Huawei: H13-511 - V4.0 Exam
Huawei: H13-511 - V4.0 Exam
Huawei: H13-511 - V4.0 Exam
Huawei
H13-511_V4.0 Exam
HCIA-Cloud Computing V4.0 Exam
https://www.braindumps2go.com
Questions & Answers PDF Page-2
Question: 1
In Huawei FusionCompute, the administrator can view the DVS port to which the virtual machine is
connected.
A. TRUE
B. FALSE
Answer: B
Question: 2
When creating a port group in Huawei FusionCompute, the following operation is wrong
Answer: A
Question: 3
In Huawei FusionCompute, adjusting virtual machine specifications is not supported when cloning a
virtual machine.
A. TRUE
B. FALSE
Answer: B
Question: 4
The memory and CPU resources used by virtual machines in Huawei FusionCompute can only be
provided by the same cluster. Therefore, the maximum available computing resources for virtual
machines cannot exceed the sum of resources available to all hosts in the cluster
https://www.braindumps2go.com
Questions & Answers PDF Page-3
A. TRUE
B. FALSE
Answer: B
Question: 5
The following options are characteristic of the era of cloud computing 1.0 (multiple choices)
Answer: B. D
Question: 6
Answer: B
Question: 7
Answer: A
Question: 8
In the development of the Internet, there are many milestone events. The order of the milestone
events in the following options is normal.
https://www.braindumps2go.com
Questions & Answers PDF Page-4
Answer: C
Question: 9
Cloud computing is the product of the development of the Internet and computing technology, so
cloud computing must be inseparable from the network.
A. TRUE
B. FALSE
Answer: A
Question: 10
The description of the relationship between Host Machine and Guest Machine is correct (multiple
choice)
A. After using virtualization technology, one guest machine can use the resources of multiple host
machines at the same time.
B. After using virtualization technology, a guest machine can only run on the host machine that
created it
C. After using virtualization technology, a Host Machine can only run one Hypervisor
D. After using virtualization technology, multiple guest machines can run on one host machine
Answer: C. D
Question: 11
A. CPU virtualization
B. Network virtualization
C. Memory virtualization
D. I / O virtualization
E. Disk virtualization
Answer: A. C. D
https://www.braindumps2go.com
Questions & Answers PDF Page-5
Question: 12
KVM (Kernel-based Virtual Machine) virtual machine can run on other virtualization platforms after
format conversion
on. A
A. TRUE
B. FALSE
Answer: A
Question: 13
In the Huawei FusionCompute architecture, what belongs to the Host Machine role is
A. CNA
B. UVP
C. KVM
D. VRM
Answer: A
Question: 14
A. After using virtualization, multiple virtual machines can run on one physical host at the same time.
B. After using virtualization, the CPU utilization of a physical host can be stabilized at about 65%
C. After using virtualization, virtual machines can be migrated between multiple hosts
D. After using virtualization, multiple applications can run on the operating system of a physical host.
Answer: A. C
Question: 15
The following description about KVM (Kernel-based Virtual Machine) is correct (multiple selection)
Answer: A. C. D
https://www.braindumps2go.com
Questions & Answers PDF Page-6
Question: 16
Answer: A. B. D
Question: 17
Answer: A. C. D
Question: 18
Virtualization technology can improve the utilization of hardware resources, reduce operation and
operation and maintenance costs, and cloud computing also has these advantages.
Therefore, cloud computing and virtualization technology are inseparable. // Cloud computing is not
equal to virtualization
A. TRUE
B. FALSE
Answer: B
Question: 19
Computing virtualization has different classifications from different perspectives, which can be
divided into type I and type II virtualization, and can also be divided into full virtualization and
paravirtualization.
A. TRUE
B. FALSE
Answer: A
https://www.braindumps2go.com
Questions & Answers PDF Page-7
Question: 20
A. NAS
B. FusionStorage
C. local disk
D. SAN
Answer: B
Question: 21
A. RAID 1
B. RAID 6
C. RAID 0
D. RAID 5
Answer: C
Question: 22
Answer: D
Question: 23
For scenarios such as archives that need to store large amounts of data for a long time, but do not
need to read frequently, it is recommended Type of disk?
A. SAS disk
B. NL-SAS disk
C. SATA disk
D. SSD disk
Answer: C
https://www.braindumps2go.com
Questions & Answers PDF Page-8
Question: 24
A SATA disk is a disk using a parallel interface type, and a SAS disk is a disk using a serial interface
type.
A. TRUE
B. FALSE
Answer: B
Question: 25
A. 3, 2
B. 2, 1
C. 1, 2
D. 2, 3
Answer: C
Question: 26
The following can achieve computer virtualization in the era of cloud computing 1.0 and improve
resource utilization
A. KVM
B. Xen
C. Hyper-v
D. OpenStack
Answer: B
Question: 27
After KVM uses Virtio, the description of the I / 0 forwarding process is correct [multiple choices]
A. I / 0 requests are sent directly from the front-end driver to the back-end driver
B. I / 0 requests are no longer forwarded via QUEM
C. I / 0 requests will be more efficiently forwarded
D. I / 0 requests need to be forwarded by the KVM module
Answer: A. C
Question: 28
https://www.braindumps2go.com
Questions & Answers PDF Page-9
If an enterprise uses a hybrid cloud, the devices that cannot be used as the demarcation point
between public and private clouds are
A. Core switch
B. Firewall
C. Virtual switch
D. Flow cleaning equipment
Answer: A. C
Question: 29
Open source virtualization technologies are all type I virtualization, and closed source virtualization
technologies are all type II virtualization
A. TRUE
B. FALSE
Answer: B
Question: 30
The following description about the characteristics of type I (bare metal) computing virtualization is
correct [multiple choices]
Answer: B. D
Question: 31
https://www.braindumps2go.com
Questions & Answers PDF Page-10
Answer: D
Question: 32
To configure the IP SAN for the host, you usually need to configure the host on the storage device to
enable the host to be mapped on the IP SAN Shoot.
A. ISCSI Target
B. ISCSI Server
C. ISCSI Client
D. ISCCSI Initiator
Answer: D
Question: 33
The essence of the Internet of Things is the Internet. As long as hardware or products are connected
to the network, data interaction can be called the Internet of Things
A. TRUE
B. FALSE
Answer: A
Question: 34
A. TRUE
B. FALSE
Answer: B
Question: 35
In Huawei FusionCompute, when a compute node is powered off, the system can have HA on the
computer node.
Attribute virtualization is pulled up on other computer nodes. Among the following options, it is not
necessary to implement this function:
https://www.braindumps2go.com
Questions & Answers PDF Page-11
Answer: D
Question: 36
In computing virtualization, the operating system running in a virtual machine is called Host OS.
A. TRUE
B. FALSE
Answer: B
Question: 37
With the development of AI technology, almost every technology now involves artificial intelligence.
Which of the following is now AI?
Application area? [multiple choices]
Answer: A. B. C. D
Question: 38
Question: 39
In Huawei FusionCompute, when a host in the cluster fails, the virtual machine on that host will
automatically
Automatic migration to other hosts in the cluster
A. TRUE
B. FALSE
Answer: B
Question: 40
https://www.braindumps2go.com
Questions & Answers PDF Page-12
Answer: A
Question: 41
In Huawei FusionCompute, if the server has a small number of physical NICs, you can consider
merging multiple planes.
