Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

H13-811_V3.0 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H13-811_V3.0 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: HCIA-Cloud Service V3.0
  • Last Update: May 25, 2025
  • Questions and Answers: 454
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H13-811_V3.0 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H13-811_V3.0 Practice Exam Questions with Answers HCIA-Cloud Service V3.0 Certification

Question # 6

Which of the following components does not belong to the big data platform?

A.

Map Reduce

B.

Yarn

C.

Open Stack

D.

HDFS

Full Access
Question # 7

In order to use the ping program to test the communication status between elastic cloud servers, Which of the following protocols need to be added to the security group?

A.

HTTPS

B.

TCP

C.

HTTP

D.

ICMP

Full Access
Question # 8

Which of the following protocols can be configured for mutual authentication?

A.

TCP

B.

HT??

C.

HTTPS

D.

UDP

Full Access
Question # 9

Which of the following parameters need to be set when creating a backup strategy?

A.

Retention rules

B.

Backup time

C.

name

D.

Backup cycle

Full Access
Question # 10

What can I do if the disk capacity of the elastic cloud server is insufficient?

A.

Reinstall the operating system

B.

Expand the disk

C.

Unmount disk

D.

Switch operating system

Full Access
Question # 11

Which of the following operations cannot be performed in the RDS backup strategy?

A.

Turn off automatic backup

B.

Set up as incremental backup

C.

Set the backup cycle

D.

Set the number of days to keep backups

Full Access
Question # 12

Relational database MySQL instance backup support recovery to which of the following?

A.

New instance

B.

Current instance

C.

Existing examples

D.

none of the above

Full Access
Question # 13

One elastic cloud server can mount multiple cloud hard drives at the same time.

A.

True

B.

False

Full Access
Question # 14

cloud dedicated line currently supports manual activation and self-service activation.

A.

True

B.

mistake

Full Access
Question # 15

By modifying the IP or city name that provides services to the outside world, Direct traffic to the high-defense machine room, All traffic is cleaned in the high-defense machine room, and the cleaned business traffic is returned to()

A.

High-defense machine room

B.

DNS service

C.

User origin site

D.

Client side

Full Access
Question # 16

Cloud Disk is a virtual block storage service based on a distributed architecture that can be flexibly expanded.

A.

True

B.

mistake

Full Access
Question # 17

users cannot deploy business applications on elastic cloud servers arbitrarily like using traditional servers.

A.

True

B.

mistake

Full Access
Question # 18

Which service resource indicators can be monitored in cloud monitoring?

A.

Virtual private cloud

B.

Distributed Cache Service

C.

Elastic load balancing

D.

Elastic Computing Service

Full Access
Question # 19

Call AP IWhich of the following security authentication methods are there?

A.

HuaweiI AM certification

B.

No certification

C.

APP authentication

D.

Micro authentication

Full Access
Question # 20

Which of the following options are the monitoring indicators of OBS?

A.

Upload traffic

B.

Number of GET requests

C.

Number of PUT requests

D.

Download traffic

Full Access
Question # 21

The cloud hard drive backup service can create backups for cloud hard drives, and use the backup data to roll back the cloud hard drives to maximize the accuracy and safety of user data and ensure your data security.

A.

True

B.

mistake

Full Access
Question # 22

Which of the following types of cloud hard disks are used by the ECS?

A.

Super highIO

B.

highIO

C.

Super highIO(Time delay optimization)

D.

ordinary

Full Access
Question # 23

Which of the following are the advantages of load balancing?

A.

Support cross-availability zone active-active disaster recovery

B.

Adopting cluster deployment to support intra-city active-active disaster recovery in multi-zones, Seamless real-time switching

C.

Automatically complete distribution based on application traffic, Seamless integration with elastic scaling services, Flexible expansion of external service capabilities of user applications

D.

Support monitoring performance indicators based on listener granularity, More suitable for customer business statistics

Full Access
Question # 24

data security provides confidentiality and integrity protection for user data applications and storage in the cloud computing environment.

A.

True

B.

