100% found this document useful (1 vote)
365 views14 pages

3 Hcia Cloud Service Multiple

This document contains questions about Huawei Cloud products and services. It asks about components of Huawei's public cloud ecosystem, ways to scale elastic cloud servers, differences between cloud disk and server backup, applications available on the Huawei Cloud App Store, components of elastic cloud servers, methods to delete servers in elastic scaling groups, constraints on whole machine images, attributes that can be modified for private images, ways to restore data from backups, operations allowed on backup strategies, scenarios for object storage, ways to connect to on-premises data centers, parameters configured for VPC subnets, types of certificates for load balancing, operations partners can perform on physical dedicated lines, correspondence between VPN gateways and remote gateways, container security monitoring, traffic

Uploaded by

Daniel Mwithui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
365 views14 pages

3 Hcia Cloud Service Multiple

This document contains questions about Huawei Cloud products and services. It asks about components of Huawei's public cloud ecosystem, ways to scale elastic cloud servers, differences between cloud disk and server backup, applications available on the Huawei Cloud App Store, components of elastic cloud servers, methods to delete servers in elastic scaling groups, constraints on whole machine images, attributes that can be modified for private images, ways to restore data from backups, operations allowed on backup strategies, scenarios for object storage, ways to connect to on-premises data centers, parameters configured for VPC subnets, types of certificates for load balancing, operations partners can perform on physical dedicated lines, correspondence between VPN gateways and remote gateways, container security monitoring, traffic

Uploaded by

Daniel Mwithui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

1. Which of the following constitutes Huawei’s public cloud ecosystem?

A. Huawei Cloud Academy


B. Partners
C. Huawei Cloud Market
D. Developer Center
ABCD

2. In which of the following scenarios can a flexible scaling group modify the availability
zone and subnet of the scaling group?
A. The current number of instances is 0
B. The scaling group is not enabled
C. Ongoing scaling activities
D. The scaling group is enabled

AB
3. Regarding the statements of cloud hard disk backup and cloud server backup, what
is the following correct?
A. Cloud disk backup is to protect the entire cloud server
B. The backup generated by cloud server backup will also appear in the cloud hard
disk backup interface
C. The backup objects of the cloud server backup are all cloud disks in the elastic
cloud server
D. The backup object of cloud disk backup is one or more designated cloud disks

4. What applications and services does Huawei Cloud App Store provide?
A. Developer tools
B. Business software
C. Basic software
D. Professional services

6. What are the components of an elastic cloud server?


A. Memory
B. Mirror
C. CPU
D. Cloud Hard Drive

7. Which of the following methods can delete a cloud server created by elastic scaling?
A. Disable the elastic scaling group
B. Add a scaling strategy to delete cloud servers in the scaling strategy
C. Manually modify the expected number of instances of the scaling group
D. "Remove and delete the scaling group" for the instance to be deleted
8. Regarding the constraints of the whole machine image, which of the following is
correct?
A. The whole machine image is not allowed to be exported.
B. The whole machine image cannot be shared with other tenants.
C. The whole machine image cannot be released as a market image.
D. The whole machine image only supports cross-region copy.

9. What attributes can be modified for the created private image?


A. How to start
B. Minimum memory
C. Maximum memory
D. NIC multi-queue

10. If the disk data is lost, you can use the pre-created backup () to restore the data.
A. Create a new disk
B. Delete
C. Restore data to the original disk
D. Unmount the disk

11. Which of the following operations can be performed on a cloud disk backup
strategy?
A. Delete backup strategy
B. Edit backup strategy
C. Bind or unbind the cloud hard disk for the backup strategy
D. Immediate execution of backup strategy

12. Object storage is suitable for the following scenarios?


A. Mass storage resource pool
B. Archive
C. Big data storage
D. Static website hosting

13. What are the ways to connect to the local data center (IDC)? (Multiple choices)
A. Virtual private network
B. Cloud dedicated line
C. Elastic load balancing
D. Elastic public network IP
14. Which of the following parameters need to be configured for the VPC subnet?
A. Subnet segment
B. Routing table
C. Gateway
D. DNS server address

15. What are the following types of certificates in Elastic Load Balancing?
A. Sub-certificate
B. Root certificate
C. CA certificate
D. Server certificate

