1. Which of the following constitutes Huawei’s public cloud ecosystem?
A. Huawei Cloud Academy
B. Partners
C. Huawei Cloud Market
D. Developer Center
ABCD
2. In which of the following scenarios can a flexible scaling group modify the availability
zone and subnet of the scaling group?
A. The current number of instances is 0
B. The scaling group is not enabled
C. Ongoing scaling activities
D. The scaling group is enabled
AB
3. Regarding the statements of cloud hard disk backup and cloud server backup, what
is the following correct?
A. Cloud disk backup is to protect the entire cloud server
B. The backup generated by cloud server backup will also appear in the cloud hard
disk backup interface
C. The backup objects of the cloud server backup are all cloud disks in the elastic
cloud server
D. The backup object of cloud disk backup is one or more designated cloud disks
4. What applications and services does Huawei Cloud App Store provide?
A. Developer tools
B. Business software
C. Basic software
D. Professional services
6. What are the components of an elastic cloud server?
A. Memory
B. Mirror
C. CPU
D. Cloud Hard Drive
7. Which of the following methods can delete a cloud server created by elastic scaling?
A. Disable the elastic scaling group
B. Add a scaling strategy to delete cloud servers in the scaling strategy
C. Manually modify the expected number of instances of the scaling group
D. "Remove and delete the scaling group" for the instance to be deleted
8. Regarding the constraints of the whole machine image, which of the following is
correct?
A. The whole machine image is not allowed to be exported.
B. The whole machine image cannot be shared with other tenants.
C. The whole machine image cannot be released as a market image.
D. The whole machine image only supports cross-region copy.
9. What attributes can be modified for the created private image?
A. How to start
B. Minimum memory
C. Maximum memory
D. NIC multi-queue
10. If the disk data is lost, you can use the pre-created backup () to restore the data.
A. Create a new disk
B. Delete
C. Restore data to the original disk
D. Unmount the disk
11. Which of the following operations can be performed on a cloud disk backup
strategy?
A. Delete backup strategy
B. Edit backup strategy
C. Bind or unbind the cloud hard disk for the backup strategy
D. Immediate execution of backup strategy
12. Object storage is suitable for the following scenarios?
A. Mass storage resource pool
B. Archive
C. Big data storage
D. Static website hosting
13. What are the ways to connect to the local data center (IDC)? (Multiple choices)
A. Virtual private network
B. Cloud dedicated line
C. Elastic load balancing
D. Elastic public network IP
14. Which of the following parameters need to be configured for the VPC subnet?
A. Subnet segment
B. Routing table
C. Gateway
D. DNS server address
15. What are the following types of certificates in Elastic Load Balancing?
A. Sub-certificate
B. Root certificate
C. CA certificate
D. Server certificate
16. What operations can partners have on physical dedicated lines? ACD
A. Unsubscribe to operate the physical dedicated line
B. Continued Fees to operate a dedicated physical line
C. Modify lease Home physical line
D. Amend the operation
Management Line
17 . Which of the following correspondences does the VPN gateway and remote
gateway support?
A. One to one
B. One-to-many
C. Many to many
D. Many-to-one
18. Container security services can monitor which of the following container
anomalies?
A. High-risk system calls
B. Escape vulnerability attack
C. Escape file access
D. Container abnormal process
19. By modifying the IP or city name of the external service, the traffic is directed to
the high-defense computer room, and all traffic is cleaned in the high-defense
computer room, and then cleaned
After the business flow is returned to ()
A. High-defense computer room
B. DNS service
C. User source station
D. Client
20. When configuring cloud monitoring parameters, which of the following notification
methods does the alarm notification include?
A. HTTP POST
B. HITPS POST
C. Emai1
D. SMS notification
21. Among the Huawei Cloud EI artificial intelligence APIs, what are the visual APIs?
some?
A. Image search
B. Image recognition
C. Face recognition
D. Content review
22. What advantages does the API gateway play in realizing the digital transformation
of enterprises?