False

Full Access
Question # 25

After creating a Windows elastic cloud server, In order to remotely connect to the elastic cloud server through RDP, Which of the following ports needs to be opened in the incoming direction of the security group?

A.

33

B.

80C

C.

3389

D.

53

Full Access
Question # 26

The disk capacity of the relational database is insufficient. In which way can it be solved?

A.

Switch operating system

B.

Expand the disk

C.

Reinstall the operating system

D.

Unmount disk

Full Access
Question # 27

What is wrong with the statement about the removal of instances of the scaling group?

A.

When the number of expected instances of the scaling group is less than the current number of instances, the scaling group will remove redundant instances.

B.

You can configure the instance removal strategy as needed.

C.

Instances manually moved in will not follow"Instance removal strategy"Requirement and has the lowest priority when it is removed.

D.

When the scaling group is moved out of the instance, the balance of the availability zone will not be considered.

Full Access
Question # 28

Regarding the process of opening a virtual private network, what is wrong in the following description?

A.

After purchasing a VPN connection, users do not need to do it on the router or firewall of their own data centerIPSec VPN tunnel configuration

B.

Users need to plan local data in advancemiddleThe VPC and its subnet that you need to connect to

C.

Users need to configure the security group rules of the VPC after purchasing the VPN gateway and the VPN connection

D.

User needswantBuy a VPN gateway first before buying a VPN connection

Full Access
Question # 29

Cloud hard disks can be mounted to cloud servers in different availability zones.

A.

True

B.

mistake

Full Access
Question # 30

HUAWEI CLOUD E1 service, What kind of service has full-stack big data capabilities?

A.

CDM Cloud Data Migration Service

B.

CloudStream real-time streaming computing service

C.

DS data warehouse service

D.

MRSMapReduce service

Full Access
Question # 31

Which of the following options is the role of the listener in elastic load balancing?

A.

Run business logic

B.

Check the progress of the connection request

C.

Receive access request

D.

Distribute traffic to the back-end server

Full Access
Question # 32

file system can be mounted to()superior.

A.

Elastic cloud server for Linux system

B.

Dedicated computing cluster

C.

Bare metal server

D.

Elastic cloud server for Windows system

Full Access
Question # 33

What lines does DDoS Anti-DDoS currently support?

A.

telecommunications

B.

move

C.

BGP line

D.

Unicom

Full Access
Question # 34

The relational database service RDS does not have database backup and recovery functions.

A.

is correct

B.

mistake

Full Access
Question # 35

When creating a listener, Under which protocol is the server certificate configurable?

A.

HTTPS

B.

UDP

C.

HTTP

D.

TCP

Full Access
Question # 36

in the DDoS high defense network architecture, Which of the following modules is the function of detecting and cleaning user traffic?

A High imitation IP

B DDoS cleaning cluster

CUser business

D DDoS high imitation

Full Access
Question # 37

After deleting the elastic scaling group, the elastic cloud server instance automatically created by elastic scaling will also be deleted automatically.

A.

True

B.

mistake

Full Access
Question # 38

What are the basic concepts of Huawei Cloud Network Service?

A.

VPN

B.

Subnet

C.

Security group

D.

EIP

Full Access
Question # 39

Which of the following parameters need to be configured for Cloud Monitoring to create an alarm rule?

A.

Monitoring indicators

B.

Alert strategy

C.

Monitoring time

D.

Alert level

Full Access
Question # 40

Which of the following is wrong in the description of VPN?

A.

Currently supports point-to-point VPN(Site-to-site VPN)And point-to-multipoint VPN (Hub=SpokeVPN)

B.

In addition to building a VPN in a VPC, You also need to build a VPN in your own data center

C.

VPCinsideVPN and self-built VPN, IKE policy and IPsec policy configuration only need to keep one policy consistent

D.

VPCInternal VPNs and self-built VPNs need to ensure the IKE policyas well asIPsec and policy configuration are consistent

Full Access
Question # 41

flexible file service supports standard()protocol.

A.

HTTI

B.

CIFS

C.