16. What operations can partners have on physical dedicated lines? ACD
A. Unsubscribe to operate the physical dedicated line
B. Continued Fees to operate a dedicated physical line
C. Modify lease Home physical line
D. Amend the operation
Management Line

17 . Which of the following correspondences does the VPN gateway and remote
gateway support?
A. One to one
B. One-to-many
C. Many to many
D. Many-to-one

18. Container security services can monitor which of the following container
anomalies?
A. High-risk system calls
B. Escape vulnerability attack
C. Escape file access
D. Container abnormal process

19. By modifying the IP or city name of the external service, the traffic is directed to
the high-defense computer room, and all traffic is cleaned in the high-defense
computer room, and then cleaned
After the business flow is returned to ()
A. High-defense computer room
B. DNS service
C. User source station
D. Client
20. When configuring cloud monitoring parameters, which of the following notification
methods does the alarm notification include?
A. HTTP POST
B. HITPS POST
C. Emai1
D. SMS notification

21. Among the Huawei Cloud EI artificial intelligence APIs, what are the visual APIs?
some?
A. Image search
B. Image recognition
C. Face recognition
D. Content review

22. What advantages does the API gateway play in realizing the digital transformation
of enterprises?
A. Improve system performance
B. Securing information assets
C. Accelerate business agility
D. Stimulate application innovation

23. When creating a complete machine image, which image sources can be selected?
(Multiple choices)
A. Bare metal server
B. Cloud server backup
C. Image file
D. Cloud server

24. What attributes can be modified for the created private image?
A. NIC multi-queue
B. Minimum memory
C. How to start
D. Maximum memory

25. What usage methods does the object storage service support?
A. Management console
B. obscmd
C. OBS Browser
D. API &SDK

26. What functions can be achieved by configuring life cycle rules?


A. Storage category of time-converted objects
B. Clean up debris
C. Regularly delete the specified objects in the bucket
D. Delete the bucket

27. What are the advantages of using Huawei Cloud EI service?


A. One-stop big data basic service
B. A basic platform with AI, providing general AI capabilities
C. Free operation and maintenance, users only need to focus on business
D. Elastic resource scaling

28. Which of the following development resources are available in the Developer
Center?
A. OpenStack
B. SDKs
C. OBS Browser
D. openAPI

29. Which of the following is a computing service?


A. Image service
B. Exclusive cloud
C. Elastic Cloud Server
D. Virtual private cloud

30. What are the types of cloud hard drives used by the Elastic Cloud Server?
A. Super high IO
B. High IO
C. Ultra-high IO (delay optimization)
D. General IO

31. Which of the following cloud servers cannot be elastically scaled?


A. Cloud server deploying database applications
B. Cloud server deploying static web pages
C. Cloud server that holds application session
D. Cloud server that saves data log information

32. Regarding the creation of a private image, what is correct?


A. Create a data disk image from an OBS file
B. Create a system disk image through an external image file
C. Create a complete machine image through cloud server backup
D. Create a system disk image through a cloud server

33. The cloud disk backup service depends on which of the following services?
A. Cloud Hard Drive
B. Elastic cloud server
C. Object storage
D. Mirror

34. Which of the following scenarios can the object storage service be applied to?
A. Video on demand
B. Enterprise cloud disk
C. Backup and archive
D. Video surveillance

35. Which of the following options does VPN consist of?


A. VPN connection
B. Subnet
C. VPN gateway
D. VPC

36. Anti-DDos main protection types include which of the following options?
A. Resistant to application attacks
B. Resistant to data attacks
C. Anti-brute force cracking
D. Anti-traffic attacks

37. When using RDS, which of the following reasons may cause automatic backup
failure?
A. Insufficient stability of the network environment
B. Abnormal parameter modification
C. Abnormal import data
D. Abnormal instance status

38. Which of the following is part of database instance lifecycle management?


A. Delete the database cluster
B. View database instance information
C. Restart the database instance
D. Add a read-only copy

39. Which services of Huawei Cloud EI are used in the IoT car networking solution?
A. MapReduce service MRS
B. Data access service DIS
C. Real-time streaming computing service CloudStream
D. Graph computing service GES
40. What are the advantages of using Huawei Cloud EI service?
A. A basic platform with AI, providing general AI capabilities
B. Resource elastic scaling
C. Free operation and maintenance, users only need to focus on business
D. One-stop big data basic service

