Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

H13-531_V2.0 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H13-531_V2.0 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: HCIE-Cloud Computing (Written) V2.0
  • Last Update: Sep 14, 2025
  • Questions and Answers: 765
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H13-531_V2.0 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H13-531_V2.0 Practice Exam Questions with Answers HCIE-Cloud Computing (Written) V2.0 Certification

Question # 6

Which of the following is incorrect about the description of the physical network of FusionSphere OpenStack?

A.

Virtual machines can use the physical network directly

B.

The physical network defines the mapping relationship between the virtual network and the host network interface

C.

The physical network is mapped to a physical network port or a bonded physical interface on the host

D.

Virtual machines on different physical hosts can communicate with each other through the same physical network

Full Access
Question # 7

(Multiple choice) During installationFusionSphere OpenStackWhat are the required network planes?

A.

External OM

B.

External_Base

C.

Internal_Base

D.

Extermal_API

Full Access
Question # 8

FusionStorage Block"Alarm"VBSFailed to load metadata", which of the following are possible causes?

A.

MDCProcess exception

B.

hostVBSinternal error

C.

hostVBSprocess withOSDProcess communication exception

D.

OSDProcess exception

Full Access
Question # 9

FusionCompute, after the port group is created, you can modify the port group type andVLAN ID.

A.

True

B.

False

Full Access
Question # 10

(Judgment question) After the user logs in to the machine, if all theFusionAccessThe infrastructure virtual machine, the recorded users can still use the virtual machine desktop normally.

A True

C. False

Full Access
Question # 11

The following description about the CSDR disaster recovery test of the cloud server disaster recovery service in the FusionCloud environment is wrong.

What's wrong? ( one)

A.

Testing can verify the integrity of disaster recovery data

B.

The test has no effect on the production virtual machine

C.

The test process needs to switch DNS repeatedly

D.

The disaster recovery virtual machine will be activated and connected to the test network

Full Access
Question # 12

?Multiple choices? The following 3D graphics about the Huawei Desktop Protocol HDP (Huawei Desktop Protocol)

Which of the descriptions of the display technology is correct?

A.

The GPU hardware virtualization technology virtualizes the graphics card into several VCPUs, and each VGPU is bound to a virtual machine.

The virtual machine directly accesses the VGPU as it accesses the GPU

B.

GPU hardware virtualization supports up to 64 users sharing one GPU card

C.

Through the management of graphical workstations, the graphical workstation can be imported into the desktop cloud solution, and sent to the desktop cloud solution.

End users provide the HDP protocol to access the graphics red workstation to obtain the 3D acceleration capability of the GPU

D.

GPU pass-through technology binds each physical GPU to a small number of virtual machines, and the virtual machines directly access to GPU

Full Access
Question # 13

In the FusionSphere server virtualization backup scenario, the following describes the eBackup backup process:

Which one is wrong? ( one)

A.

When using snapshot comparison technology for incremental backup, it is necessary to retain snapshot data on the production side

B.

Use CBT technology for incremental backup, which saves storage space compared to snapshot comparison.

C.

CBT technology will not be used during the first full backup

D.

When using CBT technology for incremental backup, snapshot technology will not be involved

Full Access
Question # 14

After adding on the Rainbow server and passing the source check, it can be displayed on the source details page What information? ( many)

A.

Source network card information

B.

Source disk information

C.

Source username and password information

D.

The version number of the destination cloud platform compatible with the source

Full Access
Question # 15

Which of the following descriptions about the VIMS file system in FusionCompute is incorrect? (one)

A.

VIMS is a high-performance cluster file system.

B.

VIMS is a common storage virtualization file system in the industry.

C.

VIMS is the technical basis for advanced features such as thin disks, snapshots, and storage migration.

D.

VIMS can be compatible with FC SAN, IP SAN, local disk.

Full Access
Question # 16

When deploying FusionAccess, the administrator needs to configure a backup server. The following about backup services description of the device, which one is wrong? ( one)

A.

In the scenario where multiple sets of FusionAccess are connected to one set of AD / DNS / DHCP, only one set is required Configuration Backup on FusionAccess

B.

If the user side is a newly created Windows AD / DNS / DHCP server, backup AD / DNS / DHCP , there is no need to install a monitoring agent on the corresponding server

C.

When Backup Server backs up the CNA node where the server is located, use Backup Server to back up. The data backed up by the server may be lost

D.

The backup server mainly backs up FusionAccess related system data, user data and certificates, etc.

Full Access
Question # 17

Authentication-related services in OpenStack are provided by the keystone project, and keystone’s own back-end storage

The storage is driven by SQL by default, and it also provides the docking capability of other heterogeneous storages, such as Connecting to LDAP is convenient for unified management and maintenance of identity information data within the enterprise.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Which of the following are the steps to synchronize data through Rainbow block-level migration? ( many)

A.

Migrate the source data to the destination VM

B.

After the co-generation is completed, business verification needs to be performed, and business switching can be performed after the business verification is successful.

C.

The migration process generates full data

D.

The source side executes the snapshot before the migration

Full Access
Question # 19

In the FusionCloud private cloud scenario, which of the following descriptions about virtual machine live migration are correct?

item? (many)

A.

Live migration requires that the Hypervisor types on the destination host and the source host are the same

B.

If the virtualization type of the available partition where the virtual machine is located is "Vmware", it supports cold and hot migration functions

C.

If the virtualization type of the available partition to which the virtual machine belongs is "FusionCompute", it is not supported to use

Batch cold and hot migration capabilities

D.

Cross-AZ hot migration of virtual machines is not supported, only cross-AZ cold migration of virtual machines is supported

Full Access
Question # 20

Backing up different components in the FusionAccess system requires different backup settings. by

Which of the following descriptions about the backup settings corresponding to each component is correct? ( many)

A.

When backing up DNS, you need to configure DNS information in the "Alarm Component" of FusionAccess

B.

When backing up VLB components, you need to configure VLB information in FusionAccess "Monitoring Components"

C.

When backing up DHCP, you need to configure DHCP information in the "Alarm Component" of FusionAccess

D.

When backing up AD, in FusionAccess "System Management > Initial Configuration > Domain/OU", the

"Enable Backup" is set to "Yes"

Full Access
Question # 21

Use the Rainbow tool for migration operations, after the migration of the operating system's magnetic, network card, system, etc.

Configuration may change. Which of the following descriptions about the system changes after the Rainbow River relocation are correct item? ( many)

A.

The license needs to be reactivated after Windows migration

B.

Disk drives may change after migration

C.

The network card MAC and IP address will change

D.

Windows dynamic disk will become a shared disk after migration

Full Access
Question # 22

?Single Choice? When FusionCompute clones a virtual machine, which of the following attributes supports customization?

A.

The bus type of the virtual machine disk

B.

The capacity of the virtual machine disk

C.

OS type and version number of the virtual machine

D.

The number of CPUs of the virtual machine

Full Access
Question # 23

In the FusionSphere private cloud solution, regarding the principle of rapid provisioning of virtual machines, which of the following Are these descriptions wrong? ( many)

A.

During the use of the virtual machine, all modifications to the system volume are written to the subvolume.

B.

When issuing a virtual machine, the system only needs to quickly create a lightweight subvolume, and add the existing parent volume to form a group becomes the full system volume of the virtual machine.

C.

The system volume ID presented by the virtual machine to the outside world is the ID of the parent volume used by it,

D.

When issuing a virtual machine, there is no need to create a new system volume in the storage and copy the full mirror content to it middle.

Full Access
Question # 24

In the user login connection process of FusionAccess, which of the following steps occurs after consuming the license?

A.

After the pre-connection is successful.

B.

HDCreturnLogin ticketafter

C.

TCAfter the side initiates a connection request.

D.

DBReturn to the virtual machineIPstatus and other information.

Full Access
Question # 25

(Multiple choice) The following aboutFusion AccessmiddleITADescription of the component, which options are correct?

A.

It can realize virtual machine creation and allocation, virtual machine state management, etC.

B.

ITAessentially based onTomcatbuilt oneWeb Services.

C.

Provides management for desktop cloud system administratorsPortal

D.

ITAcomponents withHDCThere is interaction between components, andFusioncomputeThere is no interaction between the

Full Access
Question # 26

?True or False? In order to ensure the consistency of the source and destination data after business migration, the business migration should be done before the final synchronization.

Machine out of business.

A.

True

B.

False

Full Access
Question # 27

In FusionCompute, it is found that the IP address of a Windows PC is 0.0.0.0. Which of the following may be the cause?

A.

the virtual machine'sIPThe address is manually set to0.0.0.0.

B.

the virtual machine'sIPaddress isDHCPdistribute.

C.

The virtual machine is not installedTools.

D.

the virtual machine'sIPThe address is set manually.

Full Access
Question # 28

VRMcomponent isFusionComputemanagement center, responsible for IT the orchestration, provisioning and automatic deployment of services can be managed in cascade.

A.

TRUE

B.

FALSE

Full Access
Question # 29

(Single choice)( FusionAccessmiddlelicenseWhere is the remainder deducted?

A.

After getting the list of virtual machines

B.

After the pre-connection is successful

C.

Get the login interface

D.

After authentication

Full Access
Question # 30

ManageOneThe homepage of the O&M plane displays information such as data center resources, alarms, capacity, and network status through different O&M map pages. The O&M map page is used to uniformly manage O&M functions and services and provide

unified O&M. Entrance

A.

TRUE

B.

FALSE

Full Access
Question # 31

Is the option correct?

A.

On the same physical host, allGuest Physical Memorycan be larger than the physical host'sHost Physical Memory

B.

On the same physical host, allGuest Physical MemoryMust be less than or equal to the physical host'sHost Physical Memory

C.

In a virtual machine, all applications correspond toGuest virtual memorycan be larger than the virtual machine'sGuest Physical Memory

D.

