New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H13-511_V5.5 HCIA-Cloud Computing V5.5 Exam Questions and Answers

Questions 4

In FusionCompute, the security auditor in role-based access control (RBAC) mode is only permitted to view and export logs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

KVM is a type of paravirtualization. It can implement CPU and memory virtualization, but not device I/O virtualization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

Which of the following storage types isrecommendedfor VRM deployment during Huawei FusionCompute installation?

Options:

A.

IP SAN

B.

FC SAN

C.

Local storage

D.

NAS

Buy Now
Questions 7

Which of the following statements aretrueabout the features and functions of the FusionCompute virtualization suite?

Options:

A.

Allowing users to add or reduce VM resources on demand without interrupting applications.

B.

Supporting x86- or Arm-based servers, various storage devices, and mainstream Linux/Windows operating systems, thereby allowing mainstream applications to run on virtualization platforms.

C.

Allowing users to define service level agreement (SLA) policies to control VM resources, thereby allocating physical resources based on application priority.

D.

Automatically migrating workloads based on preset policies, thereby optimizing resource allocation, system response efficiency, and user experience.

Buy Now
Questions 8

To enhance the security of user desktops, FusionAccess supports diverse access management policies. Which of the following statements about access management policies are true?

Options:

A.

MAC address-based access control. This policy can be applied only to users or user groups.

B.

Time-based access control. This policy implements only whitelist control. Users can log in to desktops only in the specified time segment.

C.

IP address-based access control. This policy implements blacklist and whitelist control and allows configuring a single IP address or IP address segment.

D.

Certificate-based access control. This policy is applied globally.

Buy Now
Questions 9

Complete the following configuration file for a network interface card (NIC) in theopenEuleroperating system to set astatic IP addressand enable the NIC toautomatically start upon system boot.

TYPE=Ethernet

BOOTPROTO=_____

NAME=enp0s4

DEVICE=enp0s4

ONBOOT=_____

IPADDR=172.28.100.100

NETMASK=255.255.255.0

Options:

Buy Now
Questions 10

Which of the following statements about the differences between adomainand anorganizational unit (OU)aretrue?

Options:

A.

Both OUs and domains can contain Active Directory (AD) objects.

B.

Users can log in to a domain but not to an OU.

C.

Group policies can be configured for both OUs and domains.

D.

An OU can exist in a domain, and a domain can also exist in an OU.

Buy Now
Questions 11

Which of the following statements is false about virtual NICs?

Options:

A.

Each virtual NIC has its own MAC address.

B.

Each virtual NIC has its own IP address.

C.

In terms of network, a virtual NIC has the same functions as a physical NIC.

D.

A VM can have only one virtual NIC.

Buy Now
Questions 12

Which of the following technologies cannot be used to manage networks?

Options:

A.

Distributed virtual switch (DVS)

B.

Snapshot

C.

Virtual NIC

D.

Network I/O control

Buy Now
Questions 13

Which of the following commands are used to view common files on Linux?

Options:

A.

less

B.

more

C.

vim

D.

cat

Buy Now
Questions 14

On FusionAccess, modifying or deleting a full copy template will affect the virtual machines created using the template.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

Match the following service models for cloud computing with their descriptions.

H13-511_V5.5 Question 15

Options:

Buy Now
Questions 16

Match the following virtualization technologies with their descriptions.

H13-511_V5.5 Question 16

Options:

Buy Now
Questions 17

Which of the following operations must be performed on FusionAccess when you create a Windows template?

Options:

A.

Mounting a template tool

B.

Converting a VM into a template

C.

Configuring a template

D.

Encapsulating a template

Buy Now
Questions 18

In compute virtualization, which of the following is the operating system running on a virtual machine (VM)?

Options:

A.

Hypervisor

B.

Host OS

C.

Guest OS

D.

Host machine

Buy Now
Questions 19

Which of the following statements aretrueabout distributed storage?

Options:

A.

Distributed storage features outstanding scalability.

B.

Distributed storage typically uses general-purpose servers rather than storage devices.

C.

Distributed storage leverages RAID technology to ensure high data availability and security.

D.

Distributed storage has no controller enclosure or disk enclosure. All disk storage resources are delivered by general-purpose servers.

Buy Now
Questions 20

After installing infrastructure VMs, you must configure the virtualized environment and vAG/vLB so that FusionAccess can work properly. Which of the following statements aboutFusionAccess initializationaretrue?

Options:

A.

After interconnection with a Windows AD domain is configured for authentication and authorization and the local domain is not enabled, the priority of the default LiteAS authentication and authorization is lower than that of the interconnected Windows AD domain.

B.

When the vAG and vLB are used as the gateway and load balancer, related parameters of a WI cluster must be configured on FusionAccess.

C.

If the CNA node or storage device where the backup server resides is faulty, backup data may be lost. Therefore, a third-party FTP backup server is preferred on the live network.

D.

