Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H13-531_V2.0 HCIE-Cloud Computing (Written) V2.0 Questions and Answers

Questions 4

(Single-choice questions) Which of the following is notFusionComputeNecessary constraints for virtual machine live migration?

Options:

A.

Virtual machine cannot be bondedUSBequipment.

B.

The target host to be migrated cannot be in maintenance mode.

C.

source host and target hostCPUModels must be the same.D. The virtual machine is installedTools.

Buy Now
Questions 5

Which of the following are HuaweiFusionAccessCommon failure types?

Options:

A.

Desktop distribution failure

B.

Login connection failure

C.

Peripheral use failure

D.

performance experience failure

Buy Now
Questions 6

Which of the following types of security services does not require a client to be installed in the cloud host operating system?

Options:

A.

Database Security Services

B.

Program Run Authentication Service

C.

Host Security Services

D.

border firewall

Buy Now
Questions 7

In the FusionSphere server virtualization scenario, the following operations cannot be configured in the FusionCompute " cluster configuration " .

What is achieved in the setting " ?

Options:

A.

IMCMode configuration

B.

disk hot add

C.

clusterHAconfigure

D.

Computing resource scheduling configuration

Buy Now
Questions 8

FusionComputeThe host fails to add data storage. Which of the following are possible causes of the failure?

Options:

A.

add one for the first timeLUNFormat is not selected when storing for virtualized data

B.

The host cannot access the storage

C.

Host management network exception

D.

The datastore mount directory is occupied

Buy Now
Questions 9

FusionSphere OpenStackThe control node can provideNTPServe.

Options:

A.

True

B.

False

Buy Now
Questions 10

(multiple choice)VDCsalesman inManageOne ServiceCenterFailed to create a virtual machine onNo valid host was found " , which of the following may be the reasons for the failure of virtual machine creation?

Options:

A.

hostDomain0Insufficient memory resources

B.

The host does not have enough storage resources

C.

The physical plane associated with the network selected for creating the virtual machine is not bound to the host network port

D.

The host does not have enough computing resources

Buy Now
Questions 11

InstallFusionSphereWhich of the following software packages should not be used in a server virtualization environment?

Options:

A.

FusionComputeXXXCNA

B.

FusionManagerXXXX

C.

FusionComputexXXX DC zip

D.

FusionToolXXXXFusionCare zip

Buy Now
Questions 12

Which of the following descriptions about HDC components in FusionAccess is incorrect?

Options:

A.

single setHDCDesktop Controller Manageable1000a virtual desktop.

B.

When the user accesses, withWIInteraction, provide access information, and support the completion of the entire user access process.

C.

according toITAThe sent request performs operations such as desktop group management and user association with virtual desktops.

D.

andVMmiddleHDAinteract, collectHDAReported VM status and access status.

Buy Now
Questions 13

Which of the following is not an advantage of an all-memory desktop over traditional VDI linked clones?

Options:

A.

No performance aging problem, all system disk data is always in memory

B.

Using efficient space management algorithm to solve the problem of small block data storage, greatly reducing the consumption of memory space management

C.

Support for advanced features such as snapshots and live migration

D.

Use memory as memory medium to improve user experience

Buy Now
Questions 14

When choosing the Huawei desktop cloud disaster recovery solution, the company hopes that the solution can perform disaster recovery on user data in the desktop. Which of the following disaster recovery solutions is more suitable?

Options:

A.

GSLB +NASDisaster recovery plan

B.

Disaster recovery for client-side autonomous services

C.

Wlredirect disaster recovery

D.

GSLBBusiness disaster recovery

Buy Now
Questions 15

in the user login connection process of FA, if the virtual machine is accessed through the TC, the HDC will. Which of the following information is generated?

Options:

A.

Address ticket

B.

Virtual Machine IP and Port

C.

Token

D.

Login ticket

Buy Now
Questions 16

After using Rainbow to migrate the Windows virtual machine, which original configuration will fail?

Options:

A.

trash can icon

B.

Partition format

C.

License authorization

D.

Username and password

Buy Now
Questions 17

huawei vDesk is a self-service tool for desktop cloud terminal users, user system check, performance optimization, and provides

Repair tools, log collection tools and peripheral assistants, and virtual machine desktops issued through templates need to be manually installed

Options:

A.

TRUE

B.

FLASE

Buy Now
Questions 18

Which of the following scenarios is not suitable for linked-clone desktops

Options:

A.

The school ' s teaching desktop

B.

HD mapping desktop

C.

Office desks in the library

D.

call center desktop

Buy Now
Questions 19

The distributed switch function of Fusion compute is similar to that of a physical switch. Which of the following options can link virtual machines

and physical network? (multiple choice)

Options:

A.

downlink

B.

Uplink

C.

port group

D.

VLAN Pool and Subnet Alarm Definition Rules

Buy Now
Questions 20

The correct option for the agentless feature description of ebackup is

Options:

A.

No need to install agent on VRM

B.

No need to install the agent on the backup storage

C.

No agent needs to be installed on the protected virtual machine

D.

No need to install an agent on the CNA

Buy Now
Questions 21

After the construction of UItraVR is completed, according to the network planning, the management address can be manually modified in the portal

Options:

A.

Correct

B.

Error

Buy Now
Questions 22

(True or False) RainbowBlock-level migration supports expansion and shrinkage, while file-level migration only supports expansion, not shrinkage.

Options:

A.

True

B.

False

Buy Now
Questions 23

Users can eitherFusionAccessModify the specifications of the virtual machine on theFusionComputeModify the specifications of the virtual

machine above.

Options:

A.

True

B.

False

Buy Now
Questions 24

Which of the following scenarios is not recommended to useRainbowto migrate?

Options:

A.

operatingRedhatmiddleKVMvirtual machine

B.

Oracledatabase cluster

C.

a group headquartersADsystem

D.

operatingSUSEmiddleXenVirtual machine

Buy Now
Questions 25

(Multiple choice questions) FusionaccessmiddlevdeskWhich of the following features are supported?

Options:

A.

Collect user VM logs

B.

andHDPCooperate to complete the control of the user virtual machine

C.

Optimize user virtual machine configuration

D.

collectTCRun log.

Buy Now
Questions 26

(Multiple choice) A company has deployed a set ofFusionaccess, The enterprise has high requirements on data availability and needs to perform a

complete backup of the user ' s virtual machine. Which of the following is not a consideration?

Options:

A.

Backup software: Excellent backup software includes accelerated backup, automatic operation, disaster recovery and other special functions, which are very important for safe and effective data backup

B.

Backup network, backup network can chooseSAN, you can also chooseLAN, it is the channel of data transmission, the efficiency of data backup is related to the backup network

C.

Backup media, media is the carrier of data, its quality must be guaranteed, using media with poor quality is undoubtedly a risk of taking enterprise data

D.

There are different types of user data, such as documents, videos, etC. , and the backup schemes used for different data are also different. Do not back up videos by backing up documents.

Buy Now
Questions 27

(Multiple Choice) In HuaweiFusionSphere OpenStackin, usecinderThe command to delete the volume fails. Which of the following reasons may be caused?

Options:

A.

Snapshots exist for this volume.

B.

A virtual machine instance created from this volume is running.

C.

A backup exists for this volume.

D.

The volume is mounted to the virtual machine instance.

Buy Now
Questions 28

ManageOneIn operation,VDCsupport moreRegionandAZmanagement to support the same project acrossRegionRequest

resources.

Options:

A.

True

B.

False

Buy Now
Questions 29

HuaweiManageOneIn the fusion resource pool scenario, ifVPCThe virtual machine in the belt needs to be accessed by the external network, which can be accessed through the elastic IPFunction

implementation. Which of the following is NOT a prerequisite for this function to work?

Options:

A.

existManageOne ServiceCenterIt has been connected to the cloud resource pool, and the advanced configuration of the cloud resource pool has been set to support elasticity IP

B.

Manually configure the gateway for the subnet

C.

External network created and subnets configured

D.

VPCA router has been applied for

Buy Now
Questions 30

Which of the following descriptions about the conditions for live migration of FusionCompute virtual machines is incorrect?

Options:

A.

The destination storage is a different storage device.

B.

The communication between the source host and the destination host is normal.

C.

The destination host must have sufficient resources.

D.

The virtual machine status is " running " Correct

Buy Now
Questions 31

(multiple choice)Manage One the operation and maintenance plane can provide three-dimensional panoramic monitoring function. Which of the following monitoring objects are supported?

Options:

A.

resource pool

B.

Tenant application

C.

physical device

D.

Cloud service instance

Buy Now
Questions 32

In the Huawei FusionCloud 6.3 solution, which of the following are the disaster recovery services that tenants can apply for?

work? (many)

Options:

A.

CSDR

B.

VBS

C.

VHA

D.

CSBS

Buy Now
Questions 33

Which of the following descriptions about VDI and IDV of the desktop cloud architecture are correct? (many)

Options:

A.

VDl is a complete technological innovation, and the fixed office adopts the structure of thin terminal + cloud virtual desktop

B.

VDI can be extended to any terminal, and there is no local data, which solves the problem of high management and maintenance costs of traditional solutions, and high efficiency. Low rate, insecurity, etc.

C.

The IDV scheme introduces local virtual desktops, which reduces the complexity of the terminal and makes management and maintenance more difficult and less expensive.

Compared with traditional PC or VDI, it is greatly improved

D.

Compared with traditional PC+ management software, IDV has only made small improvements, generally including mirror server+

Management software + local virtual desktop terminal

Buy Now
Questions 34

In the FusionSphere private cloud solution, regarding the principle of rapid provisioning of virtual machines, which of the following Are these descriptions wrong? ( many)

Options:

A.

During the use of the virtual machine, all modifications to the system volume are written to the subvolume.

B.

When issuing a virtual machine, the system only needs to quickly create a lightweight subvolume, and add the existing parent volume to form a group becomes the full system volume of the virtual machine.

C.

The system volume ID presented by the virtual machine to the outside world is the ID of the parent volume used by it,

D.

When issuing a virtual machine, there is no need to create a new system volume in the storage and copy the full mirror content to it middle.

