Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following Huawei Desktop Cloud components is not recommended for single-node deployment in a production environment?

A.

ITA

B.

TCM

C.

WI

D.

HDC

Full Access
Question # 5

(multiple choice) aFusionComputeThe cluster where the virtual machine is located is powered onHAfunction, in which of the following scenarios, the virtual machine does not fail after a failureHAto other hosts in the cluster?

A.

virtual machineHApolicy is enabled

B.

Virtual machines run on shared storage mounted to all hosts in the cluster

C.

Binding the virtual machine to the host

D.

The virtual machine is created in a specificCNAsAnswer on the host's local disk

Full Access
Question # 6

(multiple choice)ManageOne OperationCenterWhich of the following user login authentication modes are supported?

A.

LDAPAuthentication

B.

remote authentication

C.

HTTPAuthentication

D.

local authentication

Full Access
Question # 7

(multiple choice)FusionAccessmiddleHDPWhich of the following operating systems can the client support?

A.

Linux

B.

Windows

C.

Android

D.

MacOS

Full Access
Question # 8

The following aboutFusionAccessThe description of the daily operation and maintenance specification, which option is incorrect?

A.

Pay attention to the number of unregistered users. If there is a large area of unregistered users, analyze the reasons and handle them urgently.

B.

LicenseIf it is about to expire, you need to process it in time and apply for a new oneLicense

C.

Storage resource and computing resource usage exceeds100%After that, start the expansion task

D.

Emergency alarms such as server heartbeat abnormality, restart, and data service abnormality need to be handled in time.

Full Access
Question # 9

In the FusionSphere private cloud solution, users can apply for cloud hard disk backup to realize local backup of cloud hard disks backup and recovery.

A.

True

B.

False

Full Access
Question # 10

Which of the following is incorrect about the description of the Huawei Cloud Computing Troubleshooting Tool?

A.

Update ToolsasFusionsphereperformance monitoring and analysis system, regularFusionsphereCloud computing infrastructure is not

implemented to collect data and build models for analysis

B.

Vnc viewerMade by HuaweiWindowsFree installation under the systemVNClogin tool

C.

passCLIInformation such as system running time, restart records and command operation records can be collected

D.

Fusion CareHealth check and information collection function answers can be provided

Full Access
Question # 11

For CVMs with shared volumes mounted on FusionCloud, it is not supported to apply for CVM backup CSBS service instances and cloud server high-availability CSHA service instances.

A.

True

B.

False

Full Access
Question # 12

Which of the following is deleteFusionComputeCorrect steps to store resources in ?

○1Deleting or migrating virtual machine disks

○2Disassociate host

○3delete storage resource

○4Destroy the data store

A.

1--->2--->3--->4

B.

1--->4--->2--->3

C.

3--->2--->4--->1

D.

2--->4--->1--->3

Full Access
Question # 13

(multiple choice)FusionSphere OpenStackBy which of the following dimensions can a logical host befc-nova-computePerform performance evaluation, select the logical host with the best overall performance, and schedule cluster resources?

A.

vCPUUtilization

B.

vCPUreservation rate

C.

remaining memory resources

D.

vCPUremaining resources

Full Access
Question # 14

Which of the following is impossible regarding the correspondence between FusionAccess virtual groups and desktop groups?

A.

Virtual Group (Full Replication) - Desktop Group Type (Dynamic Pool)

B.

Virtual Group (Linked Clones) - Desktop Group Type (Static Pool)

C.

Virtual Group (Full Copy) - Desktop Group Type (Proprietary)

D.

Virtual Groups (Linked Clones) - Desktop Group Type (Proprietary)

Full Access
Question # 15

In FusionSphere OpenStack, which network plane addresses can be used to log in to the CPS interface?

A.

Internal Base

B.

External API

C.

External OM

D.

External Base

Full Access
Question # 16

In Huawei BCManager eBackup, what are the advantages of snapshot comparison technology compared to CBT technology?

A.

Snapshots can be saved on the production side to better protect data

B.

It takes longer to get information about data changes

C.

Supports backup of virtual machines using Huawei distributed storage

D.

Takes up less space on the production side

Full Access
Question # 17

huawei full memory desktop10 TailorDeduplication compression technology forVDIIt is specially optimized with the memory medium, while deduplication and compression, it also ensures the real-time and consistency of data interaction

A.

True

B.

False

Full Access
Question # 18

In the user login connection process of FusionAccess, which of the following steps occurs after consuming the license?

A.

After the pre-connection is successful.

B.

HDCreturnLogin ticketafter

C.

TCAfter the side initiates a connection request.

D.

DBReturn to the virtual machineIPstatus and other information.