41. Which of the following may be the reason why you cannot log in to the windows
virtual machine through mstsc?
A. No Elastic IP is bound
B. Incorrect DNS address configuration
C. Do not allow connection to the computer in the remote settings
D. The corresponding port is not released in the security group

42. What are the deployment models of cloud computing?


A. Private cloud
B. Hybrid cloud
C. Community Cloud/Industry Cloud
D. Public cloud

43. Public cloud provides multiple types of elastic cloud servers, including but not
limited to?
A. Bare metal server type
B. GPU accelerated
C. Disk Enhanced
D. General computing

44. What are the login authentication methods for elastic cloud servers?
A. Fingerprint
B. Dynamic port token OTP
C. Key pair
D. Password

45. Regarding the description of the key pair, which of the following is correct?
A. You can query the key pair information used by the elastic cloud server through the
console
B. It is not possible to create a key pair to log into the Windows unisex cloud server
C. You can change the elastic cloud server for key pair login to password login
D. You can use the key to authenticate when logging in with VNC

46. Which of the following are the execution actions in the scaling strategy?
A. Randomly generated
B. Set to
C. Increase
D. Decrease

47. After the scaling group is deactivated, which of the following operations or
activities will still be performed?
A. The health check will continue to check the health status of the instance
B. After manually adjusting the expected number of instances, the scaling activity will
continue
C. Scaling activities already started will continue
D. The instance with abnormal health check will be removed

48. What can the shared image provider do?


A. Delete the shared image
B. Share the specified image
C. Delete the mirrored shared tenant
D. Add mirrored shared tenants

49. Which of the following options are usage scenarios for the cloud disk snapshot
function?
A. Set up a strategy to automatically back up the cloud hard disk data according to the
strategy
B. Daily backup data
C. Quick data recovery
D. Quickly deploy multiple services

50. Regarding the statement of backup and disaster recovery, what is the following
correct?
A. Backup generally builds a backup copy of data through snapshots, backup and other
technologies
B. Disaster recovery generally uses backup technology to build business backup hosts
and data in remote locations
C. The cost of backup is usually higher than disaster recovery
D. Disaster recovery is mainly aimed at business interruptions caused by hardware and
software failures and major natural disasters such as tsunamis, fires, and earthquakes.

51. Which of the following parameters should be set when creating a backup strategy?
A. Retention rules
B. Backup time
C. Name
D. Backup time

52. Only when the cloud hard disk is in the () state can the backup be performed.
A. Error
B. Failed to delete
C. Available
D. In use

53. Which of the following options are OBS monitoring indicators?


A. Upload traffic
B. Number of GET requests
C. Number of PUT requests
D. Download traffic

54. Which of the following functions does OBS Browser support?


A. Mount the external bucket
B. Static website hosting
C. Cross-domain resource sharing
D. Multi-version control

55. Regarding the description of object storage service billing, what is the following
correct?
A. There is no cost to retrieve the data
B. Every data stored in OBS needs to be billed
C. Outgoing traffic on the public network requires billing
D. Intranet outflow will not incur charges

56. Which of the following file system types does the flexible file service have?
A. SFS Turbo Enhanced
B. SFS Turbo Performance
C. SFS Turbo Standard
D. SFS

57. Users can use () to create an encrypted file system.


A. Password
B. Own key material
C. Keys provided by the key management service
D. Password

58. When creating a file system, which of the following parameters need to be
configured?
A. File system type
B. File system interface
C. VPC
D. Maximum capacity

59. The file system can be mounted on ().


A. Elastic cloud server of Linux system
B. Exclusive computing cluster
C. Bare metal server
D. Windows-based elastic cloud server

60. Which of the following are the main use cases for SFS?
A. High performance computing
B. Log management
C. Content management and home directory
D. Media processing

61. What are the ways to connect to the Internet?


A. Flexible public network IP
B. Cloud monitoring
C. NAT gateway
D. Elastic load balancing

62. What concepts are included in network services?


A. Subnet
B. EIP
C. Security Group
D. VPN

63. Which of the following options can establish a connection between VPC and VPC?
A. Cloud dedicated line
B. VPN
C. Cloud connection
D. Peer-to-peer connection

64. Which of the following parameters need to be configured for the health check in
elastic load balancing?
A. Health check port
B. Inspection cycle
C. Check the connection request process
D. Health check agreement