Buy Now
Questions 35

When using FusionAccess, when the virtual machine network card, desktop proxy service, etc. are stopped unexpectedly, use If the user cannot connect to the virtual machine, the user can self-check through the tool and try to solve the problem. The following about

Description of inspection tools and problem solving, which one is wrong? ( one)

Options:

A.

Using the self-service maintenance desk can solve the blue screen/stuck problem of the virtual machine

B.

The desktop cloud connection maintenance tool can solve the virtual machine patch update problem

C.

The desktop cloud connection repair tool can detect whether the virtual machine network card is disabled

D.

The use of the self-service maintenance desk can solve the problem that the virtual machine takes too long to start or restart

Buy Now
Questions 36

In the early stage of migration, it is necessary to investigate and evaluate the business to be migrated.

What are the contents? (many)

Options:

A.

Applied Relationship Analysis

B.

Migration strategy

C.

Risk assessment

D.

Business log analysis

Buy Now
Questions 37

When eReplication performs disaster recovery on data, an agent needs to be installed on the protected host, using to identify the application information; for virtual machine disaster recovery, there is no need to install agent.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

The security management mechanism provided by FusionAccess includes access security, user information security and desktop management.

Manage component security. Deploy antivirus software on user virtual machines to prevent user virtual machines from being attacked by viruses,

This belongs to the security mechanism - security.

Options:

Buy Now
Questions 39

In the ManageOne operation and maintenance plane, when the administrator performs routine maintenance or handles user requests, the

Tenant resource page, query resources according to requirements. After querying the required resources, click the required query

The resource name of , which of the following can be seen on the resource details page? ( many)

Options:

A.

Basic information about the resource

B.

alarm

C.

Components

D.

Topology

Buy Now
Questions 40

In FusionCloud, which of the following descriptions about the virtual firewall VFW is wrong? (one)

Options:

A.

Security group is a virtual machine port-level security service of VPC, supports black and white lists, and can be used to control Control traffic to and from one or more virtual machines

B.

is a subnet-level and VPC-level security service of the VPC

C.

By setting up a virtual firewall, adding an additional security layer to the VPC can be more flexible and hierarchical

Safety management.

D.

Support black and white list, which can be used to control the traffic in and out of one or more subnets

Buy Now
Questions 41

[Judgment] When an engineer deploys the Rainbow server on the FusionSphere platform, he will

Plane isolation, when the Rainbow server communicates, even if dual network cards are not configured, it can communicate with the king FusionSphere and the destination virtual machine of the service plane communicate with each other.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

UItraVR supports centralized deployment and distributed deployment. The following describes the two deployment methods

What are the wrong options? ( many)

Options:

A.

In the distributed deployment scenario, UItraVR Server is deployed on a separate server at the disaster recovery site.

Disaster recovery management of current production resources and disaster recovery resources.

B.

In the centralized deployment scenario, UItraVR Server is deployed on a separate server at the disaster recovery site to achieve disaster recovery management of production resources and disaster recovery resources.

C.

In the distributed deployment scenario, UItraVR Server is deployed on the production site and the service of the disaster recovery site respectively

On the server, the disaster recovery management of the site resources is realized.

D.

In the centralized deployment scenario, the UltraVR Server deployed at the production site and the disaster recovery site are required to be deployed network connectivity between UItraVRServers.

Buy Now
Questions 43

Which other component works besides the Server dAgent in the Rainbow process——

Options:

Buy Now
Questions 44

In the FusionCloud solution, by selecting the elastic cloud server ECS with different SLAs and specifications

Services or service combinations to meet the needs of different business applications. For advertising precision marketing, e-commerce, car

Which of the following ECSs is recommended for big data analysis scenarios such as networking? ( one)

Options:

A.

Universal exclusive cloud host

B.

GPU-based host

C.

Memory-optimized cloud hosting

D.

NVMe SSD type host

Buy Now
Questions 45

A user cannot view the monitoring data of the host or virtual machine when using FusionCompute, the following

Which of the descriptions of the possible causes of this phenomenon and corresponding measures are correct? (many)

Options:

A.

The user does not configure the NTP clock source, the user can check whether the

If there is any related alarm, follow the alarm handling help to configure the NTP clock source and clear the alarm

B.

This phenomenon is caused by the inconsistency between the time of the NTP clock source and the local PC. The user can modify the time of the local PC.

time, consistent with the NTP clock source

C.

When the key is updated, the business process on the node will be restarted, which will cause abnormal monitoring of the virtual machine.

D.

The phenomenon is caused by the abnormal monitoring process. The user can use " PuTTY " to log in to the main machine as the gandalf user

VRM, restart monitoring process

Buy Now
Questions 46

A FusionCompute user reports that virtual machine A and virtual machine B run slowly. The following is about passing The description of operations and analysis related to eSight locating the fault is correct. Which items are correct? ( many)

Options:

A.

Users can view alarms related to virtual machines in the eSight alarm list to locate virtual machine faults

B.

The user can view the inflow/outflow rate of the virtual machine NIC and the network flow of the physical port in the eSight component topology

Inbound/outbound bandwidth utilization, it is found that the inbound/outbound rate of the network card of virtual machine A is very low, less than 100KB/s,

However, if the network bandwidth utilization rate of the corresponding physical port exceeds 90%, it is judged that it is another v

C.

Users can check whether the server where the virtual machine is located is properly connected to the external network in the physical topology of eSight.

Often, troubleshoot the network

D.

The user checks the CPU and memory usage of the virtual machine in the eSight component topology, and finds the virtual machine

The CPU usage rate of B is as high as 95%, and the memory usage rate is only 20%. It is judged that there is a business occupied by the virtual machine.

Too many CPU resources cause virtual machines to run slowly

Buy Now
Questions 47

A company plans to use the Rainbow tool to migrate the virtual machines of the existing FusionSphere platform to when the FusionCloud administrator adds the source virtual machine host in the Rainbow tool, the

The tool cannot communicate with the host of the source virtual machine. After testing, the administrator found that the source host network was reachable and protected against the firewall is closed, so it is judged that the terminal state is abnormal, and the Rainbow host should be restarted.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

Huawei FusionAccess cannot perform user access control based on which of the following methods? (one)

Options:

A.

The device is bound to the user

B.

Access time control

C.

TC is bound to the computer

D.

Access site control

Buy Now
Questions 49

When installing FusionCloud 6.3, which of the following statements is correct? (many)

Options:

A.

When FusionCloud 6.3 is installed, the deployment scenario needs to be determined.

B.

FusionCloud 6.3 is installed uniformly using FCD.

C.

Fusioncloud 6.3 requires manual installation of all components.

D.

Fusioncloud 6.3 needs to determine the cloud service type during installation, and the installation is completed at one time.

Buy Now
Questions 50

Which of the following descriptions about the VIMS file system in FusionCompute is incorrect? (one)

Options:

A.

VIMS is a high-performance cluster file system.

B.

VIMS is a common storage virtualization file system in the industry.

C.

VIMS is the technical basis for advanced features such as thin disks, snapshots, and storage migration.

D.

VIMS can be compatible with FC SAN, IP SAN, local disk.

Buy Now
Questions 51

After the cloud disaster recovery service is upgraded, which of the following descriptions of the impact on the current system is correct?

Options:

A.

BCManager eReplication: Only supports online upgrade, and does not need to be restarted during the upgrade process

Operating system, after the upgrade is completed, the protection group or recovery plan can be executed after the automatic refresh of resources under the site is completed.

B.

eBackup: Back up by means of always full backup

C.

ManageOne SC. After the upgrade, the backup console cannot be logged in, and the cloud backup service is interrupted

D.

Fusion Sphere OpenStack: During the completion of the upgrade, the host OS will automatically restart, during the restart

Some services cannot access the subnormal phenomenon

Buy Now
Questions 52

In addition to supporting the management of physical devices such as servers, storage, and networks, Huawei eSight tools also support

Management of virtual resources. Which of the following computing virtual facilities provide access to eSight management capabilities? ( many)

Options:

A.

FusionSphere OpenStack

B.

Vmware Center Server

C.

FusionCompute

D.

VMware ESX/ESXi Server

Buy Now
Questions 53

It is assumed that a portal website needs to be built to provide external services, and the elastic scaling in Fusioncloud is used.

The service can dynamically adjust the number of instances according to the business load. In addition, we may also use which of the following

some cloud services? (many)

Options:

A.

VPC

B.

EIP

C.

ECS

D.

ELB

Buy Now
Questions 54

Each project in OpenStack is composed of different components, some of which need to run

On the management node, some components need to run on the computing node. The components involved in the following description are actually

What are the items that only need to run on the management node during deployment? (many)

Options:

A.

nova-compute in the nova project

B.

neutron-server in the neutron project

C.

neutron-13-agent in the neutron project

D.

nova-scheduler in the nova project

Buy Now
Questions 55

When maintaining FusionAccess, in order to ensure the security and stability of the system, you need to pay attention to the following:

Which high-risk operations? ( many

Options:

A.

Batch delete virtual machines

B.

Replacing the infrastructure server

C.

Batch association operations on ITA

D.

Modify group policy operations on AD

Buy Now
Questions 56

The user enables the HA function on Fusioncompute. Which of the following descriptions about this function is correct an item? ( one)

Options:

A.

Configuring the cluster HA strategy is to automatically adjust the resource load balancing on different hosts

B.

Dedicated failover hosts refer to: setting a specified number of hosts in the cluster to fail, the system

Periodically check that there are enough resources left in the cluster to fail over the virtual machines on these hosts

C.

To allow host failure in the cluster refers to: Reserving a designated host as a dedicated failover host, when the host is used as a failover host, ordinary virtual machines are prohibited from starting, migrating, waking up, and snapshot recovery on the host

D.

HA resource reservation is to reserve CPU and memory resources according to the configured values ​​in the entire cluster

Buy Now
Questions 57

During the migration process, ——” is a key indicator for evaluating the migration, and the downtime includes business

Switchover time and last data increment synchronization time.