Full Access
Question # 19

FusionStorage Block"Alarm"VBSFailed to load metadata", which of the following are possible causes?

A.

MDCProcess exception

B.

hostVBSinternal error

C.

hostVBSprocess withOSDProcess communication exception

D.

OSDProcess exception

Full Access
Question # 20

(Multiple Choice) Which of the following descriptions are correct regarding the correspondence between desktop groups and virtual groups in the Huawei Desktop Cloud solution?

A.

"The "linked clone" virtual machine group uses the "static pool" desktop group. When the user logs in for the first time, the desktop group will randomly assign a virtual

machine to bind the user.

B.

"The "Linked Clone" virtual machine group uses the "Dynamic Pool" desktop group. When a user logs in for the first time, the desktop group will randomly assign a virtual

machine to bind the user.

C.

""Full Replication" virtual groups correspond to "private" desktop groups, including "static multi-user" and "single-user"

D.

"Linked-clone" virtual groups correspond to "private" desktop groups, which include "static multi-user" and "single-user"

Full Access
Question # 21

FusionCloudcloud server backup inCSBSThe service can not only backup and restore all cloud hard disks of the cloud server, but also back up and restore some cloud hard disks of the cloud server.

A.

True

B.

false

Full Access
Question # 22

(Multiple Choice) If FusionComputeport group inVLAN IDset as10, then which of the following options is correct?

A.

Passing through the port group with non-VLAN 10Dataframe of labels to drop

B.

There is no bandwidth for passing through the port groupVLANLabel the data frameVLAN 10forwarded after the tag.

C.

Passing through the port group with non-VLAN 10Label the dataframe to change the label toVLAN 10then forwardeD.

D.

to pass through the port group withVLAN 10The labeled data frame is forwarded after de-labeling.

Full Access
Question # 23

When there are many desktop cloud users, the average network bandwidth required per user is more; when the number of desktop cloud users is small, the average network bandwidth required per user is less.

A.

True

B.

False

Full Access
Question # 24

Which of the following are the license authorization modes of Huawei Desktop Cloud?

A.

Number of virtualized desktops

B.

Number of physical servers

C.

User number

D.

concurrent users

Full Access
Question # 25

In FusionCloud, the --- component in the cloud server backup service CSBS is responsible for saving and

Schedule backup policies, and provide an AP1 interface for connecting to the cloud management platform. (Please fill in the full English name of the component)

Full Access
Question # 26

Which tool can agree to monitor physical devices in a data center in a cloud DC

A.

FusionCare

B.

G-ray

C.

FusionNetDoctor

D.

eSight

Full Access
Question # 27

When the operation and maintenance engineer conducts network equipment inspection, it is necessary to check the operation status and link status of network equipment every time state, which of the following operations are in compliance with the network equipment inspection standards for operation and maintenance engineers (multiple choice)

A.

Before the inspection, it is necessary to obtain the consent of the customer and operate it when the business volume is low

B.

It is recommended to log in to each device to collect the alarm information of each device

C.

Submit a report to the customer after the inspection is completed, and propose improvement suggestions to the customer

D.

The inspection process completes the network inspection according to the standard, and outputs the inspection report

Full Access
Question # 28

In the FusionCloud private cloud environment, the elastic IP service refers to the

Binding of associated cloud hosts in the network, so that business resources in the VPC can pass through a fixed public IP address

Provide external access services or access the public network. The following description about elastic IP binding cloud host, error

Which is it?

A.

When using the routing network to search for the cloud host network card, the list only displays the cloud host network card corresponding to the network

B.

When using the IP address to search for the cloud host network card, if the cloud host network card corresponding to the entered IP address is not

Bind the elastic IP, the search result is all the network cards under the cloud host that can be bound to the elastic IP

C.

When using the IP address to search for the cloud host network card, if the input IP address corresponds to the cloud host network card

The elastic IP has been bound, the search result is empty

D.

When the elastic IP of one cloud host belongs to the same external network, these cloud hosts need to apply for external external network, cannot directly share the bandwidth of the same external network

Full Access
Question # 29

When using the Rainbow. tool for online migration of windows, the Rainbow. tool will push the Agent to Source host, collect OS and hardware information. Which of the following descriptions about Agent is correct? (many select)

A The process of installing Agent needs to rely on the source host. NET components, if the source host. NET components are incomplete or damaged

Bad, the installation will fail, which can be fixed by reinstalling the .NET components.

B. Before installing the Agent, it is necessary to enable the DICP service of the source host in advance, and the Agent will call the DICP service during the installation process.

