Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

H31-522 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H31-522 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Huawei Certified Network Professional –Cloud DataCentre Operations
  • Last Update: Sep 12, 2025
  • Questions and Answers: 262
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H31-522 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H31-522 Practice Exam Questions with Answers Huawei Certified Network Professional –Cloud DataCentre Operations Certification

Question # 6

During the installation of Ope ration Center, which of the following root disk sizes should be selected?

A.

500 GB

B.

GB

C.

1500 GB

D.

5000 GB

Full Access
Question # 7

Which of the following features can enable different components in the cloud ecosystem to collaborate for achieving the expected result?

A.

Portability

B.

Scalability

C.

Compatibility

D.

Interoperability

Full Access
Question # 8

Which of the following cloud computing products cannot be installed on a VM?

A.

VRM

B.

FusionSphere OpenStack OM

C.

FusionStorage

D.

ServiceCenter

Full Access
Question # 9

Which of the following attacks do not belong to network-layer attacks?

A.

IP spoofing attacks

B.

Smurf attacks

C.

ARP spoofing attacks

D.

ICMP attacks

Full Access
Question # 10

PaaS(Platform-as-a-Service) is a mode of providing platforms as a service. The platforms can generally consist of middleware, databases, and development tools.

A.

TRUE

B.

FALSE

Full Access
Question # 11

On which of the following pages, client logout upon timeout can be disabled?

A.

User management

B.

Account policy

C.

Idle timeout settings

D.

User session inspection

Full Access
Question # 12

Which of the following are included in the performance monitoring function of eSight? (Multiple Choice)

A.

Real-time monitoring

B.

Historical monitoring

C.

In-band monitoring

D.

Out-band monitoring

Full Access
Question # 13

Why is it important to know how data is accessed?

A.

Data access devices may have different ownership characteristics.

B.

Data access devices have different storage formats.

C.

Data access devices use different applications or clients and thus may have different security characteristics.

D.

Data access devices use different operating systems and thus may run different applications.

Full Access
Question # 14

eSight supports SNMPv1, SNMPv2c, and SNMPv3 protocols. However, SNMPv3 is recommended because SNMPv1 and SNMPv2c have security risks.

A.

TRUE

B.

FALSE

Full Access
Question # 15

Which of the following is not a support sub-procedure of capacity management?

A.

Service capacity management

B.

Plan capacity management

C.

Component capacity management

D.

Service capacity management

Full Access
Question # 16

Which of the following is not an IaaS service characteristic?

A.

Users can obtain the IaaS service for free.

B.

The services that users obtain are IT resource services.

C.

Users obtain the IaaS services on the Internet.

D.

Users can obtain the IaaS services using the self-service.

Full Access
Question # 17

Which of the following virtualization types does VMware ESXi belong to?

A.

Hosted virtualization

B.

Bare metal virtualization

C.

Hybrid virtualization

D.

OS virtualization

Full Access
Question # 18

OperationCenter can be deployed on a VM or a physical server. The deployment modes are the same.

A.

TRUE

B.

FALSE

Full Access
Question # 19

What procedures does the data center service migration process consists of? (Multiple Choice)

A.

Migration assessment

B.

Solution design

C.

Migration implementation

D.

Migration acceptance

Full Access
Question # 20

Which of the following steps are included in the Ope ration Center software package installation process?

(Multiple Choice)

A.

Obtain the software package.

B.

Install OperationCenter.

C.

Perform OS security hardening.

D.

Verify the installation.

Full Access
Question # 21

What of the following are SSL protocols? (Multiple Choice)

A.

Handshake protocol

B.

Record protocol

C.

Alert protocol

D.

Discovery protocol

Full Access
Question # 22

Storage devices managed by eSight include Huawei storage devices, third-party storage devices, and FC switches.

A.

TRUE

B.

FALSE

Full Access
Question # 23

Which of the following is incorrect about the eSight software installation scenario?

A.

Pre-installation

B.

Brand-new installation

C.

Incremental installation

D.

Full installation

Full Access
Question # 24

When a user configures the mapping between physical networks and ports, which of the following mapping modes need high-performance iNICs? (Multiple Choice)

A.

User-mode EVS

B.

OVS

C.

Hard passthrough

D.

DVS

Full Access
Question # 25

Which of the following are practices adopted by cloud O&M? (Multiple Choice)

A.

Lightweight, self-service, and automated ITSM management system architecture

B.

Agile DevOps O&M method which prevails in the industry

C.

