HHHH
HHHH
In TCP/IP-Based data communication, a() header will be added to the data that passes
through the transport layer
Answer : Transport Layer
59. A ( ) desktop group randomly assign a vm to a user during the ifrst logi of the user and then
the vm is bound to the user. A user can be bound to only one vm
Answer : Virtual Desktop Infrastructure (VDI)
58. In a computer the()is a basic, important, and indispensable connection device. It provides
function such as data transmission and reception, data encapsulation, link management, encoding
and decoding.
Jawaban : network interface card (NIC)
55. So, ideally, it takes () for a computer to read a 10 GB file over a 2 Gbit/s link.
Jawaban :40
53. On FusionAccess, the()component is used for service access and self-service maintenance.
Jawaban : self service portal
52. On FusionAccess, the vLB implements load balancing when a user access the().
Jawaban : Unified Gateway
51. On FusionAccess, if a linux desktop is assigned to multiple users, users can log in to the
desktop at the same time.
A. True
B. False
Jawaban : B false
50. HDP enables FusionAccess component communication and real-time data synchronization. It
also ensures that components deployed in active/standby mode can obtain the status of each other
at any time.
A. True
B. False
Jawaban : A true
49. DAS and SAN support data transmission over fibre channel or IP networks, while NAS
supports data transmission over IP networks only.
A. True
B. False
Jawaban : B false
48. Centralized storage means that all disk are centrally deployed in a cabinet. Distributed
storage means that disk are deployed in different cabinet.
A. True
B. False
Jawaban : B false
47. A server has ten disk. Among them. Two disk form a raid 1 group, seven disk form a raid 5
group, and the other one is configured as the hot spare disk. If any disk in the raid groups fails,
the hot spare disk automatically replaces the faulty disk, ensurag the system redundancy.
A. True
B. False
Jawaban : A true
46. Each VM in a full copy VM group has a system disk, and the VM template type is full copy.
A. True
B. False
Jawaban : A true
45. In the FusionCompute, a pair of VRM nodes must be deployed each time a cluster is created.
A. True
B.false
Jawaban : A true
44. If a desktop on funsionaccess needs to call the camera of a terminal , device redirection is
recomended.
A.true
B.false
Jawaban : A true
43. RAID uses the parity check algorithem (XOR) for data verification. Which of the following
XOR functions have a result of 0?
A. 0 1
B. 0 0
C.1 0
D. 1 1
Jawaban : A
41. Which of the following actions may a swith take on data frames?
A.discard
B. Block
C.forwad
D. Flood
Jawaban : a, c, d
40. Which of the following items should be included in complete route information?
A. Next help address
B. Destination network
C.source network adderss
D. Destination subnet and mask
Jawaban : B
39. manakah dari perangkat berikut ini yang dapat menyediakan fungsi terjemahan alamat
jaringan (NAT)?
A. firewall
B. sakelar lapisan 2
C. router
D. SAKLAR LAPISAN 3
38. Which of the following Linux distributions are developed based on openEuler ?
A. Eulix Os
B. Kylin V10
C. iSoft v5.1
D. CentOs 7.3
37. manakah dari pernyataan berikut yang menjelaskan sumber daya komputasi tanpa
virtualisasi?
A. sistem operasi yang berjalan tidak membutuhkan perangkat keras
B. sumber daya komputasi tidak tergantung satu sama lain
C. sistem operasi terkait erat dengan perangkat keras
D. sumber daya komputasi diabstraksikan sebagai kumpulan sumber daya komputasi
35. Manakah dari mode akses berikut yang didukung oleh akses fusi?
A. SC
B. TC
C. VNC
D. Terminal seluler
32. dalam mode baris perintah Vim, mana dari berikut ini yang digunakan untuk menyimpan file
dan keluar dari editor saat ini?
A. wq
B. ql
C. Q
D. Wql
31. berdasarkan model layanan untuk komputasi awan, manakah dari item berikut yang dianggap
sebagai lingkungan aplikasi yang sedang berjalan?