Already in a virtual machine, all applications correspond toGuest Virtual MemoryMust be less than or equal to the virtual machine's Guest Physical Memory

Full Access
Question # 32

In HuaweiFusionCloud6.3In the solution, the following aboutLVSWhich of the component descriptions are correct?

A.

Work on the four layers of the network, strong anti-load ability

B.

no flow,LVSDistribute requests only

C.

yeshttp, database for load balancing

D.

LVSDependency ratio for the networkNginxLow

Full Access
Question # 33

(Multiple choice) In the full-memory desktop technology of Huawei Zhuo face cloud solution,lOTailorAs a key technology, it is applied to virtual desktops, which can improve the performance of virtual desktops. Which of the following options arelOTailorThe benefits of technology?

A.

hardwareCPUHighly coupled, enhance virtualCPUprocessing performance

B.

Reduce the space occupied in the memory by deduplication and sinking technology

C.

Deep integration with virtualization platform to improve deployment efficiency

D.

memory efficientIOAbility to provide a high-experience user virtual machine

Full Access
Question # 34

FusionSphere OpenStackThe control node can provideNTPServe.

A.

True

B.

False

Full Access
Question # 35

If a storage device is configured with8open1Gb/sofiSCSIstorage card,15%the network bandwidth consumption, which of the following methods can calculate the effective bandwidth of the storage device (Mb/s) ?

A.

8x1024x0.15

B.

8x1024x1024x0.15

C.

8x1024x(1-0.15)

D.

8x1024x1024x(1-0.15)

Full Access
Question # 36

In the desktop cloud system, the virtual machine is located in the data center, and the terminal is located on the user access side. In order to use the relevant port resources

on the terminal, it is necessary toFusionAccessThe corresponding resource mapping function is configured in the management system. According to different resources, it can be divided into two types: device mapping mode and desktop mapping mode.

A.

TRUE

B.

FALSE

Full Access
Question # 37

Which of the following is notFusionAccessWhat auxiliary tools are needed for log collection?

A.

WinSCP

B.

Huawei vDesk

C.

FusionCarel

D.

eService

Full Access
Question # 38

AboutFusionSphereDescription of private cloud, which of the following is incorrect?

A.

FusionSphere OpenStack OMResponsible for resource access, configuration, monitoring and maintenance functions

B.

In a single data center scenario, it needs to be deployed in the data center at the same timeFusionSphere OpenStack OMand ManageOne Service Center

C.

In a multi-data center scenario, it needs to be deployed in each data center at the same timeFusionSphere OpenStack OMandManageOne Service Center

D.

ManageOne Service CenterResponsible for account opening and cancellation, cloud service application, approval, management and other functions

Full Access
Question # 39

In the daily operation and maintenance work of the cloud data center, the logs of related components need to be collected.

Which of the following components can logs be collected in the environment? (Multiple) A. FusionSphere OpenStack

B. ManageOne

C. FusionStorage

D. VRM. CNA

Full Access
Question # 40

In addition to supporting the management of physical devices such as servers, storage, and networks, Huawei eSight tools also support

Management of virtual resources. Which of the following computing virtual facilities provide access to eSight management capabilities? ( many)

A.

FusionSphere OpenStack

B.

Vmware Center Server

C.

FusionCompute

D.

VMware ESX/ESXi Server

Full Access
Question # 41

When FusionCompute uses NAS resources, which of the following protocols can be used to scan to storage devices? (one)

A.

FTP

B.

NFS

C.

CIFS

D.

HTTPS

Full Access
Question # 42

Virtual machine specification adjustment, the error is

A.

Disk capacity can be increased or decreased

B.

Memory QoS, increase or decrease memory share

C.

CPU Qos select share, reserve, limit

D.

Can add or delete network cards

Full Access
Question # 43

The security management of accounts in FusionAccess is also an important part of the operation and maintenance work. The following

What is wrong about the description of changing the password of the Linux infrastructure server "gandalf" account?

item?

A.

The "gandalf" account is the local ordinary user account of the Linux server

B.

The "gandalf" account is used to start and stop VAG services on the VAG server

C.

If the "gandalf" account of the linux infrastructure server where the vAG and HDC components are located is modified at the same time password, you need to reconfigure the HDC component

D.

"gandalf" account can be used for SSH login to Linux server

Full Access
Question # 44

In FusionCloud, if a user wants to connect to an RDS instance, which type of cloud service must be created first? (one)

A.

OBS

B.

ECS

C.

EVS

D.

EIP

Full Access
Question # 45

[Judgment] In the ManageOne operation plane, if the parent VDC has unlimited quota (that is, the quota upper limit is source pool), the child VDC support is set to unlimited quota.

A.

TRUE

B.

FALSE

Full Access
Question # 46

In FusionCompute, which of the following are the reasons for the abnormal heartbeat connection between the CAN host and the VRM?

A.

CNAshost offline

B.

CNAThe host is in maintenance mode

C.

CNAThe host management network port is abnormal

D.

CNAhost process exception

Full Access
Question # 47

Regarding the correspondence between ports and subnets in FusionCloud, which of the following is correct?

A.

1:1

B.

1:N

C.

N:1

D.

M:N

Full Access
Question # 48

The filtering templates of different pages for shielding alarms are different. Users need to set filtering templates for each page.

Which of the following is wrong in the description of the FusionCloud private cloud operation and maintenance plane system filter template? (multiple choice)

A.

Users with Admin role can manage templates saved by all users

B "Other templates" is the default template of the system

B.

"Following template" is the template that users follow. Users can set commonly used templates as follow templates for easy selection.

C.

"custom template" is the template customized by the current user, and the user can set whether to share the template with other users.

Full Access
Question # 49

existrainbowmigrateWindowsWhen a virtual machine is used, which ports are recommended to be opened on the source virtual machine

A.

80

B.

445

C.

8899

D.

22

Full Access
Question # 50

In the physical networking of the FusionAccess desktop cloud single data center, the desktop virtual machine needs to be connected to the

Which network planes? (many)

A.

business network

B.

to manage the network

C.

storage network

D.

BMC network

Full Access
Question # 51

The technology used in data disaster recovery, the common array layer is array replication, which may be block replication or NAS replication.

In general, virtualized storage arrays cannot write data mirroring to other storage devices.

A.

True

B.

Fault

Full Access
Question # 52

In the user login connection process of FA, after the user clicks the virtual desktop icon on the WI page, the following information is also included:

Which steps (multiple choice)

A.

ITA sends username and password to virtual machine

B.

HDC checks whether licnese is satisfied

C.

The virtual machine uses the domain account password to log in to AD for authentication

D.

TC establishes a login connection with the virtual machine

Full Access
Question # 53

(multiple choice) based onFusionSphereWhat software may exist in the system platform of the server virtualization solution?

A.

FusionSphere OpenStack OM

B.

FusionManager

C.

FusionCompute

D.

FusionStorage

Full Access
Question # 54

In the FusionSphere private cloud solution, after a tenant applies for a cloud server disaster recovery service, they need to perform a disaster recovery test.

Test, which of the following is true about the description of the disaster tolerance test process?

A.

During the disaster recovery test, it needs to synchronize with the main-end business to ensure data consistency

B.

The production-side business needs to be suspended during disaster recovery testing

C.

The disaster recovery test work is initiated by the administrator and does not require user participation

D.

DR testing to productionVMNo business impact

Full Access
Question # 55

(multiple choice) inFusionSphereIn the private cloud solution, which of the following functions can be implemented when a tenant (non-tenant administrator) applies for the cloud server backup service?

A.

Perform backup tasks automatically or manually

B.

Modify Backup Capacity Quota

C.

Configure backup strategy or recovery strategy according to actual needs

D.

Self-modified service period

Full Access
Question # 56

For CVMs with shared volumes mounted on FusionCloud, it is not supported to apply for CVM backup CSBS service instances and cloud server high-availability CSHA service instances.

A.

True

B.

False

Full Access
Question # 57

The following aboutFusionAccessThe description of the daily operation and maintenance specification, which option is incorrect?

A.

Pay attention to the number of unregistered users. If there is a large area of unregistered users, analyze the reasons and handle them urgently.

B.

LicenseIf it is about to expire, you need to process it in time and apply for a new oneLicense

C.

Storage resource and computing resource usage exceeds100%After that, start the expansion task

D.

Emergency alarms such as server heartbeat abnormality, restart, and data service abnormality need to be handled in time.

Full Access
Question # 58

FusionCloudcloud server backup inCSBSThe service can not only backup and restore all cloud hard disks of the cloud server, but also back up and restore some cloud hard disks of the cloud server.

A.

True

B.

false

Full Access
Question # 59

Manage One Operation CenterWhich of the following topology viewing methods is not supported?

A.

physical location topology

B.

VDCtopology

C.

Service Application Topology

D.

VPCtopology

Full Access
Question # 60

FusionComputeThe host fails to add data storage. Which of the following are possible causes of the failure?

A.

add one for the first timeLUNFormat is not selected when storing for virtualized data

B.

The host cannot access the storage

C.

Host management network exception

D.

The datastore mount directory is occupied

Full Access
Question # 61

(Multiple Choice) Which of the following descriptions are correct regarding the correspondence between desktop groups and virtual groups in the Huawei Desktop Cloud solution?

A.

"The "linked clone" virtual machine group uses the "static pool" desktop group. When the user logs in for the first time, the desktop group will randomly assign a virtual

machine to bind the user.

B.

"The "Linked Clone" virtual machine group uses the "Dynamic Pool" desktop group. When a user logs in for the first time, the desktop group will randomly assign a virtual

machine to bind the user.

C.

""Full Replication" virtual groups correspond to "private" desktop groups, including "static multi-user" and "single-user"

D.