Options:

Buy Now
Questions 58

When FusionCompute installs a virtual machine operating system, which of the following methods are supported for mounting the optical drive? (many)

Options:

A.

File method

B.

to share

C.

local way

D.

remote

Buy Now
Questions 59

Database Security Service (DBSS) is an intelligent data

The library security protection service is used to ensure the security of the database on the cloud. The following description about DBSS is wrong. Which one is it? (one)

Options:

A.

In terms of database auditing, it can provide database column-level management and access activity monitoring. Senior Event Supervisor

Control includes front-to-back views of sensitive database tables and columns, allowing independent monitoring and analysis of database activity and

Right activity alert

B.

In terms of sensitive data protection, sensitive data can be automatically located and classified according to rules, and desensitization can be easily created

and audit rules to ensure users do not expose sensitive information

C.

DBSS can support multiple types of databases, including: SQL Server, MySQL, PostgreSQL, etc.

D.

In terms of database security, based on the characteristics of database firewall and separation of rights and responsibilities, it can provide detection and reporting

Alarm capability, does not support real-time intrusion prevention and fault repair functions

Buy Now
Questions 60

A company plans to migrate the virtual machine of the original Fusioncloud2.x cloud platform to FusionCloud6.x

On the cloud platform, which of the following descriptions about the migration sequence are correct? ( many)

Options:

A.

Migrate according to the order of migration risk from high to low

B.

Migrate in order of migration complexity from easy to difficult

C.

Migrate according to the order of the migration allowable interruption time from short to long

D.

Migrate according to the order of the impact of the migration on the business from small to large

Buy Now
Questions 61

(Multiple choice) A user usesTCLog in to the cloud desktop and find that the connection isTCUpUSBThe storage device cannot be read, which of the following methods can be used to troubleshoot?

Options:

A.

an examinationUSBStorage device driver version

B.

an examinationTCNetwork bandwidth to and from the cloud desktop

C.

ReplugUSBstorage device

D.

Fusion AccessPeripheral redirection policy configuration

Buy Now
Questions 62

( many Topic) The following aboutFusionComputeA description of the memory usage of physical hosts and virtual machines in258. (True or False) ManageoneIn the operation plane, the operation administrator role reserves resource pool configuration and tenant management

rights, but cannot apply for cloud resources;VDCAdmin role can manageVDCusers, projects and children withinVDC, and can also apply for cloud resources.

A True

B. False

Options:

Buy Now
Questions 63

(Multiple choice) Regarding the functions of each service in FusionSphere OpenStack, which of the following descriptions is incorrect?

Options:

A.

hostVBSprocess withOSDProcess communication exception

B.

GlanceProvides query, upload and download of virtual machine images

C.

MDCProcess exception

D.

hostVBSinternal error

Buy Now
Questions 64

In FusionSphere OpenStack, which of the following services does CPS provide?

Options:

A.

Computing resource-driven loading

B.

Graphical installation

C.

Network resource plugin loading

D.

Storage Resource Driven Loading

Buy Now
Questions 65

FusionCloudcloud server backup inCSBSService support withRegiondifferent withinAzreplication and recovery between Region

replication and local recovery, but does not support cross-Regionrecovery.

Options:

A.

True

B.

False

Buy Now
Questions 66

Which of the descriptions about Rainbow software deployment is correct? (one)

Options:

A.

Rainbow Server must be deployed.

B.

Rainbow Migrator Linux must be deployed.

C.

According to the source virtual machine to be migrated, decide whether to deploy RainbowMigrator.

D.

Rainbow Migrator Windows must be deployed.

Buy Now
Questions 67

Fusioncomputevirtual machines in andDVSrelationship, the correct.

Options:

A.

A virtual machine has multiple network cards, and each network card is associated with oneDVS BOne

B.

virtual machine and one network card, and the network card is associated with multipleDVS

C.

A virtual machine has multiple network cards, and all network cards can only be associated with oneDVS

D.

One virtual machine has one network card, and the network card can only be associated with oneDVS

Buy Now
Questions 68

OnerainbowThe server can only add one target platform

Options:

A.

correct

B.

mistake

Buy Now
Questions 69

Which of the following components is not involved in the process of Fusion access issuing virtual desktops?

Options:

A.

HDC

B.

WI

C.

ITA

D.

GaussDB

Buy Now
Questions 70

Which of the following are necessary conditions for the normal communication between the FusionCompute virtual machine and other virtual machines? (Multiple choice)

Options:

A.

Configure the correct IP address for the virtual machine

B.

Configure the gateway address for the virtual machine

C.

Configure a fixed IP address for the virtual machine

D.

Configure the correct MAC address for the virtual machine

Buy Now
Questions 71

The cloud computing platform involves a variety of software and hardware components that require operation and maintenance. Which of the following methods can be used for operation and maintenance? (name selection)

Options:

A.

web interface

B.

command line

C.

Equipment operation panel

D.

Unified management of tools

Buy Now
Questions 72

The security management mechanism of the desktop cloud FusionAccess system includes access security, user information security and

And desktop management component security. Which of the following is about user information security? (one)

Options:

A.

FusionAccess adopts the mechanism of SSL and certificate authentication for terminals to ensure that only secure terminals are

to access the desktop cloud

B.

FusionAccess supports fingerprint login authentication, dynamic password authentication, USBKey authentication, and fixed terminal

Authentication and other login methods C. The information transmission from the desktop cloud system client to the server, and the information transmission between the internal components of the system are all

Based on SSL encryption mechanism to ensure the security of information transmission

C.

FusionAccess reinforces the operating system and management system of the management server to ensure that the entire

Security of desktop cloud management system

Buy Now
Questions 73

Which of the following scenarios requires manual data backup of each service instance in FusionCloud? (many)

Options:

A.

Routine backup

B.

Before the server replaces the hard disk

C.

Before upgrading the service instance

D.

Before major business adjustments

Buy Now
Questions 74

[Judgment] Using virtualization technology, a physical server can be virtualized into multiple virtual machines, thereby Improved hardware performance of physical servers

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 75

When installing eBackup according to the template deployment method, the following error is reported " eBackup software has

not been installed.Install it before the configuation " Which of the following are possible

The reason for the error? many)

Options:

A.

The operating system does not support

B.

CNA host does not turn off NUMA

C.

The configuration file of the eBackup virtual machine is incorrectly configured

D.

The eBackup virtual machine is out of memory

Buy Now
Questions 76

Which of the following items may cause the OpenStack Cinder-volume component to be abnormal? (many)

Options:

A.

DNS configuration error

B.

Cinder-volume node time is inconsistent

C.

The back-end storage network configuration is incorrect

D.

The network of the storage management plane is abnormal

Buy Now
Questions 77

Which of the following are the functions provided by the operation plane of ManageOne? (many)

Options:

A.

VDC Management

B.

Application management

C.

Application resource monitoring

D.

project management

Buy Now
Questions 78

Which of the following descriptions about the virtual private cloud VPC in Fusioncloud are correct? ( many)

Options:

A.

VPC can realize the isolation of computing resources at the network level.

B.

Only one subnet can be created under each VPC.

C.

Each user can apply for multiple VPCs.

D.

By default, ECSs in different VPCs cannot communicate with each other.

Buy Now
Questions 79

A user needs to redeploy a set of Huawei private cloud. The following are the installation steps for FusionC1oud

Which item is in the correct order? ( one)

a. The Fusioncloud Deploy node network port communicates with the execution machine;

b. The execution machine installs FusionCloud Deploy by mounting the ISO image: c. Automatically install the basic management node;

d. Release the FusionCloud Deploy node to the KVM computing node pool;

e. Automated installation of KVM compute nodes:

f. The network port of the FusionCloud Deploy node communicates with the environment to be deployed;

g The executor uploads the software package to the FusionCloud Deploy node;

h. Automated installation of extended management nodes.

Options:

A.

a-f-h-c-g-b-e-d

B.

a-f-b-g-c-h-e-d

C.

a-f-c-b-g-h-e-d

D.

a-f-h-b-g--c-e-d

Buy Now
Questions 80

Virtual machine specification adjustment, the error is

Options:

A.

Disk capacity can be increased or decreased

B.

Memory QoS, increase or decrease memory share

C.

CPU Qos select share, reserve, limit

D.

Can add or delete network cards

Buy Now
Questions 81

In FusionCompute, when the running host where the virtual machine is located fails, the resource allocation is uneven (For example, the load is too heavy or the load is too light), etc., the virtual machine can be migrated to ensure the normal operation of the virtual machine business.

It runs normally. Which of the following descriptions about virtual machine migration in the operation and maintenance scenario is wrong? ( one)

Options:

A.

Only when the virtual machine network card is in " SRIoV " , " PF " or " PCI " pass-through mode can the hot migration function be supported.

B.

During virtual machine live migration, if the migrated virtual machine has a large business volume or a large memory usage, it will lead to the hot migration time is longer, and it is recommended to perform hot migration when the business volume is small

C.

When the load of most hosts is too light, the virtual machines can be integrated by live migration to reduce the number of hosts. Improve resource utilization and achieve energy saving and emission reduction

D.

By default, the system interface will prompt a timeout when the hot migration time exceeds 12 hours, but the internal heat. The migration task timeout period is 24 hours, and the live migration will not be terminated until the system times out.

Buy Now
Questions 82

Which tool can agree to monitor physical devices in a data center in a cloud DC

Options:

A.

FusionCare

B.

G-ray

C.

FusionNetDoctor

D.

eSight

Buy Now
Questions 83

The FusionCloud solution is part of Huawei ' s public cloud products.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 84

Virtualization technology can virtualize one server into multiple virtual machines, thereby improving performance

Options:

A.

True

B.

False

Buy Now
Questions 85

What type of templates does FA not support?

Options:

A.

linked clone

B.

full copy

C.

Fast packaging

D.

high performance desktop

Buy Now
Questions 86

Fusion compute virtual machine supports the first full permanent incremental backup

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 87

RainbowBlock-level migration supports expansion and shrinkage, while file-level migration only supports expansion, not shrinkage.

Options:

A.

True

B.