Passive management

D.

Focus only on the service strategy from the view of management.

Full Access
Question # 26

Which of the following layer does FusionSphere focuses on?

A.

IaaS

B.

PasS

C.

SaaS

D.

MaaS

Full Access
Question # 27

Which of the following types of VPN are suitable for staff on business trip to connect to the enterprise intranet over the public network? (Multiple Choice)

A.

GREVPN

B.

L2TPVPN

C.

SSL VPN

D.

L2TP Over IPSec

Full Access
Question # 28

On which of the following pages, a monthly report can be created and configured?

A.

View Report

B.

System Configurations

C.

Resource Management

D.

Performance Statistics

Full Access
Question # 29

Which of the following networks does not need a VLAN tag?

A.

External_OM

B.

External_API

C.

Internal_Base

D.

storage_data0

Full Access
Question # 30

What technical characteristics does IPS have? (Multiple Choice)

A.

Online mode

B.

Real-time blocking

C.

Self-learning and self-adaption

D.

In-band deployment

Full Access
Question # 31

FusionCompute consists of CNA and VRM. VRM uses VNA deployed on CNA nodes to manage al virtualization resources.

A.

TRUE

B.

FALSE

Full Access
Question # 32

Which of the following is not a process module of the ITTL_ frame?

A.

Service strategy

B.

Service design

C.

Service transition

D.

Service measuring

Full Access
Question # 33

Which of the following statements about block storage and object storage is incorrect?

A.

Cinder provides block storage to be attached to VMs to provide additional disk space for VMs.

B.

Swift is used to store VM images.

C.

In the FusionSphere environment, Glance backend storage is the Swift object storage by default.

D.

In the FusionCompute environment, block storage contains only SAN storage and local storage.

Full Access
Question # 34

What can grant a customer rights to audit a cloud service provider?

A.

Transparent right clauses in the contract.

B.

International laws.

C.

Customers never have any right to audit a cloud service provider.

D.

Auditing right clauses in the contract.

Full Access
Question # 35

Which of the following is not a mainstream virtualization technology of cloud computing?

A.

FusionSphere OpenStack

B.

Hyper-V

C.

KVM

D.

Xen

Full Access
Question # 36

Which of the following installation modes are available for ServiceCenter? (Multiple Choice)

A.

WebUI-based installation

B.

Image installation

C.

PXE installation

D.

Network installation

Full Access
Question # 37

Which of the following devices is required by the VLB service?

A.

Router

B.

F5 load balancer

C.

Firewall

D.

NAT device

Full Access
Question # 38

SAs are uniquely identified by a triplet consisting of three elements. Which of the following elements does not belong to the triplet? (Multiple Choice)

A.

Security protocol

B.

Source IP address

C.

Destination IP address

D.

Security parameter index

Full Access
Question # 39

Which of the following is not an indicator in the disk information monitoring of eSight?

A.

Disk name

B.

Health status

C.

Installation status

D.

Hard disk usage

Full Access
Question # 40

Which of the following topologies are supported by OperationCenter? (Multiple Choice)

A.

Physical topology

B.

Logical topology

C.

Service topology

D.

Network topology

Full Access
Question # 41

The eSight single-node system can be deployed on a VM. Only the Windows operating system is supported. The network traffic analysis and management component and the WLAN wireless positioning function are not supported.

A.

TRUE

B.

FALSE

Full Access
Question # 42

Which of the following functions is configured from Operation Center to an interconnected system to allow users to log in to the interconnected system through My Link on OperationCenter without entering the user name and password?

A.

Resource management

B.

Routine monitoring

C.

SSO

D.

Real-time monitoring

Full Access
Question # 43

Which of the following statements is incorrect about the FusionSphere OpenStack OM resource pool configuration?

A.

You must first specify the availability zone (AZ) to which the host group belongs and then select hosts from the AZ to create a host group.

B.

If the resource pool is to interconnect with FusionCompute, the AZ needs to be consistent with the AZ configured in the FusionCompute storage cluster.

C.

The external network is used to connect to the network outside the system and cannot be the Internet.

D.

fc-nova-computeXXX is in fact a group of FusionCompute computing clusters interconnected with FusionSphere OpenStack.

Full Access
Question # 44

Which of the following statements about FusionSphere OpenStack components is incorrect?

A.

In the FusionSphere OpenStack environment, Nova provides lifecycle management for compute instances. On-demand response includes VM creation, scheduling, and reclamation.