, Using a VLAN to logically isolate each plane A
A. TRUE
B. FALSE
Answer: A
Question: 42
The following description about the cluster, host and virtual machine in Huawei FusionCompute is
incorrect
A. Determine whether the hosts belong to the same cluster depends on whether you use unified
shared storage
B. A cluster is made up of multiple hosts and their associated storage and network resources
C. Virtual machines can be migrated across clusters
D. Hosts can be moved between different clusters
Answer: C
Question: 43
In Huawei FusionCompute, the configuration mode of the most storage-efficient virtual machine disk
loading is
A. General
B. Independent-persistent
C. Streamline
D. Independent-non-persistent
Answer: C
https://www.braindumps2go.com
Questions & Answers PDF Page-13
Question: 44
The following description about virtualized storage and non-virtualized storage is correct
Answer: C
Question: 45
A. Router
B. VLAN
C. Hub
D. Firewall
Answer: C
Question: 46
A.TURE
B. FALSE
Answer: A
Question: 47
Answer: D
Question: 48
https://www.braindumps2go.com
Questions & Answers PDF Page-14
The SAN provides the host with a "bare disk" without a file system. What file system is built on it
depends entirely on the host's operating system.
A. TRUE
B. TRUE
Answer: B
Question: 49
The following description about the differences between physical switches and virtual switches is
incorrect (B)
A. virtual switch runs on a physical server, and the physical switch has separate hardware
B. The virtual switch cannot operate on the VLAN tag, and the physical switch can operate on the
VLAN tag
C. A virtual switch cannot be configured with a Layer 3 interface, and a physical switch can be
configured with a Layer 3 interface
D. Virtual switches also require certain hardware resources for their normal operation
Answer: B
Question: 50
In Huawei Fusion Compute, the following description of the number correspondence between
virtual machines and DVS is correct (multiple selection)
A. When a virtual machine has a network card, the network card can only be associated with one
DVS
B. When a virtual machine has multiple network cards, each network card can be associated with a
DVS
C. When there are multiple NICs in a virtual machine, multiple NICs can be associated with the same
DVS.
D. When a virtual machine has a network card, the network card can be associated with multiple
DVSs.
Answer: A. B. C
Question: 51
https://www.braindumps2go.com
Questions & Answers PDF Page-15
A. Data frame containing vlan 16 label will be stripped and forwarded when passing through the port
B. Data frames that do not contain any labels are dropped when passing through the port
C. When a data frame that does not contain any tags passes through the port, it will be tagged with
VLAN 16 or VLAN 17 and
Forward
D. Data frames containing VLAN 17 tags will be tagged and forwarded as they pass through the port
Answer: D
Question: 52
In Huawei FusionCompute, the following incorrect technical description of CPU QoS is (C)
A. The role of "reservation" is to ensure the lower limit of the computing power of the virtual
machine, that is, how much resources are used at least
B. "Shares" is used to calculate resources based on the relative CPU share values of multiple virtual
machines when computing resources are insufficient.
Source balance and adjustment
C. "limit" is used to specify the maximum number of hosts
D. By adjusting the "Reservation", "Share", "Restriction", to achieve control of the virtual machine
CPU resource usage
Answer: C
Question: 53
In Huawei Fusion Compute, to facilitate unified management, each DVS must be configured with a
management IP address.
A. TRUE
B. TRUE
Answer: B
Question: 54
Artificial intelligence is a new research and development theory, method, technology and application
system used to extend artificial intelligence.
Technical science, the following statement about artificial intelligence is wrong (D)
https://www.braindumps2go.com
Questions & Answers PDF Page-16
Answer: D
Question: 55
In Huawei FusionCompute, when a virtual machine installs an operating system by mounting a local
image file, the administrator can close the VNC window at any time without affecting the reading of
the image. A
A. TRUE
B. TRUE
Answer: A
Question: 56
A. memory reuse technology can make the sum of virtual machine memory specifications larger than
the sum of physical server specifications
B. memory reuse technology can make the total memory used by virtual machines larger than the
total memory of physical server specifications
C. After the C memory reuse function is enabled, the memory reuse rate is inversely proportional to
the actual memory usage of each virtual machine.
D. memory reuse single technology includes memory bubbles, memory swap and memory sharing
Answer: B
Question: 57
In Huawei FusionCompute, the following description of the virtual machine HA is correct (multi-
selection) ABC
A. Virtual machine HA function can quickly restore business when a failure occurs
When system
B. detects the blue screen of the virtual machine and configures the processing strategy as HA. the
system will choose another normal computing node for reconstruction
virtual machine
C. After HA is enabled in the cluster, virtual machines can be rebuilt on other hosts after a host failure
As long as resources are reserved in the D cluster, virtual machines with HA attributes can be rebuilt
on other computing nodes when a fault occurs
success
Answer: A. B. C
Question: 58
https://www.braindumps2go.com
Questions & Answers PDF Page-17
Answer: B
Question: 59
A. LDAP
B. LACP
C. VLAN
D. VXLAN
Answer: B
Question: 60
Answer: A. B
Question: 61
CPU virtualization technology can be divided into full virtualization, paravirtualization, software
virtualization, and hardware-assisted virtualization.
A. TRUE
B. TRUE
Answer: A
Question: 62
In Huawei FusionCompute, virtual machines using non-virtualized storage do not support the
https://www.braindumps2go.com
Questions & Answers PDF Page-18
snapshot function.
A. TRUE
B. TRUE
Answer: B
Question: 63
IoT devices can be connected to the Internet and can be controlled via the Internet.
A. TRUE
B. TRUE
Answer: A
Question: 64
Some virtualization technologies are open source, and some are closed source. The same is true for
cloud computing management platforms. Open source cloud computing management platforms
need to be implemented using open source virtualization technology.
A. TRUE
B. TRUE
Answer: B
Question: 65
In Huawei FusionCompute, in addition to configuring static routes, DVS also supports multiple
dynamic routes.
A. TRUE
B. TRUE
Answer: B
Question: 66
A. Normal
B. emergency
C. hint
D. secondary
E. important
https://www.braindumps2go.com
Questions & Answers PDF Page-19
Answer: A
Question: 67
Create a virtual machine by importing it in Huawei FusionCompute. The following file formats are
not supported ()
A. ova
B. qcow2
C. ovf
D. vmdk
Answer: D
Question: 68
A. This port will add a VLAN 16 tag to the data frames that pass by
B. This port allows only data with vlan 16 tags to pass through.
C. The port will strip the VLAN 16 label of the passing data frame and forward it.
D. The port will not do any operations on the data frames passing by.
Answer: C
Question: 69
In Huawei FusionCompute, to improve VRM reliability, which of the following deployment methods
is recommended?
Answer: A
Question: 70
https://www.braindumps2go.com
Questions & Answers PDF Page-20
A. Value
B. Varitey
C. Valid
D. Volume
Answer: C
Question: 71
Which of the following statements about the relationship between cloud computing and the Internet
of Things is incorrect?