DHCP assigns a temporary IP address to the source host. C. After installing the Agent, register it as a system service "Hconvertoragent Service" and bind it

Port listening on port 8899

D. Remotely call the source host WNI component through RPC to install the Agent installation package.

Full Access
Question # 30

An enterprise plans to deploy FusionCloud, when the business storage FusionStorage adopts the ———— deployment method

During deployment, you need to manually install and configure the storage node operating system.

Full Access
Question # 31

Backing up different components in the FusionAccess system requires different backup settings by which of the following descriptions about the backup settings corresponding to each component is correct? ( many)

A.

When backing up DHCP, you need to configure DHCP information in the "Alarm Component" of FusionAccess

B.

When backing up AD, in FusionAccess "System Management > Initial Configuration > Domain/OU", the

"Enable Backup" is set to "Yes"

C.

When backing up DNS, you need to configure DNS information in FusionAccess "Alarm Component"

D.

When backing up VLB components, you need to configure VLB information in FusionAccess "Monitoring Components"

Full Access
Question # 32

Data center overview, resource pool overview, and multi-level cloud resources are preset in the operation and maintenance plane of ManageOne

Four Dashboards for overview and VDC resource details. Which of the following descriptions about the 4 Dashboards are correct?

Exactly? ( many)

A.

The resource pool overview shows the number of physical devices on the entire network in the data center, the number of devices in each region, the number of servers

Status, cloud service provisioning statistics, resource allocation and other information.

B.

The data center overview shows the number of network resources of the data center, the number of resources in each region, and the allocation of resources and other information.

C.

The overview of multi-level cloud resources shows the number of resources in the entire network of the data center, the number of resources in each region, and the allocation of resources other information

D.

VDC resource details show the total number of data centers and VDCs, as well as the scale and resource distribution of VDCs.

matching information.

Full Access
Question # 33

The correct option for the agentless feature description of ebackup is

A.

No need to install agent on VRM

B.

No need to install the agent on the backup storage

C.

No agent needs to be installed on the protected virtual machine

D.

No need to install an agent on the CNA

Full Access
Question # 34

Which of the following types of security services does not require a client to be installed in the cloud host operating system?

A.

Database Security Services

B.

Program Run Authentication Service

C.

Host Security Services

D.

border firewall

Full Access
Question # 35

During the FusionManager maintenance phase, it is forbidden to pass the FusionManager during normal business operation.

Modify the time zone and daylight saving time on the interface, otherwise the FusionManager service will be restarted.

A.

TRUE

B.

FALSE

Full Access
Question # 36

During the desktop distribution process by FusionAccess, IP configuration supports two methods: DHCP and static allocation.

A.

TRUE

B.

FLASE

Full Access
Question # 37

VLB is an indispensable component in the Fusion access system

A.

TRUE

B.

FALSE

Full Access
Question # 38

During the desktop cloud maintenance process, the operation and maintenance engineers regularly sequence and restart the infrastructure according to the business. The following is about regular.

What is wrong with restarting the infrastructure virtual machine?

A.

After restarting the ITA master node, the service being issued will be interrupted. It is recommended to restart without the service being issued.

B.

The time period for restarting the virtual machine cannot conflict with the time period of other automatic scheduled tasks

C.

In the scenario where the desktop access service passes through the gateway, restarting the virtual machine of the active or standby VAG/LB node does not affect the use of the connected users

D.

In the scenario where the desktop access service does not pass through the gateway, restarting the virtual machine of the main VAGNLB node does not affect the use of the connected users

Full Access
Question # 39

ManageOne operation and maintenance page statistics can count the visits of common tasks, operation and maintenance maps, and quick-access functions statistics, help administrators to count the frequency of common operation and maintenance tasks, and help administrators to optimize the settings of the operation and maintenance map page; access statistics Can I view those visit statistics?

A.

Quick Access Statistics

B.

Statistics of common tasks

C.

global resource statistics

D.

Operation and maintenance map statistics

Full Access
Question # 40

When using FusionCompute to modify the system management plane VLAN fails, when the VRN is deployed on the physical server.

When the management plane VLAN of the VRM node and host can be modified manually, the administrator needs to

What are the prerequisites? (multiple choice)

A.

The login user name and password of the VRMI node or host BNC system of the VLAN to be modified have been obtained.

B.

The "root" user password of the VRM node or host of the VLAN to be modified has been obtained.

C.

The VRM node or host version to be modified has been obtained.

D.

The BMC IP address of the VRM node or host of the VLAN to be modified has been obtained.

Full Access
Question # 41

When using Huawei BCManager eBackup for data backup, only the backup storage type is SAN

storage and NAS storage.

A.

TRUE

B.

FALSE

Full Access
Question # 42

Is the description of the distributed virtual switch DVS in FusionCompute correct?

A.

Can connect to multiple servers

B.

