
Answer: A

NO.204 Using SmartThin gives extra responsibility for the SAN administrator because there is a risk
of over-provisioning storage capacity.
A. TRUE

36
IT Certification Guaranteed, The Easy Way!

B. FALSE
Answer: A

NO.205 A customer needs zoning configured in a Fibre Channel switch. The customer frequently
changes the patch points in the infrastructure.
What zoning method is preferred then?
A. Port zoning because it is more flexible when it comes to changing patch points.
B. Soft zoning because it is more flexible when it comes to changing patch points
C. Port zoning and Soft zoning should always be used together.
D. Zoning is not required in a FC SAN.
Answer: B

NO.206 What is required to add additional controllers to an existing HUAWEI OceanStor V3 system?
A. SAS cabling
B. Smart I/O card
C. 56 Gb Infiniband module
D. FC or iSCSI Host Bus Adapter
Answer: B

NO.207 Which module is not in the disk enclosure of a storage device?


A. Fan module
B. Power module
C. Expansion module
D. BBU module
Answer: D

NO.208 Which of the following is NOT a benefit of cloud datacenters?


A. Mainframe servers improve performance.
B. Virtualization technology improves resource utilization.
C. Distributed computing and storage improve reliability.
D. Unified resource management improves efficiency.
Answer: A

NO.209 Statement 1: Disaster Recovery plans eliminate the need for backups on tape or disk.
Statement 2: With the design of the DR plan one should always assume the worst possible scenario.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: C

NO.210 Which of the following statements about pre-copy is incorrect?


A. Pre-copy is the process of copying data from a failing member disk to a hot spare disk.

37
IT Certification Guaranteed, The Easy Way!

B. Data to be pre-copied must be reconstructed and calculated.


C. Pre-copy greatly reduces the risk of data loss.
D. Pre-copy requires hot spare disks.
Answer: B

NO.211 Which of the following system model is a direct representation of the SCSI connection
between the SCSI Initiator and Target?
A. Serverless Architecture.
B. Peer to Peer Architecture.
C. Browser/Client Architecture.
D. Client/Server Architecture.
Answer: D

NO.212 A differential backup holds all changes that were made since the last successful full backup.
A. TRUE
B. FALSE
Answer: A

NO.213 Which of the following dimensions are often used to express the data used in Big Data
scenarios? (Multiple Choice)
A. Variety
B. Volume
C. Velocity
D. Verticality
Answer: ABC

NO.214 Which of the following statements about RAID 5 are correct? (Multiple Choice)
A. RAID 5 has fixed parity disks.
B. RAID 5 uses the XOR algorithm for parity.
C. RAID 5 writes data by stripes.
D. RAID 5 tolerates the failure of a maximum of two member disks without losing data.
Answer: BC

NO.215 Which of the following statements is true? (Multiple Choice)


A. A SAS disk generally has more IOPS than a SATA disk.
B. only SLC SSD are used in Enterprise level systems.
C. the realized transfer speed of SSD is higher than that of SAS.
D. SSD are cheaper than HDD because they are physically much smaller.
Answer: AC

NO.216 What is the purpose of context for data?


A. Context gives meaning to the data collected. Without context the data is meaningless.
B. Context gives comparison between data and information.

38
IT Certification Guaranteed, The Easy Way!

C. Context is only found in data and not in information.


D. Context is optional when collecting and analyzing data.
Answer: A

NO.217 CIF5 can be run on UDP as well as on TCP


A. TRUE
B. FALSE
Answer: B

NO.218 Lifecycle Management Of Information and Data consists of 5 different stages.


Which of the following is the second stage?
A. Maintenance.
B. Transmission.
C. Generation.
D. Usage.
Answer: B

NO.219 Statement 1: If possible it is always advised to make only Full Backups Statement 2: LAN free
backups typically run slower than LAN based backups.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.220 Synchronous replication in OceanStor V3 devices is based on the snapshot technology.


A. TRUE
B. FALSE
Answer: B

NO.221 Which of the following technologies are able to quickly obtain valuable information from a
variety of data types in a short period of time from a collection of vast amounts of data?
A. Cloud.
B. Big Data.
C. Social Media.
D. Internet Of Things.
Answer: B

NO.222 Host is a computing system consisting of hard drives or file system that can provide data
access and storage.
A. TRUE
B. FALSE
Answer: A

39
IT Certification Guaranteed, The Easy Way!

NO.223 What is the main difference between desktop grade hard drives with enterprise grade hard
drives which is the deciding factor in hard drive usage?
A. The presence of mechanical parts.
B. The performance of the hard drive.
C. The capacity of hard drive.
D. The lifespan of hard drive.
Answer: B

NO.224 Which of the following statements is NOT true? (Multiple Choice)


A. CIFS is a network-based sharing protocol. It has high demands on network transmission reliability,
so it usually uses TCP/IP.
B. One disadvantage of CIFS is that Windows clients must be equipped with dedicated software.
C. NFS is a stateless protocol while CIFS is a stateful protocol. NF5 can be automatically recovered
from a fault while CIFS cannot
D. Both the CIF5 as well as the NFS protocol requires file format conversion.
Answer: BD

NO.225 Which of the following statements about RAID technology are correct? (Multiple Choice)
A. Disks are striped for storing data blocks, shortening the mechanical seek time and accelerating
data access.
B. Several disks in an array are accessed simultaneously (parallel access), shortening the mechanical
seek time and accelerating data access.
C. Current RAID technology only uses the parity check mechanism to protect data.
D. Performance of all RAID levels increases with the number of member disks.
Answer: AB

NO.226 What does the term RPO mean?


A. Return Purchase Order
B. Recover Plan Objective
C. Restore Point Objective
D. Recovery Point Objective
Answer: D

NO.227 Which of the following is NOT a port name in Fibre Channel.


A. FL_Port
B. E_Port
C. TX_Port
D. U_Port
Answer: C

NO.228 In high end storage systems, what is the main function of the service processor?
A. To manage the I/O commands and complete disk operations.
B. To process the network service.