F?P

D.

NFSv3

Full Access
Question # 42

Which of the following parameters need to be configured for the health check in elastic load balancing?

A.

Health check port

B.

inspection cycle

C.

Check the progress of the connection request

D.

Health Check Agreement

Full Access
Question # 43

Cloud hard disk backup does not support batch backup of cloud hard disks.

A.

True

B.

mistake

Full Access
Question # 44

The virtual private cloud supports the interconnection and intercommunication of VPCs and traditional data centers through dedicated lines/VPNs and other connection methods, which flexibly integrate resources.

A.

True

B.

False

Full Access
Question # 45

What can't be achieved in the description of the use of elastic load balancing?

A.

Check the health of the service node

B.

Eliminate single points of failure

C.

Forwarding of Layer 2 and Layer 3 data

D.

Allocate service node pressure

Full Access
Question # 46

Description of the secret key, Which of the following is correct?

A.

The key pair information used by the elastic cloud server can be queried through the console

B.

It is not possible to create a key pair to log in to the Windows single-sex cloud server

C.

You can change the key pair to log in to the elastic cloud server to log in with a password

D.

You can use the key to authenticate when logging in with VNC

Full Access
Question # 47

Cloud Monitoring is an open resource monitoring platform, It can provide resource monitoring, alarm, notification and other services.

A.

True

B.

False

Full Access
Question # 48

What can be done when the vCPU and memory of the elastic cloud server you purchased is insufficient?

A.

Mount the disk

B.

Switch operating system

C.

Reinstall the operating system

D.

Change specifications

Full Access
Question # 49

Use mirroring to create a cloud server, Can not specify the size of the system disk

A.

is correct

B.

mistake

Full Access
Question # 50

The API gateway service currently supports API integration and API openness including the entire HUAWEI CLOUD.

A.

True

B.

False

Full Access
Question # 51

Through private images in area B, elastic cloud servers can be deployed in area A.

A.

True

B.

mistake

Full Access
Question # 52

Which of the following services is not related to the Elastic File Service?

A.

Virtual Private Cloud VPC

B.

Control Service Cloud Eye

C.

Elastic Cloud Server ECS

D.

Elastic Scaling AS

Full Access
Question # 53

When using RDS, Which of the following may cause automatic backup failure?

A.

Insufficient stability of the network environment

B.

Parameter modification abnormal

C.

Imported data is abnormal

D.

Instance status is abnormal

Full Access
Question # 54

file systems can be mounted on cloud servers in different VPCs.

A.

True

B.

mistake

Full Access
Question # 55

After the elastic cloud server is successfully created, If the size does not meet the demand, The specifications of the cloud server can be changed.

A.

True

B.

mistake

Full Access
Question # 56

relational database binding()Later, it can be accessed through the external network

A.

Flexible ip

B.

Data disk

C.

system disk

D.

Mirroring

Full Access
Question # 57

The description of VPN gateway parameters is the following error?

A.

Reliability currently only supports single live

B.

Support two billing methods, charge by bandwidth or charge by traffic

C.

Region refers to the physical location of the virtual private cloud

D.

Bandwidth refers to the maximum bandwidth that each VPN connection can reach

Full Access
Question # 58

Which of the following is not included in the function of Vulnerability Scanning Service?

A.

Mirror leakage management

B.

Emergency vulnerability management

C.

diversification testing

D.

Weak password detection

Full Access
Question # 59

Which of the following application scenarios does cloud hard disks have?

A.

Development test

B.

High performance computing

C.

Deploy various databases

D.

Mass data storage

Full Access
Question # 60

VPN connection onlysupportIPsecVPN

A.

True

B.

False

Full Access
Question # 61

Compared with self-built database, Relational database services have more cost and operation and maintenance workload.

A.

True

B.

mistake

Full Access
Question # 62

Which of the following descriptions about the cloud dedicated line is wrong?

A.

Cloud Dedicated Line (Direct Connect) is to build a high-speed, low-latency, stable and secure dedicated connection channel between the user's local data center and the virtual private cloud on the cloud

B.