False

Buy Now
Questions 88

FusionSphereIn the private cloud solution, a host is powered off abnormally.mongodbService exception. At this point, you can clear

mongodb ERRORnode data, restartmongodb, which automatically synchronizes the data and completes the recovery

Options:

A.

True

B.

False

Buy Now
Questions 89

During the deployment and implementation of the FusionAccess gateway and load balancer, if the user logs in to the self-service maintenance gateway, the It shows that there is no gateway available, which of the following reasons cannot be caused?

Options:

A.

There is a firewall in the network, and the firewall is not allowed to pass throughvAGservice port.

B.

ITAconfigure onvAGofIPwrong address.

C.

vAGconfigure onHDCwrong port.

D.

vAGAfter the component was installed, the service did not start.

Buy Now
Questions 90

existFusionAccessIn the scenario, the local administrator account of the domain account cannot be deletedOU, possibly because theOUThe properties of

" Prevent objects from being accidentally deleted " are checked

Options:

A.

wrong

B.

right

Buy Now
Questions 91

Which of the following is incorrect about the description of the physical network of FusionSphere OpenStack?

Options:

A.

Virtual machines can use the physical network directly

B.

The physical network defines the mapping relationship between the virtual network and the host network interface

C.

The physical network is mapped to a physical network port or a bonded physical interface on the host

D.

Virtual machines on different physical hosts can communicate with each other through the same physical network

Buy Now
Questions 92

In progressFusionSphereWhen hardware deployment of a server virtualization cloud platform, which of the following is the recommended order of hardware deployment in

the cabinet from bottom to top?

Options:

A.

Storage---Server---Switch

B.

Storage---Switch---Server

C.

Server---Storage---Switch

D.

Server---Switch---Storage

Buy Now
Questions 93

In FusionSphere OpenStack, which network plane addresses can be used to log in to the CPS interface?

Options:

A.

Internal Base

B.

External API

C.

External OM

D.

External Base

Buy Now
Questions 94

(Multiple Choice) AboutFusionAccessTypes of desktop virtual machines, which of the following statements is incorrect?

Options:

A.

Quickly encapsulated virtual machines are faster than fully replicated virtual machines because there is no decapsulation process when they are created, and domains have been added in advance

B.

A full-memory virtual machine means that the entire virtual machine runs in memory

C.

Linked clone parent volumes are at most128indivual

D.

The changes of user data on the complete copy virtual machine cannot be saved, and the shutdown restore and one-click restore functions are supporteD.

Buy Now
Questions 95

In FusionCloud, the cloud fortress can provide terminal security protection services and database security protection. Protection capabilities, such as providing intrusion detection and defense, data desensitization, data auditing, fault repair and other security protection capabilities to ensure the security of related services.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 96

In Huawei Fusioncompute, it is necessary to modify a certain disk of the virtual machine. Which of the following operations can be implemented?

(single choice)

Options:

A.

Change the status of the disk from available to unavailable

B.

Change the mode of the disk from slave to independent-persistent

C Change the capacity of the disk from 80G to 8G

D Change the configuration mode of the disk from thin to normal

Buy Now
Questions 97

Which of the following options is incorrect about the memory description in Fusion Compute?

Options:

A.

When the memory hot add strategy is enabled, reduce the memory value and need to modify it offline

B.

When the memory hot add policy is not enabled, the virtual machine increases the memory value and needs to be restarted to take effect

C.

When the memory hot add policy is not enabled, it needs to be modified offline when adjusting the memory QoS

D.

When the memory hot add policy is enabled, increase the memory value and take effect online

Buy Now
Questions 98

Which of the following scenarios is not applicable to FusionCompute snapshots? single choice)

Options:

A.

business patch upgrade

B.

Business Destruction Test

C.

long-term preservation of business data

D.

Major business changes

Buy Now
Questions 99

On the operation side, what rights does the first-level VDC administrator have?

Options:

A.

Publish child VDC products

B.

Manage own and child VDC resources

C.

Assign or unassign the external network of the primary VDC

D.

Manage child VDCs, including projects and users in child VDCs

Buy Now
Questions 100

RainbowWhat are the supported boot methods for the source virtual machine?

Options:

A.

in the case ofWindowsoperating system, only supportedUEFI

B.

in the case ofWindowsoperating system that supports bothUEFIandBIOS

C.

in the case ofLinuxoperating system that supports bothUEFIandBIOS

D.

in the case ofLinuxoperating system, only supportedUEFI

Buy Now
Questions 101

In the scenario where FusionSphere OpenStack is connected to KVM and FusionCompute, the description of virtual machine creation is as follows:

Which of the following is incorrect?

Options:

A.

in dockingFusionComputein the scene,HA,DRS, thermal migration and other advanced features areVRMto fulfill

B.

The creation methods of virtual machine cloud disks are different in two scenarios

C.

nova-computepasslibvirtinterface to completeKVMCreation of virtual machines

D.

in dockingFusionComputeIn the scene, thenova- schedulerto schedule to decide which one to chooseCANHost

Buy Now
Questions 102

When using Rainbow to migrate a Windows virtual machine, which port is used by the destination virtual machine to Receive data sent by the source VM? ( one)

Options:

A.

8899

B.

8900

C.

445

D.

22

Buy Now
Questions 103

In the FusionCloud private cloud environment, the elastic IP service refers to the

Binding of associated cloud hosts in the network, so that business resources in the VPC can pass through a fixed public IP address

Provide external access services or access the public network. The following description about elastic IP binding cloud host, error

Which is it?

Options:

A.

When using the routing network to search for the cloud host network card, the list only displays the cloud host network card corresponding to the network

B.

When using the IP address to search for the cloud host network card, if the cloud host network card corresponding to the entered IP address is not

Bind the elastic IP, the search result is all the network cards under the cloud host that can be bound to the elastic IP

C.

When using the IP address to search for the cloud host network card, if the input IP address corresponds to the cloud host network card

The elastic IP has been bound, the search result is empty

D.

When the elastic IP of one cloud host belongs to the same external network, these cloud hosts need to apply for external external network, cannot directly share the bandwidth of the same external network

Buy Now
Questions 104

FusionCloud supports the capability of one cloud and multiple pools, and supports heterogeneous virtualization. VMware and KVM virtualization.

The pool can be connected to the same Az for easy scheduling and management.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 105

What hardware requirements to meet when installing rainbow migration server

Options:

A.

CPU: 4nuclear and above

B.

memeory: total memory4Gand above

C.

disk, the installed partition must have4Gabove available space

D.

GPU: Tesla T4

Buy Now
Questions 106

Which of the following descriptions about FusionCompute virtual machine snapshot recovery is incorrect?

( one)

Options:

A.

A virtual machine can have multiple snapshots.

B.

If a certain disk mode of the virtual machine is " independent-persistent " or " independent-non-persistent " , use fast

When the restorer is used, the data on the disk will not be restored.

C.

Using the existing snapshot of the virtual machine, the data of the virtual machine can be restored to the state when the snapshot was created.

D.

If the virtual machine deletes the port group where the network card of the virtual machine is located after the snapshot is created, the

When the original virtual machine is used, the deleted port group will also be restored.

Buy Now
Questions 107

If three single-disk virtual machines share a data storage with a capacity of 10GB, which of the following situations are possible?

Options:

A.

The actual occupied space of the virtual machine disk is: 4GB, 3GB, 5GB

B.

The virtual machine disk sizes are: 8GB, 9GB, 7GB

C.

The data storage is non-virtualized data storage, and the size of the virtual machine disk is: 4GB, 3GB, 5GB

D.

The virtual machine disk sizes are: 3GB, 4GB, 12GB

Buy Now
Questions 108

Which of the following virtual machine descriptions is wrong? (single choice)

Options:

A.

The virtual machine template format is divided into two types: ova and ovf

B.

An ovf template consists of an ovf file and a vhd file

C.

Templates can be created by converting an existing virtual machine to a template, cloning a virtual machine template, or cloning an existing template

D.

A template is a copy of a virtual machine, including operating system, application software and virtual machine specifications

Buy Now
Questions 109

Which of the following information is mainly monitored by the FusionAccess gateway (multiple choice)

Options:

A.

Gateway basic information

B.

Virtual Machine Usage Information

C.

Basic information of components

D.

User connection information

Buy Now
Questions 110

Which of the following descriptions about the host storage interface in Fusion compute is incorrect?

Options:

A.

You can manually add host storage interfaces, or you can add host storage interfaces in batches

B.

Currently, Huawei ' s host storage interface can support IPv4 protocol and IPV6 protocol

C.

The host storage interface needs to be added before adding FC-SAN storage

D.

Add multiple host storage interfaces to realize multi-path transmission of storage

Buy Now
Questions 111

A customer plans to use Rainbow to migrate Windows virtual machines of the Hyper-V virtualization platform.

Moved to FusionCloud platform, the following description about using Rainbow to migrate Windows scenarios is wrong

Which items are wrong? (multiple choice)

Options:

A.

After the migration is completed, the system time of the virtual machine is the same as that of the source

B.

Windows basic disk becomes dynamic disk after migration

C.

After the migration, the network card driver, network card MAC, and IP address will change

D.

After the host that joined the domain is migrated, it needs to rejoin the domain

Buy Now
Questions 112

When using Rainbow to migrate virtual machines to HCS, which of the following operations are feasible? (many)

Options:

A.

When the source terminal is a Windows virtual machine and port 445 is not opened, the migration task can also be completed by manually installing WinSrcAgent.

B.

While migrating the virtual machine, you can upgrade the version of Centos, for example, upgrade Centos 6.5 to Centos7.0.

C.

The source virtual machine IP address can use IPv4 or IPV6.

D.

The firmware type of the source virtual machine is UEFI. When registering the corresponding image, you need to check the UEFI option.

Buy Now
Questions 113

The source platform supported by Rainbow can be x86 architecture or Kunpeng architecture (judgment)

Options:

A.

TRUE

B.

FLASE

Buy Now
Questions 114

In Huawei FusionCompute, if a virtual machine is bound to a host, which of the following functions will it be affected? (multiple choice)

Options:

A.

DRS

B.

snapshot

C.

Thermal migration

D.