When configuring the License on FusionAccess and the License supports both per-desktop and per-user modes, you must selectUser CountorConcurrent User Count.

Buy Now
Questions 21

Which of the following statements is false about centralized storage and distributed storage?

Options:

A.

Distributed storage stores data on multiple independent devices. During data reading, data is read from these devices at the same time, affecting read efficiency.

B.

Centralized storage has a simple deployment structure. It can leverage the redundant array of independent disks (RAID) technology to ensure data security and reliability.

C.

In terms of technical architectures, centralized storage can be classified into network attached storage (NAS) and storage area network (SAN). SANs are further divided into Fibre Channel storage area networks (FC SANs) and IP storage area networks (IP SANs).

D.

Distributed storage adopts a scalable system architecture and enables multiple storage servers to share the storage load, improving scalability, reliability, availability, and access efficiency.

Buy Now
Questions 22

During template creation on FusionAccess, you need to enter a temporary account to install Windows OS. Which of the following is the temporary account?

Options:

A.

PrivateAccount

B.

LocalAccount

C.

AreaAccount

D.

SafeAccount

Buy Now
Questions 23

Which of the following statements about the differences betweenuser groupsandorganizational units (OUs)aretrue?

Options:

A.

OUs and user groups are Active Directory objects.

B.

An OU can contain objects such as accounts, computers, printers, and shared folders.

C.

Group policies can be configured for both OUs and user groups.

D.

A user group can only contain accounts.

Buy Now
Questions 24

When a user VM uses a USB device, FusionAccess defaults to "USB Port Redirection". If the device is still unavailable, the"Device Redirection"policy can be configured.

Options:

Buy Now
Questions 25

On FusionAccess, when creating afull copy, QuickPrep, or linked clone template, the template must be added to a domain.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

Which of the following parameters are mandatory for quickly provisioning desktops on FusionAccess?

Options:

A.

Computer Type

B.

Host

C.

Security Group

D.

Template

Buy Now
Questions 27

In Huawei FusionCompute, which of the following functions enables virtual machines (VMs) to be migrated between CNA hosts with different CPU models?

Options:

A.

Cluster I/O ring adaptation

B.

Cluster HANA optimization

C.

Cluster Guest NUMA policy

D.

Cluster IMC policy

Buy Now
Questions 28

Which of the following statements are true about the differences between OpenStack and FusionCompute?

Options:

A.

OpenStack is open-source software, and FusionCompute is closed-source commercial software.3

B.

OpenStack does not have any virtualization capability, while FusionCompute can directly pool physical hardware resources.

C.

OpenStack can manage VMs, bare metal servers, and containers, but FusionCompute cannot manage containers.

D.

OpenStack has concepts about projects and tenants, but FusionCompute does not have the concept about tenants.

Buy Now
Questions 29

A router manages path information by managing its___

Options:

Buy Now
Questions 30

Which of the following statements isfalseabout the development of cloud computing architecture?

Options:

A.

In terms of cloud platforms and cloud management software, it has evolved from closed-source and closed architecture to open-source and open architecture.

B.

It has evolved from non-critical IT applications to critical enterprise applications.

C.

It has evolved from unstructured or semi-structured data to structured data.

D.

It has evolved from small-scale resource virtualization and integration to large-scale resource pool construction.

Buy Now
Questions 31

Which of the following statements isfalseabout virtualization concepts?

Options:

A.

A guest OS is the operating system running on a virtual machine (VM).

B.

A guest machine is a virtual machine (VM).

C.

A host machine is a physical machine.

D.

A host OS is the virtualization software layer.

Buy Now
Questions 32

In Huawei FusionCompute, a virtual machine running Linux is created. In this scenario, which of the following does thehost OSrun in?

Options:

A.

Linux VM

B.

VRM

C.

VNA

D.

CNA

Buy Now
Questions 33

Which of the following statements arefalseabout the network shown in the figure?

H13-511_V5.5 Question 33

Options:

A.

The next-hop address of the packet sent from RTA to RTC is20.1.1.2.

B.

If RTA needs to communicate with RTC, a route needs to be configured onRTC.

C.

RTB can communicate with RTA and RTCwithout any configuration modification.

D.

If RTA needs to communicate with RTC, a route needs to be configured onRTB.

Buy Now
Questions 34

Which of the following statements is false about a Virtual Image Management System (VIMS) file system?

Options:

A.

VIMS is the technical basis of advanced features such as thin-provisioned disks, snapshots, and storage migration.

B.

VIMS is compatible with FC SAN storage, IP SAN storage, and local disks.

C.

VIMS is a universal storage virtualization file system in the industry.

D.

VIMS is a high-performance cluster file system.

Buy Now
Exam Code: H13-511_V5.5
Exam Name: HCIA-Cloud Computing V5.5 Exam
Last Update: Jan 4, 2026
Questions: 116

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now H13-511_V5.5 testing engine

PDF (Q&A)

$43.57  $124.49
buy now H13-511_V5.5 pdf