40
IT Certification Guaranteed, The Easy Way!

C. To maintain the interconnection of disk drives within the enclosures.


D. To optimize the speed of I/O operations.
Answer: A

NO.229 HyperSnap for Block is based on Redirect-On-Write.


A. TRUE
B. FALSE
Answer: B

NO.230 Statement 1: A Solid State Disk drive can withstand strong vibrations.
Statement 2: A Solid State Disk drive has only a few mechanical parts.
A. Statement 1 and 2 are true
B. Statement 1 is true; Statement 2 is false
C. Statement 1 is false; Statement 2 is true
D. Statement 1 and 2 are false
Answer: B

NO.231 Which of the following is the correct procedure for configuring a HUAWEI OceanStor V3
storage system?
A. Creating a Storage pool -> Creating a LUN -> Adding a mapping.
B. Creating a Storage pool -> Adding a mapping -> Creating a LUN.
C. Creating a LUN -> Creating a Storage pool -> Adding a mapping.
D. Creating a LUN -> Adding a mapping -> Creating a Storage pool.
Answer: A

NO.232 Each organization independently determines which data should be stored and for how long.
A. TRUE
B. FALSE
Answer: B

NO.233 Statement 1: Multipathing is caused by adding redundant hardware.


Statement 2: Huawei offers a different version of Ultra Path for different operating systems.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: A

NO.234 Statement 1: A disk drive with a high latency performs better than a disk drive with a low
latency.
Statement 2: A smaller seek time means that the disk performs better.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.

41
IT Certification Guaranteed, The Easy Way!

C. Statement 1 is false; Statement 2 is true.


D. Statement 1 and 2 are false.
Answer: C

NO.235 When using LAN-based backups it is best to create a dedicated backup network.
A. TRUE
B. FALSE
Answer: A

NO.236 In which stage of the lifecycle management of information and data, does the data
management operation such as copying and backup occurs?
A. Generation.
B. Transmission.
C. Maintenance.
D. Usage.
Answer: C

NO.237 In storage systems, what does throughput refers to?


A. Amount of data that can be received and written to the storage medium in a period of time.
B. Amount of data that can be transmitted and received over network in a period of time.
C. Amount of signals that can be sent or received by processors in a period of time.
D. Amount of calculations that can be processed in a period of time.
Answer: A

NO.238 Clustered NAS can provide concurrent multi-node access of data to hosts.
A. TRUE
B. FALSE
Answer: A

NO.239 IP SAN uses underlying optical networks to connect servers and storage systems.
A. TRUE
B. FALSE
Answer: B

NO.240 What is typical for a DAS solution? (Multiple Choice)


A. More scaleable in capacity than a SAN solution
B. Consists of a server/host with its locally connected disk drives
C. Sharing of files between DAS solutions is possible via the network.
D. Backups are centrally made on a special backup server.
Answer: BD

NO.241 About HUAWEI OceanStor V3, the following 2 statements:


Statement 1: With the SmartTier feature the SSD disks are in the Performance Tier.

42
IT Certification Guaranteed, The Easy Way!

Statement 2: No more than 3 tiers can exist in the OceanStor V3 storage arrays.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: C

43
HCIA-AI (Artificial Intelligence)
48. Python regular expressions are a special sequence of characters that makes it easy to check if
a string matches a pattern

A. True (Right Answers)


B. False

Answer: A

47. Which of the following products is related to artificial intelligence? (Multiple Choice)

A. Alpha Go (Right Answers)


B. Self-driving (Right Answers)
C. Voice input (Right Answers)
D. Huawei Mate mobile phone (Right Answers)

Answer: ABCD

49. What operating systems does Python support'? (Multiple Choice)

A. DOS (Right Answers)


B. Linux (Right Answers)
C. Mac OSX (Right Answers)
D. Windows (Right Answers)

Answer: ABCD

50. Which of the following about the description of the number of rows and columns for the
determinant is correct'?

A. The number of rows is greater than the number of columns


B. The number of rows is equal to the number of columns (Right Answers)
C. The number of rows is less than the number of columns
D. The number of rows has no relationship with the number of columns

Answer: B

43. Machine Learning Service is a data mining and analytics platform service that helps users
quickly discover data patterns and build predictive models through machine learning techniques
and deploy them as predictive analytics solutions

A. True (Right Answers)


B. False Answer: A
44. Which of the following about the description of expectations and variances is incorrect?

A. Expectation reflects the average level of random variable values


B. The variance reflects the degree of deviation between the random vanable and its
mathematical expectation
C. Expectation and variance are both nominal characteristics of random variables
D. The greater the expectation, the smaller the variance (Right Answers)

Answer: D

45. The Python dictionary is widely identified by " {} and the internal data consists of the key
and its corresponding value

A. True (Right Answers)


B. False

Answer: A

46. Which of the following options is not a tensor attribute?

A. Name (Logo)
B. Shape (Dimensionality)
C. Type (Type)
D. Node (Node) (Right Answers)

Answer: D

40. Which of the following conditions is not a condition that n-fold Bernoulli trials need to meet?

A. Each test was repeated under the same conditions


B. There are only two possible outcomes for each trial, i.e. event A occurs and event A does
not occur
C. Each test itself is obeying normal distribution (Right Answers)
D. The results of each tnal are independent of each other

Answer: C

41. The Python language can use multiple statements on the same line, separated by commas

A. True
B. False (Right Answers)

Answer: B
42. Which of the following files is the graph structure of TensorFlow saved in?