Can be equipped with multiple virtual ports

C.

Each virtual machine can only connect to one DVS

D.

Multiple UPLink ports can be configured

Full Access
Question # 43

There are two indicators for disaster recovery, RTO and RPO, which are correct (multiple choice)

A.

A service fails at 7:05, the service is restored at 7:30, the restored service data is the data at 7:00, and the RTO is 30 minutes

B.

A service fails at 7:05, the service is restored at 7:30, the restored service data is the data at 7:00, RPO for 30 minute

C.

A service fails at 7:05, the service is restored at 7:30, the restored service data is the data at 7:00, and the RPO is 5 minutes

D.

A service fails at 705, the service is restored at 7:30, the restored service data is the data at 7-00, and the RTO is 25 minutes answer

Full Access
Question # 44

Which of the following functions does CPU virtualization in Fusioncompute support? (multiple choice)

A.

Support heterogeneous servers

B.

CPU resource over-allocation

C.

QOS

D.

Support Windows and Linux virtual machines to increase CPU online

Full Access
Question # 45

If the virtual machine in FusionCompute does not have Tools installed, which of the following functions can be implemented? (one)

A.

Safely shut down the virtual machine

B.

Virtual machine live migration

C.

Configure the IP address for the virtual machine

D.

Create a snapshot of the virtual machine

Full Access
Question # 46

During the daily operation and maintenance work, a series of preliminary preparations are often required to ensure the smooth operation and maintenance work. Which of the following is the preliminary preparation information that needs to be done? (multiple choice)

A.

Human Matrix

B.

Account Information

C.

Alarm handling

D.

Environmental Information

Full Access
Question # 47

Virtualization technology can virtualize one server into multiple virtual machines, thereby improving performance

A.

True

B.

False

Full Access
Question # 48

Which of the following are necessary conditions for the normal communication between the FusionCompute virtual machine and other virtual machines? (Multiple choice)

A.

Configure the correct IP address for the virtual machine

B.

Configure the gateway address for the virtual machine

C.

Configure a fixed IP address for the virtual machine

D.

Configure the correct MAC address for the virtual machine

Full Access
Question # 49

Which data on the FusionCompute host is usually forwarded using the management port? (single choice)

A.

Business virtual machine live migration command

B.

Business virtual machine data disk data

C.

Business virtual machine system disk data

D.

Business virtual machine memory access data

Full Access
Question # 50

The cloud computing platform involves a variety of software and hardware components that require operation and maintenance. Which of the following methods can be used for operation and maintenance? (name selection)

A.

web interface

B.

command line

C.

Equipment operation panel

D.

Unified management of tools

Full Access
Question # 51

ServiceCenter supports viewing measurement data in units of resource types, and counts the measurement results.

for billing usage. Which of the following descriptions about ServiceCenter user charge metering is correct?

item?

A.

Temporary cloud disks generated during the backup process, and snapshots used for backup, ServiceCenter will also measure it

B.

If the cloud host has multiple computing SLAs, statistics are calculated based on the rate corresponding to each computing SLA during metering.

Sum of all calculated SLA fees

C.

Cloud hosts managed by ServiceCenter and cloud hosts issued by MANO, if using private

Created by Grid, ServiceCenter also supports metering of cloud hosts

D.

The user has created a cloud host or cloud disk on MANO (Management and Orchestration)

By default, ServiceCenter will count the cloud host or cloud hard disk statistics issued by MANO at 0:00 every day volume data

Full Access
Question # 52

The administrator uses Fusioncompute to block the pauses that do not need attention. When a masked alarm is generated, it will not It will be displayed on the real-time alarm interface, which can be queried and masked through conditional search in historical alarms. The configuration includes which of the following in some ways?

A.

Block by ID

B.

mask by time

C.

Mask by object and ID

D.

Shield by type

Full Access
Question # 53

Enterprise business scenarios sometimes need to use bare metal servers. The following is about the use of bare metal servers.

Which of the descriptions of the scene is wrong?

A.

Performance computing/AI scenarios

B.

The business load changes greatly in a short time / blog website application

C.

Core database scenarios of precious metal transactions in the financial industry

D.

big data analysis

Full Access
Question # 54

In the early stage of migration, it is necessary to investigate and evaluate the business to be migrated.

What are the contents? (many)

A.

Applied Relationship Analysis

B.

Migration strategy

C.

Risk assessment

D.

Business log analysis

Full Access
Question # 55

If there is a problem with the HDC process, you need to use the command service---restart to restart

Full Access
Question # 56

The following description about deploying the gateway/load balancer in the FusionAccess desktop cloud is correct

Which items are there? (many)

A.

