Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

HCIE-Cloud Computing (Written) V2.0 Question and Answers

HCIE-Cloud Computing (Written) V2.0

Last Update May 2, 2024
Total Questions : 765

We are offering FREE H13-531_V2.0 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H13-531_V2.0 free exam questions and then go for complete pool of HCIE-Cloud Computing (Written) V2.0 test questions that will help you more.

H13-531_V2.0 pdf

H13-531_V2.0 PDF

$35  $99.99
H13-531_V2.0 Engine

H13-531_V2.0 Testing Engine

$42  $119.99
H13-531_V2.0 PDF + Engine

H13-531_V2.0 PDF + Testing Engine

$56  $159.99
Questions 1

Which of the templates created by FusionCompute is incorrect?

Options:

A.  

Convert virtual machine to template

B template clone into template

B.  

Snapshots are converted into templates

C.  

Virtual Machine Clone Template

Discussion 0
Questions 2

UItraVR supports centralized and distributed deployment. Which of the following statements about centralized and distributed deployment is wrong?

A centralized deployment scenario, UltraVR server is deployed at the production site and disaster recovery site

B. Centralized deployment scenario, UltraVR server is deployed at the disaster recovery site

C In the distributed deployment scenario, the UltraVR server is deployed at the disaster recovery site

D. In the distributed deployment scenario, the UtraV monthly server is deployed on the production site and the disaster recovery site

Options:

Discussion 0
Questions 3

Fusion Storage is Huawei's distributed storage software, which includes a very important process Zookeeper (ZK),

Which of the following statements about zookeeper is correct?

Options:

A.  

There is also a master selection mechanism in the Zk cluster. Which zk starts first, whichever is the master zk

B.  

zookeeper is a distributed application coordination service process, zk is deployed on the control node

C.  

MDC and zk deploy a one-to-one relationship in fusion storage, the main MDC and the main ZK must be on the same server

D.  

The Zk cluster provides the primary selection arbitration for the MDC cluster, and the MDC selected by more than half of the total zookeepers is the primary

Discussion 0
Questions 4

In the FusionCloud private cloud environment, the elastic IP service refers to the

Binding of associated cloud hosts in the network, so that business resources in the VPC can pass through a fixed public IP address

Provide external access services or access the public network. The following description about elastic IP binding cloud host, error

Which is it?

Options:

A.  

When using the routing network to search for the cloud host network card, the list only displays the cloud host network card corresponding to the network

B.  

When using the IP address to search for the cloud host network card, if the cloud host network card corresponding to the entered IP address is not

Bind the elastic IP, the search result is all the network cards under the cloud host that can be bound to the elastic IP

C.  

When using the IP address to search for the cloud host network card, if the input IP address corresponds to the cloud host network card

The elastic IP has been bound, the search result is empty

D.  

When the elastic IP of one cloud host belongs to the same external network, these cloud hosts need to apply for external external network, cannot directly share the bandwidth of the same external network

Discussion 0
Questions 5

Fusioncomputevirtual machines in andDVSrelationship, the correct.

Options:

A.  

A virtual machine has multiple network cards, and each network card is associated with oneDVS BOne

B.  

virtual machine and one network card, and the network card is associated with multipleDVS

C.  

A virtual machine has multiple network cards, and all network cards can only be associated with oneDVS

D.  

One virtual machine has one network card, and the network card can only be associated with oneDVS

Discussion 0
Questions 6

Which of the following information is mainly monitored by the FusionAccess gateway (multiple choice)

Options:

A.  

Gateway basic information

B.  

Virtual Machine Usage Information

C.  

Basic information of components

D.  

User connection information

Discussion 0
Questions 7

If the virtual machine in FusionCompute does not have Tools installed, which of the following functions can be implemented? (one)

Options:

A.  

Safely shut down the virtual machine

B.  

Virtual machine live migration

C.  

Configure the IP address for the virtual machine

D.  

Create a snapshot of the virtual machine

Discussion 0
Questions 8

An enterprise plans to deploy Huawei FusionCloud and perform disaster recovery on Huawei Cloud. Due to financial constraints,

Considering the economy and security, you can use the --- service to integrate FusionCloud with Huawei

Cloud connectivity.

Options:

Discussion 0
Questions 9

Which of the following descriptions about FusionCompute host deployment requirements is wrong? ( one)

Options:

A.  

The CPU needs to support hardware virtualization technology, such as Intel's VT-x, and the CPU has been turned on in the BIOS

Virtualization function

B.  

If the host is used to deploy the management node virtual machine, the memory specification of the host must at least meet the management node

The sum of the memory specification of the virtual machine and the memory specification of the management domain of the host where the virtual machine of the management node is located

C.  

The memory virtualization function must be turned on, otherwise only a virtual machine can be created on the host, and the virtual machine cannot be started normally.

virtual machine

D.  

If the business virtual machine uses local storage, the local storage used by the business virtual machine needs to be planned separately.

Recommended local disk group RAID 1

Discussion 0
Questions 10

Which tool can agree to monitor physical devices in a data center in a cloud DC

Options:

A.  

FusionCare

B.  

G-ray

C.  

FusionNetDoctor

D.  

eSight

Discussion 0
Questions 11

In FusionAccess, when creating a virtual machine template, if required ------ group members can also log in

If you want to record a virtual machine, you need to check "Configure user login" when creating a virtual machine template

Options:

Discussion 0
Questions 12

During the FusionManager maintenance phase, it is forbidden to pass the FusionManager during normal business operation.