A. Without cloud computing support, the Internet of Things cannot perform data transmission
B. Cloud computing is the cornerstone of the development of the Internet of Things, and at the same
time, the Internet of Things continues to promote the development of cloud computing
C. Cloud computing can provide enough storage space for massive data of the Internet of Things
D. If there is no cloud computing as the basic support, the work efficiency of the Internet of Things
will be greatly reduced
Answer: A
Question: 72
Storage virtualization technology can improve storage utilization and provide storage resources for
multiple virtual machines.
A. Yes
B. wrong
Answer: A
Question: 73
Answer: D
Question: 74
The virtual switch plays an important role in communicating between virtual machines and is an
indispensable component
https://www.braindumps2go.com
Questions & Answers PDF Page-21
A. Yes
B. wrong
Answer: A
Question: 75
A. "Virtual machine to template" is to directly convert a virtual machine into a template, all
parameters use the current configuration of the virtual machine
The virtual machine will no longer exist after conversion
B. When using a virtual machine to make a template, the status of the virtual machine can be
"running"
C. "Clone a template as a template" is to copy the template as a new template and support
adjustment of some parameter configurations, which can be slightly different from the original
template
The difference is that the template still exists after cloning is complete
D. "Clone a virtual machine as a template" is to copy the virtual machine as a template and support
adjustment of some parameter configurations, which can be compared with the original virtual
machine.
The virtual machine is slightly different. The virtual machine still exists after cloning is complete.
Answer: B
Question: 76
In Huawei FusionCompute, if a virtual machine is bound to a host, the functions that will be affected
are (multi-select) .
A. DRS
B. Memory Hot Add
C. Thermal migration
D. Snapshot
Answer: A. C
Question: 77
https://www.braindumps2go.com
Questions & Answers PDF Page-22
Answer: B
Question: 78
In Huawei FusionCompute, the description of the "shared" type disk is correct (multi-select).
A. The virtual machine to which this type of hard disk is bound does not support the snapshot
function
B. This type of hard disk can only be bound to one virtual machine
C. The virtual machine does not support changing datastores on such hard disks
D. This type of hard disk can be bound to multiple virtual machines
Answer: A. C. D
Question: 79
Answer: C
Question: 80
A. Enable memory reuse technology. The higher the reuse ratio, the better the performance of the
virtual machine.
B. Enabling memory reuse technology can improve the deployment of virtual machines on physical
hosts
C. If the user's virtual machine memory usage is high, you can optimize it by modifying the memory
reuse ratio
D. Enabling memory reuse technology, the total memory of all virtual machines created by the user
can exceed the physical memory
Answer: A
Question: 81
The function of the Internet of Things is only to collect data generated by various things.
A. Yes
B. wrong
https://www.braindumps2go.com
Questions & Answers PDF Page-23
Answer: B
Question: 82
A. Hub
B. Layer 2 switch
C. Router
D. Physical server NIC
Answer: C
Question: 83
In cloud computing, the network can be divided into two parts: virtual network and physical
network.
A. Yes
B. wrong
Answer: A
Question: 84
A. Authorization between the security group to be deleted and other security groups does not affect
the deletion
B. There are no virtual machines in the security group. If there are virtual machines in the security
group, you need to remove the virtual machines from the security group.
C. After the security group is deleted, all the security group rules in the group are deleted at the
same time
D. When you delete a security group to which a virtual machine belongs, the other security groups
have no effect on the virtual machine.
Answer: C
Question: 85
Intelligent memory reuse technology (memory bubble, memory swap, memory sharing) can be
customized to turn on / off any of the functions according to customer needs
A. Yes
B. wrong
https://www.braindumps2go.com
Questions & Answers PDF Page-24
Answer: B
Question: 86
Answer: C
Question: 87
A. Yes
B. wrong
Answer: A
Question: 88
A. The FC protocol is completely heterogeneous with the existing Ethernet and has poor
compatibility.
B. iSCSI runs on Ethernet based on TCP / IP protocol and can be seamlessly integrated with existing
Ethernet
C. FC has a longer transmission distance than TCP / IP
D. From the perspective of the transport layer, Fibre Channel uses the FC protocol, and iSCSI uses the
TCP / IP protocol.
Answer: C
Question: 89
A. Copying a snapshot
B. Modifying a snapshot
C. Create a snapshot
D. Delete a snapshot
https://www.braindumps2go.com
Questions & Answers PDF Page-25
Answer: A
Question: 90
A.TRUE
B. FALSE
Answer: A
Question: 91
In Huawei fusion compute, all virtual machine NICs that join the same security group use this
security group filtering. To improve security, you need to add the same network card to multiple
security groups. B // A network card is only assigned to one security group
A. TURE
B. FALSE
Answer: B
Question: 92
A virtual machine can have multiple virtual network adapters at the same time, corresponding to
different virtual switches.
A.TURE
B. FALSE
Answer: A
Question: 93
Which of the following virtual machine disk file formats does Huawei fusioncompute not support? A
A. VMDK
B.VHD
C.RAW
D.QCOW2
Answer: A
Question: 94
https://www.braindumps2go.com
Questions & Answers PDF Page-26
In fusioncompute, the virtual switch is connected to the physical network via ().
A.INIC
B. Virtual network card
C. Port group
D. Uplink
Answer: D
Question: 95
The rules in the security group will be deleted along with the security group
A.TRUE
B. FALSE
Answer: B
Question: 96
A. Application-level virtualization
B. Block-level virtualization
C. Page-level virtualization
D. File-level virtualization
Answer: B. D
Question: 97
A. Packaging
B. Formatting
C. RAID
D. Partition
Answer: B
Question: 98
The necessary conditions for a virtual machine to communicate with other virtual machines are
(multiple choice)
https://www.braindumps2go.com
Questions & Answers PDF Page-27
Answer: B. C
Question: 99
In Huawei FunsionCompute, the operations that can be performed on VRM are (multi-select)
A. RAID RAID
B. Converting virtualized storage to non-virtualized storage
C. Manually add storage devices to the virtual machine
D. Add SAN storage as non-virtualized storage
Answer: C. D
Question: 100
The VLAN ID (except 0) configured for DVS in Huawei FunsionCompute needs to exist on the physical
switch, otherwise it will affect the normal communication of the virtual machine.
A. TRUE
B. TRUE
Answer: B
Question: 101
A. Hypervisor is virtualization
B. Hypervisor is essentially an operating system
C. Hypervisor carries a large number of drivers, so the Hypervisor does not need to install drivers and
patches
D. Hypervisor is the key to computer virtualization
Answer: D
Question: 102
Create a new disk in Huawei FusionCompute, which of the following operations is incorrect
A. Set the disk type to "normal" and the disk mode to "independent-non-persistent"
B. Set the disk configuration mode to "Thin" and the disk mode to "Independent-Persistent"
C. Set the disk mode to "independent-non-persistent" and change the raw device mapping to
"supported"
D. Set the disk configuration mode to "Thin" and the disk mode to "Independent-Non-persistent"
https://www.braindumps2go.com
Questions & Answers PDF Page-28
Answer: C
Question: 103
If a virtual machine wants to communicate with other virtual machines, which of the following
options is necessary?