"Linked-clone" virtual groups correspond to "private" desktop groups, which include "static multi-user" and "single-user"

Full Access
Question # 62

FusionAccessSupports manual or automatic monitoring of resource load and shutdown of unused virtual machines

A.

True

B.

False

Full Access
Question # 63

FusionComputeuseIP SANStorage, probabilistic failure when creating disk, which of the following may cause this failure?

A.

Data consistency check is enabled on the storage resource

B.

storage interfaceVLAN IDwrong setting

C.

LUNbad block

D.

Configure a separate network plane to host virtualizationSANStore heartbeat traffic

Full Access
Question # 64

(multiple choice)FusionSphereIn a server virtualization scenario, which of the following are typical configurations of physical switch ports that carry the service network plane?

A.

LA, CPload balancing

B.

The port mode is configured asA, CCESS

C.

Port configuration speed limit

D.

The port mode is configured asTRUNK

Full Access
Question # 65

In FusionComupte, two virtual machines in the same port group on the same host cannot communicate, which of the following

Not the cause of this failure?

A.

virtual machineIPConfiguration error

B.

Physical router failure

C.

Virtual machine firewall configuration error

D.

DVSworking abnormally

Full Access
Question # 66

FusionSphereIn the private cloud solution, a host is powered off abnormally.mongodbService exception. At this point, you can clear

mongodb ERRORnode data, restartmongodb, which automatically synchronizes the data and completes the recovery

A.

True

B.

False

Full Access
Question # 67

BCManager eReplicationhost-based10The remote replication disaster recovery scheme, in the optimized deployment mode, the mostsmallRPOcan reach

A.

10Hour

B.

10minute

C.

10second

D.

0second

Full Access
Question # 68

Update ToolProvide upgrade and patch update functions. Currently supported products do not include which of the following?

A.

FusionAccess

B.

FusionStorage

C.

FusionInsight

D.

FusionManager

Full Access
Question # 69

(multiple choice)FusionStorage BlockFailed to create control cluster, which of the following might be the reasons for this failure?

A.

SSLInvalid certificate

B.

Active and standbyFusionStorage Managernetwork exception

C.

FusionStorage ManagerresidualMDCprocess

D.

The time of each host node is not synchronized

Full Access
Question # 70

Which of the following is incorrect about the description of Fusioncompute's virtualization antivirus capabilities?

A.

When running functions such as virus scanning and killing, it only takes up very little computing resources of the user virtual machine, which is used to run antivirus functions

B.

FusionComputeThe virtualized antivirus function consumes a lot of user virtual machine network resources due to its dependence on the network.

C.

FusionComputeVirtualized antivirus eliminates the need to install full antivirus software on user virtual machines

D.

FusionComputeThe virtualized antivirus function performs virus scanning and real-time monitoring through the exchange of host physical memory, with high efficiency and

high speed

Full Access
Question # 71

Use HuaweiBCmanager eBackupdata backup and useLAN-FreeIn networking mode, when a user restores a virtual machine, what operation does the backup server perform?

A.

Issue recovery tasks to production storage

B.

Issue a recovery task to the backup agent

C.

TowardsVRMorvcenterIssue a recovery task

D.

Distribute recovery tasks to backup storage

Full Access
Question # 72

HuaweiManageOne ServiceCenterSeveral default service templates are provideD. Regarding the description of service templates, which of the following is incorrect?

A.

Cloud hard disk instances can be mounted on running cloud host instances

B.

existVDC (Virtual Data Center)Unified management of computing, storage and network resources

C.

In the general cloud hosting service, support advanced properties such as custom hostname, key pair, specified password, etc.

D.

elasticityIPThe address is a static publicIPaddress that can be elasticIPThe address is associated with the cloud host

Full Access
Question # 73

(Multiple Choice) In HuaweiFusionSphere OpenStackin, usecinderThe command to delete the volume fails. Which of the following reasons may be caused?

A.

Snapshots exist for this volume.

B.

A virtual machine instance created from this volume is running.

C.

A backup exists for this volume.

D.

The volume is mounted to the virtual machine instance.

Full Access
Question # 74

(Multiple Choice) AboutFusionAccessTypes of desktop virtual machines, which of the following statements is incorrect?

A.

Quickly encapsulated virtual machines are faster than fully replicated virtual machines because there is no decapsulation process when they are created, and domains have been added in advance

B.

A full-memory virtual machine means that the entire virtual machine runs in memory

C.

Linked clone parent volumes are at most128indivual

D.

The changes of user data on the complete copy virtual machine cannot be saved, and the shutdown restore and one-click restore functions are supporteD.

Full Access
Question # 75

FusionComputeandFusionSphere OpenStackconnected,FusionCompute. The management network must be compatible with FusionSphere OpenStack. Which network is interconnected?

A.

external Om

B.

internal base

C.

external_base

D.

external api

Full Access
Question # 76

(multiple choice)Manage One the operation and maintenance plane can provide three-dimensional panoramic monitoring function. Which of the following monitoring objects are supported?

A.

resource pool

B.

Tenant application

C.

physical device

D.

Cloud service instance

Full Access
Question # 77

The company plans to deploy a large number of linked clones, using oneOceanStor5500As back-end storage, which disk solution is

more suitable?

A.

50piece2TB SATADisks form storage pools. internal useRAID5type

B.

100piece1TB SATADisks form a storage pool for internal useRAID5type

C.

50piece2TB SATAAdministrative disks form a storage pool for internal useRAID6type

D.

100piece1T8 SATADisks form storage pools. internal useRAID6Beautiful

Full Access
Question # 78

(multiple choice)FusionSphereIn a server virtualization scenario, which of the following situations will causeVMCan't hot migrate?

A.

VMThe disk property is "non-persistent"

B.

The target host is in maintenance state

C.

VMThe uplink of the distributed switch where the NIC is located is not associated with both the source host and the target host

D.

VMnot mountedTools

Full Access
Question # 79

HuaweiFusionSphereMedium host adoptsGEWhen using a network card, it is recommended to separate the management, service, and storage networks, and use a separate physical network port for each.

A.

wrong

B.

right

Full Access
Question # 80

Which of the following is deleteFusionComputeCorrect steps to store resources in ?

?1Deleting or migrating virtual machine disks

?2Disassociate host

?3delete storage resource

?4Destroy the data store

A.

1--->2--->3--->4

B.

1--->4--->2--->3

C.

3--->2--->4--->1

D.

2--->4--->1--->3

Full Access
Question # 81

When the host in Huawei FusionSphere uses a GE network card, it is recommended to separate the management, service, and storage networks and use them independently.

a physical network?

A.

True

B.

False

Full Access
Question # 82

(multiple choice)ManageOne OperationCenterWhich of the following user login authentication modes are supported?

A.

LDAPAuthentication

B.

remote authentication

C.

HTTPAuthentication

D.

local authentication

Full Access
Question # 83

After the UltraVR system is built, the administrator needs to adjust the network settings according to the network settings.

Plan to manually modify UItravR's management IP address on the Portal page.

A, TRUE

B. FALSE

Full Access
Question # 84

Which of the following descriptions about FusionAccess desktop distribution is wrong? (one)

A "Pool" refers to a group of people sharing a set of virtual machines, often used in scenarios such as call centers.

B. "Exclusive" refers to one virtual desktop per person, often used in scenarios such as call centers.

C. Support two allocation modes: exclusive allocation and pool allocation

D. "proprietary" refers to one virtual desktop per person, commonly used in OA office and other scenarios

Full Access
Question # 85

Which of the following are the license authorization modes of Huawei Desktop Cloud?

A.

Number of virtualized desktops

B.

Number of physical servers

C.

User number

D.

concurrent users

Full Access
Question # 86

In progressFusionSphereWhen hardware deployment of a server virtualization cloud platform, which of the following is the recommended order of hardware deployment in

the cabinet from bottom to top?

A.

Storage---Server---Switch

B.

Storage---Switch---Server

C.

Server---Storage---Switch

D.

Server---Switch---Storage

Full Access
Question # 87

A company hopes to replace the traditionalPCdesktop, users include3DAnimation, video production staff, etc. Which of the following desktops is more suitable?

A.

GPUdesktop

B.

Linked-clone desktop

C.

full memory desktop

D.

full copy desktop

Full Access
Question # 88

When deploying HUAWEI Desktop Cloud Network, which component should be deployed on the management plane?

A.

HDC

B.

DHCPserver

C.

VAG

D.

desktop virtual machine

Full Access
Question # 89

(multiple choice) Which of the following isManageOneWhat are the functions provided by the operation side?

A.

project management

B.

VDCmanage

C.

Application resource monitoring

D.

Application management

Full Access
Question # 90

Which of the following descriptions about the FusionCompute architecture is incorrect?

A.

VRMProvides management for administratorsPortal

B.

VRMcan run onCNAscan also be deployed on a separate physical machine

C.

CNA, Can manage the network, storage and computing resources of the cluster.

D.

CNAProvides computing resources for virtual machines.

Full Access
Question # 91

(multiple choice)RainbowBlock-level migration is used in which of the following scenarios?

A.

purpose of planningVMThe disk space size is expanded or reduced relative to the source end

B.

The partition structure needs to be consistent with the source side

C.

Hosts with lots of small files

D.

Hosts with high disk usage

Full Access
Question # 92

FusionSphereIn server virtualization scenariosFusionAccessThe virtual machine is stored inFusionComputeAfter the interface is removedFusionAccessThe

virtual machine state corresponding to the management interface remains unchangeD.

A.

True

B.

False

Full Access
Question # 93

(Multiple Choice) In Huawei Desktop Cloud, which of the following are the factors in the performance triangle model that affects virtual machine density?

A.

capcity

B.

density

C.

workload

D.

qos

Full Access
Question # 94

FusionSphereIn a server virtualization scenario, when deploying a virtual machine according to a template, set the disk property to "non-persistent" and the operating system will be lost after the virtual machine is restarted

A.