Modify the time zone and daylight saving time on the interface, otherwise the FusionManager service will be restarted.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 13

Which of the following functions does CPU virtualization in Fusioncompute support? (multiple choice)

Options:

A.  

Support heterogeneous servers

B.  

CPU resource over-allocation

C.  

QOS

D.  

Support Windows and Linux virtual machines to increase CPU online

Discussion 0
Questions 14

Regarding the description of FusionAccess recycling desktop, which of the following is incorrect? ( one)

Options:

A.  

On the FusionAccess management interface, first deallocate the desktop to be recycled, and then delete the virtual machine.

B.  

If the user desktop to be recycled is a dynamic multi-user desktop, the user can be deleted separately without affecting its

other user's login.

C.  

Directly delete the virtual machine to be recycled on the virtualization platform. D. After the virtual machine is deleted on the FusionAccess management interface, the virtual machine on the FusionCompute will also be deleted. Deleted automatically.

Discussion 0
Questions 15

In FusionAccess, the following information about recycling user allocation type is "dynamic multi-user" user desk:

From the description above, which items are wrong? ( many)

Options:

A.  

When reclaiming the user desktop of the "dynamic multi-user" allocation type, the administrator needs to manually delete the corresponding virtual desktop.

B.  

When the user desktop of this allocation type is reclaimed, the normal operation of the system will not be affected

C.  

When reclaiming the user desktop of the "dynamic multi-user" allocation type, there is no need to enter the AD server from the user group

Delete the corresponding user from the group

D.  

When reclaiming the user desktop of the "dynamic multi-user" allocation type, there is no need to decompose the desktop to be reclaimed match

Discussion 0
Questions 16

In a typical FusionCloud Type I deployment scenario, the KVM resource pool passes through the ---layer FusionSphere

OpenStack manages and provides computing resources.

Options:

Discussion 0
Questions 17

When using Rainbow to migrate a Windows virtual machine, which port is used by the destination virtual machine to Receive data sent by the source VM? ( one)

Options:

A.  

8899

B.  

8900

C.  

445

D.  

22

Discussion 0
Questions 18

When registering the image type of Fusioncompute in FusionCloud 6.3, you need to select the appropriate mirror server type, which of the following are the optional mirror server types in this scenario? (multiple choice)

Options:

A.  

OBS

B.  

NFS

C.  

Swift

D.  

Glance

Discussion 0
Questions 19

RTOandRPOThe correct statement is

Options:

A.  

RPOis the recovery time objective

B.  

RTOis the recovery point objective

C.  

RTOis the recovery time objective

D.  

RPOis the recovery point objective

Discussion 0
Questions 20

When using rainbow for virtual machine migration, Win SrcAgent will automatically identify the operating system type of the original virtual machine

Options:

A.  

TRUE

B.  

FLASE

Discussion 0
Questions 21

FusionStorage block storage adopts distributed cluster management mode, the system is fully redundant, and there is no single point

Fault. Supports two data redundancy protection mechanisms: multiple copies and EC (Brasure Coding).

Which of the descriptions of copy and EC is wrong?

Options:

A.  

The Erasure Coding technology is applied to realize the RAID function between nodes, and the configuration of the protection level is supported.

Any node or any disk failure without affecting data integrity.

B.  

Multiple copies can ensure that in the case of server failure, cabinet failure, or even computer room failure, the data is still

While not lost, accessible.

C.  

The application of the multi-copy mechanism can copy 2 to 3 copies of the same data, and place different copies in different

On the server, on the cabinet, or even in a different computer room.

D.  

Compared with the EC mechanism, the reliability of multiple copies is not reduced, or even higher than the EC mechanism, while the space utilization rate increased significantly.

Discussion 0
Questions 22

When using Huawei BCManager eBackup for data backup, only the backup storage type is SAN

storage and NAS storage.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 23

OnerainbowThe server can only add one target platform

Options:

A.  

correct

B.  

mistake

Discussion 0
Questions 24

The technology used in data disaster recovery, the common array layer is array replication, which may be block replication or NAS replication.

In general, virtualized storage arrays cannot write data mirroring to other storage devices.

Options:

A.  

True

B.  

Fault

Discussion 0
Questions 25

When using Rainbow to migrate a virtual machine to the HCS platform, after configuring the source information, it is necessary to perform

Check, if the check result is a "yellow background, pass" icon, what does it mean?

Options:

A.  

Indicates that the source host can be migrated, but some configuration information is missing, and the group migration needs to be completed after the missing information.

B.  

Indicates that the source host can be migrated, but there may be migration risks or some configurations after migration are inconsistent with the source.

C.  

Indicates that the source host can be migrated, but the destination platform is not ready, wait for the destination platform to pass the check, and then start the migration.

D.  

Indicates that the source host meets the migration conditions and can be migrated.

Discussion 0
Questions 26

In MangeOne, after the system installation and commissioning are completed, the security administrator needs to Users with the same role are granted different permissions to improve operation and maintenance efficiency and ensure system security. The following is about authorization planning

Which description of the principle is correct?

Options:

A.  

If the scope of management objects for multiple roles is exactly the same, plan the scope of management objects for each role separately.

B.  

Plan users with exactly the same responsibilities into the same role, and assign users with different responsibilities from other users

Plan for different roles.

If the application operations required by multiple roles are exactly the same, plan the application operation set separately for each role or not.

Plan the application action set.

C.  

If the management scope and application operations of multiple roles are exactly the same, plan common applications for these roles

The operation set but the scope of management objects is planned separately for each role.

Discussion 0
Questions 27

rainbowmigrateIPAddresses can only be set statically

Options:

A.  