Answer: D
Question: 104
A. IaaS
B. DaaS
C. PaaS
D. SaaS
Answer: A
Question: 105
Which of the following methods are generally supported by a physical switch for remote
management (multiple selection)
A. Telnet
B. SSL
C. Web
D. SSH
Answer: A. C. D
Question: 106
https://www.braindumps2go.com
Questions & Answers PDF Page-29
VNC server
Answer: B. C
Question: 107
Answer: D
Question: 108
Which of the following scenarios is not recommended to enable the memory reuse function?
Answer: C
Question: 109
NUMA is a memory architecture designed for multiprocessor computers. Memory access time
depends on
Processor location, under NUM
A. the processor accesses its own local memory faster than non-local memory (the memory is
located in
Another processor, or shared memory between processors) is faster.
A. TRUE
B. FALSE
Answer: A
Question: 110
https://www.braindumps2go.com
Questions & Answers PDF Page-30
Answer: B. C
Question: 111
A. Convert virtual machines from other virtualization platforms into virtual machines available to
FusionCompute
B. Cloning a virtual machine
C. create a virtual machine
D. delete the virtual machine
Answer: B. C. D
Question: 112
Data packets in the cloud computing virtual network need to be routed and forwarded by routers in
the physical network. / TOR switch
A.TURE
B. FALSE
Answer: B
Question: 113
ISCSI is a standardized protocol based on the _____ protocol and the SCSI instruction set. It is widely
used in many storage networks using the ____ architecture.
A. FC IP SAN
B. TCP / IP FC SAN
C.FC FC SAN
D. TCP / IP IP SAN
Answer: D
Question: 114
Cloud computing is the product of the development of parallel computing, grid computing, and
distributed computing. The correct description of the relationship between the four is
https://www.braindumps2go.com
Questions & Answers PDF Page-31
Answer: C
Question: 115
A. Router
B. Hub
C. Layer 2 switch
D. Layer 3 switch
Answer: C
Question: 116
The following description of the characteristics of cloud computing resource pooling is correct
A. Cloud computing resource pooling is a prerequisite for achieving extensive network access
B. Cloud computing resource pooling feature can put CPU and hard disk in the same resource pool
C. Cloud computing resource pooling characteristics can shield the differences between similar
resources
D. Cloud computing resource pooling features must rely on virtualization technology to achieve
Answer: C
Question: 117
Templates can be used to quickly deploy virtual machines. Currently, templates can only be made by
converting or cloning virtual machines.
A. TRUE
B. FALSE
Answer: B
Question: 118
In Huawei FusionCompute, a virtual machine can have multiple virtual network adapters.
A. TURE
B. FALSE
Answer: A
https://www.braindumps2go.com
Questions & Answers PDF Page-32
Question: 119
During the snapshot creation process, you can perform other operations on the virtual machine.
A.TURE
B. FALSE
Answer: B
Question: 120
A. Virtual machine A and virtual machine B use the same network segment
B. Both virtual machine A and virtual machine B are configured with the correct IP addresses
C. Virtual machine A and virtual machine B use different network segments
D. Virtual machine A and virtual machine B run on the same physical host
Answer: B
Question: 121
In Huawei FusionCompute, the following description about the hot migration is incorrect
A. Live migration includes virtual machine live migration and disk live migration
B. Use the technology of rapid replication of memory data and shared storage during the hot
migration of virtual machines to ensure the number of virtual machines
Data unchanged
C. Storage live migration can only be performed within the same storage device under storage
virtualization management
D. The types of virtual machine live migration are divided into change host, change datastore, and
change host and datastore
Answer: C
Question: 122
In Huawei FusionCompute, DRS rules do not take effect for virtual machines bound to USB devices.
A.TURE
B. FALSE
Answer: A
Question: 123
https://www.braindumps2go.com
Questions & Answers PDF Page-33
Answer: B. C. D
Question: 124
Answer: B. C
Question: 125
Memory reuse is a resource allocation scheme that increases the density of virtual machines on a
single host, reduces costs, and sacrifice performance for density.
A.TRUE
B. FALSE
Answer: B
Question: 126
Answer: D
Question: 127
https://www.braindumps2go.com
Questions & Answers PDF Page-34
Answer: D
Question: 128
Answer: A. C
Question: 129
When installing Huawei FusionCompute, which storage is recommended for VRM deployment?
A. NAS
B. FC SAN
C. IP SAN
D. Local Disk
Answer: D
Question: 130
A. After the virtual machine is cloned as a template, the virtual machine still exists
B. Custom parameters when deploying virtual machines using templates
C. After converting the template to a virtual machine, the template no longer exists
D. Templates can be used across virtualization platforms
Answer: D
Question: 131
In cloud computing, different types of hardware of the same type can form a resource pool.
A. TRUE
B. FALSE
Answer: A
https://www.braindumps2go.com
Questions & Answers PDF Page-35
Question: 132
A. The virtual switching function of the intelligent network card is also provided by Huawei Virtual
Switch
B. Huawei virtual switch is open source open vSWitch
C. If Huawei distributed switch has multiple virtual ports, each port has its own attributes
D. Huawei virtual switches are divided into standard virtual switches and distributed virtual switches
Answer: B
Question: 133
A. Hot migration is the migration of virtual machines running from one host to another king machine,
business will not occur during the migration process Break.
B. In the performance test-reliability test, there are tests for virtual machine migration, including hot
migration, cold migration, migration duration,
Duration of business interruption.
C. Cold migration is to migrate a virtual machine in a stopped state from one host to another host,
and business will be interrupted during the migration process.
D. both hot and cold migrations will migrate memory and disk data
Answer: D
Question: 134
A. The communication between the source host and the destination host is normal
B. destination storage for different storage devices
C. virtual machine status is "running"
D. destination host must have sufficient resources
Answer: C
Question: 135
In Huawei FunsionCompute, the following incorrect description of the host storage interface is
https://www.braindumps2go.com
Questions & Answers PDF Page-36
C. storage interface can be on the same network segment as the management plane
D. Local hard disk and FC SAN can be connected to the storage device without adding a storage
interface.
Answer: A
Question: 136
Virtual machines are generally composed of virtual machine configuration information and disk files.
Users can move the two files to implement virtual machines running on different physical hosts.
What are the characteristics of cloud computing described above? (Multiple choices)
A. Partition
B. isolation
C. independent
D. Encapsulation
Answer: A. B. C. D
Question: 137
The following are not KVM (Kernel-Based Virtual Machine) management tools: ()
A. QEMU
B. Virsh instruction set
C. Virt-Manager
D. Libvirt
Answer: A
Question: 138
A. Virtualization and non-virtualization cannot exist in the same data center at the same time
B. Applications that can run on physical machines must also run on virtual machines
C. Virtualization can improve the uniformity of hardware resources
D. Virtual machines using different types of virtualization technology can be converted to each other
Answer: C
Question: 139
In computing virtualization, the CPU and memory allocated to the virtual machine is (multi-select)
A. Hypervisor
https://www.braindumps2go.com
Questions & Answers PDF Page-37
B. VMM
C. Guest OS
D. Host OS
Answer: A. B
Question: 140
KVM virtual machines can be created through a graphical interface or created using the command
line.