A. sistem operasi
B. cpu dan memori
C. library dependensi untuk menjalankan aplikasi
D. middleware
30. if optical fibers are used to carry storage services, which of the following storage network
types can be used?
a. ip san
b. das
c. fan
d. FC SAN
29. Which the following devices from a communication network
A. SERVER
b. firewall
C. SWITCH
D. ROUTER
28. on fusion acces, which of the following methods are used by virtual desktops to obtain ip
address?
a. template address
B. MANUAL ASSIGNMENT
C. DNS RESOLUTION
D. DHCP ASSIGNMENT
27. which of the following desktop groups support “add user (group)”?
a. assign a computer to multiple users
B. STATIC POOL
C. ASSIGN A COMPUTER TO A USER
d. dynamic pool
26. which of the following statement are true about fusioncompute installation?
A. VRM CODES CAN BE DEPLOYED ON VMS BY USING A SPECIFIED TOOL OR
BY MOUNTING ISO IMAGES
b. CAN hosts must be deployed on physical machines
C. CAN HOSTS CAN BE INSTALLED IN PXE MODE OR BY MOUNTING ISO
IMAGES
D. IT IS RECOMMENDED THAT VRM NODES BE DEPLOYED
25. which o the following is the default file system on openeuler
a. fat32
b. ntfs
C. EXT4
d. xfs
20. A multinational group has services across the globe. One of its branches purchases products
from a local public cloud service provider based on its actual situation. Which of the following
cloud computing deployment modes Is used by the group?
A. Hybrid cloud
B. Public cloud
C. HYBRID PUBLIC CLOUD
D. Private cloud
18. On FusionAccess, when the Backup Server does not have enough space, which of the
following operations will be performed by system?
A. Delete the backup data over the past 10 days.
B. DELETE THE EARLIEST BACKUP DATA
C. Automatically delete all backup data
D. Delete the backup data generated 10 days ago
17. In Huawei virtualization suite, which of the following is used to provide disaster recovery
(DR) services?
A. eBackup
B. FusionCompute Pro
C. ULTRAVR
D. FusionCompute
16. In FusionCompute, which of the following components is deployed on the server that needs
to be virtualized?
a. eBackup
b. UltraVR
C. CAN
d. vrm
15. Asa company has strict regulations on employees' permissions, which of the following
methods Is recommended for VLAN assignment?
A. Interfaco-barsad assignment
B. IP SUBNET-BASED ASSIGNMENT
C. Protocol-based assignment
D. MAC address based assignment
14. On FusionAccess, which of the following methods is recommended to disable the recording
and playback of music and games at important meetings?
a. Disabling SC/TC playback devces
B. DISABLING AUDIO REDIRECTION
c. Disabling cipboard reditection
d. Disabiing device teduecton
13. On a FusionAccess system with 2,000 users, how many vAGs need to be deployed?
a. 4
b. 5
C. 2
d. 3
12. Which of the following is the the basic unit of RAID 2.0?
a. CK
b. Volume
C. CKG
d. Extent
11. In modern computers, CPUs cannot directly read data from disks. Instead, the data must be
first read to which of the following devices?
a. Register
b. Arithmetic logic unit
c. Cache
D. Memory
10. On Linux, which of the following is an absolute path representing a file storage location?
a. ../../test
b ./test
C. /HOME/TEST
d. home/test
9. Which of the following FusionAccess components runs on virtual desktops?
A HDC
b. ITA (bisa ini juga)
c HAD
d. WI
8. On FusionAccess, if the CPU resources of a desktop are insufficient, which of the following
operations Is recommended?
A. Delet the desktop and provision a desktop that meets the user's reguirements (bisa ini juga)
B. Upgrade the desktop toa VIP desktop
C. Migrate the desktop to another cluster
D. MODIFY THE DESKTOP SPECIFICATIONS TO MEET THE USERS
REGUIREMENTS
5. Which of the following components on FusionAccess does not have backup data?
a. HDC
b. ITA
C VAG
d. vLB
4. Which of the following drives provides the best read and write performance In Ideal working
conditions?
a. nl-sas
b. sata
c. sas
D. SSD