0% found this document useful (0 votes)
58 views

Questions H13-511 V5.0

Uploaded by

Reem Mustafa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Questions H13-511 V5.0

Uploaded by

Reem Mustafa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Huawei H13-511_V5.

0-ENU Exam Success


Guaranteed with DumpsBase Updated H13-
511_V5.0-ENU Exam Dumps V9.02
Passing the HCIA-Cloud Computing V5.0 H13-511_V5.0-ENU exam can be challenging, especially if
you don’t have access to the right study materials. We DumpsBase specialize in providing the latest
and greatest exam dumps to help candidates as you prepare for the H13-511_V5.0-ENU exam. Our
updated H13-511_V5.0-ENU exam dumps V9.02 provide you with 522 questions and answers,
which are regularly updated to ensure that you have access to the most recent and accurate
information. At DumpsBase, we guarantee that you can pass your HCIA-Cloud Computing V5.0
exam successfully with our Huawei H13-511_V5.0-ENU exam dumps V9.02. By choosing
DumpsBase for your H13-511_V5.0-ENU exam preparation, you can save time and money while
maximizing your chances of success.

HCIA-Cloud Computing V5.0 H13-511_V5.0-ENU


Free Dumps Demo Online
1. Which of the following descriptions about the functions of the CNA module in Huawei
FusionCompute is wrong?
Provide virtual computing capabilities
Dynamic adjustment of resources in the management cluster
Manage computing, storage, and network resources on computing nodes
Manage virtual machines on compute nodes
2. Which of the following descriptions about virtualization-related concepts is wrong?

Guest Machine: virtual machine


Guest OS: virtual machine operating system
Host Machine: machine
Host OS: virtualization software layer
3. Which of the following descriptions about Huawei FusionCompute HA is wrong?

The system periodically checks the status of the virtual machine. When the failure of the CNA
host causes the failure of the virtual machine, the system can migrate the virtual machine to other
CNA hosts in the cluster and restart it to ensure that the virtual machine can recover quickly.
If the data of the virtual machine is saved in the shared storage, the unsaved data will not be lost
when a failure occurs
The administrator can set different HA policies according to the importance of the virtual
machine.
This function supports automatic restart after a virtual machine failure
4. In which of the following scenarios, the core instructions issued by the operating system
can be directly sent to the underlying hardware?

CPU full virtualization scenario


CPU Paravirtualization Scenario
Hardware Assisted Virtualization Scenarios
Non-virtualized scenarios
5. Which of the following options is the correct sequence for making a complete template for
Huawei Desktop Cloud?

Create a bare virtual machine>install the operating system>configure the operating


system>encapsulate the template>convert the virtual machine into a template>configure the
template
Create a bare virtual machine > install the operating system > configure the operating system >
join the domain > encapsulate the template > convert the virtual machine to a template > configure
the template
Create a bare virtual machine > install the operating system > join the domain > configure the
operating system > package the template > convert the virtual machine to a template > configure the
template
Create a bare virtual machine > install the operating system > configure the operating system >
encapsulate the template > join the domain > convert the virtual machine to a template > configure
the template
6. Which of the following descriptions about cloud computing is wrong?

Support users to use multiple devices to use cloud resources through the network
Using the software-defined method, the data fault tolerance is not high
It has the characteristics of on-demand self-service and meterable services
The bottom layer can use virtualization technology to improve resource utilization
7. Which of the following descriptions about Libvirt components is wrong?

Both KVM and Xen can call the api provided by Libvirt to manage the virtualization platform
Libvirt is a set of library functions that are called by other technologies to manage the virtual
machine on the machine
Libvirt provides programming interfaces in multiple languages. You can directly call the external
interface provided by Libvirt to operate the virtual machine through programming.
Libvirt is a closed source project, it is a very powerful management tool
8. Which of the following descriptions about centralized storage and distributed storage is
wrong?

Distributed storage system is to disperse and store data on multiple independent devices. When
reading data, it needs to read data on multiple devices at the same time, so it will affect the rate of
data reading
Centralized storage can be divided into SANFINAS storage according to the technical
architecture, and SAN storage can be divided into FC-SAN and IP-SAN
The biggest feature of centralized storage is that the deployment structure is simple, and RAID
technology can also be used to ensure data security and reliability
The distributed network storage system adopts a scalable system structure and uses multiple
storage servers to share the storage load. It not only improves the reliability, availability and access
efficiency of the system, but is also easy to expand
9. Which of the following is not an optional function item in the step of creating a template in
FusionAccess Tindows Installer?