B.

Cinder provides persistent block storage for running instances. Its pluggable drives facilitate block storage device creation and management.

C.

Keystone provides monitoring and measurement for FusionSphere OpenStack charging, baseline, scalability, and statistics.

D.

Horizon provides a web-based self-service portal which interacts with FusionSphere OpenStack underlying services, such as starting an instance, allocating IP addresses, and configuring access control.

Full Access
Question # 45

Which of the following statements is incorrect about backup management software?

A.

Backup management software supports automatic backup.

B.

Backup management software does not support backup for heterogeneous platforms.

C.

Backup management software manages storage media and all backup jobs in a centralized manner.

D.

Backup management software provides a comprehensive log system, enabling administrators to perform monitoring and query operations based on different requirements.

Full Access
Question # 46

Which two methods are used by OperationCenter to synchronize alarm data from its lower-layer management systems? (Multiple Choice)

A.

FTP

B.

SNMPTrap

C.

Scheduled query (HTTPS)

D.

SMTP

Full Access
Question # 47

The x86 server virtualization technology can greatly reduce the server management cost. In the cloud computing environment, which of the following is the ratio between the number of O&M personnel and the number of servers being maintained?

A.

1:1

B.

1:10

C.

1:100

D.

1:1000

Full Access
Question # 48

What procedures does the data center migration acceptance process consists of? (Multiple Choice)

A.

Acceptance solution provision

B.

Applying for acceptance

C.

Onsite acceptance

D.

Signing the acceptance certificate

Full Access
Question # 49

You do not need to check the device compatibility when using FusionSphere OpenStack OM to manage the infrastructure.

A.

TRUE

B.

FALSE

Full Access
Question # 50

Which of the following are included in the storage report management feature of eSight? (Multiple Choice)

A.

Predefined report

B.

Customized report

C.

Periodical task report

D.

Imported report

Full Access
Question # 51

Fusion Storage is the distributed storage software that supports storage and computing resource integration. It can be deployed on multiple general x86 servers to combine the local disks on all the servers into a virtual storage resource pool to provide the block storage function.

A.

TRUE

B.

FALSE

Full Access
Question # 52

Which of the following statements about the FusionSphere OpenStack network plane is incorrect?

A.

Internal_base is a FusionSphere OpenStack internal management network. Set the network format to tag when creating a network.

B.

External_API is an external API management plane of FusionSphere OpenStack. The FusionSphere OpenStack web client can be accessed from the Internet through External_API.

C.

External_API is an internal OM management plane which allows users to access external networks from internal networks.

D.

Storage_data is an internal storage plane for using KVM resources.

Full Access
Question # 53

In the FusionCompute environment, which of the following statements is incorrect about the VM template?

A.

A VM template is a duplicate of a VM, which includes an OS, application software, and a set of VM specifications.

B.

A VM template can be created by converting a VM, cloning a VM, or cloning an existing template.

C.

A template in OVF format consists of an OVF file and a VHD file.

D.

There are two formats of VM templates: OVA and OVF formats.

Full Access
Question # 54

Nova is a core service of FusionSphere OpenStack. Many other components are split from the Nova project and serve Nova. All activities in the lifecycle of FusionSphere OpenStack VM instances are processed by Nova.

A.

TRUE

B.

FALSE

Full Access
Question # 55

What actions are taken to prevent against security risks in the cloud?

A.

Understand related supervision regulations.

B.

Run standard security software.

C.

Encrypt everything.

D.

Understand the cloud storage architecture in use.

Full Access
Question # 56

Routine priorities of traditional U O&M are to responsively handle IT service interrupts, service performance deterioration, and production changes of supported IT services.

A.

TRUE

B.

FALSE

Full Access
Question # 57

Which of the following tools is not supported by FusionSphere?

A.

FusionCube

B.

Update tool

C.

Fusion Care

D.

Automatic web UI installation and deployment tool

Full Access
Question # 58

Which of the following are encryption algorithms? (Multiple Choice)

A.

DES

B.

3DES

C.

SHA-l

D.

MD5

Full Access
Question # 59

A server can have only one eSight installed.

A.

TRUE

B.

FALSE

Full Access
Question # 60

The virtualization consolidation and migration are implemented by V2V and P2V tools.

A.

TRUE

B.

FALSE

Full Access
Question # 61

Which of the following reports are supported by OperationCenter? (Multiple Choice)

A.

Instant report

B.

Common report

C.

Periodic report

D.