A load balancer is used to distribute users' HTTP(S) requests to different WIs

B.

The load balancer can automatically perform health checks on W! to ensure that all user requests can be allocated

WI used

C.

When deploying a VAG, according to different user access types, there are intranet user access and external/public network access.

Two deployment scenarios for user access

D.

When the gateway and load balancer deployment scheme adopts F5, VAG / VLB can also be installed

Full Access
Question # 57

【Single Choice】 Which of the following types of ACLs does not support in the virtual firewall rules in FusionCloud parameters?

A.

Action

B.

Agreement

C.

source, destination hostname

D.

port

Full Access
Question # 58

A FusionAccess system maintenance engineer is performing data recovery operations on the ITA server. by

Which of the following descriptions about ITA data recovery is correct? ( many)

A.

The copy task in the recovery process can be completed by the remote copy software WinSCP

B.

It can be verified whether the ITA service is restored by checking whether the ITA alarm is eliminated and whether the desktop can be issued normally.

no success

C.

There is no need to uninstall and then reinstall the ITA during the recovery process

D.

After the ITA data is restored, the data from the backup time to the restore time will be lost

Full Access
Question # 59

In the Huawei FusionCloud 6.3 solution, which of the following are the disaster recovery services that tenants can apply for?

work? (many)

A.

CSDR

B.

VBS

C.

VHA

D.

CSBS

Full Access
Question # 60

Which of the following descriptions about port groups in FusionCompute are correct? ( many)

A.

There are two types of A port group: common and trunk.

B.

A port group can be configured with multiple IP addresses.

C.

A port group is a distributed virtual switch.

D.

All virtual ports in the port group have the same attributes

Full Access
Question # 61

The Neutron project provides network services in OpenStack. In native scenarios, virtual

The internal communication of a single node and the communication of virtual machines across nodes need to be supported by the virtual machine network inside the physical host.

Among them, the virtual network bridge (or virtual machine switch) is a kind of important homogeneous element in the virtual network, and carries the control

A series of flow tables issued by the level, such as

The virtual bridge is implemented by --- open source software. (Please fill in the English abbreviation)

Full Access
Question # 62

A company plans to migrate the virtual machine of the original Fusioncloud2.x cloud platform to FusionCloud6.x

On the cloud platform, which of the following descriptions about the migration sequence are correct? ( many)

A.

Migrate according to the order of migration risk from high to low

B.

Migrate in order of migration complexity from easy to difficult

C.

Migrate according to the order of the migration allowable interruption time from short to long

D.

Migrate according to the order of the impact of the migration on the business from small to large

Full Access
Question # 63

In FusionCloud, the following description about the deployment of cinder-volume components is wrong which items? (many)

A.

HBA card is required when connecting to FC--SAN. In this scenario, cinder-volume can be deployed in virtual In the virtual host

B.

There is no need to deploy the image-cache partition when deploying the cinder-volume host

C A set of cinder-volume (at least one node) connected to only one storage pool

C.

cinder-volume can only be deployed on the control node

Full Access
Question # 64

A university plans to deploy a set of Huawei FusionAccess in the electronic reading room in response to the requirements of informatization development

Desktop cloud. Based on the above scenario, which of the following statements are correct? ( many)

A.

The desktop group type of virtual desktop is recommended to be "exclusive"

B.

The virtual desktop type is recommended to be linked clone

C.

The recommended desktop group type for virtual desktops is "Dynamic Pool"

D.

The virtual desktop type is recommended to be a complete copy

Full Access
Question # 65

When maintaining FusionAccess, in order to ensure the security and stability of the system, you need to pay attention to the following:

Which high-risk operations? ( many

A.

Batch delete virtual machines

B.

Replacing the infrastructure server

C.

Batch association operations on ITA

D.

Modify group policy operations on AD

Full Access
Question # 66

Create a memory snapshot of the virtual machine in FusionCompute, which can be used to save and restore the memory of the virtual machine memory status. Which of the following virtual machine operations will affect the normal creation of virtual machine memory snapshots? ( many)

A.

The virtual machine is upgrading Tools

B.

virtual machine online increase network card

C.

The virtual machine is set to sleep state

D.

virtual machine live migration

Full Access
Question # 67

In the process of operation and maintenance management, the relevant functional components of the data center can be accurately identified, and the

Design capabilities, define monitoring indicators that match the technical characteristics of the component, and through active and passive management,

Ensure the normal operation of each management component of the data center to the greatest extent. The above describes the four operation and maintenance objectives of the data center.

______ in the bid

Full Access
Question # 68

In the Huawei FusionCloud 6.3 solution, what types of tasks does FusionCare support?

(many)

A.

Information collection

B.