A. Improve system performance
B. Securing information assets
C. Accelerate business agility
D. Stimulate application innovation
23. When creating a complete machine image, which image sources can be selected?
(Multiple choices)
A. Bare metal server
B. Cloud server backup
C. Image file
D. Cloud server
24. What attributes can be modified for the created private image?
A. NIC multi-queue
B. Minimum memory
C. How to start
D. Maximum memory
25. What usage methods does the object storage service support?
A. Management console
B. obscmd
C. OBS Browser
D. API &SDK
26. What functions can be achieved by configuring life cycle rules?
A. Storage category of time-converted objects
B. Clean up debris
C. Regularly delete the specified objects in the bucket
D. Delete the bucket
27. What are the advantages of using Huawei Cloud EI service?
A. One-stop big data basic service
B. A basic platform with AI, providing general AI capabilities
C. Free operation and maintenance, users only need to focus on business
D. Elastic resource scaling
28. Which of the following development resources are available in the Developer
Center?
A. OpenStack
B. SDKs
C. OBS Browser
D. openAPI
29. Which of the following is a computing service?
A. Image service
B. Exclusive cloud
C. Elastic Cloud Server
D. Virtual private cloud
30. What are the types of cloud hard drives used by the Elastic Cloud Server?
A. Super high IO
B. High IO
C. Ultra-high IO (delay optimization)
D. General IO
31. Which of the following cloud servers cannot be elastically scaled?
A. Cloud server deploying database applications
B. Cloud server deploying static web pages
C. Cloud server that holds application session
D. Cloud server that saves data log information
32. Regarding the creation of a private image, what is correct?
A. Create a data disk image from an OBS file
B. Create a system disk image through an external image file
C. Create a complete machine image through cloud server backup
D. Create a system disk image through a cloud server
33. The cloud disk backup service depends on which of the following services?
A. Cloud Hard Drive
B. Elastic cloud server
C. Object storage
D. Mirror
34. Which of the following scenarios can the object storage service be applied to?
A. Video on demand
B. Enterprise cloud disk
C. Backup and archive
D. Video surveillance
35. Which of the following options does VPN consist of?
A. VPN connection
B. Subnet
C. VPN gateway
D. VPC
36. Anti-DDos main protection types include which of the following options?
A. Resistant to application attacks
B. Resistant to data attacks
C. Anti-brute force cracking
D. Anti-traffic attacks
37. When using RDS, which of the following reasons may cause automatic backup
failure?
A. Insufficient stability of the network environment
B. Abnormal parameter modification
C. Abnormal import data
D. Abnormal instance status
38. Which of the following is part of database instance lifecycle management?
A. Delete the database cluster
B. View database instance information
C. Restart the database instance
D. Add a read-only copy
39. Which services of Huawei Cloud EI are used in the IoT car networking solution?
A. MapReduce service MRS
B. Data access service DIS
C. Real-time streaming computing service CloudStream
D. Graph computing service GES
40. What are the advantages of using Huawei Cloud EI service?
A. A basic platform with AI, providing general AI capabilities
B. Resource elastic scaling
C. Free operation and maintenance, users only need to focus on business
D. One-stop big data basic service
41. Which of the following may be the reason why you cannot log in to the windows
virtual machine through mstsc?
A. No Elastic IP is bound
B. Incorrect DNS address configuration
C. Do not allow connection to the computer in the remote settings
D. The corresponding port is not released in the security group
42. What are the deployment models of cloud computing?
A. Private cloud
B. Hybrid cloud
C. Community Cloud/Industry Cloud
D. Public cloud
43. Public cloud provides multiple types of elastic cloud servers, including but not
limited to?