A. checkpoint file
B. index file
C. cpkt file
D. metafile (RightAnswers)

Answer: D

37. Which of the following about the dictionary in Python is correct? (Multiple Choice)

A. Each key and its corresponding value need to be separated by (Right Answers)
B. Separate the different key-value with (Right Answers)
C. The entire dictionary is included in the "{} " (Right Answers)
D. The keys of the dictionary are unique and the data type is uniform (Right Answers)

Answer: ABCD

38. The determinant of square matrix A is a scalar

A. True (Right Answers)


B. False

Answer: A

39. Which of the following about the gradient descent is incorrect?

A. Random gradient descent is a commonly used one in gradient descent


B. Gradient descent includes random gradient descent and batch gradient descent
C. The gradient descent algorithm is fast and reliable (Right Answers)
D. Random gradient descent is one of the commonly used optimization algorithms in deep
learning algorithms

Answer: C

34. Which of the following conditions do the randomized trials need to meet? (Multiple Choice)

A. It can be repeated under the same conditions (Right Answers)


B. There may be more than one possible outcome for each trial and all possible
outcomes of the tnal can be clarified in advance (Right Answers)
C. All results of the test cannot be clarified in advance
D. It is not possible to determine which result will appear before conducting a test
(Right Answers)

Answer: ABD
35. In a neural network, knowing the weight and deviations of each neuron is the most important
step if you know the exact weights and deviations of neurons in some way. you can approximate
any function. What is the best way to achieve this?

A. Random assignment, pray that they are correct


B. Search for a combination of weight and deviation until the best value is obtained
C. Assign an initial value to iteratively update weight by checking the difference
between the best value and the initial. (Right Answers)
D. The above is not correct

Answer: C

36. What are the regularizations in deep learning? (Multiple Choice)

A. L1 norm, L2 norm (Right Answers)


B. Data set enhancement (Right Answers)
C. Integration method (Right Answers)
D. Dropout (RightAnswers)

Answer: ABCD

29. Which of the following data types does Tensor Flow not support?

A. int8
B. float32
C. double64 (Right Answers)
D. bool

Answer: C

30. In TensorFlow. data is represented in the form of tensors and calculation charts

A. True
B. False (Right Answers)

Answer: B

31 Python is a fully object-oriented language Which of the following options belong to the
Python object? (Multiple Choice)

A. Function (Right Answers)


B. Module (Right Answers)
C. Number (Right Answers)
D. Character string (Right Answers)

Answer: ABCD
32. Which of the following options belong to Tensor Flow concept? (Multiple Choice)

A. Tensor (Right Answers)


B. Vanables (Right Answers)
C. Placeholder (Right Answers)
D. Operation (Right Answers)
E. Conversation (Right Answers)

Answer: ABCDE

26. Deep learning algorithms can be divided into supervised learning and unsupervised learning

A. True (Right Answers)


B. False

Answer: A

27. The matrix produced by the exchange of matrix A rows and columns is called the transpose
of A What are the correct properties of matrix transposition? (Multiple Choice)

A. (A T) T = A (Right Answers)
B. (A + B) T = AT +BT (Right Answers)
C. (!EA) T = JEAT (Right Answers)
D. (AB) T = A T +BT

Answer: ABC

28. What quotation marks can the Python language use? (Multiple Choice)

A. Single quotes (Right Answers)


B. Double quotes (Right Answers)
C. Three quotes (Right Answers)
D. Four quotes

Answer: ABC

21. The Python list can be identified by " [] ", and the default index of the first element from left
to right is 1

A. True
B. False (Right Answers)

Answer: B
22. What are the core concepts in TensorFlow? (Multiple Choice)

A. Gridding
B. Calculation Chart (Right Answers)
C. Dot Product
D. Tensor (Right Answers)

Answer: BD

23. Which of the following is not included in the recurrent neural network usage scenario?

A. Machine translation
B. Speech recognition
C. Image style migration (Right Answers)
D. Text generation

Answer: C

24. Numerical calculations refer to the method and process of effectively using the digital
computer to solve the approximate problem of mathematical problems, and the discipline
consisting of related Theories. Which of the following processes are involved in solving actual
problems with a computer? (Multiple Choice)

A. Know the actual problem (Right Answers)


B. Mathematical model (Right Answers)
C. Numerical calculation method (Right Answers)
D. Programming (Right Answers)
E. Computer calculation results (Right Answers)

Answer: ABCDE

25. Which of the following is not the difference between Python 2 and Python 3?

A. print
B. Unicode
C. import (Right Answers)
D. xrange

Answer: C
16. What of the following does belong to convolutional neural network (CNN)? (Multiple
Choice)

A. VGGNet (Right Answers)


B. ResNet (Right Answers)
C. AlexNet (Right Answers)
D. GoogleNet (RightAnswers) Answer: ABCD

17. What is wrong description of the normal distribution?

A. In natural phenomena and social phenomena, many random variables obey or


approximate a normal distribution
B. The normal distribution takes the maximum value at the mean
C. The larger the standard deviation, the steeper the normal distribution curve (Right
Answers)
D. The larger the standard deviation, the slower the normal distribution curve

Answer: C

18. Which of the following options is not a reason for traditional machine learning algorithms to
promote the development of deep learning?

A. Dimensional disaster
B. Local invanance and smooth regulanzation
C. Manifold learning
D. Feature Engineering (Right Answers)

Answer: D

19. The commonly used functions for mathematical operations in Python are basically in the
math module and the cmath module

A. True (Right Answers)


B. False

Answer: A

20. What does not belong to supervised learning?

A. Logistic regression
B. Support vector machine
C. Decision tree
D. Principal component analysis (Right Answers)

Answer: D
12. There are many commercial applications for machine learning services What are the main
business scenarios covered? (Multiple Choice)

A. Financial product recommendation (Right Answers)


B. Predictive maintenance (Right Answers)
C. Telecom customer retention (Right Answers)
D. Retailer grouping (Right Answers)

Answer: ABCD

13. What is wrong description of the Python module?

A. The Python module is a Python file that ends with py and contains Python object
definitions and Python statements
B. The Python module allows you to logically organize your Python code snippets
C. Python modules can define functions, classes, and variables, but the module does not
contain executable code (Right Answers)
D. Assigning relevant code to a module can make your code better and easier to understand