True

B.  

False

Discussion 0
Questions 28

In various and disaster recovery scenarios, the indicator --- indicates the tolerable business interruption time when the system is unavailable.

(Please fill in the English capital abbreviation)

Options:

Discussion 0
Questions 29

In order to achieve RPO of 0 and RT0 of minutes, a company plans to adopt a metro active-active disaster recovery scheme to ensure that

For the continuous operation of data center services, which of the following scenarios are suitable for choosing the metro active-active disaster recovery solution? (multiple choice)

Options:

A.  

Disaster recovery involves a large number of virtual machines and requires a large or complex manual intervention

B.  

The two data centers for disaster recovery have high-speed, low-latency link conditions that meet the requirements

C.  

It is necessary to achieve cross-data center business load sharing, and to schedule resources with zero business interruption

D.  

Part or all of the business (network, storage, host) in the site fails, and the business needs to be restored as soon as possible

Discussion 0
Questions 30

In the ManageOne operation and maintenance plane, when the administrator performs routine maintenance or handles user requests, the

Tenant resource page, query resources according to requirements. After querying the required resources, click the required query

The resource name of , which of the following can be seen on the resource details page? ( many)

Options:

A.  

Basic information about the resource

B.  

alarm

C.  

Components

D.  

Topology

Discussion 0
Questions 31

The following description about the CSDR disaster recovery drill of the cloud server disaster recovery service in FusionCloud is wrong

Which one is it?

Options:

A.  

The production virtual machine will be stopped and the volume will be unmounted

B.  

The DNS record of the business virtual machine will be switched

C.  

The DNS records of ManageOne will be switched

D.  

The data of the production center will be synchronized to the disaster recovery center

Discussion 0
Questions 32

When creating a desktop group, the administrator initiates a request to create a desktop group to the ITA through the desktop cloud portal, please

Which of the following information does the request contain? (many)

Options:

A.  

Is it possible to rotate

B.  

Desktop group name

C.  

Desktop group type

D.  

the operator

Discussion 0
Questions 33

Which of the following reasons will cause the user virtual machine to fail to start, and the status of the virtualized local disk becomes read only? (many)

Options:

A.  

File metadata corruption

B.  

Super block corruption

C.  

The access control module is damaged

D.  

The auxiliary distribution module is damaged

Discussion 0
Questions 34

In order to ensure the security of data in the actual production environment, data backup technology is used;

To ensure the continuity of the service and the availability of the system, the disaster recovery technology is used. The following describes the different disaster recovery and backup schemes.

Which statement is correct? ( one)

Options:

A.  

Local high availability disaster recovery can cope with data center failures such as power failures and building fires.

B.  

Remote disaster recovery can deal with logical errors such as operational errors, upgrade failures, and software defects.

C.  

Disaster recovery in different places can deal with regional disasters such as turmoil and natural disasters.

D.  

The data backup system can deal with equipment failures such as disk failure, application interruption, and data damage.

Discussion 0
Questions 35

The incremental backup of eBackup uses differential incremental backup. Compared with cumulative incremental backup, Minimal data needs to be copied.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 36

In the FusionCloud private cloud solution, the bare metal service BMS mainly meets the needs of cloud transformation.

During the process, some applications still need to be deployed on physical machines. In the following description of BMS usage scenarios,

Which items are correct? ( many)

Options:

A.  

Application nodes require the use of special peripherals, servers that are not suitable for virtualization

B.  

The security requirements of the application node use a separate server

C.  

Computing clusters with high performance requirements, such as big data clusters, distributed databases, etc.

D.  

Large-capacity local storage, such as data backup

Discussion 0
Questions 37

When the administrator routinely checks Fusioncompute, it is found that a CNA host is

Machine communication is interrupted. Which of the following options would cause this behavior? (many)

Options:

A.  

The network cable connected to the host network port is loose

B.  

The VRM clock synchronization process is abnormal

C.  

The network cable of the switch connected to the host is loose or damaged

D.  

The host is restarting

Discussion 0
Questions 38

FusionNetDoctor, also known as network traffic diagnosis, is for operation and maintenance personnel to detect the network field.

Which can detect traffic in which of the following scenarios? ( many)

Options:

A.  

East-west traffic detection between the tenant's two virtual machines

B.  

Tenant's VM-to-VM Elastic IP (EIP) traffic inspection

C.  

Access traffic detection from the client computer to the ELB on the cloud

D.  

Inspection of access traffic from client computers to virtual private network services (VPNs) on the cloud

Discussion 0
Questions 39

In addition to supporting the management of physical devices such as servers, storage, and networks, Huawei eSight tools also support

Management of virtual resources. Which of the following computing virtual facilities provide access to eSight management capabilities? ( many)

Options:

A.  

FusionSphere OpenStack

B.  

Vmware Center Server

C.  

FusionCompute

D.  

VMware ESX/ESXi Server

Discussion 0
Questions 40

Which of the following options are the basic services of FusionCloud 6.3? (many)

Options:

A.  

NTP

B.  

IMS

C.  

LVS

D.  

CSBS

Discussion 0
Questions 41

When maintaining FusionAccess, in order to ensure the security and stability of the system, you need to pay attention to the following:

Which high-risk operations? ( many

Options:

A.  

Batch delete virtual machines

B.  

Replacing the infrastructure server

C.  

Batch association operations on ITA

D.  

Modify group policy operations on AD

Discussion 0
Questions 42

If there is a problem with the HDC process, you need to use the command service---restart to restart

Options:

Discussion 0
Questions 43

In the daily operation and maintenance work of the cloud data center, the logs of related components need to be collected.

