Questions H13-511 V5.0
Questions H13-511 V5.0
The system periodically checks the status of the virtual machine. When the failure of the CNA
host causes the failure of the virtual machine, the system can migrate the virtual machine to other
CNA hosts in the cluster and restart it to ensure that the virtual machine can recover quickly.
If the data of the virtual machine is saved in the shared storage, the unsaved data will not be lost
when a failure occurs
The administrator can set different HA policies according to the importance of the virtual
machine.
This function supports automatic restart after a virtual machine failure
4. In which of the following scenarios, the core instructions issued by the operating system
can be directly sent to the underlying hardware?
Support users to use multiple devices to use cloud resources through the network
Using the software-defined method, the data fault tolerance is not high
It has the characteristics of on-demand self-service and meterable services
The bottom layer can use virtualization technology to improve resource utilization
7. Which of the following descriptions about Libvirt components is wrong?
Both KVM and Xen can call the api provided by Libvirt to manage the virtualization platform
Libvirt is a set of library functions that are called by other technologies to manage the virtual
machine on the machine
Libvirt provides programming interfaces in multiple languages. You can directly call the external
interface provided by Libvirt to operate the virtual machine through programming.
Libvirt is a closed source project, it is a very powerful management tool
8. Which of the following descriptions about centralized storage and distributed storage is
wrong?
Distributed storage system is to disperse and store data on multiple independent devices. When
reading data, it needs to read data on multiple devices at the same time, so it will affect the rate of
data reading
Centralized storage can be divided into SANFINAS storage according to the technical
architecture, and SAN storage can be divided into FC-SAN and IP-SAN
The biggest feature of centralized storage is that the deployment structure is simple, and RAID
technology can also be used to ensure data security and reliability
The distributed network storage system adopts a scalable system structure and uses multiple
storage servers to share the storage load. It not only improves the reliability, availability and access
efficiency of the system, but is also easy to expand
9. Which of the following is not an optional function item in the step of creating a template in
FusionAccess Tindows Installer?
The underlying virtualization resources are managed through the coordination of various
component services, and the usage is flexible
OpenStack is an open source cloud platform operating system
Virtualization resources can be allocated and scheduled according to user needs, and allocated
to different businesses and applications
OpenStack can independently implement resource access and abstraction without relying on the
underlying virtualization software
11. Two virtual machines belonging to the same network segment in the same host cannot
communicate with each other. Which of the following is not a possible cause of the failure?
Private Account
safeAccount
AreaAccount
LocalAccount
14. Which of the following descriptions about the virtual network card is wrong?
Turnel
Trunk
Hybrid
Access
16. Which of the following descriptions about IP routing is wrong?
Monitor
Power supply and fan module
hard disk
CPU
18. In Huawei FusionCompute, which one is correct about the description of "role"?
If the memory usage of the user virtual machine is relatively high, it can be optimized by
increasing the memory reuse ratio
Turn on the memory multiplexing technology, which can increase the number of virtual machines
deployed on the physical host to a certain extent
Enable memory multiplexing technology, the higher the multiplexing ratio, the better the
performance of the virtual machine
The total memory of all virtual machines created by the user with memory reuse technology must
be smaller than the physical memory
23. Which of the following descriptions about the development of cloud computing
architecture is wrong?
Resource pools move from small-scale resource virtualization integration to larger-scale resource
pool construction
Cloud platform and cloud management software from closed source and closed to open source
and open
From non-critical applications to enterprise-critical applications
Data form from unstructured and semi-structured to structured
24. Which of the following descriptions about KVM is correct?
NUMA
Resource hot addition
Template deployment
Snapshot
29. Which of the following can achieve load balancing among different hosts in the
FusionCompute cluster?
DPM
IM
CHA
DRS
30. In the early stage of enterprise operation, two physical hosts are used to deploy the
FusionCompute platform to carry services. The two hosts are in the same cluster. Virtual
machine 1 runs on host A, and virtual machine 2 runs on host B. The business needs to
reduce the load on host A. The technician wants to migrate virtual machine 1 on host A to
host B, but finds that the migration cannot be completed. Which of the following is the
possible reason?
Broad connection
Speed
low cost
Low latency
32. Which of the following descriptions about KVM is wrong?
KVM is a kernel-based virtual machine that runs on the Linux operating system
KVM supports hardware-assisted virtualization
KVM needs the DomianO virtual machine to schedule hardware resources
The KVM virtual machine exists as a process on the operating system
33. Which of the following cloud computing operation models is most suitable for small
Internet of Things enterprises?
Hybrid cloud
Private cloud
Community cloud
Public cloud
34. Which of the following descriptions about DVs is wrong?
SSD disk
SATA disk
SAS disk
NL-SAS disk
38. A company is migrating its business system to the FusionComute virtualization platform,
and the management plane and business plane are on different network segments. However,
due to incorrect configuration, a Linux virtual machine cannot run normally after migration.