Answer: C

14. Which of the following options is not the session mode used by TensorFlow?

A. Explicitly call the session to generate function


B. Explicitly call the session to close function
C. Through the Python context manager
D. Multiple POST queries (Right Answers)

Answer: D

15. Principal Component Analysis (PCA) is a statistical method A set of variables that may be
related to each other is transformed into a set of linearly related variables by orthogonal
transformation The converted set of variables is called the principal component

A. True
B. False (Right Answers)

Answer: B

9. Python tuples are identified by "0" and internal elements are separated by

A. True
B. False (Right Answers)

Answer: B
10. What are the numeric types of Python? (Multiple Choice)

A. int (integer type) (Right Answers)


B. long (long integer type) (Right Answers)
C. float (floating point type) (Right Answers)
D. complex (complex number type) (Right Answers)

Answer: ABCD

11. What is the English abbreviation for Al?

A. Automatic Intelligence
B. Artrfical Intelligence (Right Answers)
C. Automatic Information
D. Artrfical Information

Answer: B

8. There are a lot of data generated during the training of the neural network What mechanism
does TensorFlow use to avoid excessive input data?

A. Client
B. feed
C. placeholder (Right Answers)
D. fetch

Answer: C

7. The history of robots is not long In 1959, the United States. Engelberg and Devol made the
world’s first generation of industrial robots, and the history of robots really began

According to the development process of the robot, it is usually divided into three generations,
respectively are (Multiple Choice)

A. Teaching Reproduction Robot (Right Answers)


B. Robot with sensation (Right Answers)
C. Robots that will think
D. Intelligent robot (Right Answers)

Answer: ABD
2. Functions are well-organized, non-reusable code segments used to implement a single, or
associated function

A. True
B. False (Right Answers)

Answer: B

3. What is wrong description of back propagation?

A. The learning process of the back propagation algorithm consists of a forward propagation
process and a back-propagation process
B. The back propagation algorithm is a learning algonthm suitable for multi-layer neural
networks, which is based on the gradient descent method
C. The back propagation phase sends training inputs to the network to obtain an
stimuli response (Right Answers)
D. The back propagation algorithm is mainly repeated by two loops (excitation propagation,
weight update) until the response of the network to the input reaches the predetermined
target range

Answer: C

4. In May 1997. the famous "Human-Machine Wars" final computer defeated Kasparov, the
world chess king, with a total score of 3 5 to 2 5 Is this computer called?

A. Dark blue (Right Answers)


B. Dark green
C. Ponder
D. Blue sky

Answer: A

5. What are the service categories included in Huawei Cloud El Enterprise Intelligence?
(Multiple Choice)

A. El visual cognition (Right Answers)


B. El online games
C. El speech semantics (Right Answers)
D. El industry scene (Right Answers)

Answer: ACD
6. As the following, what are the Python language design philosophy? (Multiple Choice)

A. Beautiful (Right Answers)


B. Expensive
C. Explicit (Right Answers)
D. Simple (RightAnswers)

Answer: ACD

1. What is the subject of artificial intelligence?

1. Mathematics and Physiology


2. Psychology and Physiology
3. Linguistics
4. Comprehensive interdisciplinary and marginal disciplines (Right Answers)

Answer: D

33. The following are the description of the distribution function, distribution law. and density
function of random variables, which is incorrect?

A. Distribution law can only describe the value rule of discrete random variables
B. The density function can only describes the value rule of continuous random vanables
C. Discrete random variables have no distribution function (Right Answers)
D. Distribution function describes the value rule of random variables

Answer: C

98. Which of the following description of the validation set is wrong?

A. The verification set can coincide with the test set. (Right Answers)
B. The test set can coincide with the training set
C. The subset used to pick hyperparameters is called a validation set
D. Typically 80% of the training data is used for training and 20% is used for verification.

Answer: A

99. Which of the following can optimization problem be classified according to the constraints?
(Multiple choice)

A. equality constraints (Right Answers)


B. Inequality constraints (Right Answers)
C. Unconstrained conditions (Right Answers)
D. Semi-constraint conditions

Answer: ABC
100. Which of the following are the characteristics of the Python language? (Multiple choice)

A. Explanatory (Right Answers)


B. Process onented
C. Object-oriented (Right Answers)
D. Dynamic data type (Right Answers)

Answer: ACD

95. The timestamps in the Python language are represented by how long fin seconds) elapsed
from midnight (epoch) on January 1. 1970

A. True (Right Answers)


B. False

Answer: A

96. Convolutional neural networks are more suitable for dealing with speech recognition
problems

A. True
B. False (Right Answers)

Answer: B

97. What are the results returned by the if conditional statements in the Python language*?
(Multiple choice)

A. TRUE (Right Answers


B. 0
C. FALSE
D. Null

90. TensorFlow is the second generation of artificial intelligence learning system developed by
Google based on ().

A. DistBelief (Right Answers)


B. PaleyFunction
C. ConvexOne
D. Infinity
Answer: A
91. The Python language can use the "#" at the beginning of a single line of code for code
comments

A. True (Right Answers)


B. False

Answer: A

92. According to the definition of information entropy, what is the bit entropy of throwing a
uniform coin?

A. 0
B. 05
C. 1 (Right Answers)
D. . -1

Answer: C

93. Artificial intelligence is currently suitable for scenarios with {’known environment, clear
objectives, and predictable actionsji Deep learning in the fields of image recognition, speech
recognition, translation, etc . artificial intelligence basically has human recognition ability even
surpassing human beings Based on these capabilities it has been applied to many scenes, such as
medical care and public safety However, there is still a lack of reasoning and cognition

A. True (Right Answers)


B. False

Answer: A

94. Python authors deliberately design very restrictive grammars that make bad programming
habits (such as the next line of if statement not indented to the right) cannot be compiled

A. True (Right Answers)


B. False

Answer: A

86. What model is not a cyclic neural network*?

A. RNN
B. LSTM
C. GBDT (Right Answers)
D. GRU

Answer: C
87. Under the large-scale relationship analysis scenario, which of the following options does not
belong to the three high demands of massive relationship processing?