The cloud dedicated line uses the Internet tunnel technology of the public network

C.

To open a cloud dedicated line, you need to purchase a physical dedicated line first, Then create a virtual gateway, Finally create the virtual interface

D.

Cloud dedicated line supports annual and monthly payment methods

Full Access
Question # 63

Statements about backup and disaster recovery, Which of the following is correct?

A.

Backup generally builds a backup copy of data through techniques such as snapshots and backups

B.

Disaster tolerance is generally to build a backup host and data for the business in a remote place through replication technology

C.

The cost of backup is usually higher than disaster recovery

D.

Disaster recovery mainly targets business interruptions caused by software and hardware failures and major natural disasters such as tsunamis, fires, and earthquakes

Full Access
Question # 64

Mount the shared cloud hard disk to multiple cloud servers, Before the operating system has built a shared file system or similar cluster management system, Unable to realize the file sharing function.

A.

True

B.

False

Full Access
Question # 65

IP Sec VPN is an encrypted tunnel technology, Establish confidential and secure communication tunnels between different networks by using encrypted security services. Which of the following is not the guaranteed data packet transmission characteristics on the public network?

A.

Authenticity

B.

Completeness

C.

Timeliness

D.

Confidentiality

Full Access
Question # 66

When creating an elastic cloud server, The elastic cloud server can be initialized through the "file injection" function provided by the system.

A.

True

B.

mistake

Full Access
Question # 67

GPU is suitable for application scenarios such as graphics rendering, engineering drawing and desktop cloud scenarios running in a virtualized environment?

A.

True

B.

mistake

Full Access
Question # 68

What are the stages of APT life cycle management?

A.

Create, publish, authorize, offline

B.

Create, authorize, publish, offline

C.

creation, release, flow control, offline

Full Access
Question # 69

Which of the following cloud disks can be created directly through the cloud disk console?

A.

Data disk

B.

system disk

C.

Mirror disk

D.

Differential disk

Full Access
Question # 70

Passing(), can record operation events related to relational database instances, Facilitate future inquiries, audits and backtracking?

A.

Cloud Audit Service

B.

Elastic scaling

C.

Virtual private cloud

D.

Cloud Monitoring Service

Full Access
Question # 71

What are the key features of RDS?

A.

High availability

B.

Backup and restore

C.

Performance monitoring

D .Flow cleaning

Full Access
Question # 72

After the relational database instance is successfully created, the database port cannot be modified.

A.

True

B.

False

Full Access
Question # 73

The file system supports batch creation.

A.

True

B.

False

Full Access
Question # 74

The number of snapshots of the cloud disk will affect the performance of the cloud disk.

A.

True

B.

mistake

Full Access
Question # 75

About the impact of cloud hard disk deletion on cloud hard disk backup, Which of the following statements is correct?

A.

After deleting the cloud drive, Backup data will not be deleted

B.

After deleting the cloud drive, The backup data is also deleted

C.

After deleting the cloud hard box, You can also use backups to restore cloud hard drives

D.

After deleting the cloud drive, You can also use backups to create cloud hard drives

Full Access
Question # 76

VBS Supports simultaneous backup of all cloud hard drives in the server.

A.

True

B.

mistake

Full Access
Question # 77

What is the storage capacity unit of cloud hard drives?

A.

PB

B.

KB

C.

GB

D.

TB

Full Access
Question # 78

Which of the following cloud servers cannot be elastically scaled?

A.

Cloud server for deploying database applications

B.

Cloud server for deploying static web pages

C.

The cloud server that saves the application session

D.

Cloud server that saves data log information

Full Access
Question # 79

On which service is the backup and snapshot data of the RDS database instance stored?

A.

CES

B.

OBS

C.

ECS

D.

VPC

Full Access
Question # 80

You can install the operating system on the elastic cloud server by yourself, Upgrade CemtOS7.2 to CentOS77.30

A.

True

B.

mistake

Full Access
Question # 81

What is the full name of ECS?

A.

Elastic Cloud Server

B.