Which of the following components can logs be collected in the environment? (Multiple) A. FusionSphere OpenStack

B. ManageOne

C. FusionStorage

D. VRM. CNA

Options:

Discussion 0
Questions 44

In FusionAccess, when administrators deploy VAG/VLB components, enter FusionAccess

After the installation interface, you should select "Software >———— and then install the vAG and VLB components respectively.

Fill in the corresponding interface words)

Options:

Discussion 0
Questions 45

Which of the following descriptions about disaster recovery technology is wrong? (Multiple)

Options:

A.  

Disaster recovery can achieve RPO=0

B.  

Backups are generally performed periodically

C.  

Disaster recovery can replace the role of backup

D.  

RTO=0 during backup and recovery

Discussion 0
Questions 46

Cloud computing is the third revolution in the IT industry, bringing about cost reduction and efficiency enhancement, elastic expansion and other technical aspects.

value, the work ensures a stable operating environment for the user's business. The following are the data center operation and maintenance goals.

Description, which items are correct? (many)

Options:

A.  

Availability: The data center is required to provide support for each functional component of the data center during the operation and maintenance management process Capability for a given function

B.  

Economy: Require the data center to achieve the financial pre-required by the data center in the entire operation and maintenance management cycle Target

C.  

Compliance: The data center is required to avoid violating any laws, regulations and standards during the operation and maintenance management process

Contract with: etc.

D.  

Serviceability: It means that the data center should establish a service-oriented operation and maintenance management framework

Discussion 0
Questions 47

The following description about the design of the bare metal resource area in the FusionCloud private cloud planning is correct which items? (many)

Options:

A.  

The bare metal resource pool needs a separate POD, and the POD needs to contain the cascaded layers Openstack and BMGW

B.  

The bare metal server supports RH2288H and RH5885H servers, and supports user-defined selection Resources such as CPU/memory

C.  

Only one set of storage resource pools can be used in the bare metal resource pool, and only FusionStorage can be selected. Select SA Storage

D.  

Bare metal is divided into: general bare metal, memory optimized bare metal, local disk intensive bare metal, I0 optimized bare metal bare metal

Discussion 0
Questions 48

When FusionCompute uses NAS resources, which of the following protocols can be used to scan to storage devices? (one)

Options:

A.  

FTP

B.  

NFS

C.  

CIFS

D.  

HTTPS

Discussion 0
Questions 49

【Single Choice】 Which of the following types of ACLs does not support in the virtual firewall rules in FusionCloud parameters?

Options:

A.  

Action

B.  

Agreement

C.  

source, destination hostname

D.  

port

Discussion 0
Questions 50

FusionCloud provides three-dimensional panoramic monitoring capabilities, monitoring objects cover multiple dimensions, and actively monitoring Control the operation status of cloud data center, help enterprises reduce TCO cost and improve operation and maintenance efficiency. the following about In the description of the FusionCloud monitoring dimension, which one is wrong? (one)

Options:

A.  

Support VDC monitoring, provide comprehensive analysis and evaluation capabilities based on VDC, help users use resources reasonably, Ultimately achieve the purpose of improving resource utilization

B.  

Support resource pool monitoring, which can perform unified monitoring and monitoring of computing, storage, network and big data resource pools

Analyze, help users use resources efficiently and reasonably, discover potential risks and problems, and propose improvement measures or Guidance

C.  

Support physical equipment monitoring, and can monitor hardware equipment such as data center servers, storage, and network equipment.

Unified monitoring and management, providing all-round monitoring capabilities such as alarms, resources, topology and performance, helping users to Quickly locate and troubleshoot hardware problems

D.  

Tenant application monitoring is not supported. The application belongs to the user business level, and users need to deploy relevant monitoring by themselves.

The cloud platform itself cannot support tenant application monitoring

Discussion 0
Questions 51

FusionCompute is deployed in a data center, and now due to equipment upgrade needs, it is planned to virtualize a certain business.

The virtual machine is migrated to a specific CNA (Compute Node Agent) host in another cluster. technical engineer root According to the plan, after the virtual machine migration action is executed, the migration task progress bar displays: The task failed, the system abnormal. Which of the following statements about the causes of the above phenomenon is correct? ( one)

Options:

A.  

The cluster has DPM enabled

B.  

The IP address of the business virtual machine is not the same as the IP of the CNA host—the network segment

C.  

The memory multiplexing configuration of the source host and the target host is inconsistent

D.  

The operating system of the business virtual machine is inconsistent with the operating system type or version of the CNA host

Discussion 0
Questions 52

When FusionCompute installs a virtual machine operating system, which of the following methods are supported for mounting the optical drive? (many)

Options:

A.  

File method

B.  

to share

C.  

local way

D.  

remote

Discussion 0
Questions 53

Which of the following descriptions about port groups in FusionCompute are correct? ( many)

Options:

A.  

There are two types of A port group: common and trunk.

B.  

A port group can be configured with multiple IP addresses.

C.  

A port group is a distributed virtual switch.

D.  

All virtual ports in the port group have the same attributes

Discussion 0
Questions 54

In the FusionCloud environment, with the changes of the business, the usage rules for the ECS resources of the elastic cloud server are regulated.

The requirements of the grid will also change, and the ECS specifications need to be adjusted as needed in a timely manner to improve resource utilization. the following

In the description of ECS-related resource changes, which one is wrong? (Single) A. The memory resources allocated to the ECS can be reduced

B. VCPU resources allocated to ECS can be reduced

C. The disk capacity mounted on ECS can be reduced

D. Multiple NICs bound to ECS can be uninstalled

Options:

Discussion 0
Questions 55

【Multiple Choice】Which of the following scenarios cannot be migrated using Rainbow?