A. Efficient relationship discovery data for massive data


B. Efficient shanng of massive data (Right Answers)
C. Efficient storage and access requirements for massive amounts of data
D. High scalability and high availability requirements for relational analysis platforms

Answer: B

88. What are the commonly used loss functions7 (Multiple choice)

A. Mean variance (Right Answers)


B. Sigmoid cross entropy (Right Answers)
C. Soft max cross entropy (Right Answers)
D. Sparse cross entropy (Right Answers)
E. Weighted Sigmoid Cross Entropy (Right Answers)

Answer: ABCDE

89 What are the steps that are not part of the operation of a Python file object?

A. open
B. delete (RightAnswers)
C. read
D. write
E. close

Answer: B

81. The for loop statement in the Python language can iterate through the items in any sequence

A. True (Right Answers)


B. False

Answer: A

82. Convolutional neural networks are more suitable for image recognition problems than cyclic
neural networks

A. True (Right Answers)


B. False

Answer: A
83 Huawei Cloud El builds enterprise intelligence services based on three-tier services Which of
the following options does not belong to Layer 3 services?

A. Basic platform services


B. General domain services
C. Industry sector services
D. Integration services (Right Answers)

Answer: D

84. Which of the following is true about unsupervised learning?

A. Unsupervised algorithm only processes "features" and does not process "tags"
(Right Answers)
B. Dimensionality reduction algonthm is not unsupervised learning
C. K-means algorithm and SVM algorithm belong to unsupervised learning
D. None of the above

Answer: A

85. Which of the following options is not the TensorFlow build process9

A. Building a calculation chart


B. Input tensor
C. Generate a session
D. Update weights (Right Answers)

Answer: D

77. TensorFlow Operations and Computation Graph are not - run in the Session

A. True
B. False (Right Answers)

Answer: B

78. What is in the category of artificial intelligence7 (Multiple choice)

A. Action (Right Answers)


B. Perception (Right Answers)
C. Cognition (Right Answers)
D. None of the above

Answer: ABC
79. The Python language does not allow embedding another loop body in a loop body

A. True
B. False (Right Answers)

Answer: B

80. What are the mainstream deep learning open source tools? (Multiple choice)

A. TensorFlow (Right Answers)


B. Caffe (Right Answers)
C. Torch (Right Answers)
D. Theano (Right Answers)
E. Scikit-leam

Answer: ABCD

73. X. Y are random variables. C is a constant, the nature of the difference in the following
options, which is wrong? (Multiple choice)

A. D(C)=0
B. D(X+Y)=D(X)+D(Y) (RightAnswers)
C. D(CX)=C*C*D(X)
D. D(XY)=D(X)D(Y) (RightAnswers)

Answer: BD

74. Vector is a number

A. True
B. False (Right Answers)

Answer: B

75. About Bayesian formula P(W|X)=P(X|W)‘P(W)/P(X) What is the correct description?

A. P(W|X) is a prior probability


B. P(X|W) is a conditional probability (Right Answers)
C. P(W) is the postenor probability
D. P(X) is the posterior probability

Answer: B
76. Cyclic neural networks are more suitable for dealing with image recognition problems

A. True
B. False (Right Answers)

Answer: B

69. As shown below, which is the following matrix A characteristic value? (Multiple choice)

A. 2 (Right Answers)
B. -2
C. -4
D. 4 (Right Answers)

Answer: AD

[Link] matrix A and matrix B have the same number of rows and columns. A and B can be
added

A. True (Right Answers)


B. False

Answer: A

72. which of the following are the cloud services provided by Huawei Cloud El Visual
Cognition'? (Multiple choice)

A. Text recognition (Right Answers)


B. Face recognition (Right Answers)
C. Image recognition (Right Answers)
D. Content detection (Right Answers)
E. Image processing (Right Answers)

Answer: ABCDE

64. Which of the following are the characteristics of TensorFlow? (Multiple choice)

A. Open source (Right Answers)


B. Convenience (Right Answers)
C. C Mature (RightAnswers)
D. Flexible (RightAnswers)

Answer: ABCD
65. Which is the correct description of the Python creation function? (Multiple choice)

A. The function created starts with the def keyword followed by the function name and
parentheses. (Right Answers)
B. The parameters need to be placed in parentheses (Right Answers)
C. The function content starts with a colon and needs to be indented (Right Answers)
D. Return the result with return and the function ends (Right Answers)

Answer: ABCD

66. About Python correct tuple which is correct description1? (Multiple choice)

A. The difference between a list and a tuple is that the elements of the tuple cannot be
modified (Right Answers)
B. The list uses square brackets, and the tuple uses parentheses (Right Answers)
C. Tuple creation is very simple, just add elements in parentheses and separate them
with commas (Right Answers)
D. When a tuple contains only one element, you need to add a comma after the
element. j£ (Right Answers)

Answer: ABCD

67. What research areas does artificial intelligence have? (Multiple choice)

A. Natural language processing (Right Answers)


B. Computer Vision (Right Answers)
C. Machine learning (Right Answers)
D. Speech recognition (Right Answers)

Answer: ABCD

68. TensorFlow supports multi-TPU cluster computing

A. True (Right Answers)


B. False

Answer: A

59. The trace operation returns the sum of the diagonal elements of the matrix Therefore, the
trace of matrix A and its transposed matrix are equal

A. True (Right Answers)


B. False

Answer: A
60. GAN is a deep learning model and one of the most promising methods for unsupervised
learning in complex distribution in recent years