Which of the following methods can an engineer not log in to a faulty virtual machine for
troubleshooting?
Log in to the normal virtual trigger on the same network segment and then jump to the faulty
virtual machine
Log in to the CNA operating system of the node and jump to the faulty virtual machine
Log in to the virtual machine with VNC on the FusionCompute platform
Use puttyi to remotely log in to the virtual machine
39. Which of the following does not belong to the interface type of VLAN?
Trunk
Hybrid
Tunel
Access
40. Which item is wrong with the description of FusionCompute distributed virtual machine
switch port group?
Port group supports special configuration of IP and MAC binding to improve security
Virtual machine NICs connected to the same port group have the same network attributes
A distributed switch can only create one port group in each computing node
Port groups are a mechanism for setting policies that are used to manage networks connected to
port groups
41. Which of the following is a typical application scenario of NAT technology?
Distributed storage has no controller enclosure and disk enclosure. All hard disk storage
resources come from general servers.
The equipment used in distributed storage is generally an ordinary server rather than a storage
device
Distributed storage has good scalability
Distributed storage uses RAID technology to ensure high availability and security of data
43. Which of the following is not a common operating system file system?
EXT4
NTFS
WNFS
FAT32
44. Which of the following is a common virtual machine disk file format?
VHD
RAW
VMDK
VDI
45. Which of the following descriptions about distributed virtual switches is wrong?
Iterative Migration
Forward Migration
Memory sharing
mirror double write
47. Which of the following is not a virtualization platform?
KVM
OpenStack
EXSi
XEN
48. Which of the following descriptions about cloud computing is correct?
Cloud computing is a technology that enables convenient and on-demand access to resources
anytime, anywhere
Various IT resources in cloud computing need to be paid to use
IT resources obtained in cloud computing need to be used through the network
In the process of obtaining IT resources, users need to repeatedly negotiate with cloud
computing service providers
49. Which of the following descriptions about clusters, hosts, and virtual machines in Huawei
FusionComputer is incorrect?
Fusion storage
NAS storage
Virtualized SAN storage
Non-virtualized local disk
51. When installing Huawei FusionCompute, which storage is recommended to deploy the
VRM?
Local disk
SAN
FC SAN
NAS
52. If a virtual machine on a physical host fails, it will not affect other virtual machines on the
physical host. Which feature of virtualization technology does this belong to?
to be independent
Zoning
to isolate
Encapsulation
53. Which of the following descriptions about ISCS and Fiber Channel is incorrect?
From the perspective of the transport layer, the transmission of Fiber Channel adopts the FC
protocol, and the ISCSI adopts the TCP/IP protocol.
The transmission distance of FC is farther than that of TCP/P
ISCSI runs on Ethernet based on TCP/IP protocol and can be combined with existing Ethernet
The FC protocol is completely heterogeneous with the existing Ethernet, and the compatibility is
relatively poor
54. Which of the following process of establishing a file system on a disk is usually called?
Formatting
Encapsulation
Partition
RAID
55. When configuring IP SAN for the host, it is usually necessary to configure () for the host
on the storage device so that the host and IPSAN can be mapped.
ISCSI Client
ISCSI Target
ISCSI Server
ISCSI Initiator
56. CS is a standardized protocol based on the () protocol and the SCS instruction set, and is
widely used in many storage networks that use the () architecture.
TCP/P FC SAN
FC, IP SAN
FC, FC SAN
TCP/IPIP SAN
57. The port configuration of a Huawei switch is as follows: iteftce Ggabtethete por inkn type
acespot defaut Wan16 According to the above configuration, which of the following
description is correct?
This port only allows data frames containing Van16 tags to pass through
This port will add a Vanl6 tag to the data frame that will pass through
The port will not perform any operations on the passing data
The port will strip off the vlan16 label in the passing data frame and forward it
58. Which of the following is the correct description of the main purpose of enabling the
NUMA function?
After memory multiplexing is turned off, the sum of the memory of all virtual machines is less
than or equal to the sum of the actual available physical memory
Turning off memory reuse requires that the memory reuse rate of all hosts in the cluster be less
than or equal to 100%
The use of memory reuse will degrade the performance of the virtual machine
The administrator can turn on or off the memory reuse function at any time
60. Which of the following descriptions about CPU resource QoS and memory resource QoS
is incorrect?
CPU share and CPU reservation only play a role when each virtual machine competes for
computing resources
Memory resource QoS is used to ensure that business-critical virtual machines can get enough
memory resources
The CPU QOS of the virtual machine is used to ensure that the computing resources of the
virtual machine are allocated reasonably
The memory resource QoS can only be used after the memory multiplexing switch is turned on