Options:

A.  

Migrating Alibaba Cloud's ECS to HUAWEI CLOUD

B.  

Migrate the running virtual machine to FusionCompute.

C.  

Migrate the virtual machine running in the Beijing data center to the virtual machine running in the Shanghai data center through the Internet on FusionCompute.

D.  

The Rainbow server can access the source and destination virtual machines, but cannot access the management network of FusionCompute network.

Discussion 0
Questions 56

In a FusionAccess site, the administrator configures the naming process in the process of rapidly provisioning virtual desktops.

rule. Which of the following descriptions about configuration naming rules is correct? (many)

Options:

A.  

The computer name prefix can be "shared vm"

B.  

When setting the naming rule of the complete replication virtual machine, it is allowed to include the domain account of the logged in user virtual machine

C.  

The computer name prefix can be "shared-vm"

D.  

When setting the naming rules for linked-clone virtual machines, it is not allowed to include the domain account of the logged-in user virtual machine

Discussion 0
Questions 57

In the following description about forward proxy settings in CPS, which is the correct option? ( many)

Options:

A.  

Different services can use different forward proxy addresses.

B.  

The system defaults to the forward proxy rules of the External APl network plane that serves the students.

C.  

The system enforces that different services must use the same forward proxy rules.

D.  

The forward proxy rules configured by default in the system cannot be modified.

Discussion 0
Questions 58

In FusionCloud, which of the following descriptions about the virtual firewall VFW is wrong? (one)

Options:

A.  

Security group is a virtual machine port-level security service of VPC, supports black and white lists, and can be used to control Control traffic to and from one or more virtual machines

B.  

is a subnet-level and VPC-level security service of the VPC

C.  

By setting up a virtual firewall, adding an additional security layer to the VPC can be more flexible and hierarchical

Safety management.

D.  

Support black and white list, which can be used to control the traffic in and out of one or more subnets

Discussion 0
Questions 59

(Multiple Choice) AboutFusionComputeDescription of cluster creation, which of the following is correct?

Options:

A.  

cluster onGuestNUMAAfter that, the virtual machines in the cluster need to be restarted to take effect.

B.  

cluster onIMCmode, which avoids theCPUVirtual machine migration fails due to incompatibility

C.  

After the cluster is turned on, the virtual machines in the cluster can be turned onHA

D.  

After the cluster enables host memory multiplexing, the total number of virtual machine memory created on the host can exceed the physical memory of the host.

Discussion 0
Questions 60

(Multiple Choice) Which of the following descriptions are correct regarding the correspondence between desktop groups and virtual groups in the Huawei Desktop Cloud solution?

Options:

A.  

"The "linked clone" virtual machine group uses the "static pool" desktop group. When the user logs in for the first time, the desktop group will randomly assign a virtual

machine to bind the user.

B.  

"The "Linked Clone" virtual machine group uses the "Dynamic Pool" desktop group. When a user logs in for the first time, the desktop group will randomly assign a virtual

machine to bind the user.

C.  

""Full Replication" virtual groups correspond to "private" desktop groups, including "static multi-user" and "single-user"

D.  

"Linked-clone" virtual groups correspond to "private" desktop groups, which include "static multi-user" and "single-user"

Discussion 0
Questions 61

(Multiple Choice) Login Fusion Access Wl After the virtual machine list is not displayed, which of the following aspects are recommended for troubleshooting?

Options:

A.  

HDC virtual machine and WI Whether the network between the virtual machines is faulty

B.  

Whether the virtual machine is unbound

C.  

Is the database working

D.  

Whether the virtual machine is shut down

Discussion 0
Questions 62

In useRainbowDuring migration, the source can be a physical server,VMwareorHyper-VVirtualization platform, the destination isFusionSphereplatform

Options:

A.  

wrong

B.  

right

Discussion 0
Questions 63

huawei full memory desktop10 TailorDeduplication compression technology forVDIIt is specially optimized with the memory medium, while deduplication and compression, it also ensures the real-time and consistency of data interaction

Options:

A.  

True

B.  

False

Discussion 0
Questions 64

Regarding the description of the functions of each module of FusionSphere OpenStack, which of the following is incorrect?

Options:

A.  

LOGProvides log management function, supports log level setting and log dump

B.  

CPSProvide cloud data centerPXEway to installOSFunction

C.  

BackupProvide management data backup and recovery functions, support regular automatic backup management data

D.  

HealthCheckAnswers to health checks and related information collection functions are provided

Discussion 0
Questions 65

Fusion Sphere In server virtualization scenarios, if customers need to use software routers and VPC. Which of the following components needs to be installed in the routing network?

Options:

A.  

fusionCompute

B.  

fusionStorage Manage

C.  

VSAM

D.  

VPC

Discussion 0
Questions 66

(multiple choice) About the following FusionCloudvirtual private cloud inVPCdescription, which options are correct?

Options:

A.  

Each user can apply for multiplevPC.

B.  

By default, in differentVPCmiddleECScannot access each other.

C.  

VPCIt can realize the isolation of computing resources at the network level.

D.  

eachVPCOnly one subnet can be created below.

Discussion 0
Questions 67

(Multiple Choice) In HuaweiFusionSphere OpenStackin, usecinderThe command to delete the volume fails. Which of the following reasons may be caused?

Options:

A.  