Enable the firewall configuration function


Install Personalized Data Management
Enable third-party Gina certification
Turn on Logout Restore
10. Which of the following descriptions about OpenStack is wrong?

The underlying virtualization resources are managed through the coordination of various
component services, and the usage is flexible
OpenStack is an open source cloud platform operating system
Virtualization resources can be allocated and scheduled according to user needs, and allocated
to different businesses and applications
OpenStack can independently implement resource access and abstraction without relying on the
underlying virtualization software
11. Two virtual machines belonging to the same network segment in the same host cannot
communicate with each other. Which of the following is not a possible cause of the failure?

The network card of the virtual machine is faulty


Virtual machine firewalls deny access to each other
Virtual machines are isolated through security groups
Two virtual machine NICs join the same port group
12. During the implementation of the FusionAccess gateway and load balancing deployment
solution, after configuring vAG/MLB, it is found that the HA status is abnormal. Which of the
following options is the cause of this failure?

The administrator changed the root password of HDC


The administrator changed the gandalf password of vAG/vLB
The administrator changed the ITA portal login password
The administrator changed the root password of vAG/vLB
13. To create a template in FusionAccess desktop cloud, which of the following accounts
must be filled in as the temporary account when installing the Windows operating system?

Private Account
safeAccount
AreaAccount
LocalAccount
14. Which of the following descriptions about the virtual network card is wrong?

The virtual network card has its own MAC address


From a network point of view, the function of the virtual network card is similar to that of the
physical network card
The virtual network card has its own IP address
A virtual machine can only have one virtual network card at the same time
15. Which of the following does not belong to Huawei's VLAN interface type?

Turnel
Trunk
Hybrid
Access
16. Which of the following descriptions about IP routing is wrong?

Include the next MAC address


Can be dynamically generated
Include the outgoing interface name
Can be manually configured
17. Which of the following computer hardware is not a necessary group or part for a server?

Monitor
Power supply and fan module
hard disk
CPU
18. In Huawei FusionCompute, which one is correct about the description of "role"?

A "role" can have one or more different "operating permissions"


If a "user" has multiple "roles", its "operating authority" depends on the "role" with the highest
priority
The "operation authority" of the "role" cannot be modified
A "user" can only have one "role"
19. Regarding the description of HDP display technology, which of the following wrong
options?

Use lossless compression for unnatural images


Can automatically identify unnatural images such as text, Windows frames, lines, etc. in the
entire image
Only supports Huawei-specific self-developed image compression algorithms
Lossy compression of natural images such as photos and pictures with an appropriate
compression rate
20. FusionCompute consists of two parts: CNA and VRM. Which of the following is not a
function of CNA?

Manage computing, storage, and network resources on computing nodes


Manage virtual machines on compute nodes
Manage network resources (IP/VLAN) in the cluster and assign IP addresses to virtual machines
Provide virtual computing capabilities
21. Which of the following descriptions about non-uniform memory architecture NUMA is
wrong? ()

Solve scalability problems in multiprocessor systems


Load balancing needs to consider Node correlation in the scheduling process
The CPU accesses the memory of other Nodes faster than the local memory
Divide CPU, memory and /O resources into different Nodes
22. Which of the following descriptions about memory multiplexing technology is correct?

If the memory usage of the user virtual machine is relatively high, it can be optimized by
increasing the memory reuse ratio
Turn on the memory multiplexing technology, which can increase the number of virtual machines
deployed on the physical host to a certain extent
Enable memory multiplexing technology, the higher the multiplexing ratio, the better the
performance of the virtual machine
The total memory of all virtual machines created by the user with memory reuse technology must
be smaller than the physical memory
23. Which of the following descriptions about the development of cloud computing
architecture is wrong?

Resource pools move from small-scale resource virtualization integration to larger-scale resource
pool construction
Cloud platform and cloud management software from closed source and closed to open source
and open
From non-critical applications to enterprise-critical applications
Data form from unstructured and semi-structured to structured
24. Which of the following descriptions about KVM is correct?

KVM is a hardware-assisted virtualization


KVM is a closed-source virtualization technology
KVM is a virtual machine on Linux.
KVM uses front-end and back-end architectures to realize virtualization
25. Which of the following descriptions about Hypervisor is correct?