A. True
B. False
Answer: A
Question: 141
Using virtualization technology can virtualize a physical server into multiple virtual machines,
thereby improving the hardware performance of the physical server. B
A. True
B. False
Answer: B
Question: 142
In a Linux virtual machine. The one who can manage the logical volume is B
A. OVM
B. LVM
C. PVM
D. DVM
Answer: B
Question: 143
In Huawei FusionCompute, the following incorrect description of port groups and security groups is D
A. A virtual machine NIC is connected to a virtual port in the port group, and a virtual machine NIC is
associated with a security groupA
B. B-port group is a collection of one or more virtual ports on a DVS, while a security group is a
collection of one or more rules
C. A DVS can have multiple port groups and a VM can be protected by multiple security groups
https://www.braindumps2go.com
Questions & Answers PDF Page-38
D. Security groups are based on port groups to protect virtual machines /// virtual network cards
Answer: D
Question: 144
Which of the following network file sharing protocols does the NAS support (multiple choice)
A. CIFS
B. NFS
C. NTFS
D. FTP
Answer: A. B
Question: 145
Switches can be divided into access switches, aggregation switches, and core switches according to
their usage. Virtual switches belong to aggregation switches Switch
A. True
B. False
Answer: B
Question: 146
A. The virtual machine IXUS belonging to the same VLAN uses the IP address of the same address
segment, otherwise it cannot communicate normally
B. The virtual machines of the two departments cannot communicate with each other after using
different VLANs
C. virtual machines belonging to the same VLAN can use IP addresses in different address segments
and can use broadcasts to discover each other
D. virtual machines belonging to different VLANs can use the same IP address without address
conflicts
Answer: A
Question: 147
If two virtual machines can ping each other, the network device that will be used in the
communication process is
https://www.braindumps2go.com
Questions & Answers PDF Page-39
B. Physical switch
C. Physical network card
D. Virtual network card
Answer: D
Question: 148
In KVM, there are two ways for the virtual machine NIC to connect to the physical network: and ()
Answer: A
Question: 149
In Huawei FusionCompute, the following incorrect descriptions of security groups and rules are
A. Security group rule changes need to be manually applied to virtual machines in the security group
B. must create a security group before adding rules
C. security group denies all by default before adding rules
D. The premise of deleting a security group is that there are no virtual machines in the security group
Answer: A
Question: 150
When you use a template to quickly deploy a virtual machine, you do not need to install the
operating system or configure it, so you save a lot of time and effort.
A. True
B. False
Answer: A
Question: 151
A. CPU reservation defines the minimum computing resources allocated when multiple virtual
machines compete for physical CPU resources
B. CPU quota defines the allocation of computing resources by priority when multiple virtual
machines compete for physical CPU resources
https://www.braindumps2go.com
Questions & Answers PDF Page-40
C. CPU shares define how multiple virtual machines allocate computing resources proportionally
when competing for physical CPU resources
D. CPU reservation only works when a virtual machine competes for computing resources. If no
competition occurs, the virtual machine can exclusively occupy the physical CPU resources.
Answer: B
Question: 152
A. The administrator can enable or disable the memory reuse function at any time.
B. After the memory reuse function is turned off, the internal sum of all virtual machines is less than
or equal to the total available physical memory
C. Using memory reuse can degrade virtual machine performance
D. Turning off memory reuse requires that the memory reuse rate of all hosts in the cluster is less
than or equal to 100%
Answer: C
Question: 153
A. By setting security group rules, you can control permissions on folders in the virtual machine
B. By setting a security group rule, you can only allow remote login of virtual machines to specific IP
addresses
C. By setting security group rules, you can protect virtual machines from being accessed
D. By setting a security group rule, you can make the virtual machine inaccessible to the FTP server
Answer: A
Question: 154
A. A virtual machine can create multiple snapshots. When you use a snapshot to restore a virtual
machine, subsequent snapshots become invalid.
B. Snapshots can save both virtual machine settings and virtual machine disk data
C. All virtual machines on a host can only create one memory snapshot at the same time
D. Snapshots can save the state of virtual machine memory
Answer: A
Question: 155
https://www.braindumps2go.com
Questions & Answers PDF Page-41
When using the same Window template to quickly deploy a virtual machine, the SIDs generated may
be consistent. As a result, some special software will fail when installed
A. True
B. False
Answer: A
Question: 156
In the OpenStack solution, which module does the load provide for persistent block storage?
Answer: D
Question: 157
In Huawei FusionCompute, when multiple virtual machines are writing to the same shared disk at
the same time, in order to prevent data loss, it is necessary to ensure the application software's
access control to the disk
A. True
B. False
Answer: A
Question: 158
A. If the data of the virtual machine is stored in shared storage, the data saved in the event of a
failure will not be lost
B. This function supports automatic restart after a virtual machine failure
C. The system periodically detects the status of the virtual machine. When a virtual server fails due to
a physical server failure, the system can migrate the virtual machine to another physical server and
restart it to ensure that the virtual machine can recover quickly
D. administrator can set different HA policies according to the importance of the virtual machine
Answer: B
Question: 159
https://www.braindumps2go.com
Questions & Answers PDF Page-42
A. untagged the data frame with VLAN 10 tag passing the port group and forwarded it
B. Data frames passing the port group with a VLAN 10 tag are re-labeled with a VLAN ID and then
forwarded.
C. Drop data frames passing the port group with a non-VLAN 10 tag
D. VLAN 10 tagged data frames passing through this port group are forwarded
Answer: A. C. D
Question: 160
A. It is recommended to enable the IMC function when the CPU models of the CNA hosts in the
cluster are inconsistent.
B. Enabling IMC cannot ensure that the virtual machine is successfully migrated between hosts with
different CPU models.
C. IMC only supports migration from lower version CPU feature set to higher version
It is recommended to enable the IMC function when the main frequency of the CNA hosts in the
cluster is inconsistent.
Answer: C
Question: 161
In Huawei FusionCompute, after the data is deleted inside the virtual machine, the disk size will not
be automatically reduced. The next time the user writes again, the internally released space will be
used.