Snapshots exist for this volume.

B.  

A virtual machine instance created from this volume is running.

C.  

A backup exists for this volume.

D.  

The volume is mounted to the virtual machine instance.

Discussion 0
Questions 68

(Multiple choice) Xiao ZhangweiAThe company designed a set ofFusionSphereThe disaster recovery system of the server virtualization

platform, but a The company system further reduces theRPO, what can Xiao Zhang do to optimize the existing solution?

Options:

A.  

Lease higher bandwidth for initial data synchronization

B.  

WillBCManager eReplicationThe host-based remote replication disaster recovery scheme is changed to storage remote replication disaster recovery

C.  

Add links and configure load balancing between the active and standby sites

D.  

WillBCManaaer eReolicationBased on the storage remote replication disaster recovery scheme, the

Discussion 0
Questions 69

InstallFusionSphereWhich of the following software packages should not be used in a server virtualization environment?

Options:

A.  

FusionComputeXXXCNA

B.  

FusionManagerXXXX

C.  

FusionComputexXXX DC zip

D.  

FusionToolXXXXFusionCare zip

Discussion 0
Questions 70

(multiple choice) inFusionSphereIn the private cloud solution, which of the following functions can be implemented when a tenant (non-tenant administrator) applies for the cloud server backup service?

Options:

A.  

Perform backup tasks automatically or manually

B.  

Modify Backup Capacity Quota

C.  

Configure backup strategy or recovery strategy according to actual needs

D.  

Self-modified service period

Discussion 0
Questions 71

FusionAccessThe branch office desktop cloud is locally managed and issued by the branch office, and has nothing to do with the headquarters desktop clouD.

Options:

A.  

True

B.  

False

Discussion 0
Questions 72

For CVMs with shared volumes mounted on FusionCloud, it is not supported to apply for CVM backup CSBS service instances and cloud server high-availability CSHA service instances.

Options:

A.  

True

B.  

False

Discussion 0
Questions 73

Failed to create a virtual machine on ManageOne ServiceCenter, use ssh to log in to FusionSphere OpenStack. Check the logs in the background. Which of the following paths should be checked?

Options:

A.  

/var/log/fusionsphere/componcnt/cinder-api

B.  

/var/fusionsphere/operate/nova-api

C.  

/var/log/fusionsphere/componcnt/nova-api

D.  

/var/fusionsphere/operate/cinderapi

Discussion 0
Questions 74

FusionStorage Blockcannot be configuredRAIDdisk, be sure toRAIDAfter the information is deletedFusionStorage Blockto recognize these disks.

Options:

A.  

True

B.  

False

Discussion 0
Questions 75

ManageOne Operation CentermiddlekeystoperAfter the configuration is complete,FusionSphere OpenStack. The connection will be automatically completed in the interface.

Options:

A.  

True

B.  

False

Discussion 0
Questions 76

(multiple choice) in useRainbowWhen migrating, aboutWindowsDescription of online file-level migration methods, which of the following are correct?

Options:

A.  

speed

B.  

The partition structure must be consistent with the source

C.  

Supports partition resizing

D.  

relatively slow

Discussion 0
Questions 77

In FusionSphere OpenStack, which network plane addresses can be used to log in to the CPS interface?

Options:

A.  

Internal Base

B.  

External API

C.  

External OM

D.  

External Base

Discussion 0
Questions 78

When deploying HUAWEI Desktop Cloud Network, which component should be deployed on the management plane?

Options:

A.  

HDC

B.  

DHCPserver

C.  

VAG

D.  

desktop virtual machine

Discussion 0
Questions 79

If a storage device is configured with8open1Gb/sofiSCSIstorage card,15%the network bandwidth consumption, which of the following methods can calculate the effective bandwidth of the storage device (Mb/s) ?

Options:

A.  

8x1024x0.15

B.  

8x1024x1024x0.15

C.  

8x1024x(1-0.15)

D.  

8x1024x1024x(1-0.15)

Discussion 0
Questions 80

If the computing node of FusionCompute has only two 10GEx network cards, which of the following networking methods should be used to store the IP SAN? more suitable?

Options:

A.  

Willeth0,eth1The binding is in load sharing mode, and both the management plane and the storage plane follow this mode.Bond, configure link aggregation on the

interconnected switch

B.  

eth0go manage traffic,eth1Send storage traffic, connect to the switch and configure link aggregation

C.  

Willeth0,eth1Binding to active/standby mode, both the management plane and the storage plane follow this modeBond, the interconnected switch is not configured with link aggregation

D.  

eth0go manage traffic,eth1For storage traffic, the interconnected switch is not configured with link aggregation

Discussion 0
Questions 81

When replacing a host in FusionSphere OpenStack, which roles need to be deleted on the new host?

Options:

A.  

DHCP

B.  

FC-Nova-Compute

C.  

Compute

D.  

Host os

Discussion 0
Questions 82

(Multiple choice) Regarding the functions of each service in FusionSphere OpenStack, which of the following descriptions is incorrect?

Options:

A.  

hostVBSprocess withOSDProcess communication exception

B.  

GlanceProvides query, upload and download of virtual machine images

C.  

MDCProcess exception

D.  

hostVBSinternal error

Discussion 0
Questions 83

ManageOne Operation CenterandManageOne ServiceCenterDocking failed, which of the following is not the cause of the docking failure?

Options:

A.  

Service Centerwrong version number selection

B.  

buttServiceCenterWhen "Is it trusted" is selected as "No"

C.  

Incorrect user name or password for docking

D.  