Hypervisor is equal to virtual batching, with Hypervisor, virtualization can be realized


The Hypervisor implements the isolation between the operating system and applications and the
hardware layer
Hypervisor is an operating system in host virtualization
Hypervisor runs in non-Root mode in hardware-assisted virtualization
26. Which of the following descriptions about the function of OvS (Open vSwitch) is wrong?

Divide the LAN


Build the tunnel
Hardware monitoring
Analog Routing
27. Which of the following descriptions about RAID is wrong?

RAID 6 ensures the reliability of user data through mirroring


RAID 5 guarantees the reliability of user data through parity check
RAID 0 improves storage read and write performance through striping
RAID 1 guarantees the reliability of user data through mirroring
28. A company has deployed its business on the FusionCompute platform. In order to
optimize the memory access performance of the virtual machine, which of the following
virtual machine features should be used?

NUMA
Resource hot addition
Template deployment
Snapshot
29. Which of the following can achieve load balancing among different hosts in the
FusionCompute cluster?

DPM
IM
CHA
DRS
30. In the early stage of enterprise operation, two physical hosts are used to deploy the
FusionCompute platform to carry services. The two hosts are in the same cluster. Virtual
machine 1 runs on host A, and virtual machine 2 runs on host B. The business needs to
reduce the load on host A. The technician wants to migrate virtual machine 1 on host A to
host B, but finds that the migration cannot be completed. Which of the following is the
possible reason?

The cluster has enabled the IMC policy


The cluster has enabled memory multiplexing
Virtual machine 2 is set to bind with host B
Virtual machine 1 and virtual machine 2 have set mutually exclusive virtual machine policies
31. Which of the following is not a characteristic of 5G?

Broad connection
Speed
low cost
Low latency
32. Which of the following descriptions about KVM is wrong?
KVM is a kernel-based virtual machine that runs on the Linux operating system
KVM supports hardware-assisted virtualization
KVM needs the DomianO virtual machine to schedule hardware resources
The KVM virtual machine exists as a process on the operating system
33. Which of the following cloud computing operation models is most suitable for small
Internet of Things enterprises?

Hybrid cloud
Private cloud
Community cloud
Public cloud
34. Which of the following descriptions about DVs is wrong?

Support QoS function


Support VLAN function
Does not support web services
Does not support the OpenFlow protocol
35. Which of the following descriptions about namespace in Linux virtual network is wrong?

Multiple namespaces can be created in a Host


A device can only be located in one namespacer
From a purely network perspective, namespacei can provide an independent network protocol
money
Different namespaces are isolated from each other and cannot communicate
36. Due to business development, a company needs to expand the disk capacity of some
business virtual machines, but finds that several disks do not support capacity expansion.
Which of the following is not a possible cause of the failure?

The disk is a shared disk


The disk is a differential disk
The virtual machine is in the "Stopped" state
The virtual machine is in maintenance mode
37. A bank now needs to purchase batches of hard disks to store some key data in daily
operations. Which of the following hard disks is the most suitable?

SSD disk
SATA disk
SAS disk
NL-SAS disk
38. A company is migrating its business system to the FusionComute virtualization platform,
and the management plane and business plane are on different network segments. However,
due to incorrect configuration, a Linux virtual machine cannot run normally after migration.
Which of the following methods can an engineer not log in to a faulty virtual machine for
troubleshooting?

Log in to the normal virtual trigger on the same network segment and then jump to the faulty
virtual machine
Log in to the CNA operating system of the node and jump to the faulty virtual machine
Log in to the virtual machine with VNC on the FusionCompute platform
Use puttyi to remotely log in to the virtual machine
39. Which of the following does not belong to the interface type of VLAN?

Trunk
Hybrid
Tunel
Access
40. Which item is wrong with the description of FusionCompute distributed virtual machine
switch port group?

Port group supports special configuration of IP and MAC binding to improve security
Virtual machine NICs connected to the same port group have the same network attributes
A distributed switch can only create one port group in each computing node
Port groups are a mechanism for setting policies that are used to manage networks connected to
port groups
41. Which of the following is a typical application scenario of NAT technology?

The company intranet virtual machine accesses the intranet application


Internet access to the company's internal Web application server
The administrator logs in to the intranet virtual machine through the virtualization platform
The same - mutual access of virtual machines in the network
42. Which of the following descriptions about distributed storage is wrong?

Distributed storage has no controller enclosure and disk enclosure. All hard disk storage
resources come from general servers.
The equipment used in distributed storage is generally an ordinary server rather than a storage
device
Distributed storage has good scalability
Distributed storage uses RAID technology to ensure high availability and security of data
43. Which of the following is not a common operating system file system?