True

B.

False

Full Access
Question # 95

FusionStorage BlockaccessFusionCompute, it is necessary toFusionStorage BlockAfter the volume is created on theFusionComputeAdd datastore on.

A.

True

B.

False

Full Access
Question # 96

The administrator logs in to HuaweiBCManager eBackupWhen backing up virtual machines on theLAN-FreeorLAN-Basemodel

A.

True

B.

False

Full Access
Question # 97

(Multiple choice)FusionSphereThe unified installation tool cannot discover the host, which of the following conditions may cause this failure?

A.

The host has an operating system installed

B.

DHCPThere is no free address in the address poolIP

C.

localPCThe installation plane of the host and the host are not in the same network segment and are not configuredDHCPrelay

D.

Host NIC not startedPXEFunctional

Full Access
Question # 98

Which of the following is true about backup and disaster recovery?

A.

As long as data transmission, data storage and data exchange occur, data failure may occur, which will affect the use of services.

Therefore, data backup is required to ensure data security.

B.

Data backup requires the production storage and backup storage to be placed in the same computer room

C.

Disaster recovery can be achieved by placing data in different regions

D.

Disaster recovery or backup can ensure that data will not be lost

Full Access
Question # 99

Which of the following types of backend storage is not supported for FusionSphere server virtualization?

A.

object storage

B.

IP SANstorage

C.

FC SANstorage

D.

NASstorage

Full Access
Question # 100

(Multiple Choice) AboutFusionComputeDescription of cluster creation, which of the following is correct?

A.

cluster onGuestNUMAAfter that, the virtual machines in the cluster need to be restarted to take effect.

B.

cluster onIMCmode, which avoids theCPUVirtual machine migration fails due to incompatibility

C.

After the cluster is turned on, the virtual machines in the cluster can be turned onHA

D.

After the cluster enables host memory multiplexing, the total number of virtual machine memory created on the host can exceed the physical memory of the host.

Full Access
Question # 101

In FusionCloud, a private image can be created by calling the IMS interface of the image service, as follows:

Which way of creation is incorrect? (many)

A.

Upload the image file to the OBS bucket, and use the image file in the OBS bucket to apply for a private image.

B.

After selecting an elastic cloud server (ECS) to shut down, use the ECS to apply for a private image.

C.

After selecting a bare metal server (BMS) and shutting it down, use the BMS to apply for a private image.

D.

Register the image file on ServiceOM, and then use the image to apply for a private image.

Full Access
Question # 102

Which of the following is not a bare metal application scenario?

A.

Enterprise official network

B.

Scenarios with high security and regulatory requirements

C.

Core database scenario

D.

High-performance technical scenarios

Full Access
Question # 103

Fusioncomputevirtual machines in andDVSrelationship, the correct.

A.

A virtual machine has multiple network cards, and each network card is associated with oneDVS BOne

B.

virtual machine and one network card, and the network card is associated with multipleDVS

C.

A virtual machine has multiple network cards, and all network cards can only be associated with oneDVS

D.

One virtual machine has one network card, and the network card can only be associated with oneDVS

Full Access
Question # 104

Which of the following descriptions about the ManageOne unified product catalog are correct? (multiple choice)

A.

Not all cloud services have default products on the product catalog

B.

Products created by operations administrators can be seen and used by all end users

C.

For each cloud service connected to ManageOne, its products are uniformly presented on MO's product catalog

D.

Products created by VDC administrators can be published to this level or lower level VDCs

Full Access
Question # 105

In FusionCloud, the virtual group policy includes anti-affinity, affinity, weak anti-affinity and

There are four types of weak affinity. Which of the following descriptions about the virtual group policy is correct? ( many)

A.

Affinity means that virtual machines in the same virtual group must coexist on the same host

B.

Weak affinity refers to the fact that the host used for virtual machine scheduling in the group has sufficient resources, and the affinity

strategy remains consistent

C.

Weak anti-affinity refers to the fact that the host used for virtual machine scheduling in the group has sufficient resources to interact with the anti-affinity

Be consistent with sexual strategy

D.

Anti-affinity means that virtual machines in the same virtual group cannot coexist on the same host

Full Access
Question # 106

Use the Rainbow tool to migrate a third-party platform's x86-architecture Linux virtual machine to When using the FusionCompute platform, the following descriptions of the ports involved in the migration process are correct:

A.

445, the destination virtual machine mounts the LiveCD

B.

7443, create a destination virtual machine

C.

443, send a snapshot creation command

D.

1880, log in to the migration server remotely and issue a migration task

Full Access
Question # 107

Which of the following descriptions about the rapid encapsulation of virtual desktops is wrong? ( one)

A.

Compared with the complete copy template, using the fast encapsulation template to issue virtual machines is faster and more efficient

B.

There is no essential difference between full reproduction and rapid distribution

C.

using sysprep package

D.

Rename and add domain by the application in the virtual machine

Full Access
Question # 108

HDP is a new-generation cloud access desktop protocol developed by Huawei. Compared with traditional desktop protocols it has. Which of the following features are available?

A.

Support 64 virtual channels, each virtual channel can carry different upper-layer application protocols

B.

Rich protocol management strategies

C.

Different compression algorithms can be used according to different application types, flexible use of server rendering and local Fast rendering

D.

Support lossless compression algorithm

Full Access
Question # 109

In FusionAccess, AD group policy is a very important configuration in deployment and operation and maintenance.

——— and domain can set group policy.

(fill in the English abbreviation)

Full Access
Question # 110

Which of the following descriptions about the host storage interface in Fusion compute is incorrect?

A.

You can manually add host storage interfaces, or you can add host storage interfaces in batches

B.

Currently, Huawei's host storage interface can support IPv4 protocol and IPV6 protocol

C.

The host storage interface needs to be added before adding FC-SAN storage

D.

Add multiple host storage interfaces to realize multi-path transmission of storage

Full Access
Question # 111

The correct option for the agentless feature description of ebackup is

A.

No need to install agent on VRM

B.

No need to install the agent on the backup storage

C.

No agent needs to be installed on the protected virtual machine

D.

No need to install an agent on the CNA

Full Access
Question # 112

Enterprise business scenarios sometimes need to use bare metal servers. The following is about the use of bare metal servers.

Which of the descriptions of the scene is wrong?

A.

Performance computing/AI scenarios

B.

The business load changes greatly in a short time / blog website application

C.

Core database scenarios of precious metal transactions in the financial industry

D.

big data analysis

Full Access
Question # 113

FusionCloudAutomated installation tool

A.

FusionCare

B.

FusionStage

C.

FusionNetDoctor

D.

FusionCloud Deploy

Full Access
Question # 114

In the user login connection process of the FA, the virtual machine list cannot be obtained after user authentication, which cannot be the following which component caused it?

A.

GaussDB

B.

ITA

C.

HDC

D.

WI

Full Access
Question # 115

The task center in FusionCloud is used to record, track, and maintain asynchronous task status information to

Which of the following tasks can be viewed through the task center?

A.

The user creates a private image through the running ECS ??server instance

B.

Users create elastic load balancing ELB through ManageOne

C.

The user creates a virtual private cloud VPC through ManageOne

D.

The user creates an ECS through ManageOne

Full Access
Question # 116

OperationCenterCentralized alarm management, which data compression technologies are included?

A.

Alert Correlation Rules

B.

Alarm Aggregation Rules

C.

Flickering/flashing alarm handling

D.

Alarm custom rules

Full Access
Question # 117

During the FusionManager maintenance phase, it is forbidden to pass the FusionManager during normal business operation.

Modify the time zone and daylight saving time on the interface, otherwise the FusionManager service will be restarted.

A.

TRUE

B.

FALSE

Full Access
Question # 118

The heartbeat failure of the nodes between the active and standby VRM will affect the reliability of the system and may cause the number of active and standby nodes.

According to inconsistent. Which of the following options will cause node heartbeat failure between VRM master and slave? (many)

A.

The BMC network plane is abnormal

B.

The operating system of the host where the standby node is located is faulty

C.

The standby node is not configured with active/standby or fails to configure active/standby

D.

The HA certificates of the active and standby VRM nodes do not match or the system time is not within the validity period of the certificate

Full Access
Question # 119

Which of the following scenarios is not applicable to FusionCompute snapshots? single choice)

A.

business patch upgrade

B.

Business Destruction Test

C.

long-term preservation of business data

D.

Major business changes

Full Access
Question # 120

(Multiple choice) InFusionCompute, the data fromVMWhen sending out through the port group of the virtual switch, which of the following

processing will be done according to the settings?

A.

change the source of the dataMA, Caddress

B.

add the correspondingVLANLabel

C.

According to the existing data frameVLANThe label determines whether to forward or not.

D.

replace the purpose of this dataframeMA, Caddress.

Full Access
Question # 121

Which of the following isFusionAccessCorrect order to quickly provision virtual desktops? ?Create a virtual machine;?Assign desktop;?Configure virtual machine options;?Confirm information

A 1234

B 1423

C. 1432

D. 1324

Full Access
Question # 122

Which of the following are HuaweiFusionAccessCommon failure types?

A.

Desktop distribution failure

B.

Login connection failure

C.

Peripheral use failure

D.

performance experience failure

Full Access
Question # 123

Which of the following scenarios can be usedRainbowto migrate?

A.

will run onCentosUpKVMMigrating Virtual Machines to HuaweiHCSsuperior

B.

will run onRH1288migrating business toTaishan 200on the server.C. will run onAlXMigrating business to HuaweiFusioncomputemiddle.

C.

will run onARMarchitecture on a virtualization platformVMMigrate to HuaweiHCSsuperior.

Full Access
Question # 124

(Judgment question) IfFusionComputeThe virtual machine is not installedTools,You cannot query the memory usage of the virtual machine.

A.