A. True
B. False
Answer: A
Question: 162
https://www.braindumps2go.com
Questions & Answers PDF Page-43
D.2-1-3-4
Answer: D
Question: 163
Huawei FusionCompute can sense the use of global physical resources during the running of a virtual
machine, and use an intelligent scheduling algorithm to calculate the best host suitable for the
virtual machine to run, and run the virtual machine on the best host by means of hot migration,
Thereby improving the global business experience
A. True
B. False
Answer: A
Question: 164
A. DAS
B. NAS
C. NFS
D. SAN
Answer: B. C
Question: 165
SSD disks are mechanical hard disks, which have the advantages of fast read and write speeds, low
power consumption, and light weight, but they have a limited life span
A. TRUE
B. FALSE
Answer: B
Question: 166
Among the following RAID levels, the highest utilization of disk space is
A. RAID 0
B. RAID 6
C. RAID 1
D. RAID 5
https://www.braindumps2go.com
Questions & Answers PDF Page-44
Answer: A
Question: 167
Where did the user apply for a cloud hard drive on the Huawei public cloud? The service model
belongs to
A. IaaS
B. DaaS
C. PaaS
D. SaaS
Answer: A
Question: 168
Answer: B
Question: 169
Both CPU resource QoS and memory multiplexing technologies use different strategies to rationally
allocate resources
A. True
B. False
Answer: A
Question: 170
https://www.braindumps2go.com
Questions & Answers PDF Page-45
Answer: C
Question: 171
The following scenarios that are not suitable for increasing the memory reuse ratio are
Answer: A
Question: 172
In Huawei FusionCompute, after enabling the automatic computing resource scheduling function,
the reason for the migration of the virtual machine may be (multi-select)
A. Windows virtual machine blue screen and processing policy is "HA virtual machine"
B. An application running on a virtual machine crashes
C. The administrator manually migrates according to the system prompt
D. The system automatically migrates according to the scheduling policy
Answer: A. C. D
Question: 173
A. Load balancing, considering the node correlation during the scheduling process, and the
corresponding relationship between the node and the physical node, to ensure the VCPU access to
local content to the greatest extent
B. Place the site, check the NUMA topology of the virtual machine, and select the physical node
mode VCPU and memory, so the relationship between VCPU and memory in nide has always been
physical.
C. The topology is displayed.The NUMA is recognized in the temporal part of the virtual machine. The
guestOS and the NUMA optimization function take effect.
D. Dynamic migration, when the affinity between the VCPU and the physical node changes, trigger
the migration of its corresponding Vnode memory
Answer: A. B. C. D
Question: 174
Fog computing is a distributed computing model that extends the concept of cloud computing to the
https://www.braindumps2go.com
Questions & Answers PDF Page-46
edge of the network to support mobile and IoT and geographically distributed applications. The
following incorrect statement about fog calculation is
A. Fog computing can quickly generate big data and reduce latency at the edge of the network
B. Fog computing can temporarily buffer data and reduce network pressure
C. Fog computing provides more reliable network and physical device security than cloud computing
D. Fog computing can reduce the bandwidth consumed in the core Internet and limit the movement
of data to the local network
Answer: C
Question: 175
A. Computing power
B. Perceptual analysis
C. Big data
D. Scenario
Answer: B
Question: 176
Artificial intelligence is the research and development of concepts, methods, technologies and
application systems for simulation extension and expansion of artificial intelligence.
A new technology science, the following false statement about artificial intelligence is
A. Artificial intelligence does not have the dynamic creativity unique to human consciousness
B. Artificial intelligence is a technology for items to communicate with each other through the
network
C. Artificial intelligence is not social
D. Physical processes that are unconscious mechanical
Answer: B
Question: 177
A. Set the vlan label of the data frame passing through the port group to 0
B. Allow only data frames tagged with vlan 0 to pass through this port group
C. Allow 0 VLAN tagged data frames to pass through this port group
D. No modification is made to the data frames passing through this port group
Answer: D
https://www.braindumps2go.com
Questions & Answers PDF Page-47
Question: 178
In Huawei FusionCompute, the following measurement factors for computing resource scheduling
are incorrectly described as
A. When set to "CPU", the scheduling policy is triggered when the CPU conditions are met
B. When set to "memory", the scheduling policy is triggered when the memory conditions are met
C. When set to "CPU and Memory", the scheduling policy is triggered when the CPU or memory
conditions are met
D. When set to "CPU and memory", the scheduling policy is triggered only when the CPU and
memory conditions are met
Answer: D
Question: 179
In Huawei FusionCompute, virtual machines using raw device mapping type data storage are not
supported (multiple selection)
A. Snapshot
B. CPU Hot Add
C. Storage thin provisioning
D. Storage live migration
Answer: A. C
Question: 180
The following description of the relationship between virtualization and cloud computing is correct
(multiple choices)
Answer: B. C. D
Question: 181
The following are the main driving forces for the emergence and development of virtualization
technologies:
https://www.braindumps2go.com
Questions & Answers PDF Page-48
Answer: C
Question: 182
A. yes
B. wrong
Answer: A
Question: 183
A. yes
B. wrong
Answer: A
Question: 184
A. Libvirt
B. Domain 0
C. QEMU
D. ESXI
Answer: A. C
Question: 185
A. FusionCompute
B. vSphere
C. KVM
D. Hyper-v
https://www.braindumps2go.com
Questions & Answers PDF Page-49
Answer: C
Question: 186
Among the following options, the correct description of the characteristics of cloud computing on-
demand self-service is
A. The cloud computing service provider only needs to prepare all the services, and the remaining
work is completely done by the user.
B. In the process of using cloud computing, users need to solve all problems by themselves
C. After the user has determined the cloud computing service he needs, he can complete the
application for cloud computing resources alone.
D. Users do not need to explain to service providers when using cloud computing resources.
Answer: C
Question: 187
The reason computing virtualization technology can improve application reliability is (multiple
choice)
A. The virtual machine hosting the application is decoupled from the hardware. You can use the
virtual machine to migrate between multiple physical hosts.
B. Use computer virtualization technology to automatically allocate virtual machines that host
applications to physical hosts with sufficient resources
C. Use computing virtualization technology to enable multiple applications to run on a physical host
at the same time
D. Use computing virtualization technology to automatically adjust virtualization specificationsk
Answer: A. B
Question: 188
In Huawei's FusionCompute, the system disk of the virtual machine cannot be unbound
A. TRUE
B. FALSE
Answer: B
Question: 189
A. The disks of the distributed storage come from the x86 architecture disk array.
B. The disk of the distributed storage comes from a personal PC
https://www.braindumps2go.com
Questions & Answers PDF Page-50
C. The disks of the distributed storage come from x86 architecture servers
D. The disks of the distributed storage come from the x86 architecture virtual machine
Answer: C
Question: 190
A. RAID6 compared with RAID5, data recovery stronger, but the decline in literacy disk
B. when after a damaged disk, RAID5 the other disk still work, is unaffected disk I / O performance
C. RAID are to improve I / O performance of the storage system by concurrent read and write data on
a plurality of disks
D. RAID storage space can be regarded as composed of two or more disks, the disk capacity available
capacity for the sum
Answer: B. C
Question: 191
RAID 6 on the basis of enhanced RAID 5 disk fault tolerance, can allow two disk failures, but not less
than the number of disks required 4
A. TRUE
B. FALSE
Answer: A
Question: 192
In the following description, in line with the characteristics of the virtual package (multiple) the
A. The configuration file of the virtual machine contains information such as CPU type and quantity.
B. Virtual machines can be migrated from one physical host to another
C. Multiple virtual machines can run on one physical host at the same time
D. If a virtual machine has multiple hard disks, each hard disk will generate a corresponding disk file
Answer: A. B. D
Question: 193
In Huawei FusionCompute, the tools installed for the virtual machine have nothing to do with the
type and version of the operating system used by the virtual machine // System-dependent
A. TRUE
https://www.braindumps2go.com
Questions & Answers PDF Page-51
B. FALSE
Answer: B
Question: 194
As FusionCompute, which one of the following options do not belong CPU resources QoS
parameters?