EXT4
NTFS
WNFS
FAT32
44. Which of the following is a common virtual machine disk file format?
VHD
RAW
VMDK
VDI
45. Which of the following descriptions about distributed virtual switches is wrong?

Each virtual machine has only one VNC connection


For the convenience of management, port groups are used to manage a group of ports with the
same attributes
Multiple distributed switches can be configured in the cluster
Each distributed switch has multiple distributed virtual ports
46. Which of the following descriptions about the technology used for virtual machine live
migration is correct?

Iterative Migration
Forward Migration
Memory sharing
mirror double write
47. Which of the following is not a virtualization platform?

KVM
OpenStack
EXSi
XEN
48. Which of the following descriptions about cloud computing is correct?

Cloud computing is a technology that enables convenient and on-demand access to resources
anytime, anywhere
Various IT resources in cloud computing need to be paid to use
IT resources obtained in cloud computing need to be used through the network
In the process of obtaining IT resources, users need to repeatedly negotiate with cloud
computing service providers
49. Which of the following descriptions about clusters, hosts, and virtual machines in Huawei
FusionComputer is incorrect?

Hosts can move between clusters


Virtual machines can be moved across clusters
Whether multiple hosts belong to the same cluster depends on whether they use the same
shared storage
A cluster is composed of multiple hosts and their associated storage and network resources
50. In Huawei FusionCompute, the data storage type that does not support disk expansion is
()

Fusion storage
NAS storage
Virtualized SAN storage
Non-virtualized local disk
51. When installing Huawei FusionCompute, which storage is recommended to deploy the
VRM?

Local disk
SAN
FC SAN
NAS
52. If a virtual machine on a physical host fails, it will not affect other virtual machines on the
physical host. Which feature of virtualization technology does this belong to?

to be independent
Zoning
to isolate
Encapsulation
53. Which of the following descriptions about ISCS and Fiber Channel is incorrect?

From the perspective of the transport layer, the transmission of Fiber Channel adopts the FC
protocol, and the ISCSI adopts the TCP/IP protocol.
The transmission distance of FC is farther than that of TCP/P
ISCSI runs on Ethernet based on TCP/IP protocol and can be combined with existing Ethernet
The FC protocol is completely heterogeneous with the existing Ethernet, and the compatibility is
relatively poor
54. Which of the following process of establishing a file system on a disk is usually called?

Formatting
Encapsulation
Partition
RAID
55. When configuring IP SAN for the host, it is usually necessary to configure () for the host
on the storage device so that the host and IPSAN can be mapped.

ISCSI Client
ISCSI Target
ISCSI Server
ISCSI Initiator
56. CS is a standardized protocol based on the () protocol and the SCS instruction set, and is
widely used in many storage networks that use the () architecture.

TCP/P FC SAN
FC, IP SAN
FC, FC SAN
TCP/IPIP SAN
57. The port configuration of a Huawei switch is as follows: iteftce Ggabtethete por inkn type
acespot defaut Wan16 According to the above configuration, which of the following
description is correct?

This port only allows data frames containing Van16 tags to pass through
This port will add a Vanl6 tag to the data frame that will pass through
The port will not perform any operations on the passing data
The port will strip off the vlan16 label in the passing data frame and forward it
58. Which of the following is the correct description of the main purpose of enabling the
NUMA function?

Maximize the computing power of the physical host CPU


Maximize the reuse rate of physical machine memory
Optimize the memory access performance of the virtual machine
Maximize the computing power of the vCPU of the virtual machine
59. In Huawei FusionCompute, which of the following descriptions of memory reuse is
incorrect?

After memory multiplexing is turned off, the sum of the memory of all virtual machines is less
than or equal to the sum of the actual available physical memory
Turning off memory reuse requires that the memory reuse rate of all hosts in the cluster be less
than or equal to 100%
The use of memory reuse will degrade the performance of the virtual machine
The administrator can turn on or off the memory reuse function at any time
60. Which of the following descriptions about CPU resource QoS and memory resource QoS
is incorrect?

CPU share and CPU reservation only play a role when each virtual machine competes for
computing resources
Memory resource QoS is used to ensure that business-critical virtual machines can get enough
memory resources
The CPU QOS of the virtual machine is used to ensure that the computing resources of the
virtual machine are allocated reasonably
The memory resource QoS can only be used after the memory multiplexing switch is turned on

You might also like