Service CenterAnswers provided by users with non-administrator privileges for

docking users

Discussion 0
Questions 84

During the deployment and implementation of the FusionAccess gateway and load balancer, if the user logs in to the self-service maintenance gateway, the It shows that there is no gateway available, which of the following reasons cannot be caused?

Options:

A.  

There is a firewall in the network, and the firewall is not allowed to pass throughvAGservice port.

B.  

ITAconfigure onvAGofIPwrong address.

C.  

vAGconfigure onHDCwrong port.

D.  

vAGAfter the component was installed, the service did not start.

Discussion 0
Questions 85

FusionAccessSupports manual or automatic monitoring of resource load and shutdown of unused virtual machines

Options:

A.  

True

B.  

False

Discussion 0
Questions 86

In the FusionSphere private cloud solution, you can view the used and available resources of the host group in the host group list. When the number of available resources in the host group is less than the sum of the available resources of each host in the host group, it means that the host group has there is a host with resource overcommit.

Options:

A.  

True

B.  

False

Discussion 0
Questions 87

When deploying 100 HUAWEI Desktop Cloud VMs with the same specifications but different types, which of the following scenarios requires the largest host internal size?

Options:

A.  

full copy desktop

B.  

Linked-clone desktop

C.  

Linked Clone Desktop+iCache

D.  

full memory desktop

Discussion 0
Questions 88

For cloud servers with shared volumes mounted in FusionCloud, applying for the cloud server backup CSBS service is not supported.

service instances and cloud server high-availability CSHA service instances

Options:

A.  

TRUE

B.  

FLASE

Discussion 0
Questions 89

(Multiple choice) The following aboutFusionComputeMemoryQosdescription, which options are incorrect?

Options:

A.  

MemoryQoSTechnology works just as well with physical machines.

B.  

open memoryQoSAfter that, the memory space that the virtual machine can use can exceed the memory size set by the virtual machine

C.  

through memoryQosIt can solve the problem of resource preemption during memory reuse

D.  

MemoryQoSThe technique mainly achieves the answer by setting memory reservation and memory share

Discussion 0
Questions 90

(Multiple choice) In Huawei's disaster recovery solution, the followingVRGWhich of the descriptions is correct?

Options:

A.  

Created and configuredVRGAfter that, create a snapshot for it immediately to prevent unavailability caused by misoperation

B.  

When using the storage replication disaster recovery method, you need toFusionComputedeployVRG

C.  

When using the host replication disaster recovery method, only theVRGofCNAsThe virtual machine on the host can be protected

D.  

when oneVRGWhen the load requirement cannot be met, it needs to be addedVRG. addedVRGCan't be created by cloning,

can only be deployed by template

Discussion 0
Questions 91

If passedVNCLog inFusionComputeThe business virtual machine fails, which of the following may be the reason?

Options:

A.  

Virtual machine blue screen failure, restarting.B. VNCThe login mode is "exclusive" and there is already a user logged in.

B.  

virtual machineGuset OSnot supportVNCFunction.

C.  

The virtual machine NIC is faulty.

Discussion 0
Questions 92

(Multiple Choice) HuaweiFusion Sphere OpenstackmiddleNeutronWhich of the following advanced network services can be provided to tenants?

Options:

A.  

anti-virus

B.  

load balancing

C.  

firewall

D.  

VPN

Discussion 0
Questions 93

(Multiple choice) The following aboutFusionComputeIn the description of Virtualization Antivirus, which options are correct?

Options:

A.  

useFusionComputeSecure User VM supports generating memory snapshots when virtualizing antivirus

B.  

Deploy one security service virtual machine per host

C.  

Each host can be configured with multiple secure user virtual machines

D.  

useFusion Com puteWhen virtualizing antivirus, the security service virtual machine does not support generating memory snapshots

Discussion 0
Questions 94

Which allocation type is a fully replicated virtual machine of which allocation cannot be restored after deallocation?

Options:

A.  

single user

B.  

pooled user

C.  

static multi-user

D.  

Dynamic Multi-User

Discussion 0
Questions 95

In order to match the customer organization model,ManageOneHow many levels can be supported at mostVDC?

Options:

A.  

4

B.  

3

C.  

2

D.  

5

Discussion 0
Questions 96

FusionAccessWhich of the following migration methods are supported for virtual machines and desktops?

Options:

A.  

existFusionAccess PortalThe interface finds the virtual machineID ,login toHDCOn the component background, enter the corresponding

command to migrate.

B.  

existFusionAccess PortalOn the interface, find the virtual machine to be migrated, and click the "Migrate" button.

C.  

existFusionCompute Portalinterface, find the virtual machine to be migrated, and click the Migrate button in the Virtual Machines taB.

D.  

existFusionAccess PortalThe interface finds the virtual machineID ,login toWIOn the component background, enter the corresponding command line to migrate

Discussion 0
Questions 97

ManageOneThe operation plane provides a resource ordering interface, and third-party platforms can create, change, extend, and delete cloud resources by calling the ordering interface.

Options:

A.  

True

B.  

False

Discussion 0
Questions 98

Which of the following types of hardware changes is not supported by an RDS instance?

Options:

A.  

CPUIncrease

B.  

CPUreduce

C.  

memory reduction

D.  

the hard disk capacity is reduced

Discussion 0
Questions 99

Register the image type in fusioncloud as Fusioncompute, which needs to be created in FusionCompute. The virtual machine template is used as an image, and only vhd image files are supported.

Options:

A.  

True

B.  