Answer: D
Question: 195
Answer: A
Question: 196
A. thin provisioning and virtual storage operating system, hardware has nothing to do, so as long as
the use of virtual image management system, will be able to achieve disk thin provisioning
B. does not currently support NTFS formatted virtual machine disk recovery // NTFS does not support
online recovery
C. providing virtual disk space monitoring and recovery features
D. to provide data storage capacity warning threshold may be set, generating a warning when the
storage capacity exceeds the threshold value
Answer: A. C. D
Question: 197
In FusionCompute, when adding multiple hosts to shared storage, the following operations are
correct (choose) the
https://www.braindumps2go.com
Questions & Answers PDF Page-52
Answer: B. C. D
Question: 198
A. Guest NUMA is to identify the Guest OS and its internal applications by presenting the NUMA
structure to the virtual machine.
NUMA structure to achieve the purpose of improving application performance
B. NUMA technology makes CPU access similar to the speed of memory in Node and the speed of
access to memory in other Nodes
C. Host NUMA mainly provides a CPU load balancing mechanism to resolve VM performance
bottlenecks caused by imbalanced CPU resource allocation.
D. Host NUMA guarantees VM access to local physical memory, reduces memory access latency, and
can improve VM performance
Answer: C
Question: 199
A. .ovf is the description file of the virtual machine and .vhd is the disk file of the virtual machine
B. The virtual machine template format is divided into two types: ova and ovf.
C. ovf format template contains only one ovf file and one vhd file
D. Format template contains only one file after export
Answer: D
Question: 200
It is found in FusionCompute that the IP address of a Windows virtual machine is 0.0.0.0, the
possible reason is
https://www.braindumps2go.com
Questions & Answers PDF Page-53
Answer: D
Question: 201
For FusionCompute, the incorrect description of the hardware of the bare device is ()
Answer: B
Question: 202
In FusionCompute, the virtual network adapter of each virtual machine is connected to the port of
the virtual switch. In order to facilitate the user to configure and manage multiple ports at the same
time, divide the ports with the same network attributes into the same port group
A. TRUE
B. FALSE
Answer: A
Question: 203
In-use memory exchange refers to using virtual memory or external storage for the virtual machine,
and storing temporarily unused data on the virtual machine to external storage. When the system
needs to use this data, it is then exchanged with data reserved in memory Exchange
A. TRUE
B. FALSE
Answer: A
Question: 204
https://www.braindumps2go.com
Questions & Answers PDF Page-54
Answer: C
Question: 205
A. TRUE
B. FALSE
Answer: B
Question: 206
FusionCompute performs a virtual machine change host live migration operation. The following
description is not a limitation of it
Answer: C
Question: 207
In FusionCompute, the administrator binds the two network adapters of the CNA host in the active /
standby mode. After binding, the transmission rate is equal to the sum of the transmission rates of
the two network ports.
A. TRUE
B. FALSE
Answer: B
Question: 208
The correct description of the extensive network access characteristics of cloud computing is ().
[Multiple choice]
A. Through the network, users can use self-purchased cloud computing resources through different
terminals
B. Through the network, users can use self-purchased cloud computing resources at any time
C. Through the network, users can check the status of self-purchased cloud computing resources at
any time
D. Through the network, users can use self-purchased cloud computing resources in different
locations
https://www.braindumps2go.com
Questions & Answers PDF Page-55
Answer: A. B. C. D
Question: 209
When a virtual machine on a physical host fails, it will not affect other virtual machines on the
physical host. Which characteristic of virtualization technology is this?
A. Isolation
B. Division
C. Independence
D. Packaging
Answer: A
Question: 210
Which of the following scenarios does virtualization apply to? [Multiple choice]
A. A company has a total of ten business systems, and the host resource utilization of these services
is less than 20%
B. A scientific research institution uses a customized operating system to ensure the confidentiality of
scientific research results
C. An enterprise needs a high-load, intensive computing environment
D. The daily use of desk applications by employees in a unit is highly similar
Answer: A. C. D
Question: 211
Answer: B. D
Question: 212
In a NAS environment, multiple hosts writing to a file at the same time will cause data consistency
issues.
A. True
B. False
https://www.braindumps2go.com
Questions & Answers PDF Page-56
Answer: A
Question: 213
If virtual machine A and virtual machine B run on different physical servers, which physical device
must be used in the communication process? (Multiple choice)
A. Virtual NIC
B. Virtual Switch
C. Physical switch
D. Physical network card
Answer: A. B. C. D
Question: 214
. A virtual machine can have multiple virtual NICs at the same time, corresponding to different virtual
switches
A. True
B. False
Answer: A
Question: 215
In Huawei FusionCompute, the following incorrect description of the template format is.
A. Ovf format template contains only one ovf file and one vhd file
B. Ova format template contains only one file after export
C. There are two formats for virtual machine templates: ova and ovf.
D. .ovf is the virtual machine's description file, and .vhd is the virtual machine's disk file
Answer: A
Question: 216
https://www.braindumps2go.com
Questions & Answers PDF Page-57
Answer: D
Question: 217
Virtual machine live migration refers to moving virtual machines in the same cluster from one
physical server to another physical server in the state of a virtual machine.
A. True
B. False
Answer: B
Question: 218
In Huawei FusionCompute, the following incorrect description of virtual machine snapshot recovery
is .
A. Use the existing snapshot of the virtual machine to restore the data of the virtual machine to the
state at the moment of the snapshot creation
B. If a virtual machine deletes the port group where the virtual machine NIC is located after the
snapshot is created, the deleted port group will also be restored when the virtual machine is restored
using the snapshot
C. If a disk mode of the virtual machine is "independent-persistent" or "independent-non-
persistent", the data on the disk is not restored when the virtual machine is restored using a
snapshot
D. Virtual machines can have multiple snapshots
Answer: B
Question: 219
In FusionCompute, the QoS parameters that can be set for the virtual machine do not include:
A. GPU
B. Disk IOPS
C. Memory
D. Network
E. CPU
Answer: A
Question: 220
When using a template to quickly deploy a virtual machine, the generated virtual machine
configuration information is consistent with the template
https://www.braindumps2go.com
Questions & Answers PDF Page-58
A. True
B. False
Answer: A
Question: 221
Voice recognition, image recognition, and emotional companion robots are all applications of
artificial intelligence
A. True
B. False
Answer: A
Question: 222
A. Cloud computing is a collection of data that cannot be captured, managed, and processed with
conventional software tools within a certain time frame
B. Big data is a pay-as-you-go model that provides usable, portable, and on-demand network access
C. Cloud computing cannot function as the underlying computing resource for big data processing
D. Big data can serve as a type of cloud computing service for users to choose according to their
needs
Answer: D
Question: 223
In Huawei FusionCompute, users log in to a virtual machine using VNC and find that they cannot
operate normally and are stuck (such as being unable to open files). The most likely cause of this
failure is.
Answer: C
Question: 224
A. If a "user" has multiple "role", its "operation authority" depends on the "role" with the highest
https://www.braindumps2go.com
Questions & Answers PDF Page-59
priority
B. A "role" can have one or more different "operating systems"
C. "Operation Permissions" of "Role" cannot be modified
D. A "user" can only have one "role"
Answer: A
Question: 225
In Huawei FusionCompute, what functions will be affected when a virtual machine is bound to a USB
device? [Multiple choice]
Answer: C. D
Question: 226
When binding a disk to a virtual machine in Huawei FusionCompute, to achieve the following
requirements, the virtual machine does not take a snapshot of the disk when creating a snapshot,
and does not restore the disk when using the snapshot to restore the virtual machine. At the same
time, all data is required to be permanently written. The disk, which mode should I choose?