Customized report

Full Access
Question # 62

During the WebUI-based installation of ServiceCenter, which of the following disk types should be selected?

A.

Local disk

B.

IP SAN

C.

FusionStorage

D.

NAS

Full Access
Question # 63

Which of the following statements is incorrect about the VM snapshots?

A.

To create a snapshot, the current disk is set to read-only. The system automatically creates an incremental disk in the data store where the disk locates.

B.

An incremental disk records the differences between the current state of the disk and the state of the disk in the last snapshot.

C.

Multiple snapshots can be created for one VM. If a VM is being restored using a snapshot, other snapshots of the VM are not affected.

D.

Snapshots can be automatically deleted.

Full Access
Question # 64

Which of the following statements about FusionCompute cluster management is incorrect?

A.

The computing resource scheduling automation technology can determine whether to migrate a VM based on the CPU usage, memory usage, or both the CPU and memory usage.

B.

In power management, hosts can be powered on or powered off manually or automatically.

C.

The VM migration rules include the keep-VMs-together, mutually-exclusive-VM, and the VM-to-host-group rules.

D.

The IMC policy supports only live migration of Intel CPU series. CPUs from other vendors can be configured with this policy.

Full Access
Question # 65

What security threats does multi-tenant face?

A.

Enables tenants to queue up with other users.

B.

Lacks the encryption key customized to each tenant.

C.

Exposes the residual information and data or operation traces to other users or tenants.

D.

Has to update the antivirus database individually for each customer.

Full Access
Question # 66

Which of the following statements is correct about the division of responsibilities in a data center service migration project?

A.

During the project implementation, the project implementer is responsible for progress management, risk control quality management, subcontract management, construction management, contract change confirmation, and engineering delivery.

B.

During the project implementation, the customer must provide necessary resources to ensure power supply, refrigerating, lighting, firefighting, equipment room protection, network bandwidth, applying for contract changes, migration personnel arrangement, and so on.

C.

Common responsibilities refer to the work that requires both parties to confirm or to complete together during the project implementation.

D.

During the project implementation, the migration implementer is responsible for confirming the project progress, acceptance criteria, hardware installation environment, and device quantity.

Full Access
Question # 67

Depending on complete automation, the cloud computing services can scale out quickly but not scale in.

A.

TRUE

B.

FALSEs

Full Access
Question # 68

How long is the validity period of the trial license of OperationCenter?

A.

1 month

B.

3 months

C.

6 months

D.

1 year

Full Access
Question # 69

VM live migration interrupts VM services, which is sensible to users.

A.

TRUE

B.

FALSE

Full Access
Question # 70

Which of the following is not a FusionCompute storage device?

A.

LUN

B.

Local disk

C.

Advanced SAN storage pool or FusionStorage pool

D.

Local RAM disk

Full Access
Question # 71

Oracle DB services are recommended to be deployed on which of the following?

A.

Customer VM

B.

Privilege VM

C.

Secure VM

D.

Physical server

Full Access
Question # 72

The centralized and cloudified IT system has demanding requirements on business continuity, including the requirements on networks, data security, and service reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 73

PaaS services are provided as clients, ensuring high-quality user experience.

A.

TRUE

B.

FALSE

Full Access
Question # 74

The host service management interface is a system interface used to carry special service traffic. Which of the following items does not belong to special services?

A.

Power on or power off a VM.

B.

VM live migration

C.

VM DR

D.

Virtualized SAN storage heartbeat detection

Full Access
Question # 75

Who should be responsible for the security of IaaS and PaaS?

A.

Cloud customers' system administrators

B.

Internet service providers

C.

Service providers' system administrators

D.

Governments

Full Access
Question # 76

Which of the following statements about backup types is correct?

A.

A full backup is a complete copy of all the data created at a certain point in time.

B.

An incremental backup is performed based on the changes since the last backup.

C.

A differential backup is performed based on the changes since the last full backup.

D.

Differential backup occupies the smallest storage space among all backup types.

Full Access
Question # 77

ServiceCenter can be deployed in a single data center but cannot be deployed across data centers.

A.

TRUE

B.

FALSE

Full Access
Question # 78

Which of the following statements is incorrect about the service design?

A.

The service design package is a suite that describes service release.

B.

Implement the transition from service design to service change.

C.

The service design package is used for each new IT service, major service change, or IT service retirement.

D.

The service design contains documents that define all aspects of IT services and requirements on each phase in the service lifecycle.

Full Access