Elastic Scaling Service

C.

Object storage service

D.

Flexible file service

Full Access
Question # 82

When the load balancer uses the seven-layer protocol HTTP/HTTPS, which of the following options is the network traffic path?

A.

LVS cluster>Nginx cluster>ECS

B.

Nginx cluster?LVS cluster?ECS

C.

LVS cluster?ECS

D.

Neinx cluster?ECS

Full Access
Question # 83

twenty one0The elastic scaling service is billable.

A.

True

B.

mistake

Full Access
Question # 84

OBS Which of the following functions does Browser support?

A.

Mount external bucket

B.

Static website hosting

C.

Cross-domain resource sharing

D.

Multi-version control

Full Access
Question # 85

Compared with the self-built database, which of the following is not an advantage of RDS?

A.

Elastic scaling

B.

convenient management

C.

Ready to use

D.

Users self-install the database

Full Access
Question # 86

The data on the cloud hard disk will be lost when the cloud hard disk is uninstalled from the elastic cloud server.

A.

is correct

B.

mistake

Full Access
Question # 87
A.

Elastic Scaling AS

B.

Virtual Private Cloud VPC

C.

Elastic load balancing ELB

D.

Elastic public network IP

Full Access
Question # 88

Virtual Private Cloud (VirtualPrivateCloud, Abbreviated as VPC)It is an isolated and private virtual network environment that users apply for on HUAWEI CLOUD.

A.

True

B.

False

Full Access
Question # 89

Which of the following options is not an advantage of cloud hard drives?

A.

High reliability

B.

Rich specifications

C.

Can be used alone

D.

Easy to use

Full Access
Question # 90

Which of the following functions does the Elastic Cloud Server service provide?

A.

Users can create, reinstall and cut virtual machinesChangeOS,switchmachine

B.

Users can add and uninstall expansion network cards by themselves, and add EIP, mount and unmount acid disk, apply for keypair, etc.

C.

Users can set the elastic cloud server alarm rules

D.

Users can view information about their own cloud server resources through the console interface

Full Access
Question # 91

Which of the following is wrong about the description of the expected number of instances in elastic scaling?

A.

The number of expected instances cannot be less than the minimum number of instances

B.

can trigger the scaling activity by manually adjusting the expected number of instances

C.

The trigger element method of the scaling strategy changes the number of expected instances

D.

The number of expected instances cannot be greater than the maximum number of instances

Full Access
Question # 92

can access file systems across VPCs.

A.

True

B.

mistake

Full Access
Question # 93

Which of the following is reserved for users when deleting a relational database instance?

A.

Automatic backup

B.

Master instance

C.

Manual backup

D.

Read-only instance

Full Access
Question # 94

elastic load balancing automatically distributes access traffic to multiple cloud servers, expands the external service capabilities of the application system, and achieves a higher level of application fault tolerance.

A.

True

B.

mistake

Full Access
Question # 95

How does the cloud hard disk triple copy technology ensure data consistency?

A.

Automatically repair damaged copies when reading data fails

B.

When writing data, Only when the data of multiple copies are written, Will return to the application a response that the data is written successfully

C.

When writing data, perform write operations on 3 copies at the same time

D.

When reading data, Perform read operations on 3 copies at the same time

Full Access
Question # 96

What are the login authentication methods for the elastic cloud server?

A.

fingerprint

B.

Dynamic mouth token OTP

C.

Key pair

D.

password

Full Access
Question # 97

Which of the following is not a basic concept of elastic load balancing?

A.

Instance (VM or application container)

B.

Listener

C.

Firewall

D.

LoadBalancer load balancer

Full Access
Question # 98

Which of the following options is the cloud private line self-service activation process?

A.

Physical leased line access?Create virtual gateway?Create virtual interface

B.

Create virtual interface?Create virtual gateway?Physical private line access

C.

Create virtual gateway?Create virtual interface?Physical private line access

D.

Physical leased line access?Create virtual interface?Create virtual gateway

Full Access
Question # 99

What are the product advantages of VPC?

A.