A. True (Right Answers)


B. False

Answer: A

61. Which of the following options is not central to linear algebra?

A. Probability theory (Right Answers)


B. Linear transformation
C. Matrix theory
D. Vector space

Answer: A

62. A scalar k is multiplied by matrix A equal to k and each of the numbers in A is multiplied

A. True (Right Answers)


B. False

Answer: A

63. What are the conditions for m row n column matrix A and p row q column matrix B to be
multiplied9

A. m=p. n=q
B. n=p (Right Answers)
C. m=n
D. p=q

Answer: B

54. What are the commonly used activation functions? (Multiple Choice)

A. sigmoid (Right Answers)


B. tanh (Right Answers)
C. relu (RightAnswers)
D. danish

Answer: ABC
54. What are the commonly used activation functions? (Multiple Choice)

A. sigmoid (Right Answers)


B. tanh (Right Answers)
C. relu (RightAnswers)
D. danish

Answer: ABC

56. What is the incorrect relationship between neural networks and deep learning?

A. The concept of deep learning stems from the study of artificial neural networks.
B. A neural network algorithm with multiple hidden layers is a deep learning algorithm
C. Single layer neural networks are also a type of deep learning (Right Answers)
D. Convolutional neural networks are a type of deep learning

Answer: C

57. Which of the following environments does not support to install the TensorFlow?

A. Linux
B. Mac OS
C. Docker
D. OpenStack (RightAnswers)

Answer: D

58. Deep learning is a branch of machine learning

A. True (Right Answers)


B. False

Answer: A

51. Deep learning makes it easy to derive simple mathematical functions from a large amount of
high-dimensional data to describe complex decision interfaces

A. True
B. False (Right Answers)

Answer: B
52. Which of the following does not belong to automatic hyper parameter optimization
algorithm?

A. Grid search
B. Random gradient descent (Right Answers)
C. Random search
D. Model-based hyper parameter optimization

Answer: B

53. What are the characteristics of Python code? (Multiple Choice)

A. legibility (RightAnswers)
B. Simplicity (Right Answers)
C. Rapidity
D. Scalability (RightAnswers)

Answer: ABD

149. How many spaces does PEP 8 stipulate that Python's first line indentation needs to indent?

A. 1
B. 2
C. 4 (Right Answers)
D. 8

Answer: C

150. What are the Python language data types'? (Multiple Choice)

A. numbers (Right Answers)


B. string (Right Answers)
C. list (Right Answers)
D. tuple (Right Answers)
E. dictionary (Right Answers)

Answer: ABCDE

144. The number of rows and columns of the three matrices A. B. and C is 3 rows and 2
columns. 2 rows. 3 columns. 3 rows and 3 columns, which of the following operations is
meaningful?

A. AC
B. BC (RightAnswers)
C. A+B Answer: B
145. The constituent elements of the Python identifier include numbers, letters, and underscores

A. True (Right Answers)


B. False

Answer: A

146. Which description is wrong about the hyper parameter'?

A. Hyper parameters are parameters that set values before the algorithm begins learning
B. Most machine learning algorithms have hyper parameters
C. Hyper parameters cannot be modified (Right Answers)
D. The value of the hyper parameter is not learned by the algorithm itself

Answer: C

147 Which of the following is not a module in the Tensor Flow library?

A. [Link]
B. tf layers
C. tf boost (Right Answers)
D. [Link]

Answer: C

148. As shown in the figure below, what is the value of the determinant A?

124578369A=

A. 24
B. 18
C. -24
D. 0(RightAnswers)

Answer: D

140. Which is wrong with the Python module time introduction method 9

0 import time
1 from time import *
2 import time as t
3 from time (Right Answers)

Answer: D
141. In what year did Huawei officially provide services in the form of cloud services and
combined with more partners to provide richer artificial intelligence practices?

A. 2002
B. 2013
C. 2015
D. 2017 (Right Answers)

Answer: D

142. Which description is wrong about the lambda function of the Python language?

A. lambda is just an expression, and the function body is much simpler than def
B. The body of a lambda can be an expression or a block of code
C. The lambda function can access the parameters in the global namespace
D. The lambda function accepts only one parameter value (Right Answers)

Answer: D

143. The meaning of artificial intelligence was first proposed by a scientist in 1950. and at the
same time a test model of machine intelligence was proposed Who is this scientist?

A. Minsky
B. Zade
C. Turing (Right Answers)
D. Von Neumann

Answer: C

135. Which of the following statement about the matrix is incorrect?

A. The arbitrary matrix is multiplied by the unit matrix and will not change
B. The transpose of the symmetric matrix A is also A itself
C. The transpose of the orthogonal matrix A is equal to the inverse of A
D. There is no inverse matrix for the diagonal matrix. (Right Answers)

Answer: D

136. Which is not a deep learning algorithm?

A. Self-encoder
B. Convolutional neural networks
C. Recurrent neural networks
D. Support vector machine (Right Answers)

Answer: D
137. TensorFlow is Google's first generation of proprietary machine learning systems

A. True
B. False (Right Answers)

Answer: B

138. Which of the following schools does the neural network study belong to?

A. Symbolism
B. Connectionism (Right Answers)
C. Behaviorism
D. None of the above

Answer: B

139. Reducing the gap between the training error and the test error will result in over-fitting How
to prevent over-fitting? (Multiple Choice)

A. Cross validation (Right Answers)


B. Integration method (Right Answers)
C. Increase regulanzation (Right Answers)
D. Feature Engineering (Right Answers)

Answer: ABCD

134. X. Y are random variables. C is a constant, which of the following description about the
nature of the mathematical expectation is incorrect?