Ping packet detection

C.

health check

D.

Troubleshooting

Full Access
Question # 69

When the physical host in Fusioncompute fails, which of the following functions can guarantee the business continuous

A.

Restart the virtual machine

B.

Virtual machine HA

C.

virtual machine hibernation

D.

virtual machine live migration

Full Access
Question # 70

The security management mechanism provided by FusionAccess includes access security, user information security and desktop management.

Manage component security. Deploy antivirus software on user virtual machines to prevent user virtual machines from being attacked by viruses,

This belongs to the security mechanism - security.

Full Access
Question # 71

After adding on the Rainbow server and passing the source check, it can be displayed on the source details page What information? ( many)

A.

Source network card information

B.

Source disk information

C.

Source username and password information

D.

The version number of the destination cloud platform compatible with the source

Full Access
Question # 72

In the FusionSphere server virtualization backup scenario, the following describes the eBackup backup process:

Which one is wrong? ( one)

A.

When using snapshot comparison technology for incremental backup, it is necessary to retain snapshot data on the production side

B.

Use CBT technology for incremental backup, which saves storage space compared to snapshot comparison.

C.

CBT technology will not be used during the first full backup

D.

When using CBT technology for incremental backup, snapshot technology will not be involved

Full Access
Question # 73

FusionNetDoctor, also known as network traffic diagnosis, is for operation and maintenance personnel to detect the network field.

Which can detect traffic in which of the following scenarios? ( many)

A.

East-west traffic detection between the tenant's two virtual machines

B.

Tenant's VM-to-VM Elastic IP (EIP) traffic inspection

C.

Access traffic detection from the client computer to the ELB on the cloud

D.

Inspection of access traffic from client computers to virtual private network services (VPNs) on the cloud

Full Access
Question # 74

If the new virtual machine of FusionCompute uses the vhost-user type (DPDK) network card, it needs to be which of the following conditions are met? (many)

A.

The host where the virtual machine is located has completed the huge page configuration and takes effect

B.

The cluster where the virtual machine is located has been set to a high-performance cluster

C.

Turn on the IMC mode of the cluster where the virtual machine is located

D.

A distributed switch of the user-mode switching mode type has been created

Full Access
Question # 75

In the Huawei Fusioncloud private cloud scenario, the VPC can provide a secure and isolated network environment for the VDC, and provide network resources for applications or virtual machines in the VDC. The following about lans+ service planning PC the description of the Console node, which items are correct? (many)

A.

Provide VPC WEB interface service

B.

The Console node is deployed in two clusters and connected to NGINX for load balancing

C.

The configuration information used to store the deployment mode of user business data

D.

Provide the transparent transmission function of the WEB interface

Full Access
Question # 76

In the FusionCloud environment, with the changes of the business, the usage rules for the ECS resources of the elastic cloud server are regulated.

The requirements of the grid will also change, and the ECS specifications need to be adjusted as needed in a timely manner to improve resource utilization. the following

In the description of ECS-related resource changes, which one is wrong? (Single) A. The memory resources allocated to the ECS can be reduced

B. VCPU resources allocated to ECS can be reduced

C. The disk capacity mounted on ECS can be reduced

D. Multiple NICs bound to ECS can be uninstalled

Full Access
Question # 77

[Single choice] There are a batch of linked clone virtual desktops in a FusionAccess site that need to be personalized data, which of the following measures cannot meet the needs of the office?

A.

Turn on the switch of shutdown and restore

B.

Configure a separate data disk for the VM

C.

Use shared file storage to save personalized data

D.

Use AD's data roaming feature to save personalized data

Full Access
Question # 78

In the exclusive type mode, is the process of allocating user virtual machines correct? ◎ ITA according to the IP of the virtual machine address, send a Ping request to the virtual machine; ②ITA sends a request to allocate a virtual machine to HDC; ③ITA sends a request to the virtual machine

The virtual machine sends a request to format the data disk and modify the computer name; ④ITA sends a query message to the DB for the virtual machine

request for information (single)

A.

4131

B.

1423

C.

1432

D.

4123

Full Access
Question # 79

When installing FusionCloud 6.3, which of the following statements is correct? (many)

A.

When FusionCloud 6.3 is installed, the deployment scenario needs to be determined.

B.

FusionCloud 6.3 is installed uniformly using FCD.

C.

Fusioncloud 6.3 requires manual installation of all components.

D.

Fusioncloud 6.3 needs to determine the cloud service type during installation, and the installation is completed at one time.

Full Access
Question # 80

When creating a desktop group, the administrator initiates a request to create a desktop group to the ITA through the desktop cloud portal, please

Which of the following information does the request contain? (many)

A.

Is it possible to rotate

B.