Flexible deployment

B.

dynamicBGP

C.

Safe isolation

D.

Support hybrid cloud deployment

Full Access
Question # 100

Vulnerability Scanning Service can repair the vulnerabilities scanned

A.

is correct

B.

mistake

Full Access
Question # 101

What are the application scenarios of real-time streaming computing service?

A.

real-time file transfer

B.

Log online analysis

C.

Network traffic monitoring

D.

Online graph calculation

Full Access
Question # 102

What are the VPC access rights control?

A.

fingerprint

B.

password

C.

Network ACL

D.

Security group

Full Access
Question # 103

Description of VPN gateway bandwidth is the following error?

A.

You can configure alarm rules in cloud monitoring to monitor bandwidth

B.

The sum of VPN connection bandwidth can exceed the bandwidth of the VPN gateway

C.

During the use of VPN, when the network traffic exceeds the VPN bandwidth, it may cause network congestion and cause the VPN connection to be interrupted.

D.

The bandwidth of the local VPN gateway is the bandwidth shared by all VPN connections created based on the gateway

Full Access
Question # 104

Face recognition is provided to users in an open API, The user obtains the face processing result through real-time access and call API.

A.

True

B.

mistake

Full Access
Question # 105

Which of the following is not a security detection source for situational awareness services?

A.

Vulnerability scanning, host security, flow probe

B.

DDoS,IDS

C.

ACL/Security Group

D.

Web firewall, database firewall

Full Access
Question # 106

Which of the following commands can be used to view the newly added data disk in the Linux system?

A.

fdisk-1

B.

mkfs-t

C.

mkdir

D.

partprobe

Full Access
Question # 107

Elastic scaling service is based on the user's business needs, A service that automatically adjusts its business resources through strategies.

A.

True

B.

False

Full Access
Question # 108

What are the ways to create a private image?

A.

Created by cloud server

B.

Created by OBS file

C.

Created by external image file

D.

Created by physical server

Full Access
Question # 109

(single choice) In the configuration description about ELB, which item is incorrect?

A.

The listening strategy can be configured when creating the listener

B.

Cannot select when adding an elastic load balancerip

C.

ConfigurationlisOptional session retention when tener

D.

Configurable health check timeout time

Full Access
Question # 110

load balancer can be used alone

A.

True

B.

mistake

Full Access
Question # 111

When creating a database instance, Which of the following options does not need to be configured?

A.

storage

B.

Example rules

C.

database engine and version

D.

The port number

Full Access
Question # 112

Description of Virtual Gateway,Which of the following is wrong?

A.

When deleting a virtual gateway, there is no need to delete the virtual interface bound to it

B.

The virtual gateway is bound to the user's local data centerVPC

C.

When configuring the virtual gateway, only the ones directly connected to the virtual gateway can be configuredVPC

D.

virtual gateway is the access router of the physical leased line

Full Access
Question # 113

What is the following error about the understanding of data encryption service DEW?

A.

Manage cloud platform and tenant keys

B.

Multi-layer key protection technology

C.

Support and application integration

D.

Use HSM (Hardware Security Module)

Full Access
Question # 114

What are the pain points facing API capability opening?

A.

API How does the provider open up capabilities

B.

The pursuit of back-end services is more stable, safe and reliable.

C.

How to quickly acquire and master the API

D.

How to manage and control the open API

Full Access
Question # 115

OBS Bucket A is set with a Policy policy, which does not allow any user to access the objects in the bucket; There is an object in bucket A, It is set with ACL permissions that allow anonymous users to visit the room, Then the user can access object B through anonymous access.

A.

True

B.

mistake

Full Access
Question # 116

What are the following ways to access the flexible file service?

A.

Client mode

B.

Local way

C.

API way

D.

Management console mode

Full Access
Question # 117

After the object storage service creates a bucket successfully, Cannot change area, so, When creating a bucket, choose the region carefully.

A.

True

B.

mistake

Full Access
Question # 118

The description of the VPN gateway is wrong?

A.