A. E(C) = CA. E(C) = C


B. E(X+Y) = E(X)+E(Y)
C. E(CX) = CE(X)
D. E(XY) = E(X)E(Y) (RightAnswers)

Answer: D

133. The correlation coefficient, also known as the linear correlation coefficient, is used to
measure the linear relationship between two variables, which is a real number greater than zero

A. True
B. False (Right Answers)

Answer: B
132. Which of the following neural network structures will share weights? (Multiple choice)

A. Convolutional neural network (Right Answers)


B. Recurrent neural network (Right Answers)
C. Fully connected neural network
D. All of the above

Answer: AB

127. The TensorFlow framework does not support Windows systems

A. True
B. False (Right Answers)

Answer: B

128. Which of the following descriptions of the depth feedforward network is correct?

A. Deep feedforward network is a kind of neural network (Right Answers)


B. The deep feedforward network has only one hidden layer
C. The unit on the hidden layer of the deep feedforward network will have countless
D. Deep feedforward network is used to deal with linear problems

Answer: A

129. The time interval in the Python language is a floating-point fraction in seconds

A. True (Right Answers)


B. False

Answer: A

130. Which of the following is not part of the deep learning development framework'?

A. CNTK
B. Keras
C. BAFA (Right Answers)
D. MXNet

Answer: C
131. Which of the following are included in the application scenarios of TensorFlow? (Multiple
choice)

A. Speech recognition (Right Answers)


B. Face recognition (Right Answers)
C. Image style changes (Right Answers)
D. Autopilot (Right Answers)

Answer: ABCD

123. Self-encoder is an unsupervised learning algorithm

A. True (Right Answers)


B. False

Answer: A

124. The number or matrix is stored in the tensor

A. True
B. False (Right Answers)

Answer: B

125. Which of the following descriptions about the Recurrent Neural Network (RNN) is correct?

A. Can be used to process sequence data (Right Answers)


B. Cannot process vanable length sequence data
C. Unlike convolutional neural networks, parameters of RNN cannot be shared
D. The units above the hidden layer are not associated with each other

Answer: A

126. Artificial intelligence is a new technical science that studies and develops theories, methods
and application systems for simulating, extending and extending human intelligence It is one of
the core research areas of machine learning

A. True
B. False (Right Answers)

Answer: B
118. In order for a machine to be intelligent, it must be knowledgeable Therefore there is a
research field in artificial intelligence, which mainly studies how computers automatically
acquire knowledge and skills to achieve self-improvement. What is the branch of this research
called*?

A. Expert system
B. Machine learning (Right Answers)
C. Neural Network
D. Natural language processing

Answer: B

119. Which of the following descriptions about Python program are correct? (Multiple choice)

A. The program consists of modules (Right Answers)


B. Module contains statements (Right Answers)
C. statement contains an expression (Right Answers)
D. Expressions create and process objects (Right Answers)

Answer: ABCD

120. Huawei Machine Learning Service MLS is a one-stop platform that supports the entire
process of data analysis Which of the following is not a feature of MLS7

A rich library of machine learning algorithms.

machine learning program is intuitive and easy to use

Distributed and scalable big data computing engine

Support for the R language, but does not support the Python language (Right Answers)

Answer: D

121. Training error will reduce the accuracy of the model and produce under-fitting How to
improve the model fit? (Multiple choice)

A. Increase the amount of data (Right Answers)


B. Feature Engineering (Right Answers)
C. Reduce regularization parameters
D. Add features (Right Answers)

Answer: ABD
122. Which of the following is not a way for the Tensor Flow program to read data4?

A. Preload data
B. Feeding data
C. Read from the file
D. Write a file format reader (Right Answers)

Answer: D

113. Which of the following description of the number of rows and columns of the matrix is
correct?

A. The number of rows is greater than the number of columns


B. The number of rows is equal to the number of columns
C. The number of rows is less than the number of columns
D. The number of rows has no relationship with the number of columns. (Right
Answers)

Answer: D

114 Which of the following is the computing model of TensorFlow?

A. Calculation chart (Right Answers)


B. Tensor
C. Conversation
D. Variable Answer: A

115. Which of the following can improve the computational efficiency of the neural network
model? (Multiple choice)

A. TPU (Right Answers)


B. GPU (RightAnswers)
C. FPGA (Right Answers)
D. Large-scale distributed cluster (Right Answers)

Answer: ABCD
116. Which of the following statements about Python are correct? (Multiple choice)

A. Invented in 1989 by the Dutch Guido van Rossum. the first public release was issued
in 1991. (Right Answers)
B. Python is purely free software and the source code follows the GPL (GNU General
Public License) protocol (Right Answers)
C. Python syntax is simple and clean One of the features is to force blank characters to
be used as statement indentation (Right Answers)
D. Python is often nicknamed glue language, which can easily connect various modules
made in other languages (Right Answers)

Answer: ABCD

117. Which of the following does not belong to long-term memory LSTM (Long Short-Term
Memory) network architecture'?

A. Memory door (Right Answers)


B. Forget the door
C. Input door
D. Output door

Answer: A

110. What are the advantages of Python? (Multiple choice)

A. Simple (Right Answers)


B. Free (RightAnswers)
C. High-level language (Right Answers)
D. Rich library (Right Answers)

Answer: ABCD

111. Python script execution mode includes interactive mode and script mode

A. True (Right Answers)


B. False Answer: A

112. Which of the following features does Python support'? (Multiple choice)

A. Inheritance (RightAnswers)
B. Heavy load (Right Answers)
C. Derived (Right Answers)
D. Multiple mhentance (Right Answers)

Answer: ABCD
105. In which year was the first introduction of "artificial intelligence"?

A. 1946
B. 1960
C. 1916
D. 1956 (RightAnswers)

Answer: D

106. Which of the following description about the relationship between the Poisson distribution
and the binomial distribution is correct?