True

B.

False

Full Access
Question # 125

(Multiple choice) The following abouteBackupThe description of the backup virtual machine, which option is incorrect?

A.

support pairFusioncomputevirtual machine backup

B.

Accurate backup of virtual machine desktop files

C.

Incremental backup to disk

D.

You can do a full backup of the virtual machine and a permanent incremental backup

Full Access
Question # 126

(True or False)Fusion AccessThe thin terminal does not contain an operating system, but is just a hardware device for presenting remote virtual desktop display content and accessing peripherals?

A.

True

B.

False

Full Access
Question # 127

(Multiple choice) The following aboutFusionComputeDescription of security groups and rules, which option is incorrect?

A.

The prerequisite for deleting a security group is that there are no virtual machines in the security group.

B.

Changes to security group rules need to be manually applied to virtual machines within the security group

C.

You must create a security group before adding rules.

D.

Before adding rules, the security group will deny all by default

Full Access
Question # 128

(Multiple choice questions)Which of the following descriptions about the difference between physical switches and virtual switches is incorrect?

A.

The normal operation of the virtual switch also requires certain hardware resources.

B.

Virtual switches run on physical servers, and physical switches have separate hardware.

C.

virtual switch failsVLANLabel operation, the physical switch canVLANlabel to do the operation.

D.

Virtual switches cannot be configured with Layer 3 interfaces, but physical switches can be configured with Layer 3 interfaces.

Full Access
Question # 129

(Single-choice questions) FusionComputerightVRMManual backup of node data does not include which of the following prerequisites

A.

VRMNode process is running normally

B.

ObtainCNAsofgandalfandrootuser password

C.

FusionComputeCan log in normally

D.

VRMThe database is running normally

Full Access
Question # 130

(Multiple choice) The following aboutFusioncomputeDescribed in Configuring Storage Interfaces, which options are correct?

A.

The storage interface can beMgnt_Aggrport multiplexing

B.

Storage interfaces can be created based on aggregated network ports.

C.

useFusionstorage BlockWhen storing, the storage interface can be usedOVSforwarding mode.

D.

Adding multiple storage interfaces can realize multi-path transmission of storage, thereby improving system reliability.

Full Access
Question # 131

(Multiple choice) The following aboutFusionAccessmiddleHDA, Component description, which option is incorrect?

A.

HDAis a series of desktop connection service brokers

B.

andHDAThe interactive protocol isHDPprotocol

C.

HDAis installed when making the template

D.

It is not necessary to install every desktop virtual machineHDA

Full Access
Question # 132

(Multiple choice) The following aboutFusionComputeMemoryQosdescription, which options are incorrect?

A.

MemoryQoSTechnology works just as well with physical machines.

B.

open memoryQoSAfter that, the memory space that the virtual machine can use can exceed the memory size set by the virtual machine

C.

through memoryQosIt can solve the problem of resource preemption during memory reuse

D.

MemoryQoSThe technique mainly achieves the answer by setting memory reservation and memory share

Full Access
Question # 133

Which of the following processing policies does FusionCompute support when a Windows virtual machine blue screen occurs? (multiple choice)

A.

do not handle

B.

Restart the virtual machine

C.

HAvirtual machine

D.

Shut down the virtual machine

Full Access
Question # 134

FusioncomputeImport supportVMDKtype disk file to create a new virtual machine.

A.

True

B.

False

Full Access
Question # 135

HuaweiFusionSphere OpenStackimprovedOpenstackAvailability of infrastructure, which of the following components are usedActive-ActivetField Department Chang way? (multiple choice)

A.

nova-api

B.

KeyStone

C.

HAProxy

D.

RabbitMQ

Full Access
Question # 136

(True or False)FusionAccessTo recycle static multi-user desktops, system administrators only need to delete them on the virtual machineUsers can.

A.

True

B.

False

Full Access
Question # 137

The following about creatingFusionAccessofLinuxDescription of the infrastructure virtual machine, which option is incorrect?

A.

Recommended network card typevirtio'

B.

When selecting a storage resource, you can choose to passSSDCard,UMapped data storage resources such as disks.

C.

If the virtual machine is deployed in active and standby mode, it is recommended to deploy the two virtual machines in different parts of the management cluster.CNAson the node.

D.

When choosing storage resources, it is recommended to use high-performance storage instead ofNL-SASorSATA etc. Low performance

Full Access
Question # 138

FusionCareIt is a set of health check and information collection tools for technical support engineers and operation and maintenance engineers. Which of the following areFusionCareHealth check inspection content?

A.

0Sstate

B.

Reliability inspection

C.

Security Inspection

D.

Availability inspection

Full Access
Question # 139

(Multiple choice questions) FusionaccessmiddlevdeskWhich of the following features are supported?

A.

Collect user VM logs

B.

andHDPCooperate to complete the control of the user virtual machine

C.

Optimize user virtual machine configuration

D.

collectTCRun log.

Full Access
Question # 140

The following aboutFusioncomputeIn the description of Port Groups and Security Groups, which option is incorrect?

A.

OneDVSThere can be multiple port groups, aVMCan be protected by multiple security groups.

B.

A virtual machine NIC is connected to a virtual port of the port group, and a virtual machine NIC is associated with a security group.

C.

Security groups are based on port groups to protect virtual machines.

D.

port group isDVSA collection of one or more virtual ports, while a security group is a collection of one or more rules Correct

Full Access
Question # 141

FusionCompute can use templates to deploy virtual machines, or convert templates into virtual machines. Deploy virtual in batches When using a virtual machine, the template is generally converted into a virtual machine.

A.

True

B.

False

Full Access
Question # 142

The panorama of Huawei's disaster recovery solutions includes local, intra-city, and remote storage. Which of the following descriptions about the three disaster recovery

solutions is incorrect?

A.

Local high availability can use real-time mirroring and synchronous replication solutions. Due to the close bandwidth and distance, it usually requires RPO=0.

B.

the remote disaster recovery party can choose the remote active-active and remote active-standby solutions according to different needs

C.

For intra-city disaster recovery, you can choose intra-city active-active and intra-city active/standby solutions according to different needs.

D.

Local high availability deploys services in the same computer room in close proximity.

Full Access
Question # 143

FusionComputeAdd toCNAsNode failure, which may be caused by the following reasons? (Multiple choice)

A.

CNAsandVRMtime out of sync

B.

CNAshostBMCNot configured

C.

CNAsGateway configuration error on node

D.

CNAshost has been added to otherFusionCompute

Full Access
Question # 144

(Multiple choice) The following aboutFusioncomputeTo delete the description of the security group, which option is incorrect?

A.

There is no virtual machine in the security group. If there is a virtual machine in the security group, you need to move the virtual machine out of the security group

B.

The authorization behavior between the security group to be deleted and other security groups does not affect the removal operation

C.

Except for a security group to which the virtual machine belongs, other security groups are not affected by the virtual machine

D.

After the security group is deleted, all security group rules in the group are deleted at the same time

Full Access
Question # 145

The following aboutFusionComputeThe description of virtual machine snapshot restore, which option is incorrect?

A.

If the port group where the NIC of the virtual machine is located after the snapshot is created, the system will automatically restore the port group and NIC when the snapshot is used to restore the virtual machine.

B.

If a certain disk attribute of the virtual machine is independent and persistent, when the virtual machine is restored using a snapshot, the data on the disk will not be restored.

C.

If a new disk is bound to the virtual machine after the snapshot is created, the new disk will be automatically unbound from the virtual machine when the snapshot is used to restore the virtual machine.

D.

When a virtual machine fails or data needs to be restored, the existing snapshot of the virtual machine can be used to restore the data of the virtual machine to the state

when the snapshot was created.

Full Access
Question # 146

Which allocation type is a fully replicated virtual machine of which allocation cannot be restored after deallocation?

A.

single user

B.

pooled user

C.

static multi-user

D.

Dynamic Multi-User

Full Access
Question # 147

Single-choice question] Regarding the correspondence between the Fusion Access virtual group and the virtual machine type, which of the following is impossible of?

A.

VM Group (Express Encapsulation) - Virtual Machine Type (Express Encapsulation)

B.

Virtual Machine Group (Hosted Machine) - Virtual Machine Type (Hosted Machine)

C.

VM Group (Full Memory) - VM Type (Full Memory)

D.

VM Group (Linked-Clone) - VM Type (Linked-Clone

Full Access
Question # 148

(True or False) FusionAccessLinked-clone virtual machines can only be created on datastores that support thin provisioning.

A.

True

B.

False

Full Access
Question # 149

Which of the following descriptions about FusionAccess pooled desktop groups is incorrect?

A.

The pooled desktop group supports the configuration of back-end standby virtual machines. When there are not enough desktops in the pool, virtual machines can be automatically replenished from the back-end standby virtual group in time.

B.

The system will be restored after the dynamic pool virtual machine is powered off

C.

A static pool is a group of users corresponding to a desktop pool. At the beginning, each user is associated with the desktop poolVMThere is no fixed distribution relationship. After being logged in by a user for the first time, the user and thisVMThe distribution relationship is fixed

D.

A dynamic pool is a group of users corresponding to a desktop pool.VMNot a fixed assignment

Full Access
Question # 150

The following aboutManageOneDescription of the approval process, which options are correct? (multiple choice)

A.

VDCadministrator andVDCThe salesperson can define the approval process.

B.

The approval process supports real-time modification of wells to take effect in the release state.

C.

Each level of approval process can specify one or more approvers, as long as any approver approves, the approval of this level is passed.

D.

The approval process can set up multi-level approval, up to5class correct.

Full Access
Question # 151

Disaster recovery protects business, and backup protects data.

A.

Truel

B.

False

Full Access
Question # 152

The user is makingFusionAccessWhen linking a clone virtual machine template, it prompts to installHDAfail. This phenomenon may be caused by which of the following reasons?