Memory hot add

Buy Now
Questions 115

In a FusionCloud private cloud, configure a VPC service instance by creating a VPC service instance

The network services meet the needs of different business applications. The following descriptions about VPC related concepts are wrong

Which one is it?

Options:

A.

SNAT network service meets the needs of using a small number of public network IPs to access the external network

B.

Provide a secure and isolated network environment, and create subnets in VPC

C.

The virtual machine under Type I can communicate with the DC external device through the dedicated line service and can be automatically configured by the system

D.

Realize three-layer intercommunication between different isolated domains such as web, APP, and DB through VPC Peering

Buy Now
Questions 116

After the user installs the Linux system for the virtual machine on FusionCompute, it is found that the virtual machine has no Law start. Which of the following is wrong about the reasons why this virtual machine cannot be started?

Options:

A.

The virtual machine disk is damaged

B.

Tools are not installed on the virtual machine

C.

Insufficient memory on the physical host

D.

Startup mode configuration error

Buy Now
Questions 117

Which of the following descriptions about FusionAccess desktop distribution is wrong? (one)

A " Pool " refers to a group of people sharing a set of virtual machines, often used in scenarios such as call centers.

B. " Exclusive " refers to one virtual desktop per person, often used in scenarios such as call centers.

C. Support two allocation modes: exclusive allocation and pool allocation

D. " proprietary " refers to one virtual desktop per person, commonly used in OA office and other scenarios

Options:

Buy Now
Questions 118

The following aboutFusionAccessIn the description of the virtual machine disk configuration mode during fast provisioning, which options are correct?

Options:

A.

When the virtual machine template is a full copy template, the configuration mode must be normal delay zero

B.

When the virtual machine template is a full copy template, the configuration mode is recommended to be normal delay zero.

C.

When the virtual machine template is a linked clone template, the configuration mode is recommended to be thin

D.

When the virtual machine template is a linked-clone template, the configuration mode must be condensed Correct

Buy Now
Questions 119

(Multiple choice) The following aboutFusioncomputeTo delete the description of the security group, which option is incorrect?

Options:

A.

There is no virtual machine in the security group. If there is a virtual machine in the security group, you need to move the virtual machine out of the security group

B.

The authorization behavior between the security group to be deleted and other security groups does not affect the removal operation

C.

Except for a security group to which the virtual machine belongs, other security groups are not affected by the virtual machine

D.

After the security group is deleted, all security group rules in the group are deleted at the same time

Buy Now
Questions 120

Authentication-related services in OpenStack are provided by the keystone project, and keystone’s own back-end storage

The storage is driven by SQL by default, and it also provides the docking capability of other heterogeneous storages, such as Connecting to LDAP is convenient for unified management and maintenance of identity information data within the enterprise.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 121

In FusionCloud, the following description about the deployment of cinder-volume components is wrong which items? (many)

Options:

A.

HBA card is required when connecting to FC--SAN. In this scenario, cinder-volume can be deployed in virtual In the virtual host

B.

There is no need to deploy the image-cache partition when deploying the cinder-volume host

C A set of cinder-volume (at least one node) connected to only one storage pool

C.

cinder-volume can only be deployed on the control node

Buy Now
Questions 122

The FusionAccess system supports the function of backup and recovery. The following about FusionAccess recovery

Description of the policy, which items are correct? (many)

Options:

A.

If the operating system of the infrastructure server fails, you can create a new server and reinstall the software

And use the backup data on the backup server for data recovery

B.

If there is a failure caused by some or all software of the infrastructure server, it is necessary to reinstall the software and take advantage of it.

Data recovery using backup data on the backup server

C.

The recovery strategy includes software reinstallation recovery and system reinstallation recovery

D.

If you need to restore WI data, you must use the system reinstallation recovery method

Buy Now
Questions 123

FusionCompute can create virtual machines through virtual machine templates to achieve rapid deployment of virtual machines.

Which of the following is NOT a way to make a template? (one)

Options:

A.

The virtual machine is converted into a template

B.

Snapshots are converted to templates

C.

Virtual machine clone as template

D.

Template file import as template

Buy Now
Questions 124

In the FusionCloud private cloud scenario, which of the following descriptions about virtual machine live migration are correct?

item? (many)

Options:

A.

Live migration requires that the Hypervisor types on the destination host and the source host are the same

B.

If the virtualization type of the available partition where the virtual machine is located is " Vmware " , it supports cold and hot migration functions

C.

If the virtualization type of the available partition to which the virtual machine belongs is " FusionCompute " , it is not supported to use

Batch cold and hot migration capabilities

D.

Cross-AZ hot migration of virtual machines is not supported, only cross-AZ cold migration of virtual machines is supported

Buy Now
Questions 125

Create a memory snapshot of the virtual machine in FusionCompute, which can be used to save and restore the memory of the virtual machine memory status. Which of the following virtual machine operations will affect the normal creation of virtual machine memory snapshots? ( many)

Options:

A.

The virtual machine is upgrading Tools

B.

virtual machine online increase network card

C.

The virtual machine is set to sleep state

D.

virtual machine live migration

Buy Now
Questions 126

In order to ensure the security of data in the actual production environment, data backup technology is used;

To ensure the continuity of the service and the availability of the system, the disaster recovery technology is used. The following describes the different disaster recovery and backup schemes.

Which statement is correct? ( one)

Options:

A.

Local high availability disaster recovery can cope with data center failures such as power failures and building fires.

B.

Remote disaster recovery can deal with logical errors such as operational errors, upgrade failures, and software defects.

C.

Disaster recovery in different places can deal with regional disasters such as turmoil and natural disasters.

D.

The data backup system can deal with equipment failures such as disk failure, application interruption, and data damage.

Buy Now
Questions 127

In Huawei ' s private cloud FusionCloud, the CMP role is FushionSphere OpenStack.

It is responsible for resource abstraction, resource allocation and scheduling, and application lifecycle management.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 128

FusionCare has two functions: health inspection and information collection. Which of the following information collection modes are available some items? (many)

Options:

A.

Collection by scene

B.

Collect by component

C.

Collection by account

D.

to collect by time period

Buy Now
Questions 129

In the FusionSphere server virtualization backup scenario, the following describes the eBackup backup process:

Which one is wrong? ( one)

Options:

A.

When using snapshot comparison technology for incremental backup, it is necessary to retain snapshot data on the production side

B.

Use CBT technology for incremental backup, which saves storage space compared to snapshot comparison.

C.

CBT technology will not be used during the first full backup

D.

When using CBT technology for incremental backup, snapshot technology will not be involved

Buy Now
Questions 130

In FusionCloud, if a user wants to connect to an RDS instance, which type of cloud service must be created first? (one)

Options:

A.

OBS

B.

ECS

C.

EVS

D.

EIP

Buy Now
Questions 131

【 Single choice 】 During the operation and maintenance phase of Fusion Compute, the operator

You should pay attention to related high-risk operations to avoid business losses. The following descriptions about Fusioncompute related operations:

Which one is wrong?

Options:

A.

Modifying the IP address of the clock source server 1 will automatically restart the business process of the VRM and the host, affecting the current business operate

B.

Manually restarting the VRM node database will cause the database to be lost and cause the task to become unresponsive

C.

Modifying the password of the internal docking account will not affect the business operation but will cause all accounts to be unable to log in

D.

Enabling the IP and MAC binding function in the port group will cause some 1P addresses of the network card to communicate abnormally

Buy Now
Questions 132

In the FusionCloud private cloud scenario, the following descriptions about NAT gateway related concepts are correct. What are the items? ( many)

Options:

A.

There are four types of NAT gateways: small, medium, large and extra large

B.

To create a NAT gateway, you must specify the VPC, subnet, and NAT gateway specifications where the NAT gateway is located

C.

The specifications of the NAT gateway will affect the maximum number of connections and the number of new connections per second of the SNAT function, and the data throughput

The amount is determined by the bandwidth of the Elastic IP

D.

The set composed of five elements: destination IP address, destination port, and transport layer protocol is regarded as a DNAT connect

Buy Now
Questions 133

There are two main technical indicators for disaster recovery, RTO is the recovery time objective, RPO is the recovery point objective, the following

Which statements about the two technical indicators are correct? ( many)

Options:

A.

RTO is infinitely close to 0. Even if synchronous replication is used, the business still needs some time,

B.

The smaller the RTO value, the less data is lost

C.

The smaller the RPO value, the smaller the service interruption time.

D.

In theory, RPO can be equal to 0. When disaster recovery or backup uses synchronous replication, the same

Step data, RPO can be achieved equal to 0.

Buy Now
Questions 134

The desktop cloud can completely replace the traditional physical desktop and realize the refined management and control of the enterprise desktop.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 135

The incremental backup of eBackup uses differential incremental backup. Compared with cumulative incremental backup, Minimal data needs to be copied.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 136

Backing up different components in the FusionAccess system requires different backup settings. by

Which of the following descriptions about the backup settings corresponding to each component is correct? ( many)

Options:

A.

When backing up DNS, you need to configure DNS information in the " Alarm Component " of FusionAccess

B.

When backing up VLB components, you need to configure VLB information in FusionAccess " Monitoring Components "

C.

When backing up DHCP, you need to configure DHCP information in the " Alarm Component " of FusionAccess

D.

When backing up AD, in FusionAccess " System Management > Initial Configuration > Domain/OU " , the

" Enable Backup " is set to " Yes "

Buy Now
Questions 137

The following description of the local backup processing process of the KVMNRM cloud server in the CSBS architecture is correct. What are the items? ( many)

Options:

A.

eBackup Workflow calls the Swift interface to create a volume snapshot and activates it with snapshot consistency

B.

eBackup Workflow calls the Cinder backup interface to notify eBackup Server to perform volume backup

C.

eBackup Workflow calls Nova interface to obtain cloud server metadata

D.

CSBS Karbor initiates task scheduling and notifies eBackup Manager to perform full backup of the cloud server

Buy Now
Questions 138

The ManageOne operation and maintenance plane provides the unified log function. Which of the following log types does the unified log support? (many)

Options:

A.

Management side operation log

B.