A. Bare metal server type
B. GPU accelerated
C. Disk Enhanced
D. General computing
44. What are the login authentication methods for elastic cloud servers?
A. Fingerprint
B. Dynamic port token OTP
C. Key pair
D. Password
45. Regarding the description of the key pair, which of the following is correct?
A. You can query the key pair information used by the elastic cloud server through the
console
B. It is not possible to create a key pair to log into the Windows unisex cloud server
C. You can change the elastic cloud server for key pair login to password login
D. You can use the key to authenticate when logging in with VNC
46. Which of the following are the execution actions in the scaling strategy?
A. Randomly generated
B. Set to
C. Increase
D. Decrease
47. After the scaling group is deactivated, which of the following operations or
activities will still be performed?
A. The health check will continue to check the health status of the instance
B. After manually adjusting the expected number of instances, the scaling activity will
continue
C. Scaling activities already started will continue
D. The instance with abnormal health check will be removed
48. What can the shared image provider do?
A. Delete the shared image
B. Share the specified image
C. Delete the mirrored shared tenant
D. Add mirrored shared tenants
49. Which of the following options are usage scenarios for the cloud disk snapshot
function?
A. Set up a strategy to automatically back up the cloud hard disk data according to the
strategy
B. Daily backup data
C. Quick data recovery
D. Quickly deploy multiple services
50. Regarding the statement of backup and disaster recovery, what is the following
correct?
A. Backup generally builds a backup copy of data through snapshots, backup and other
technologies
B. Disaster recovery generally uses backup technology to build business backup hosts
and data in remote locations
C. The cost of backup is usually higher than disaster recovery
D. Disaster recovery is mainly aimed at business interruptions caused by hardware and
software failures and major natural disasters such as tsunamis, fires, and earthquakes.
51. Which of the following parameters should be set when creating a backup strategy?
A. Retention rules
B. Backup time
C. Name
D. Backup time
52. Only when the cloud hard disk is in the () state can the backup be performed.
A. Error
B. Failed to delete
C. Available
D. In use
53. Which of the following options are OBS monitoring indicators?
A. Upload traffic
B. Number of GET requests
C. Number of PUT requests
D. Download traffic
54. Which of the following functions does OBS Browser support?
A. Mount the external bucket
B. Static website hosting
C. Cross-domain resource sharing
D. Multi-version control
55. Regarding the description of object storage service billing, what is the following
correct?
A. There is no cost to retrieve the data
B. Every data stored in OBS needs to be billed
C. Outgoing traffic on the public network requires billing
D. Intranet outflow will not incur charges
56. Which of the following file system types does the flexible file service have?
A. SFS Turbo Enhanced
B. SFS Turbo Performance
C. SFS Turbo Standard
D. SFS
57. Users can use () to create an encrypted file system.
A. Password
B. Own key material
C. Keys provided by the key management service
D. Password
58. When creating a file system, which of the following parameters need to be
configured?
A. File system type
B. File system interface
C. VPC
D. Maximum capacity
59. The file system can be mounted on ().
A. Elastic cloud server of Linux system
B. Exclusive computing cluster
C. Bare metal server
D. Windows-based elastic cloud server
60. Which of the following are the main use cases for SFS?
A. High performance computing
B. Log management
C. Content management and home directory
D. Media processing
61. What are the ways to connect to the Internet?
A. Flexible public network IP
B. Cloud monitoring
C. NAT gateway
D. Elastic load balancing
62. What concepts are included in network services?
A. Subnet
B. EIP
C. Security Group
D. VPN
63. Which of the following options can establish a connection between VPC and VPC?
A. Cloud dedicated line
B. VPN
C. Cloud connection
D. Peer-to-peer connection
64. Which of the following parameters need to be configured for the health check in
elastic load balancing?