A.

The virtual machine used to make the template was not obtainedDNSaddress.

B.

The virtual machine operating system used to make the template andHDANot compatible.

C.

A virtual machine that is templated with children has multiple disks.

D.

The virtual machine used to make the template did not get the correct oneIPaddress.

Full Access
Question # 153

When using Rainbow to migrate a virtual machine to the HCS platform, the destination virtual machine's boot source must select a cloud disk.

A.

TRUE

B.

FALSE

Full Access
Question # 154

In useRainbowconductWindowsAfter the virtual machine is migrated, the implementer finds that the migrated virtual machine does not have a network card. What is the possible reason?

A.

automatic installationUVP toolsThe destination virtual machine is not restarted after

B.

The source virtual machine does not have a network card.

C.

The destination virtual machine is not installedUVP tools.

D.

No NIC was created when the destination virtual machine was created

Full Access
Question # 155

(Multiple choice questions) The followingFusionAccess. Which options are incorrect in the description of the virtual machine plus domain?

A.

Full replication virtual machines join the domain when provisioned

B.

Linked-clone VM joins domain at template creation time

C.

Full replication VM joins domain at template making

D.

Linked-clone VMs are domain-joined when provisioned

Full Access
Question # 156

(Multiple choice) The following aboutFusionComputeIn the description of Virtualization Antivirus, which options are correct?

A.

useFusionComputeSecure User VM supports generating memory snapshots when virtualizing antivirus

B.

Deploy one security service virtual machine per host

C.

Each host can be configured with multiple secure user virtual machines

D.

useFusion Com puteWhen virtualizing antivirus, the security service virtual machine does not support generating memory snapshots

Full Access
Question # 157

FusionComputemiddleCPUWhich of the following features does virtualization support? (multiple choice)

A.

supportWindowsandLinuxVirtual machine online increaseCPU

B.

CPUresource over-allocation

C.

Support for heterogeneous servers

D.

QOS

Full Access
Question # 158

The operation and maintenance administrator can passManageOneWhich interface to use in the operation and maintenance planeFusionNetDoctortool?

A.

Centralized alarm

B.

Operation and maintenance map

C.

Safety

D.

System Management

Full Access
Question # 159

(Multiple choice) The following aboutFusionComputevirtual machineHADescription of the configuration, which options are correct?

A.

The data storage failure handling policy is set to not be processeD. If the data storage failure time exceeds the time set by "Policy Delay", the virtual machine will be automatically shut down to avoid data damage.

B.

The host failure handling policy is set to restore the virtual machine from the original host. When the host where the virtual machine is located fails, the system must wait for

the host to recover before restarting the virtual machine on the original host.

C.

The host failure handling policy is set toHAVirtual machine, when the host where the virtual machine is located fails, the system will reselect the host to start

the virtual machine according to the virtual machine startup policy set in the cluster

D.

The delay policy is configured, during the delay time, the virtual machine's1/OThe backend driver will retransmit and process the

Full Access
Question # 160

(Multiple Choice)Which of the following operations is correct during the installation of FusionAccess?

A.

Create the corresponding port group for the service network

B.

Requires separate datastore creation for infrastructure VMs

C.

the same setFusionAccessprimary and secondary ITA the virtual machine is set as a mutually exclusive virtual machine

D.

Infrastructure VMs compete on a level playing field with user desktop VMs.

Full Access
Question # 161

(Multiple choice questions) FusionaccessWhich of the following logs are collected during system failure?

A.

User VM logs

B.

User terminal log

C.

Fusioncomputerun log

D.

LinuxInfrastructure virtual machine running log

Full Access
Question # 162

existFusionCompute, which of the following operations cannot be performed on the NIC of a running virtual machine?

A.

ReviseMAC

B.

Modify port group

C.

Modify security group

D.

remove network card

Full Access
Question # 163

(Judgment) FusionComputeWhen the department mode is three-member separation, the system super administrator account isadmin.

A True

B. False

Full Access
Question # 164

in HuaweiFusionCloud6.3solution,APIWhat authentication methods does the gateway include?

A.

AK/SK

B.

IAM

C.

Username Password

D.

Token

Full Access
Question # 165

(Multiple choice) IfFusionComputevirtual machineAwere ablepingpass virtual machine. Which of the following results can be inferred from this?

A.

virtual machineAand virtual machineBare configured correctlyIPaddress

B.

virtual machineAand virtual machineBrun on the same physical machine

C.

virtual machineAand virtual machineBThe same network segment is useD.

D.

virtual machineAand virtual machineBDifferent network segments are used.

Full Access
Question # 166

There is a one-to-one relationship between TA components and HCD components in FusionAccess, and one set of ITA can only manage one set of HDC (judgment).

broken)

A.

TRUE

B.

FLASE

Full Access
Question # 167

in the user login connection process of FA, if the virtual machine is accessed through the TC, the HDC will. Which of the following information is generated?

A.

Address ticket

B.

Virtual Machine IP and Port

C.

Token

D.

Login ticket

Full Access
Question # 168

Which of the following descriptions about CPU resource QoS and memory resource QoS in FusionCompute item is incorrect? ( one)

A.

Memory resource QoS is used to ensure that business-critical virtual machines can get enough memory resources.

B.

The CPU QoS of the virtual machine is used to ensure that the computing resources of the virtual machine are reasonably allocated.

C.

The memory resource QoS can only be used after the memory multiplexing switch is turned on.

D.

CPU shares and CPU reservations only come into play when virtual machines compete for computing resources.

Full Access
Question # 169

huawei vDesk is a self-service tool for desktop cloud terminal users, user system check, performance optimization, and provides

Repair tools, log collection tools and peripheral assistants, and virtual machine desktops issued through templates need to be manually installed

A.

TRUE

B.

FLASE

Full Access
Question # 170

In FusionCloud, which of the following may be the possible reasons for the failure of cloud disk creation? (multiple choice)

A.

Insufficient storage resources in the resource pool

B.

The ManageOne operation and maintenance plane resource pool cannot obtain data

C.

The configuration of the cloud disk type label is incorrect

D.

Nova component exception

Full Access
Question # 171

The sequence design of business migration is very important. The following description of the sequence of business migration is correct

What are the items? (multiple choice)

A.

According to the impact on the business from small to large

B.

According to the business interruption time from short to long

C.

According to business complexity, from easy to difficult

D.

According to the migration risk from low to high

Full Access
Question # 172

RainbowWhat are the supported boot methods for the source virtual machine?

A.

in the case ofWindowsoperating system, only supportedUEFI

B.

in the case ofWindowsoperating system that supports bothUEFIandBIOS

C.

in the case ofLinuxoperating system that supports bothUEFIandBIOS

D.

in the case ofLinuxoperating system, only supportedUEFI

Full Access
Question # 173

In ManageOne, the system supports two login modes: multi-user mode and single-user mode.

Which login mode description is wrong?

A.

Under normal circumstances, the system runs in multi-user mode. When maintenance operations on the system are required, the login mode can be changed.

Set to single-user mode to prevent the operation of other users from affecting system maintenance

B.

After switching to single-user mode, only the admin user is allowed to log in to the system through one terminal, and all other online users

will be forced out of the system

C.

Set the system login mode to "multi-user mode: after the system switches to multi-user mode after 5 minutes

D, switch the system login mode to single-user mode, after switching all other online users will be forced to log out

Full Access
Question # 174

An enterprise plans to deploy Huawei FusionCloud and perform disaster recovery on Huawei Cloud. Due to financial constraints,

Considering the economy and security, you can use the --- service to integrate FusionCloud with Huawei

Cloud connectivity.

Full Access
Question # 175

eReplication supports storage layer replication disaster recovery and host layer replication history, which of the following is about the two disaster recovery solution groups

Is the net wrong? (single choice)

A.

storage layer replication includes a variety of technologies, including synchronous replication, asynchronous replication, etc.

B.

The host layer replication scenario cannot use the storage layer service

C.

storage layer DR production site and DR site storage devices can use storage devices from different manufacturers

D.

Host layer replication disaster recovery uses I0 Mirror to capture and replicate I0 to realize remote replication and disaster recovery management of data

Full Access
Question # 176

The source platform supported by Rainbow can be x86 architecture or Kunpeng architecture (judgment)

A.

TRUE

B.

FLASE

Full Access
Question # 177

VRMsingle node deployment,FusionComputeThe management interface cannot be opened, and it still cannot be solved once restarteD. What are the possible reasons?

A.

RAIDCard failure

B.

VRMfile system corruption

C.

Abnormal power off

D.

not loadedlicense

Full Access
Question # 178

When using Rainbow to migrate a Windows virtual machine, which port is used by the destination virtual machine to Receive data sent by the source VM? ( one)

A.

8899

B.

8900

C.

445

D.

22

Full Access
Question # 179

The cloud computing platform involves a variety of software and hardware components that require operation and maintenance. Which of the following methods can be used for operation and maintenance? (name selection)

A.

web interface

B.

command line

C.

Equipment operation panel

D.

Unified management of tools

Full Access
Question # 180

After the user installs the Linux system for the virtual machine on FusionCompute, it is found that the virtual machine has no Law start. Which of the following is wrong about the reasons why this virtual machine cannot be started?

A.

The virtual machine disk is damaged

B.

Tools are not installed on the virtual machine

C.

Insufficient memory on the physical host

D.

Startup mode configuration error

Full Access
Question # 181

Which of the following descriptions about the NTP clock of the FusionCompute virtualization platform is wrong?

A.

After modifying the NTP server time or when the site time is inconsistent with the NTP server time, you can to perform forced time synchronization operations without any impact on the business

B.

If multiple NIP servers are configured, it is necessary to ensure that the NTP servers have the same upper-layer clock source to Make time consistent between NTP servers

C To configure the NTP clock source and change the time zone, the Fusioncompute service needs to be restarted; service is temporarily interrupted and may cause abnormal antivirus services

C.