A. The mathematical model of the Poisson distribution and the binomial distribution are
both Lagrangian models
B. Poisson distnbution is an approximation of the binomial distnbution when n is very
large and p is small (Right Answers)
C. Poisson distnbution has no relationship with binomial distribution
D. Poisson distribution can replace binomial distnbution

Answer: B

107. Which of the following is not an artificial intelligence school?

A. Symbolism
B. Statisticahsm (RightAnswers)
C. Behaviorism
D. Connectionism

Answer: B

108. Which of the following does the convolutional neural network structure not include'?

A. Convolutional layer
B. Pooling layer
C. Loop layer (Right Answers)
D. Fully connected layer

Answer: C

109. Which of the following functions can numerically stabilize overflow and underflow*?

A. Softminus function
B. Softplus function
C. Soft max function (Right Answers)
D. Softmin function Answer: C
101. Which of the following are the elements of artificial intelligence9 (Multiple choice)

A. Algorithm (Right Answers)


B. Computing power (Right Answers)
C. Data (Right Answers)
D. Scene (Right Answers)

Answer: ABCD

102. Which of the following is not a specific technology of artificial intelligence?

A. Knowledge map
B. Machine translation
C. Riemann geometry (Right Answers)
D. Semantic understanding

Answer: C

103. Which of the following statements about overflow and underflow in numerical calculations
is correct? (Multiple choice)

A. Underflow occurs when the number close to zero is rounded to zero (Right Answers)
B. Overflow occurs when the number close to zero is rounded to zero
C. Overflow occurs when a large number of levels are approximated as jt> or - jP
(Right Answers)
D. Underflow occurs when a large number of levels are approximated as or - jb

Answer: AC

104. Which of the following description about Python regular expression is not correct?

A. Python has added the re regular expression module since version 1.5.
B. re regular expression module gives the Python language all the regular expression
functionality
C. re regular expressions are powerful tools for working with strings
D. re regular expressions can only process stnng data, not numeric data. (Right
Answers)

Answer: D
171. Which of the following description is wrong about the image recognition cloud service?

A. The service identifies specific objects such as skyscrapers, buildings, and ships.
B. The service can also identify the sea. city, port and other scenes
C. The service can perform semantic analysis on the content in the image to extract labels
with specific abstract meanings
D. The service can provide object and scene labels, and can also provide more
conceptual labels (Right Answers)

Answer: D

169. What is not the optimization method in deep learning?

A. Random gradient descent


B. Back propagation algorithm
C. Principal component analysis (Right Answers)
D. Momentum

Answer: C

170. Information theory is a branch of applied mathematics The main research is to quantify how
much information a signal contains. Who is the first to propose information theory?

A. Minsky
B. Tunng
C. Simon
D. Shannon (RightAnswers)

Answer: D

164. Deep learning is different from machine learning and there are no unsupervised algorithms

A. True
B. False (Right Answers)

Answer: B

165. What are the implementation modes of TensorFlow? (Multiple Choice)

A. Stand-alone mode (Right Answers)


B. Distributed mode (Right Answers)
C. Reverse mode
D. Forward mode

Answer: AB
166. What are the application scenarios for the break statement in the Python language7
(Multiple Choice)

A. Any Python statement


B. while loop statement (Right Answers)
C. for loop statement (Right Answers)
D. Nested loop statement (Right Answers)

Answer: BCD

167. TensorFlow only supports Python and R language

A. True
B. False (Right Answers)

Answer: B

168. What are the commonly used gradient descent optimization functions? (Multiple Choice)

A. Random gradient descent (Right Answers)


B. Adadelta (Right Answers)
C. Adagrad (Right Answers)
D. momentum (RightAnswers)
E. RMSProp (Right Answers)

Answer: ABCDE

159. Huawei firmly believes that the value of Al is ultimately reflected in solving the actual
business problems of the enterprise Therefore. Huawei is firmly committed to the development
of Al technology, focusing on domain solutions, focusing on basic technologies and enabling
platforms, and working with industry practice leaders to develop industry solutions

A. True (Right Answers)


B. False

Answer: A

160. The Python dictionary is identified by and the internal data consists of the key and its
corresponding value

A. True (Right Answers)


B. False

Answer: A
161. In Huawei Cloud El Enterprise Intelligence, which basic platform services are included9
(Multiple Choice)

A. Machine learning (Right Answers)


B. Deep learning (Right Answers)
C. Graph engine (Right Answers)
D. Batch processing (Right Answers)

Answer: ABCD

162. Linear algebra is a branch of algebra that deals with linear problems. The linear relationship
is that the relationship between exponential objects is expressed in ( ) times form*?

A. 1 (Right Answers)
B. 2
C. 3
D. 4

Answer: A

163. "print" in Python 3 must be used with "Q"

A. True (Right Answers)


B. False

Answer: A

155. Which of the following are solutions for the Huawei Cloud El industry scenario9 (Multiple
Choice)

A. Intelligent Logistics (Right Answers)


B. Intelligent Water (Right Answers)
C. Intelligent transportation (Right Answers)
D. Intelligent Finance (Right Answers)
E. E Intelligent manufacturing (Right Answers)

Answer: ABCDE

156. Vector group a1=(1.1.1). a2=(0.2.5). a3=(1.3.6). which of the following options is correct?

A. Linear correlation (Right Answers)


B. Linear independence
C. a1+a2+a3=0
D. 2a1+a2+a3=0

Answer: A
157. What are the scenarios or industries that are suitable for using Python? (Multiple Choice)

A. Artificial intelligence (Right Answers)


B. web development (Right Answers)
C. Game development (Right Answers)
D. Hardware development

Answer: ABC

158. Which descriptions are correct about Python's index'? (Multiple Choice)

A. Index from left to right defaults from 0 (Right Answers)


B. Index from left to nght defaults from 1
C. Index from right to left defaults from-1 (Right Answers)
D. Index from right to left defaults from 0

Answer: AC

151. What are the algorithms supported by TensorFlow? (Multiple Choice)

A. CNN (Right Answers)


B. ZNN
C. RNN (Right Answers)
D. HUT

Answer: AC

152. Which is not a Python operator?

A. arithmetic operator
B. Reasoning operator (Right Answers)
C. Logical operator
D. Comparison operator

Answer: B

153. Which method is not supported in TensorFlowto define variables?

A. Random number
B. Constant
C. Calculated from the initial values of other variables
D. null (RightAnswers)

Answer: D
154. What does factors that promote the development of artificial intelligence not include?

A. Big data
B. Computing ability
C. Algorithm theory
D. Blockchain (RightAnswers)

Answer: D

You might also like