Desktop group name

C.

Desktop group type

D.

the operator

Full Access
Question # 81

Which of the following descriptions about FusionSphere Openstack related components is wrong? ( one)

A.

Swift is a scalable redundant storage system. Adopt a fully symmetric, resource-oriented distributed system framework

Structure design, all components are scalable, avoid spreading due to single point of failure and affecting the operation of the entire system

B.

Heat can orchestrate complex cloud applications and implement metering and monitoring of assets by calling OpenStack APIs according to the defined templates

C.

Ironic provides a series of AP interfaces for managing physical machines, which can

From the installation of the operating system on the physical machine to the removal of the physical machine for maintenance

D.

Cinder provides a unified interface, on-demand allocation, and persistent block storage service for the cloud platform.

Access different types of back-end storage in a dynamic way

Full Access
Question # 82

When using Rainbow to migrate a Linux virtual machine, which tool should be used? ( one)

A.

Volume Shadow Copy Service

B.

telnet

C.

SSH

D.

DiskGenius

Full Access
Question # 83

(True or False)FusionaccessSupports monitoring of resource load by manual or automatic means. Shut down virtual machines that are not in use.

A.

True

B.

False

Full Access
Question # 84

(Multiple choice) The following aboutFusionComputeWhich option is incorrect in the description of aggregated network ports?

A.

By setting the corresponding load sharing strategy, the bandwidth can be larger than that of a single network port, thereby improving performance.

B.

Different aggregated network ports can have the same physical port

C.

By configuring multiple physical network ports into aggregate network ports, the reliability of the system can be improveD.

D.

You can configure an aggregated network port with one physical network port, or you can configure an aggregated network port with multiple physical network ports

Full Access
Question # 85

ManageOne ServiceGenteron cloud hostingVNCThe login window fails to pop up. Which of the following are possible reasons?

A.

already atFusionComputeinterface usageVNCLog in to the cloud host

B.

Browser version is too low

C.

The browser's document mode is not set wrong

D.

JavaIncorrect security level setting

Full Access
Question # 86

The following aboutManageOneDescription of the approval process, which options are correct? (multiple choice)

A.

VDCadministrator andVDCThe salesperson can define the approval process.

B.

The approval process supports real-time modification of wells to take effect in the release state.

C.

Each level of approval process can specify one or more approvers, as long as any approver approves, the approval of this level is passed.

D.

The approval process can set up multi-level approval, up to5class correct.

Full Access
Question # 87

During the deployment and implementation of the FusionAccess gateway and load balancer, after the vAG/vLB is configured, it is found that the HA. The state is abnormal, it is not possible to be caused by one of the following reasons

A.

Modified by the administratorvAG/vLBmanagement planeIPaddress.

B.

Modified by the administratorvAG/vLBbusiness planeIPaddress.

C.

Modified by the administratorvAG/vLBofgandalfpassworD.

D.

Modified by the administratorvAG/vLBofrootpassworD.

Full Access
Question # 88

(Multiple choice) Which of the following is possibleFusioncomputeWhy did virtual machine migration fail?

A.

The target host has failed, has been rebooted, or has entered maintenance mode

B.

source host and target hostCPUThe amount is inconsistent.

C.

The source host and the target host have network interruptions or network failures

D.

The virtual machine is bound to the source host

Full Access
Question # 89

(Multiple choice) The following aboutFusion AccessmiddleITADescription of the component, which options are correct?

A.

It can realize virtual machine creation and allocation, virtual machine state management, etC.

B.

ITAessentially based onTomcatbuilt oneWeb Services.

C.

Provides management for desktop cloud system administratorsPortal

D.

ITAcomponents withHDCThere is interaction between components, andFusioncomputeThere is no interaction between the

Full Access
Question # 90

The ManageOne system can realize the connection of third-party systems by configuring the 3A authentication protocol, and the system no longer passes the

The user management function performs user authentication, and the user authentication is implemented by the 3A system when logging in. Where 3A stands for which of the following content ?

A.

Accounting

B.

Accessing

C.

Authentication

D.

Authorization

Full Access
Question # 91

Backup is the process of copying all or part of the data set from the hard disk or array applied to the host to other storage media in order to prevent data loss due to system operating errors or system failures. Which of the following options are backup media?

A.

CD library

B.

cloud storage

C.

Disk Array

D.

casette library

Full Access
Question # 92

The panorama of Huawei's disaster recovery solutions includes local, intra-city, and remote storage. Which of the following descriptions about the three disaster recovery

solutions is incorrect?

A.

Local high availability can use real-time mirroring and synchronous replication solutions. Due to the close bandwidth and distance, it usually requires RPO=0.