If the set internal clock source node type is host, the service process of the host will be restarted during the configuration process

Full Access
Question # 182

Resource pool planning considerations include geographic location, application type, virtualization type, resource type, etc. point. Which of the following descriptions about resource pool design in cloud computing planning are correct?

A.

Resource type: Divide different resource pools according to device model, manufacturer, performance, etc.

B.

Application type: According to the needs of the application, divide different resource pools based on the SLA capability requirements, such as according to the enterprise

Core business applications and general applications are divided into different resource pools

C.

Virtualization type: Divide different resource pools according to different virtualization systems used, or combine virtualization and

Divide non-virtualized resources into different resource pools

D.

Geographical location: Different resource pools can be divided based on latitudes such as DC, site or branch structure

Full Access
Question # 183

A user cannot issue services normally using FusionAccess. Check the log files of FusionAccess

The alarm information is found as follows. Which of the following is the correct analysis of the cause of this phenomenon?

Wins error: The client cannot connect to the destination specified in the request. Consult the logs

and documentation for the WS-Management service running on the destination, most commonly IS or configure the WinRM service: "winrm quickconfig"

A.

There is a problem with the template creation, and WinRM is not successfully opened to receive the request

B.

The backup server is abnormal

C.

APS CPU usage exceeds the threshold

D.

The VAG server is abnormal

Full Access
Question # 184

In the process of operation and maintenance management, the relevant functional components of the data center can be accurately identified, and the design capabilities of the components can be understood and determined.

Define the monitoring indicators that match the technical characteristics of the component, and through active and passive management, to maximize the guarantee of data in the normality of each management component of the heart, the above description is of the four operation and maintenance goals of the data center————

Full Access
Question # 185

In a typical FusionCloud Type I deployment scenario, the KVM resource pool passes through the ---layer FusionSphere

OpenStack manages and provides computing resources.

Full Access
Question # 186

Which of the following information is mainly monitored by the FusionAccess gateway (multiple choice)

A.

Gateway basic information

B.

Virtual Machine Usage Information

C.

Basic information of components

D.

User connection information

Full Access
Question # 187

If the virtual machine in FusionCompute does not have Tools installed, which of the following functions can be implemented? (one)

A.

Safely shut down the virtual machine

B.

Virtual machine live migration

C.

Configure the IP address for the virtual machine

D.

Create a snapshot of the virtual machine

Full Access
Question # 188

Which of the templates created by FusionCompute is incorrect?

A.

Convert virtual machine to template

B template clone into template

B.

Snapshots are converted into templates

C.

Virtual Machine Clone Template

Full Access
Question # 189

Which of the following descriptions about HDC components in FusionAccess is incorrect? (one)

A.

Perform operations such as desktop group management, user association with virtual desktops, etc. according to the request sent by the ITA.

B.

When the user accesses, interact with the WI, provide access information, and support the completion of the entire user access process.

C.

interacts with the HDA in the VM, and collects the virtual machine status and access status reported by the HDA.

D.

A single set of HDC desktop controllers can manage 1000 virtual desktops.

Full Access
Question # 190

In today's IT industry, the amount of data is growing rapidly, new; regulations are constantly introduced, in order to prevent data Loss, the protection business can be quickly switched after an accident, continue to work normally, the business will be designed when planning Disaster recovery and backup solutions, which of the following statements about disaster recovery and backup is false? ( one)

A.

If there is only disaster recovery, the production side has wrong operations, or the system upgrade fails, etc., it will be Synchronizing to the disaster recovery side will also cause data or business interruption.

B.

The backup is generally performed periodically. Once the data is damaged, the data will be restored from the recovery time to the last backup time. data in between will be lost.

C.

If there is only backup, the business cannot be recovered quickly, and data recovery takes time. During this time, the business cannot be used. For a certain industry, such business interruption cannot be tolerated.

D.

If there is only disaster recovery, business can be quickly recovered and data can be protected.

Full Access
Question # 191

In FusionCompute, when the running host where the virtual machine is located fails, the resource allocation is uneven (For example, the load is too heavy or the load is too light), etc., the virtual machine can be migrated to ensure the normal operation of the virtual machine business.

It runs normally. Which of the following descriptions about virtual machine migration in the operation and maintenance scenario is wrong? ( one)

A.

Only when the virtual machine network card is in "SRIoV", "PF" or "PCI" pass-through mode can the hot migration function be supported.

B.

During virtual machine live migration, if the migrated virtual machine has a large business volume or a large memory usage, it will lead to the hot migration time is longer, and it is recommended to perform hot migration when the business volume is small

C.

When the load of most hosts is too light, the virtual machines can be integrated by live migration to reduce the number of hosts. Improve resource utilization and achieve energy saving and emission reduction

D.

By default, the system interface will prompt a timeout when the hot migration time exceeds 12 hours, but the internal heat. The migration task timeout period is 24 hours, and the live migration will not be terminated until the system times out.

Full Access
Question # 192

In Huawei FusionCompute, if a virtual machine is bound to a host, which of the following functions will it be affected? (multiple choice)

A.

DRS

B.

snapshot

C.

Thermal migration

D.

Memory hot add

Full Access
Question # 193

Virtualization technology can virtualize one server into multiple virtual machines, thereby improving performance

A.

True

B.

False

Full Access
Question # 194

Is the description of the distributed virtual switch DVS in FusionCompute correct?

A.

Can connect to multiple servers

B.

Can be equipped with multiple virtual ports

C.

Each virtual machine can only connect to one DVS

D.

Multiple UPLink ports can be configured

Full Access
Question # 195

The ManageOne operation plane is the operation management center of the FusionCloud solution, supporting multi-tenancy and heterogeneous resources

Management of pools such as VMware, PowervM

A.

True

B.

False

Full Access
Question # 196

If you do not purchase the license related to Rainbow8.0.0, you can only migrate two source hosts, and the maximum migration rate does not exceed over 30M/S

A.

Correct

B.

False

Full Access
Question # 197

Which data on the FusionCompute host is usually forwarded using the management port? (single choice)

A.

Business virtual machine live migration command

B.

Business virtual machine data disk data

C.

Business virtual machine system disk data

D.

Business virtual machine memory access data

Full Access
Question # 198

The functions of FusionCare health check and information collection can be triggered when needed, or a period can be set

Trigger, suitable for real-time information collection scenarios.

A.

TRUE

B.

FALSE

Full Access
Question # 199

In Fusioncloud, which of the following cannot be the possible reason for the failure of elastic cloud server provisioning?

A.

VDC configures resource authorization for salespersons

B.

VDC quota limit

C.

The resource pool of the ManageOne operation and maintenance plane cannot obtain data storage resources.

Full Access
Question # 200

A FusionAccess system maintenance engineer is performing data recovery operations on the ITA server. by

Which of the following descriptions about ITA data recovery is correct? ( many)

A.

The copy task in the recovery process can be completed by the remote copy software WinSCP

B.

It can be verified whether the ITA service is restored by checking whether the ITA alarm is eliminated and whether the desktop can be issued normally.

no success

C.

There is no need to uninstall and then reinstall the ITA during the recovery process

D.

After the ITA data is restored, the data from the backup time to the restore time will be lost

Full Access
Question # 201

What points should be noted when creating a destination virtual machine for Rainbow migration on FusionCompute

meaning? many)

A.

The destination virtual machine selects the same operating system type and version as the source host.

B.

The description of the destination virtual machine must contain the "Rainbow" field.

C.

When selecting data storage resources, if virtualized storage is selected, there will be no data storage after Windows system migration.

method for data synchronization.

D.

It is recommended that the CPU and memory of the destination virtual machine be greater than or equal to the specifications of the source.

Full Access
Question # 202

[Single Choice] A company plans to migrate some of its existing businesses running on physical devices to

Before migrating the FusionCloud platform, the status quo needs to be assessed. Which of the following scenarios is best for migration

Go to the cloud?

A.

The application requires high-performance graphics card and image processing.

B.

The application requires special hardware support.

C.

Physical server non-X86 architecture.

D.

The company's daily office system, such as OA system.

Full Access
Question # 203

There are two main technical indicators for disaster recovery, RTO is the recovery time objective, RPO is the recovery point objective, the following

Which statements about the two technical indicators are correct? ( many)

A.

RTO is infinitely close to 0. Even if synchronous replication is used, the business still needs some time,

B.

The smaller the RTO value, the less data is lost

C.

The smaller the RPO value, the smaller the service interruption time.

D.

In theory, RPO can be equal to 0. When disaster recovery or backup uses synchronous replication, the same

Step data, RPO can be achieved equal to 0.

Full Access
Question # 204

The FusionAccess system supports the function of backup and recovery. The following about FusionAccess recovery

Description of the policy, which items are correct? (many)

A.

If the operating system of the infrastructure server fails, you can create a new server and reinstall the software

And use the backup data on the backup server for data recovery

B.

If there is a failure caused by some or all software of the infrastructure server, it is necessary to reinstall the software and take advantage of it.

Data recovery using backup data on the backup server

C.

The recovery strategy includes software reinstallation recovery and system reinstallation recovery

D.

If you need to restore WI data, you must use the system reinstallation recovery method

Full Access
Question # 205

A company plans to migrate the virtual machine of the original Fusioncloud2.x cloud platform to FusionCloud6.x

On the cloud platform, which of the following descriptions about the migration sequence are correct? ( many)

A.

Migrate according to the order of migration risk from high to low

B.

Migrate in order of migration complexity from easy to difficult

C.

Migrate according to the order of the migration allowable interruption time from short to long

D.