A. Independent-non-persistent
B. Independence-durable
C. Independence
D. Subordinate
Answer: B
Question: 227
In Huawei FusionCompute, the memory and CPU resources used by virtual machines can only be
provided by the same cluster. Therefore, the maximum computing resources that virtual machines
can actually use cannot exceed the sum of resources available to all hosts in the cluster
A. True
B. False
Answer: B
Question: 228
https://www.braindumps2go.com
Questions & Answers PDF Page-60
In Huawei FusionCompute, if there is only one physical network port in the bound network port, the
physical network port cannot be removed directly.
A. True
B. False
Answer: A
Question: 229
In Huawei FusionCompute, the following incorrect description of the security group rule is.
A. When a virtual machine has multiple network cards, you can configure a security group for each
network card.
B. A virtual machine can communicate with the outside world only after a security group is created
and rules are added.
C. All virtual machine NICs in the same security group will use the security group rules for access
control
D. The essence of a security group is a collection of rules
Answer: B
Question: 230
In Huawei FusionCompute, if the Windows virtual machine has a blue screen, what operations can
the system perform? [Multiple choice]
A. HA Virtual Machine
B. Recover a virtual machine using a snapshot
C. Restart the virtual machine
D. Not processed
Answer: A. C. D
Question: 231
In Huawei FusionCompute, the correct description of the method for logging in to the virtual
machine is . [Multiple choice]
A. The virtual machine does not have an IP address, and the administrator can log in through VNC. so
VNC gets rid of its dependence on the network
B. If the operating system of the virtual machine is windows, the administrator can log in to the
virtual machine through remote desktop
C. Administrators can log in to a virtual machine with any operating system installed through VNC
D. If the operating system of the virtual machine is Linux, the administrator can log in to the virtual
https://www.braindumps2go.com
Questions & Answers PDF Page-61
Answer: B. C
Question: 232
In Huawei FusionCompute, to enable virtual machines to migrate between CNA hosts with different
CPU models, the function to be enabled is.
Answer: B
Question: 233
In Huawei FusionCompute, the following incorrect description of virtual machine storage live
migration is.
Answer: B
Question: 234
In Huawei FusionCompute, the resources of the cluster are composed of the host and its associated
storage and network resources.
A. True
B. False
Answer: A
Question: 235
Cloud computing quantifiable services refer to charging customers based on time and volume of use.
A. TRUE
B. FALSE
https://www.braindumps2go.com
Questions & Answers PDF Page-62
Answer: A
Question: 236
Cloud computing is the product of the development of the Internet and computing technology, so
cloud computing must be inseparable from the network
A. TRUE
B. FALSE
Answer: A
Question: 237
In Huawei FusionCompute, a Linux-based virtual machine is created. In this scenario, the host OS
Running at
A. VNA
B. CNA
C. VRM
D. Linux virtual machine
Answer: B
Question: 238
The KVM virtualization architecture includes KVM modules, QEMU and Libvirt. The following
incorrect description of these modules is
A. KVM module is mainly responsible for the creation of Vcpu and the allocation of virtual memory
B. KVM + QEMU can constitute a set of virtualization solutions
C. Libvirt + QEMU can constitute a set of virtualization solutions
D. QEMU is mainly responsible for I / O operation simulation
Answer: C
Question: 239
Virtual machines generally have corresponding configuration files that record information such as the
specifications and names of the virtual machines.
A. TRUE
B. FALSE
Answer: A
https://www.braindumps2go.com
Questions & Answers PDF Page-63
Question: 240
A. Each file system block corresponds to a discontinuous area on the physical disk.
B. The file is stored on the file system, and the file system is mapped to the file system block.
C. The file system block corresponds to the logical area of LVM
D. The logical area is mapped to the physical area of the disk through LVM
Answer: A
Question: 241
A. TRUE
B. FALSE
Answer: B
Question: 242
After using virtio, the network card speed of the windows virtual machine is 10Gbps
A. TRUE
B. FALSE
Answer: B
Question: 243
A. Host
B. operating system
C. virtual machine
D. Cluster
Answer: D
Question: 244
In Huawei FusionCompute, when the virtual machine is in the "running" or "stopped" state, users can
To increase or decrease the number of vCPUs of the virtual machine
https://www.braindumps2go.com
Questions & Answers PDF Page-64
A. TRUE
B. FALSE
Answer: B
Question: 245
In Huawei FusionCompute, which of the following factors does DRS perform virtual machine
migration? (Multiple choices)
A. Memory
B.I / O
C. Network traffic
D.CPU
Answer: A. D
Question: 246
The following Qos description about CPU and memory resources is incorrect.
A. Memory resources QOS is used to ensure that business-critical virtual machines can get sufficient
memory resources
B. CPU shares and CPU reservations work only when each virtual machine competes for computing
resources
C. The CPU QoS of the virtual machine is used to ensure that the computing resources of the virtual
machine are reasonably allocated
D. Memory resource QoS can only be used after the memory reuse switch is enabled
Answer: D
Question: 247
With the "Internet" being valued and the rise of big data and cloud computing, related technologies
have entered like mushrooms
In your vision, one of the most widely used and valued is Docker. The following incorrect statement
about Docker is
A. Docker can package the underlying environment of applications to ensure that applications can
still run normally after migration
B. Docker needs to create a virtual layer, virtual operating system, etc. on the host or host operating
system, and then
installation
C.Docker launches faster than other virtual machine technologies
D.Docker runs with containers, which are running instances created from Image
https://www.braindumps2go.com
Questions & Answers PDF Page-65
Answer: B
Question: 248
Answer: D
Question: 249
Huawei FusionCompute supports adding hosts in batches. The administrator fills in host information
according to the template provided by the system and imports it at one time.
A. TRUE
B. FALSE
Answer: A
Question: 250
A. FusionStorage
B. Advanced SAN
C. NAS
D. IP SAN
E. FC SAN
Answer: A. B. C. D. E
Question: 251
The cloud service purchased by the user includes the application operating environment, but there is
no application and related dat
a. This mode
Formula belongs to
A. SaaS
B. PaaS
C. NaaS
https://www.braindumps2go.com
Questions & Answers PDF Page-66
D. IaaS
Answer: B
Question: 252
What does not reflect the features of cloud computing on-demand self-service in the following
options are
A. The engineer purchased a cloud server from Huawei public cloud according to his needs.
B. The engineer upgraded the cloud server CPU he purchased from 2 to 4
C. The engineer changed the operating system of the cloud server he purchased from Linux to
Windows
D. The engineer received a notification message from the server provider one week before the cloud
server expired.
Answer: D
Question: 253
A. Linux
B. Windows
C. uvp
D. Unix
Answer: B
https://www.braindumps2go.com
Questions & Answers PDF Page-67
https://www.braindumps2go.com