65. What kinds of protocols does the elastic load balancing system support?
A. HTTPS
B. TCP
C. UDP
D. HTTP

66. Typical application scenarios of web application firewall include:


A. Anti-webpage tampering
B. One-click detection of the latest CVE vulnerabilities
C. 0 Day outbreak protection
D. E-commerce panic buying spike protection

67. Which of the following databases can the database security service protect?
A. Local database
B. RDS relational database
C. ECS self-built database
D. BMS self-built database

68. What service resource indicators can be monitored in cloud monitoring?


A. Virtual private cloud
B. Distributed cache service
C. Elastic load balancing
D. Elastic computing services

69. What are the application scenarios of real-time streaming computing services?
A. Real-time file transfer
B. Online log analysis
C. Network traffic monitoring
D. Online graph calculation

70. What is included in the multiple security protection of API Gateway?


A. Threat protection
B. Access security
C. Log audit
D. Authentication service extension

71. Which of the following functions does the Elastic Cloud Server service provide?
A. Users can create and delete virtual machines, reinstall, switch OS, and power on and
off
B. Users can add and uninstall extended network cards, add EIP, mount and uninstall
acid disks, apply for keypair, etc.
C. Users can set alarm rules for the Elastic Cloud Server
D. Users can view the information of their cloud server related resources through the
console interface

72. Which of the following are application scenarios for elastic load balancing?
(Multiple choices)
A. Suitable for web services with large traffic
B. Realize more flexible service forwarding
C. Host a web application or website in a VPC, which can be used like a normal network
VPC
D. Provide routing balancing capabilities based on domain names and URLs

73. Regarding the description of VPN gateway parameters, what is the following error?
A. Reliability currently only supports single live
B. Support two billing methods: billing by bandwidth or billing by flow rate
C. Region refers to the physical location of the virtual private cloud
D. Bandwidth refers to the maximum bandwidth that each VPN connection can
reachWhat types of attacks can Anti-DDoS traffic cleaning service prevent?
A. SYN Flood attack
B. HTTP Get/Post Flood attack
hit
C. TCP connection exhaustion attack
D. Deformed package

74. Which of the following aggregation methods does instance monitoring support in
the cloud monitoring service?
A. Average
B. Standard deviation
C. Maximum
D. Variance value

75. What key performance indicators does the relational database service support for
monitoring database instances and database engines?
A. Buffer pool utilization
B. Number of database connections
C. TPS
D. QPS

76. What are the following security measures for relational database services?
A. Use Security Group
B. Use SSL channel
C. Setting up a virtual private cloud
D. Bind the elastic public network IP

77. Regarding cloud server instances manually moved into the scaling group, what are
the following restrictions? (Multiple choices)
A. The instance is the same as the scaling group VPC
B. The instance is bound to an elastic public IP
C. Scaling group AZ contains the AZ where the instance is located
D. The instance is not used by other scaling groups
78. What are the following application scenarios of cloud hard disk?
A. Development test
B. High-performance computing
C. Deploy various databases
D. Mass data storage

79. Object is the basic unit of data storage in OBS. Which of the following parts does it
include?
A. AK/SK
B. Metadata
C. Data
D. Key

80. What management functions does Elastic Load Balancing support?


A. Create a load balancer
B. Delete the load balancer
C. Adjust bandwidth
D. Query the load balancer

81. Which of the following options are the role of listeners in elastic load balancing?
A. Run business logic
B. Check the connection request process
C. Receive access request
D. Distribute traffic to back-end servers

82. What are the alarm levels


A. Urgent
B. secondary
C. Important
D. Reminder

83. Which of the following parameters need to be configured for cloud monitoring to
create alarm rules?
A. Monitoring indicators
B. Alarm strategy
C. Duration of monitoring
D. Alarm level

84. What are the key functional features of RDS?


A. High availability
B. Backup and recovery
C. Performance monitoring
D. Flow cleaning
85. What are the advantages of shared service architecture?
A. Each service must be developed using the same programming language and tools
B. Allow the frequent release of different services while maintaining the availability
and stability of other parts of the system
C. Low complexity
D. Each service can be independently developed by different teams without affecting
each other, speeding up the market launch speed

86. What steps are included in the automatic learning function in ModelArts?
A. Data standards
B. Write code
C. Deploy and go online
D. Model training

You might also like