Migrate according to the order of the impact of the migration on the business from small to large

Full Access
Question # 206

Which of the following application scenarios is Huawei FusionAccess desktop cloud solution generally applicable to? (many)

A.

large game

B.

public terminal

C.

mobile office

D.

to work safely

Full Access
Question # 207

An enterprise plans to purchase Huawei FusionCompute to issue 50 service virtual machines.

What is the most appropriate VRM deployment model for the scene? (one)

A.

Virtualized stand-alone deployment

B.

Virtualized active and standby deployment

C.

Physical machine stand-alone deployment

D.

Active and standby deployment of physical machines

Full Access
Question # 208

Which of the following descriptions about port groups in FusionCompute are correct? ( many)

A.

There are two types of A port group: common and trunk.

B.

A port group can be configured with multiple IP addresses.

C.

A port group is a distributed virtual switch.

D.

All virtual ports in the port group have the same attributes

Full Access
Question # 209

If there is a problem with the HDC process, you need to use the command service---restart to restart

Full Access
Question # 210

When registering the image type of Fusioncompute, the user needs to select the corresponding image server type,

Which of the following are standard mirror server types? (many)

A.

OBS: To use OBS as a mirror server, the IP address of the OBS service is required to be on the same level as the CNA management.

face to face

B.

Swift: Use the object file as the mirror server, requiring the IP address of the object storage service to be the same as the

C.

The management plane of CNA communicates with C and NFS: use a third-party NFS server as a mirror server, and require NFS to provide the IP service the address communicates with the management plane of the CNA

D.

Glance: When registering an image, upload the image file to Glance through HTTPS or NFS upload Register in backend storage

Full Access
Question # 211

In a FusionAccess site, the administrator configures the naming process in the process of rapidly provisioning virtual desktops.

rule. Which of the following descriptions about configuration naming rules is correct? (many)

A.

The computer name prefix can be "shared vm"

B.

When setting the naming rule of the complete replication virtual machine, it is allowed to include the domain account of the logged in user virtual machine

C.

The computer name prefix can be "shared-vm"

D.

When setting the naming rules for linked-clone virtual machines, it is not allowed to include the domain account of the logged-in user virtual machine

Full Access
Question # 212

[Multiple Choice] After an enterprise deployed two virtual machines on FusionCompute, it found that the

can not communicate with each other, what are the possible reasons?

A.

The virtual machine is in a different port group, and the switch cannot achieve Layer 3 intercommunication

B.

The virtual machine firewall does not pass through

C.

The virtual machine is in a different port group, and the routing forwarding policy is not configured in the virtual machine

D.

the virtual machine is in the same port group of different hosts, and the routing forwarding policy is not configured in the virtual machine

Full Access
Question # 213

[Multiple Choices] Which of the following descriptions about VNC logging in to a virtual machine are correct? (many)

A.

VNC login may touch end user data and should be used with caution.

B.

through VNC, the administrator can connect and view the interface of the virtual machine, which is convenient for the management of the virtual machine

And maintenance.

C.

After VNC logs in to the Linux virtual machine, the administrator cannot log in to the virtual machine via SSH.

D.

The virtual machine without Tools installed cannot log in with VNC.

Full Access
Question # 214

In the ManageOne operation and maintenance plane, when the administrator performs routine maintenance or handles user requests, the

Tenant resource page, query resources according to requirements. After querying the required resources, click the required query

The resource name of , which of the following can be seen on the resource details page? ( many)

A.

Basic information about the resource

B.

alarm

C.

Components

D.

Topology

Full Access
Question # 215

[Single choice] There are a batch of linked clone virtual desktops in a FusionAccess site that need to be personalized data, which of the following measures cannot meet the needs of the office?

A.

Turn on the switch of shutdown and restore

B.

Configure a separate data disk for the VM

C.

Use shared file storage to save personalized data

D.

Use AD's data roaming feature to save personalized data

Full Access
Question # 216

[Judgment] eBackup only supports data backup in virtualization scenarios.

Physical machine, but also supports disaster recovery of virtual machine.

A.

TRUE

B.

FALSE

Full Access
Question # 217

The centralized alarm on the ManageOne operation and maintenance plane can centralize the alarm of the theft control system service or third-party system,

Centralized alarms provide a unified alarm model, third-party systems can develop their own drivers, and provide

The provided interface reports alarms to realize unified management of alarms. The following describes the logical structure of centralized alarms.

Which is wrong?

A.

The resource pool collects computing resource pools, storage resource pools and network resources through FusionSphere OpenStack.

Source pool alarms are reported to the ManageOne O&M plane.

B.

Cloud services are monitored through service monitoring Agent or Service OM / FusionInsight Manager and other systems

The system collects cloud service alarms and reports them to the ManageOne operation and maintenance plane.

C.

The physical device collects alarms of server devices, storage devices, and network devices through eSight, and reports them

Go to the ManageOne operation and maintenance plane.

D.

Physical devices, resource pools and cloud services can all be accessed directly through the AP interface provided by ManageOne.

Report the alarm to the ManageOne operation and maintenance plane.

Full Access
Question # 218

When registering an image in Fusioncloud, you need to select the corresponding image server type. Which of the following

Item description about OBS mirror server is wrong? ( one)

A.

Upload the image file to the OBS bucket before registering the image, and the system will upload the image directly when registering the image.

Upload to Glance

B.

When registering the image type of FusionCompute, use OBS as the image server and require OBS to serve

The IP address of the service communicates with the management plane of the CNA

C.

If you want to delete the image and use the image file in the OBS bucket at the same time, you can configure OBS as Glance

backend storage

D.

When OBS is used as a mirror server, deleting the mirror will only delete the address information of the mirror, not OBS

Image files in the bucket

Full Access
Question # 219

The desktop cloud can completely replace the traditional physical desktop and realize the refined management and control of the enterprise desktop.

A.

TRUE

B.

FALSE

Full Access
Question # 220

After restarting FusionCompute, the status of the service virtual machine is abnormal, which cannot be caused by which of the following reasons made? ( one)

A.

The disk has bad sectors, resulting in the loss of the virtual machine xml file.

B.

There are too many service virtual machines on FusionCompute and insufficient CPU resources.

C.

When the FusionCompute is restarted, the virtual machine is in the process of full-machine backup, but the task is not completed.

D.

Power on the CNA host first, and then power on the IP-SAN storage, resulting in abnormal data storage.

Full Access
Question # 221

FusionNetDoctor, also known as network traffic diagnosis, is for operation and maintenance personnel to detect the network field.

Which can detect traffic in which of the following scenarios? ( many)

A.

East-west traffic detection between the tenant's two virtual machines

B.

Tenant's VM-to-VM Elastic IP (EIP) traffic inspection

C.

Access traffic detection from the client computer to the ELB on the cloud

D.

Inspection of access traffic from client computers to virtual private network services (VPNs) on the cloud

Full Access
Question # 222

The administrator configures the HTTP server for storing alarms through FusionCompute.

View the stored alarm information on the corresponding HTTP server. If the alarm dump is not configured, the system will report After a certain number of entries are exceeded, the latest alarm information will be automatically cleared to free up space. If alarm dump is configured,

It will dump the earliest certain entry alarms to the HTTP server

A, TRUE

B. FALSE

Full Access
Question # 223

If the new virtual machine of FusionCompute uses the vhost-user type (DPDK) network card, it needs to be which of the following conditions are met? (many)

A.

The host where the virtual machine is located has completed the huge page configuration and takes effect

B.

The cluster where the virtual machine is located has been set to a high-performance cluster

C.

Turn on the IMC mode of the cluster where the virtual machine is located

D.

A distributed switch of the user-mode switching mode type has been created

Full Access
Question # 224

When eReplication performs disaster recovery on data, an agent needs to be installed on the protected host, using to identify the application information; for virtual machine disaster recovery, there is no need to install agent.

A.

TRUE

B.

FALSE

Full Access
Question # 225

When using FusionAccess, when the virtual machine network card, desktop proxy service, etc. are stopped unexpectedly, use If the user cannot connect to the virtual machine, the user can self-check through the tool and try to solve the problem. The following about

Description of inspection tools and problem solving, which one is wrong? ( one)

A.

Using the self-service maintenance desk can solve the blue screen/stuck problem of the virtual machine

B.

The desktop cloud connection maintenance tool can solve the virtual machine patch update problem

C.

The desktop cloud connection repair tool can detect whether the virtual machine network card is disabled

D.

The use of the self-service maintenance desk can solve the problem that the virtual machine takes too long to start or restart

Full Access
Question # 226

In Huawei FusionCompute, which of the following types of storage do not need to be added to the host

storage interface? (many)

A.

IP SAN storage

B.

FusionStorage

C.

FC SAN storage

D.

local hard drive

Full Access
Question # 227

In the Huawei FusionCloud 6.3 solution, which of the following technologies does CSBS use? (one)

A.

Virtual machine snapshot

B.

HyeperMetro 0

C.

remote replication

D.

I0 copy

Full Access
Question # 228

When installing eBackup according to the template deployment method, the following error is reported "eBackup software has

not been installed.Install it before the configuation"Which of the following are possible

The reason for the error? many)

A.

The operating system does not support

B.

CNA host does not turn off NUMA

C.

The configuration file of the eBackup virtual machine is incorrectly configured

D.

The eBackup virtual machine is out of memory

Full Access
Question # 229

In FusionCompute, if the SRIOV pass-through NIC is used for the uplink, the virtual switch needs to select the SRIOV mode. Which of the following descriptions about the SRIOW function is correct? (many)

A.

SR-OV realizes the distribution of PCI functions to multiple virtual interfaces to share a PCI in a virtualized environment

device resources

B.

SR-IOV reduces the V/O overhead in the software simulation layer to improve the network forwarding performance of the virtual machine

C.

SR-IOV can only assign a physical NIC device to one virtual machine

D.

The port group created in the distributed switch that selects the SRIOV pass-through mode, the port type can only be used "ordinary"

Full Access