Operation log

C.

Security log

D.

Tenant operation log

Buy Now
Questions 139

When deploying FusionCloud Type l, network nodes need to deploy various components to realize SDN,

Which of the following components need to be deployed on network nodes? (many)

Options:

A.

DMK

B.

vRouter

C.

FusionSphere OpenStack

D.

L3 NAT

Buy Now
Questions 140

Which of the following items will cause the failure to create a VM in FusionCloud R6? ( many)

Options:

A.

The image_cache partition space of the computing node is insufficient

B.

Disk type configuration error

C.

VMTools is not installed in the mirror

D.

The label of the flavor does not match the label of the host group

Buy Now
Questions 141

Huawei Desktop Cloud launched a sub-HD mapping desktop solution, which can support a variety of high-definition mapping software.

According to its 3D display implementation principle, which of the following technologies are mainly used? (Multiple)

Options:

A.

graphics workstation management

B.

GPU hardware virtualization

C.

GPU pass-through

D.

Device redirection

Buy Now
Questions 142

FusionAccess fails to issue a virtual machine. Which of the following methods can be used to locate the fault? (many)

Options:

A.

Look at the FusionAccess system error message

B.

View the FusionAccess log

C.

View system alarms

D.

Check whether the AccessAgent version of the virtual machine matches the version of the FusionAccess system

Buy Now
Questions 143

ManageOne ServiceGenteron cloud hostingVNCThe login window fails to pop up. Which of the following are possible reasons?

Options:

A.

already atFusionComputeinterface usageVNCLog in to the cloud host

B.

Browser version is too low

C.

The browser ' s document mode is not set wrong

D.

JavaIncorrect security level setting

Buy Now
Questions 144

In useRainbowconductWindowsAfter the virtual machine is migrated, the implementer finds that the migrated virtual machine does not have a network card. What is the possible reason?

Options:

A.

automatic installationUVP toolsThe destination virtual machine is not restarted after

B.

The source virtual machine does not have a network card.

C.

The destination virtual machine is not installedUVP tools.

D.

No NIC was created when the destination virtual machine was created

Buy Now
Questions 145

Disaster recovery protects business, and backup protects data.

Options:

A.

Truel

B.

False

Buy Now
Questions 146

(Multiple choice) The following aboutFusionComputeWhich option is incorrect to store descriptions of related concepts?

Options:

A.

A physical storage device can be used as a storage resource.

B.

VHDIs the virtual machine disk file format.

C.

Data storage can beIP SAN,FCSAN,NASWait.

D.

Storage devices correspond to logical units in physical storage, such asLUN

Buy Now
Questions 147

( Judgment question ) IfFusionComputeThe virtual machine is not installedTools,You cannot query the memory usage of the virtual machine.

Options:

A.

True

B.

False

Buy Now
Questions 148

The operation and maintenance administrator can passManageOneWhich interface to use in the operation and maintenance planeFusionNetDoctortool?

Options:

A.

Centralized alarm

B.

Operation and maintenance map

C.

Safety

D.

System Management

Buy Now
Questions 149

( Single choice )( FusionAccessmiddlelicenseWhere is the remainder deducted?

Options:

A.

After getting the list of virtual machines

B.

After the pre-connection is successful

C.

Get the login interface

D.

After authentication

Buy Now
Questions 150

Disaster recovery is to restore the system or business from the failure or paralysis caused by the disaster to the normal operating state, and the activities and

processes designed, the national standard level of disaster recovery capability is divided into6class,PTO/RPO There is a slight correlation with the disaster recovery

capability level. Which of the following options describes the correlation is wrong?

Options:

A.

Disaster Recovery Capability Level2level correspondenceRTOfortwenty fourhours or more,RPOfor1day to day7sky.

B.

Disaster Recovery Capability Level1level correspondenceRTOfor2days or more,RPOfor1day to day7sky

C.

Disaster Recovery Capability Level Up CorrespondenceRTOfor12hours or more,RPOhours to1sky.

D.

Disaster Recovery Capability Level4level correspondenceRTOhours to2sky,RPOhours to2skycorrect

Buy Now
Questions 151

Windows If the operating system runs for a long time, there may be insufficient memory and process occupancy CPU. The problem of slow system operation caused by excessive resources, so it is recommendedFusionAccessSystem administrators can3--5Restart user VMs in batches every day.

Options:

A.

True

B.

False

Buy Now
Questions 152

(Multiple choice) IfFusionComputevirtual machineAwere ablepingpass virtual machine. Which of the following results can be inferred from this?

Options:

A.

virtual machineAand virtual machineBare configured correctlyIPaddress

B.

virtual machineAand virtual machineBrun on the same physical machine

C.

virtual machineAand virtual machineBThe same network segment is useD.

D.

virtual machineAand virtual machineBDifferent network segments are used.

Buy Now
Questions 153

[Judgment] In the disaster recovery service,RPOis the amount of data lost,RPOThe smaller, the less amount of data is lost, RPO theoretically can be0, but not actually0;RTOrefers to the interruption time of the business,RTOThe smaller, the shorter the time of business interruption,RTOtheoretically0.

Options:

A.

correct

B.

False

Buy Now
Questions 154

in HuaweiFusionCloud6.3solution,APIWhat authentication methods does the gateway include?

Options:

A.

AK/SK

B.

IAM

C.

Username Password

D.

Token

Buy Now
Questions 155

Which of the following descriptions about FusionCloud troubleshooting are correct? (multiple choice)

Options:

A.

If you want to perform some major operations during the troubleshooting process, you should back up the relevant databases, alarm information and log files, etC.

B.

Fault handling should comprehensively consider the possibility and time cost of the corresponding operation to restore business success.

C.

The principle is to restore the system as soon as possible.

D.

When determining the fault handling party, you should first evaluate the impact and give priority to ensuring the normal operation of the business.

Buy Now
Questions 156

The port configuration of a Huawei switch is as follows:interface XGigabitEthernet0/0/4

port link-type trunk port trunk allow-pass vlan 16 17

Based on the above configuration, which of the following descriptions is correct?

Options:

A.

Data frames that do not contain any tags will be added when passing through this portvlan 16orvan 17tag and forward.

B.

Data frames that do not contain any tags will be discarded when passing through this port.

C.

Includevlan 16When the data frame of the label passes through the port, the label will be stripped and forwarded.

D.

Includevan 17The tagged data frame will be forwarded by the reserved tag well when passing through the port.

Buy Now
Questions 157

Compared with traditional physical desktops, which of the following are the characteristics of cloud desktops?

Options:

A.

desktop standardization

B.

mobile office

C.

Terminal and data isolation

D.

automated scheduling

Buy Now
Questions 158

The user is makingFusionAccessWhen linking a clone virtual machine template, it prompts to installHDAfail. This phenomenon may be caused by which of the following reasons?

Options:

A.

The virtual machine used to make the template was not obtainedDNSaddress.

B.

The virtual machine operating system used to make the template andHDANot compatible.

C.

A virtual machine that is templated with children has multiple disks.

D.

The virtual machine used to make the template did not get the correct oneIPaddress.

Buy Now
Questions 159

(Single choice question) InFusionaccessDuring the process of provisioning virtual desktops, which of the following components will check whether the specified virtual

group and desktop group exist?

Options:

A.

GaussDB

B.

HDA

C.

ITA

D.

HDC

Buy Now
Questions 160

(Multiple choice questions) Fusion accessWhich of the following domain configuration information is included when creating a virtual machine template?

Options:

A.

OU

B.

domain account

C.

Computer name

D.

domain name

Buy Now
Questions 161

(Multiple choice) The following aboutFusionAccessAppend the description of the virtual machine user, which option is incorrect?

Options:

A.

The added user must be the same as the " User Login Name " set when creating the virtual machine user

B.

The added user can be a user that does not exist in the domain controller

C.

When adding multiple users, separate the accounts with commas

D.

When setting the permission group of the newly added user, only " Users " andAdministrators”Optional

Buy Now
Questions 162

( Multiple Choice ) In HuaweiFusion sphere Openstack middle,SwiftResponsible for providing object storage services. Which of the following advantages does its architecture have?

Options:

A.

Fully symmetrical system architecture

B.

Extremely high data persistence

C.

Extremely scalable

D.

very little delay

Buy Now
Questions 163

( Multiple Choice ) AboutFusionAccess, Which of the following statements is true?A. Thin provisioning is recommended for linked-clone virtual machines

B. Normal delay zeroing is recommended for full replication of virtual machines

CLinked-clone virtual machines must use thin provisioning

D. Fully replicated virtual machines must be zeroed with normal delay

Options:

Buy Now
Questions 164

Which allocation type is a fully replicated virtual machine of which allocation cannot be restored after deallocation?

Options:

A.

single user

B.

pooled user

C.

static multi-user

D.

Dynamic Multi-User

Buy Now
Questions 165

the following about HuaweiFusionSphere OpenStackmiddleGlance, CinderandSwiftWhich of the three descriptions is correct?

Options:

A.

To create a virtual machine instance fromGlanceQuery image information

B.

Image files do not need to be changed frequently, and are more suitable for storing inSwiftmiddle.

C.

Glancemust useSwiftAs a backend storage for images.

D.

The volume data of the virtual machine instance is updated frequently and is more suitable for storing inCinder

Buy Now
Questions 166

(Multiple choice questions) FusionaccessWhich of the following logs are collected during system failure?

Options:

A.

User VM logs

B.

User terminal log

C.

Fusioncomputerun log

D.

LinuxInfrastructure virtual machine running log

Buy Now
Questions 167

(Multiple choice questions) Manangeone OperationcenterIn, what are the capabilities provided by cloud resource capacity management?

Options:

A.

Capacity Statistics Report

B.

Capacity warning

C.

capacity analysis

D.

Capacity monitoring

Buy Now
Questions 168

Which of the following descriptions about FusionCompute memory virtualization is incorrect?

Options:

A.

Applications requesting virtual memory can be0Shenzhen begins.

B.

Memory virtualization technology can achieve memory over-allocation.

C.

FusionComputeSupports memory hardware-assisted virtualization technology to reduce memory virtualization overheaD.