Fault

Discussion 0
Questions 100

(Multiple choice) Users useVNCLog inFusioncomputeAfter the virtual machine is found to be unable to operate normally, there is a stuck phenomenon (for example, the file cannot be opened, etc. ), which of the following reasons may cause this phenomenon?

Options:

A.  

The management link is unstable

B.  

Storage link is unstable

C.  

The service link is unstable

D.  

virtual machine corruption

Discussion 0
Questions 101

Which of the following scenarios is not suitable for improvingFusionComputeMemory reuse ratio?

Options:

A.  

Virtual machine memory utilization is low

B.  

While ensuring performance, customers require a single host to host the maximum number of virtual machines

C.  

Reduce customer hardware procurement costs

D.  

In commercial scenarios, the memory reuse rate has reached150%

Discussion 0
Questions 102

What should I do if the user thinks about the pre-symptom of the desktop card when using the FusionAccess desktop cloud? (multiple choice)

Options:

A.  

Restart the virtual machine and log in to the virtual desktop again.

B.  

Disabled in service listHDPRelated Services.

C.  

deleteHDA

D.  

closureCPU.Processes with high memory usage.

Correct case

Discussion 0
Questions 103

Which of the following data is generally not saved toFusionAccessDifferential disks for linked-clone virtual machines?

Options:

A.  

User profile

B.  

system startup file

C.  

The application temporarily caches data

D.  

User personalized configuration

Discussion 0
Questions 104

(Judgment question) IfFusionComputeThe virtual machine is not installedTools,You cannot query the memory usage of the virtual machine.

Options:

A.  

True

B.  

False

Discussion 0
Questions 105

The following aboutFusioncomputeIn the description of Port Groups and Security Groups, which option is incorrect?

Options:

A.  

OneDVSThere can be multiple port groups, aVMCan be protected by multiple security groups.

B.  

A virtual machine NIC is connected to a virtual port of the port group, and a virtual machine NIC is associated with a security group.

C.  

Security groups are based on port groups to protect virtual machines.

D.  

port group isDVSA collection of one or more virtual ports, while a security group is a collection of one or more rules Correct

Discussion 0
Questions 106

(Multiple choice questions)Which of the following descriptions about the difference between physical switches and virtual switches is incorrect?

Options:

A.  

The normal operation of the virtual switch also requires certain hardware resources.

B.  

Virtual switches run on physical servers, and physical switches have separate hardware.

C.  

virtual switch failsVLANLabel operation, the physical switch canVLANlabel to do the operation.

D.  

Virtual switches cannot be configured with Layer 3 interfaces, but physical switches can be configured with Layer 3 interfaces.

Discussion 0
Questions 107

(Multiple choice) The following aboutFusioncomputeMedium Distributed Virtual SwitchDVSdescription, which options are correct?

Options:

A.  

Can be configured with multipleUplinkport

B.  

Multiple virtual ports can be configured

C.  

Multiple physical servers can be connecteD.

D.  

eachVMonly connect oneDVS

Discussion 0
Questions 108

(Multiple Choice)Which of the following operations is correct during the installation of FusionAccess?

Options:

A.  

Create the corresponding port group for the service network

B.  

Requires separate datastore creation for infrastructure VMs

C.  

the same setFusionAccessprimary and secondary ITA the virtual machine is set as a mutually exclusive virtual machine

D.  

Infrastructure VMs compete on a level playing field with user desktop VMs.

Discussion 0
Questions 109

(Multiple choice) The following aboutFusionAccessmiddleTCMDescription of the component, which options are correct?

Options:

A.  

passTCMyesHDAto upgrade

B.  

passTCMable to manageTCto upgrade

C.  

passTCMCan issue policies to virtual desktops

D.  

passTCMCan view managedTCThe run log

Discussion 0
Questions 110

Which of the following descriptions about FusionAccess log collection is correct? (Multiple Choice)

Options:

A.  

able to passsshLog in to the user VM to collect logs.

B.  

can be collectedGuessDBThe database service check log and database operation log.

C.  

able to passgandalfusersshLog inLinuxThe system infrastructure virtual machine virtual machine, and then copy the component logs to the local.

D.  

LinuxSystem logs are generally in /var/logUnder contents.

Discussion 0
Questions 111

Before modifying the specifications of the Windows virtual desktop of FusionAccess, either modify the CPU parameters, or to modify memory parameters, all need to shut down.

Options:

A.  

correct

B.  

mistake

Discussion 0
Questions 112

(Multiple choice) Which of the following reasons may causeFusionAccessVirtual desktop registration failed?

Options:

A.  

DNSThe configuration information of the forward lookup zone in the server is modified

B.  

twoHDCTime out of sync between servers

C.  

virtual machine withHDCThe network status is abnormal.

D.  

DHCPComponent exception

Discussion 0
Questions 113

in HuaweiFusionCloud6.3solution,APIWhat authentication methods does the gateway include?

Options:

A.  

AK/SK

B.  

IAM

C.  

Username Password

D.  

Token

Discussion 0
Questions 114

FusionAccessmiddleVIPCompared with ordinary desktops, the advantages of desktops are reflected in which of the following aspects? (many)

Options:

A.  

User access doorVIPOn desktop, greater bandwidth brings better user experience

B.  

VIPCompared with Xitong Desktop, the desktop has the functions of automatic data backup and fast recovery, ensuring thatVIPDesktop Data Security

C.  

CPU, the priority guarantee of memory resources, when resources are tight, resources are allocated toVIPdesktop.

D.  

Real-time monitoring of virtual machine status, guaranteeVIPThe desktop virtual machine runs stably.

Discussion 0