Through the VPN gateway, secure and reliable encrypted communication between the virtual private cloud and the corporate data center or other regional VPCs can be established.

B.

The VPN gateway needs to correspond to the user's local gateway.

C.

A VPN gateway is an entry gateway device established in a virtual private cloud.

D.

Each VPN gateway can correspond to multiple VPN connections.

Full Access
Question # 119

What usage methods does the object storage service support?

A.

Management console

B.

obscmd

C.

OBS Browser

D.

PI & SDK

Full Access
Question # 120

What applications and services does Huawei Cloud Application Supermarket provide?

A.

Developer tools

B.

commercial software

C.

Basic software

D.

professional service

Full Access
Question # 121

Which of the following options can be used to establish a connection between VPC and VPC?

A.

Cloud Dedicated Line

B.

VPN

C.

Cloud connection

D.

Peer-to-peer connection

Full Access
Question # 122

Divided by HUAWEI CLOUD services, Which cloud service is not a computing cloud service?

A.

Elastic Cloud Service

B.

Elastically scalable cloud services

C.

Virtual private cloud

D.

Bare Metal Service

Full Access
Question # 123

Which of the following descriptions about public clouds is wrong?

A.

The public cloud is generally available via the Internet

B.

Public cloud is a cloud built by enterprises using their own infrastructure

C.

Public cloud can have many tenants at the same time

D.

Public cloud can optimize resources on a large scale

Full Access
Question # 124

After purchasing a VPN gateway, the VP. The N gateway allocates a public network exit IP address.

A.

True

B.

mistake

Full Access
Question # 125

What is wrong about the following statement about the elastic scaling service?

A.

Elastic scaling does not support viewing the status of instances in a scaling group.

B.

Elastic scaling supports health checks on the status of the instance.

C.

Elastic scaling can automatically adjust the number of instances in the scaling group according to the set strategy.

D.

Elastic scaling supports instance protection for specific instances in the scaling group.

Full Access
Question # 126

Which of the following services does the Standard Edition Security Expert Service include?

A.

Host security checkup

B.

Website security checkup

C.

Safety monitoring

D.

Security reinforcement

Full Access
Question # 127

What is the application of content review in the HUAWEI CLOUD E1 AI API?

A.

Text-based image search, content-based image search, and image search

B.

Detect pornography, advertising, tyranny, politics and other content in images, texts and videos

C.

Convert the text in the image into an editable text format

D.

Recognize tags of objects, scenes, etc. in images

Full Access
Question # 128

Strictly selected products are based on industry needs, Strictly select products, services and solutions that meet customer needs and service quality requirements

A.

True

B.

False

Full Access
Question # 129

In which of the following scenarios can a elastic scaling group modify the availability zone and subnet of the scaling group?

A.

The current number of instances is0

B.

The scaling group is in an inactive state

C.

Scaling activity in progress

D.

The scaling group is enabled

Full Access
Question # 130

The cloud hard disk is like a traditional server hard disk. You can format and create a file system on the cloud hard disk mounted on the cloud server, and store the data persistently.

A.

True

B.

False

Full Access
Question # 131

Which of the following scenarios is suitable for object storage?

A.

Mass storage resource pool

B.

Archive

C.

Big data storage

D.

Static website hosting

Full Access
Question # 132

Faced with massive multi-dimensional spatio-temporal data, fast data access is required. Which of the following services is most suitable for storage?

A.

Real-time streaming computing service Cloudstrear

B.

Data Warehouse Service

C.

Cloud Data Migration Service CDM

D.

Table storage service Cloudtable

Full Access
Question # 133

Elastic Load Balancing can add cloud servers with different operating systems.()

A.

True

B.

False

Full Access
Question # 134

Which of the following options is the default port of the MySQL database instance?

A.

1433

B.

80

C.

3306

D.

5432

Full Access
Question # 135

The API gateway service is a booster for the digital transformation of enterprises.

A.

True

B.

mistake

Full Access
Question # 136

The default backup strategy of cloud hard drives cannot be deleted.

A.

True

B.

mistake

Full Access