D.

The virtual memory requested by the application is contiguous.

Buy Now
Questions 169

in HuaweiFusionCloud 6.3 Type lmiddle,PODWhich of the following options is equivalent in scope?

Options:

A.

AZ

B, Region

B.

a cascaded layerOpenStack

C.

Global

Buy Now
Questions 170

(Multiple Choice) In FusionCompute, when adding shared storage to multiple hosts, which of the following operations is correct?

Options:

A.

Check all hosts when initializing storage resources

B.

When the shared storage type is IP SAN, ensure that the storage network of the host and the business interface of the storage are connected. C. Check the corresponding host when adding data storage

C.

Check all hosts when associating storage devices

Buy Now
Questions 171

In order to match the customer organization model,ManageOneHow many levels can be supported at mostVDC?

Options:

A.

4

B.

3

C.

2

D.

5

Buy Now
Questions 172

Monitor resource pools to help administrators monitor centrallyManageOne. The overall situation of various resources under the system, which of the following resource data is not supported by resource pool monitoring?

Options:

A.

multi-level cloud

B.

laasresource pool

C.

Alresource pool

D.

Big data resource pool

Buy Now
Questions 173

In fuisoncompute, after the virtual machine is assigned to a specific host, some of the following functions are affected?

Options:

A.

DPM

B.

HA

C.

DRS

D.

reboot

Buy Now
Questions 174

FusionAccessProvisioning of linked-clone virtual machines fails. Which of the following reasons cannot be the cause?

Options:

A.

Fusion Acces the number of concurrent users has reached the maximum limit

B.

The virtual machine template was deleted by mistake

C.

FusionComputePlatform failure

D.

ADServer exception

Buy Now
Questions 175

Which of the following processing policies does FusionCompute support when a Windows virtual machine blue screen occurs? (multiple choice)

Options:

A.

do not handle

B.

Restart the virtual machine

C.

HAvirtual machine

D.

Shut down the virtual machine

Buy Now
Questions 176

OpenstackAs the most popular open source cloud operating system platform, which of the following cloud computing service models belong to?

Options:

A.

DaaS

B.

PaaS

C.

IaaS

D.

Saas

Buy Now
Questions 177

Which of the following descriptions about FusionAccess log collection is correct? (Multiple Choice)

Options:

A.

able to passsshLog in to the user VM to collect logs.

B.

can be collectedGuessDBThe database service check log and database operation log.

C.

able to passgandalfusersshLog inLinuxThe system infrastructure virtual machine virtual machine, and then copy the component logs to the local.

D.

LinuxSystem logs are generally in /var/logUnder contents.

Buy Now
Questions 178

BringGPUPass-through virtual machines do not support live migration.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 179

In useRainbowspecialwindowsMigrating virtual machines toHCSIn the platform scenario, which parameters of the destination virtual machine need to be configured by the migration personnel when creating a migration task?

Options:

A.

The port used by the destination virtual machine to communicate with the source virtual machine

B.

The number of disks of the destination virtual machine

C.

The disk capacity of the destination virtual machine

D.

destination virtual machineIPaddress

Buy Now
Questions 180

Virtual machine snapshot, generally used when the virtual machine is faulty before upgrading, patching, testing and other destructive tests, and the snapshot can be used to quickly restore the virtual machine.

Options:

A.

True

B.

Fault

Buy Now
Questions 181

ManageOneThe operation plane provides a resource ordering interface, and third-party platforms can create, change, extend, and delete cloud resources by calling the ordering interface.

Options:

A.

True

B.

False

Buy Now
Questions 182

HuaweiFusionSphere OpenStackimprovedOpenstackAvailability of infrastructure, which of the following components are usedActive-ActivetField Department Chang way? (multiple choice)

Options:

A.

nova-api

B.

KeyStone

C.

HAProxy

D.

RabbitMQ

Buy Now
Questions 183

Which of the following scenarios is not suitable for improvingFusionComputeMemory reuse ratio?

Options:

A.

Virtual machine memory utilization is low

B.

While ensuring performance, customers require a single host to host the maximum number of virtual machines

C.

Reduce customer hardware procurement costs

D.

In commercial scenarios, the memory reuse rate has reached150%

Buy Now
Questions 184

If a tenant needs to deploy multiple applications at one time, which of the following methods is recommended for automatic orchestration?

Options:

A.

application group

B.

Serve

C.

stack

D.

cluster

Buy Now
Questions 185

The following aboutFusionComputemiddleDVSFor the description of the uplink, which options are correct? (Multiple choice)

Options:

A.

The same bound network port can be set to differentDVSthe uplink.

B.

—indivualDVSThere can only be one uplink.

C.

Uplinks are used for virtual machine data uplinks.

D.

The same binding port can only be set to a certain oneDVSthe uplink.

Buy Now
Questions 186

(Multiple choice) The following aboutFusionComputemiddleDRSDescription of the feature, which option is incorrect?

Options:

A.

Scheduling policies can be precisely set according to daily, weekly and monthly time periods

B.

Automatically achieve relative load balance of hosts in the cluster according to the scheduling policy

C.

The scheduling algorithm is reasonable, taking into account the change trend of the host load, avoiding the virtual machine oscillating and migrating back and forth on the host

D.

Does not support real-time manual scheduling by administrators

Buy Now
Questions 187

A maintenance engineer wishes to perform regular or periodic inspections on FusionCompute, and send the It is recommended that maintenance engineers use the product to check the health of the system and open the email send function. (Please fill in the English letters of the tool)

Options:

Buy Now
Questions 188

Ebackup only supports data backup in virtualization scenarios, eReplication supports both physical machines and virtual machine disaster recovery

Options:

A.

Correct

B.

False

Buy Now
Questions 189

If the virtual machine in FusionCompute does not have Tools installed, which of the following functions can be implemented? (one)

Options:

A.

Safely shut down the virtual machine

B.

Virtual machine live migration

C.

Configure the IP address for the virtual machine

D.

Create a snapshot of the virtual machine

Buy Now
Questions 190

In FusionCompute, what is the north-south flow of business data?

A The virtual machines in the data center access each other

B. Traffic generated by customers accessing the data center through the Internet

C. Cross-data center mutual access between virtual machines

D. Virtual machine live migration

Options:

Buy Now
Questions 191

The sequence design of business migration is very important. The following description of the sequence of business migration is correct

What are the items? (multiple choice)

Options:

A.

According to the impact on the business from small to large

B.

According to the business interruption time from short to long

C.

According to business complexity, from easy to difficult

D.

According to the migration risk from low to high

Buy Now
Questions 192

FusionSphereWhat are the typical configurations of physical switches on the service plane in a virtual machine scenario?

Options:

A.

port speed limit

B.

Port Mode Configurationtrunk

C.

LA, CPload balancing

D.

Port Mode ConfigurationAccess

Buy Now
Questions 193

In today ' s IT industry, the amount of data is growing rapidly, new; regulations are constantly introduced, in order to prevent data Loss, the protection business can be quickly switched after an accident, continue to work normally, the business will be designed when planning Disaster recovery and backup solutions, which of the following statements about disaster recovery and backup is false? ( one)

Options:

A.

If there is only disaster recovery, the production side has wrong operations, or the system upgrade fails, etc., it will be Synchronizing to the disaster recovery side will also cause data or business interruption.

B.

The backup is generally performed periodically. Once the data is damaged, the data will be restored from the recovery time to the last backup time. data in between will be lost.

C.

If there is only backup, the business cannot be recovered quickly, and data recovery takes time. During this time, the business cannot be used. For a certain industry, such business interruption cannot be tolerated.

D.

If there is only disaster recovery, business can be quickly recovered and data can be protected.

Buy Now
Questions 194

Which of the following operations does the running virtual machine in FusionCompute support?

Options:

A.

Export as template

B.

Convert to template

C.

clone the virtual machine

D.

clone as template

Buy Now
Questions 195

In the user login connection process of the FA, the virtual machine list cannot be obtained after user authentication, which cannot be the following which component caused it?

Options:

A.

GaussDB

B.

ITA

C.

HDC

D.

WI

Buy Now
Questions 196

An enterprise plans to deploy FusionCloud, when the business storage FusionStorage adopts the ———— deployment method

During deployment, you need to manually install and configure the storage node operating system.

Options:

Buy Now
Questions 197

Use the Rainbow tool to migrate a third-party platform ' s x86-architecture Linux virtual machine to When using the FusionCompute platform, the following descriptions of the ports involved in the migration process are correct:

Options:

A.

445, the destination virtual machine mounts the LiveCD

B.

7443, create a destination virtual machine

C.

443, send a snapshot creation command

D.

1880, log in to the migration server remotely and issue a migration task

Buy Now
Questions 198

In FusionCloud, the virtual group policy includes anti-affinity, affinity, weak anti-affinity and

There are four types of weak affinity. Which of the following descriptions about the virtual group policy is correct? ( many)

Options:

A.

Affinity means that virtual machines in the same virtual group must coexist on the same host

B.

Weak affinity refers to the fact that the host used for virtual machine scheduling in the group has sufficient resources, and the affinity

strategy remains consistent

C.

Weak anti-affinity refers to the fact that the host used for virtual machine scheduling in the group has sufficient resources to interact with the anti-affinity

Be consistent with sexual strategy

D.

Anti-affinity means that virtual machines in the same virtual group cannot coexist on the same host

Buy Now
Questions 199

Which of the following is the correct process for FusionAccess to issue a fully replicated virtual machine? (one)

①Check whether the IP of the virtual machine is reachable; ②Create a virtual machine; ③Add the user to the desktop group; ④Add the virtual machine Domain

Options:

A.

2431

B.

2341

C.

2134

D.

2143

Buy Now
Questions 200

In Huawei ' s disaster recovery solution, aboutVRGdescription, which of the following is correct?

Options:

A.

Created and configuredVRGAfter that, create a snapshot for it immediately to prevent unavailability caused by misoperation

B.

when oneVRGWhen the load requirement cannot be met, it needs to be addedVRG.addedVRGCannot be created by cloning, can only be deployed by template

C.