A. Health check port
B. Inspection cycle
C. Check the connection request process
D. Health check agreement
65. What kinds of protocols does the elastic load balancing system support?
A. HTTPS
B. TCP
C. UDP
D. HTTP
66. Typical application scenarios of web application firewall include:
A. Anti-webpage tampering
B. One-click detection of the latest CVE vulnerabilities
C. 0 Day outbreak protection
D. E-commerce panic buying spike protection
67. Which of the following databases can the database security service protect?
A. Local database
B. RDS relational database
C. ECS self-built database
D. BMS self-built database
68. What service resource indicators can be monitored in cloud monitoring?
A. Virtual private cloud
B. Distributed cache service
C. Elastic load balancing
D. Elastic computing services
69. What are the application scenarios of real-time streaming computing services?
A. Real-time file transfer
B. Online log analysis
C. Network traffic monitoring
D. Online graph calculation
70. What is included in the multiple security protection of API Gateway?
A. Threat protection
B. Access security
C. Log audit
D. Authentication service extension
71. Which of the following functions does the Elastic Cloud Server service provide?
A. Users can create and delete virtual machines, reinstall, switch OS, and power on and
off
B. Users can add and uninstall extended network cards, add EIP, mount and uninstall
acid disks, apply for keypair, etc.
C. Users can set alarm rules for the Elastic Cloud Server
D. Users can view the information of their cloud server related resources through the
console interface
72. Which of the following are application scenarios for elastic load balancing?
(Multiple choices)
A. Suitable for web services with large traffic
B. Realize more flexible service forwarding
C. Host a web application or website in a VPC, which can be used like a normal network
VPC
D. Provide routing balancing capabilities based on domain names and URLs
73. Regarding the description of VPN gateway parameters, what is the following error?
A. Reliability currently only supports single live
B. Support two billing methods: billing by bandwidth or billing by flow rate
C. Region refers to the physical location of the virtual private cloud
D. Bandwidth refers to the maximum bandwidth that each VPN connection can
reachWhat types of attacks can Anti-DDoS traffic cleaning service prevent?
A. SYN Flood attack
B. HTTP Get/Post Flood attack
hit
C. TCP connection exhaustion attack
D. Deformed package
74. Which of the following aggregation methods does instance monitoring support in
the cloud monitoring service?
A. Average
B. Standard deviation
C. Maximum
D. Variance value
75. What key performance indicators does the relational database service support for
monitoring database instances and database engines?
A. Buffer pool utilization
B. Number of database connections
C. TPS
D. QPS
76. What are the following security measures for relational database services?
A. Use Security Group
B. Use SSL channel
C. Setting up a virtual private cloud
D. Bind the elastic public network IP
77. Regarding cloud server instances manually moved into the scaling group, what are
the following restrictions? (Multiple choices)
A. The instance is the same as the scaling group VPC
B. The instance is bound to an elastic public IP
C. Scaling group AZ contains the AZ where the instance is located
D. The instance is not used by other scaling groups
78. What are the following application scenarios of cloud hard disk?
A. Development test
B. High-performance computing
C. Deploy various databases
D. Mass data storage
79. Object is the basic unit of data storage in OBS. Which of the following parts does it
include?
A. AK/SK
B. Metadata
C. Data
D. Key
80. What management functions does Elastic Load Balancing support?
A. Create a load balancer
B. Delete the load balancer
C. Adjust bandwidth
D. Query the load balancer
81. Which of the following options are the role of listeners in elastic load balancing?
A. Run business logic
B. Check the connection request process
C. Receive access request
D. Distribute traffic to back-end servers
82. What are the alarm levels
A. Urgent
B. secondary
C. Important
D. Reminder
83. Which of the following parameters need to be configured for cloud monitoring to
create alarm rules?
A. Monitoring indicators
B. Alarm strategy
C. Duration of monitoring
D. Alarm level
84. What are the key functional features of RDS?
A. High availability
B. Backup and recovery
C. Performance monitoring
D. Flow cleaning
85. What are the advantages of shared service architecture?
A. Each service must be developed using the same programming language and tools
B. Allow the frequent release of different services while maintaining the availability
and stability of other parts of the system
C. Low complexity
D. Each service can be independently developed by different teams without affecting
each other, speeding up the market launch speed
86. What steps are included in the automatic learning function in ModelArts?
A. Data standards
B. Write code
C. Deploy and go online
D. Model training