When using the storage replication disaster recovery method, you need toFusionComputedeployVRG

D.

When using the host replication disaster recovery method, only theVRGofCANOnly virtual machines on the host can be protected

Buy Now
Questions 201

(multiple choice)FusionSphere OpenStackBy which of the following dimensions can a logical host befc-nova-computePerform performance evaluation, select the logical host with the best overall performance, and schedule cluster resources?

Options:

A.

vCPUUtilization

B.

vCPUreservation rate

C.

remaining memory resources

D.

vCPUremaining resources

Buy Now
Questions 202

(Multiple Choice) In HuaweiBCManager eBackupmiddle,CBTIt is one of the ways to achieve backup. The backup method used in the

first backup is full backup. For different backup objects, the content of the backup is different. Which of the following descriptions are correct?

Options:

A.

The backup object isLUNwhen theLUNAll data in the storage pool to which it belongs are backed up

B.

When the backup object is a host, back up all the data of the host

C.

When the backup object is a virtual machine, the first backup will back up all data on all disks of the virtual machine

D.

When the backup object is a virtual machine disk, the first backup will back up all the data on the disk.

Buy Now
Questions 203

FusionComputeuseIP SANStorage, probabilistic failure when creating disk, which of the following may cause this failure?

Options:

A.

Data consistency check is enabled on the storage resource

B.

storage interfaceVLAN IDwrong setting

C.

LUNbad block

D.

Configure a separate network plane to host virtualizationSANStore heartbeat traffic

Buy Now
Questions 204

(multiple choice)FusionSphereIn the server virtualization scenario, user services are networked separately, and which of the following network planes must be connected to

the computing node host?

Options:

A.

storage plane

B.

management plane

C.

VIMScontrol plane

D.

business plane

Buy Now
Questions 205

HuaweiBCManager eBackupWhich of the following objects can be backed up?

Options:

A.

in a protected environmentLUN

B.

Host disks in protected environments

C.

Virtual machine disks in a protected environment

D.

Virtual Machines in Protected Environments

Buy Now
Questions 206

(Multiple Choice) Which of the following components areFusionAccessRequired components for desktop cloud?

Options:

A.

LIC

B.

TCM

C.

ITA

D.

HDC

Buy Now
Questions 207

An engineer is working on Huawei for a customerBCManager eBackupDuring the backup design, it was found in the demand survey that the production storage usedFusionStorage, which of the following networking methods is more suitable for this customer?

Options:

A.

LAN-Free

B.

LAN-Base

C.

Server-Less

D.

Server-Free

Buy Now
Questions 208

(multiple choice)ManageOne OperationCenterIn which of the following ways is the alarm data synchronized from the lower management system?

Options:

A.

SNMP Trap

B.

SMTP

C.

Timed query (HTTPS)

D.

FTP

Buy Now
Questions 209

In the FusionSphere private cloud solution, you can view the used and available resources of the host group in the host group list. When the number of available resources in the host group is less than the sum of the available resources of each host in the host group, it means that the host group has there is a host with resource overcommit.

Options:

A.

True

B.

False

Buy Now
Questions 210

The customer service call center uses the Huawei desktop cloud solution. Which of the following desktops is recommended?

Options:

A.

full copy desktop

B.

Application Virtualization Shared Desktop

C.

GPUdesktop.

D.

Linked-clone desktop

Buy Now
Questions 211

(Multiple choice) Which of the following principles must be followed when collecting cloud computing fault information?

Options:

A.

Any maintenance operation must be authorized by the customer, any operation beyond the scope of customer approval is prohibited

B.

The fault information must be collected by the customer himself, and the engineer can only guide the operation

C.

The transfer of problem location data out of the customer network must be authorized by the customer

D.

Use information gathering tools such asFusionCare)Before, you should proactively provide the customer with an explanation of the tool

Buy Now
Questions 212

FusionStorage Block " Alarm " VBSFailed to load metadata " , which of the following are possible causes?

Options:

A.

MDCProcess exception

B.

hostVBSinternal error

C.

hostVBSprocess withOSDProcess communication exception

D.

OSDProcess exception

Buy Now
Questions 213

When deploying HUAWEI Desktop Cloud Network, which component should be deployed on the management plane?

Options:

A.

HDC

B.

DHCPserver

C.

VAG

D.

desktop virtual machine

Buy Now
Questions 214

The reasons for the failure to log in to the FusionAccess management system do not include which of the following?

Options:

A.

ITAService exception

B.

username or password is incorrect

C.

Incompatible browser version

D.

WIService exception

Buy Now
Questions 215

(multiple choice) inFusionComputeFailed to start the virtual machine, which of the following measures can be taken to fix the failure?

Options:

A.

Take the host out of maintenance mode

B.

Recreate a virtual machine with the same specifications

C.

Check the remaining storage space to ensure that there is enough storage space

D.

Repair the host network link

Buy Now
Questions 216

ManageOne Operation CentermiddlekeystoperAfter the configuration is complete,FusionSphere OpenStack. The connection will be automatically completed in the interface.

Options:

A.

True

B.

False

Buy Now
Questions 217

In a FusionSphere server virtualization scenario, if you add a host to a cluster where IMC has been set up, the host supports. The supported CPU feature set must be equal to or lower than the CPU feature set set by the cluster IMC.

Options:

A.

wrong

B.

right

Buy Now
Questions 218

FusionSphereIn a server virtualization scenario, if you configureHAFunction; Which of the following configuration suggestions for storage is correct?

Options:

A.

Shared storage is connected to theFusionSphere, all hosts in the server virtualization platform

B.

Shared storage directly connected to the host

C.

Shared storage is connected to all hosts in the cluster through switches

D.

Use local storage

Buy Now
Questions 219

If a storage device is configured with8open1Gb/sofiSCSIstorage card,15%the network bandwidth consumption, which of the following methods can calculate the effective bandwidth of the storage device (Mb/s) ?

Options:

A.

8x1024x0.15

B.

8x1024x1024x0.15

C.

8x1024x(1-0.15)

D.

8x1024x1024x(1-0.15)

Buy Now
Questions 220

(Multiple Choice) AboutFusionSphereOf the four supported disk configuration modes, which of the following descriptions are correct?

Options:

A.

Virtualized storage supports normal disks, thin disks, and normal delayed-zeroed disks

B.

Raw device disks willSANphysical storageLUNDirectly as a disk, bound to the business virtual machine for use

C.

Non-virtualized storage of block storage only supports ordinary disks and raw device disks

D.

NASStorage supports normal, thin disks and raw device disks

Buy Now
Questions 221

(multiple choice)FusionStorage BlockFailed to create control cluster, which of the following might be the reasons for this failure?

Options:

A.

SSLInvalid certificate

B.

Active and standbyFusionStorage Managernetwork exception

C.

FusionStorage ManagerresidualMDCprocess

D.

The time of each host node is not synchronized

Buy Now
Questions 222

Which of the following is incorrect about the description of the cloud server disaster recovery service in the FusionSphere private cloud solution?

Options:

A.

After the cloud service data center is built, customers can apply for cloud server disaster recovery services to ensure the business continuity of the cloud server. The whole process does not require administrators to operate in the background

B.

Storage layer replication disaster recovery technology used by server disaster recovery service

C.

In order to provide cloud server disaster recovery services, the back-end storage needs to enable the remote replication function

D.

In order to provide cloud server disaster recovery services, the storage used by the protected cloud server can beAdvancedSAN

Buy Now
Questions 223

A Company by300For the sake of information security, Company A hopes to centrally control the data generated during the office process of employees, and reduce the IT The workload of the operation and maintenance personnel to deal with the problem of office computer software and hardware failure, please suggest. Which of the following

solutions does the company use?

Options:

A.

eBackupbackup

B.

FusionAccessdesktop cloud

C.

FusionSphereServer virtualization

D.

FusionSpherePrivate Cloud

Buy Now
Questions 224

FusionCloudcloud server backup inCSBSThe service can not only backup and restore all cloud hard disks of the cloud server, but also back up and restore some cloud hard disks of the cloud server.

Options:

A.

True

B.

false

Buy Now
Questions 225

If the computing node of FusionCompute has only two 10GEx network cards, which of the following networking methods should be used to store the IP SAN? more suitable?

Options:

A.

Willeth0,eth1The binding is in load sharing mode, and both the management plane and the storage plane follow this mode.Bond, configure link aggregation on the

interconnected switch

B.

eth0go manage traffic,eth1Send storage traffic, connect to the switch and configure link aggregation

C.

Willeth0,eth1Binding to active/standby mode, both the management plane and the storage plane follow this modeBond, the interconnected switch is not configured with link aggregation

D.

eth0go manage traffic,eth1For storage traffic, the interconnected switch is not configured with link aggregation

Buy Now
Questions 226

In Huawei BCManager eBackup, LAN-Free can only be used for SAN storage, and LAN-Base can only be used for non-SAN storage

Options:

A.

True

B.

False

Buy Now
Questions 227

(Multiple choice) in use Rainbow, When migrating, which of the following descriptions about the applicable scenarios of file-level migration and block-level migration are correct?

Options:

A.

Block-level migration for hosts with low source disk usage

B.

File-level migration is suitable for scenarios that need to expand or reduce the capacity of the destination disk

C.

The destination partition structure of block-level migration needs to be consistent with the source side.

D.

Block-level migration is suitable for hosts with a large number of small files at the source

Buy Now
Questions 228

FusionSphere OpenStack OMWhen creating a specification, if virtual machine hugepages are set, thenNUMAAffinity is enabled by default.

Options:

A.

wrong

B.

right

Buy Now
Questions 229

Update ToolProvide upgrade and patch update functions. Currently supported products do not include which of the following?

Options:

A.

FusionAccess

B.

FusionStorage

C.

FusionInsight

D.

FusionManager

Buy Now
Exam Code: H13-531_V2.0
Exam Name: HCIE-Cloud Computing (Written) V2.0
Last Update: May 17, 2026
Questions: 765

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now H13-531_V2.0 testing engine

PDF (Q&A)

$54.99  $157.11
buy now H13-531_V2.0 pdf