B.

the remote disaster recovery party can choose the remote active-active and remote active-standby solutions according to different needs

C.

For intra-city disaster recovery, you can choose intra-city active-active and intra-city active/standby solutions according to different needs.

D.

Local high availability deploys services in the same computer room in close proximity.

Full Access
Question # 93

ManageOne ServiceCenter supports disaster recovery, production site and disaster recovery site can synchronize ServiceCenter data. After a disaster occurs, the disaster recovery site can be automatically started.

A.

True

B.

False

Full Access
Question # 94

(Judgment question) IfFusionComputeThe virtual machine is not installedTools,You cannot query the memory usage of the virtual machine.

A.

True

B.

False

Full Access
Question # 95

FusioncomputeImport supportVMDKtype disk file to create a new virtual machine.

A.

True

B.

False

Full Access
Question # 96

The following aboutFusionComputemiddleVNCdescription, which options are correct? (multiple choice)

A.

VNCIt is a lightweight remote control computer software.

B.

The computer to be controlled needs to install the corresponding software to becomeVNCserver.

C.

The host that initiates the control request needs to install the corresponding software to becomeVNCserver.

D.

VNCneed supportLinuxoperating system.

Full Access
Question # 97

The following aboutFusionComputemiddleDVSFor the description of the uplink, which options are correct? (Multiple choice)

A.

The same bound network port can be set to differentDVSthe uplink.

B.

—indivualDVSThere can only be one uplink.

C.

Uplinks are used for virtual machine data uplinks.

D.

The same binding port can only be set to a certain oneDVSthe uplink.

Full Access
Question # 98

(Judgment question) HuaweiManageone ServicecenterSupport disaster recovery, automatic synchronization between production site and disaster recovery site

Servicecenterdata, the disaster recovery site can be automatically started after a disaster occurs

A.

True

B.

False

Full Access
Question # 99

ManageOneThe operation plane provides a resource ordering interface, and third-party platforms can create, change, extend, and delete cloud resources by calling the ordering interface.

A.

True

B.

False

Full Access
Question # 100

Which of the following descriptions about FusionCompute memory virtualization is incorrect?

A.

Applications requesting virtual memory can be0Shenzhen begins.

B.

Memory virtualization technology can achieve memory over-allocation.

C.

FusionComputeSupports memory hardware-assisted virtualization technology to reduce memory virtualization overheaD.

D.

The virtual memory requested by the application is contiguous.

Full Access
Question # 101

in HuaweiFusionCloud 6.3 Type lmiddle,PODWhich of the following options is equivalent in scope?

A.

AZ

B, Region

B.

a cascaded layerOpenStack

C.

Global

Full Access
Question # 102

Before modifying the specifications of the Windows virtual desktop of FusionAccess, either modify the CPU parameters, or to modify memory parameters, all need to shut down.

A.

correct

B.

mistake

Full Access
Question # 103

In useRainbowconductWindowsAfter the virtual machine is migrated, the implementer finds that the migrated virtual machine does not have a network card. What is the possible reason?

A.

automatic installationUVP toolsThe destination virtual machine is not restarted after

B.

The source virtual machine does not have a network card.

C.

The destination virtual machine is not installedUVP tools.

D.

No NIC was created when the destination virtual machine was created

Full Access
Question # 104

Compared with traditional physical desktops, which of the following are the characteristics of cloud desktops?

A.

desktop standardization

B.

mobile office

C.

Terminal and data isolation

D.

automated scheduling

Full Access
Question # 105

(Multiple choice) The following aboutFusionAccessmiddleHDA, Component description, which option is incorrect?

A.

HDAis a series of desktop connection service brokers

B.

andHDAThe interactive protocol isHDPprotocol

C.

HDAis installed when making the template

D.

It is not necessary to install every desktop virtual machineHDA

Full Access
Question # 106

(True or False ) Fusion access backup server in Backup Server Which of the following components' files are supported for backup and data ?

A.

VLB

B.

ITA

C.

HDC

D.

WI

Full Access
Question # 107

Which of the following processing policies does FusionCompute support when a Windows virtual machine blue screen occurs? (multiple choice)

A.

do not handle

B.

Restart the virtual machine

C.

HAvirtual machine

D.

Shut down the virtual machine

Full Access
Question # 108

(Multiple choice) In HuaweiFusionsphere Openstack, the lifecycle management of volumes is ultimately determined by which of the following Cinder component complete?

A.

cinder-backup

B.

cinder-api

C.

cinder-volume

D.

cinder-scheduler

Full Access
Question # 109

In the operation analysis, the administrator can know the number of devices, resource utilization, capacity, tenant resources, alarms, etC. of the data center in real time according to which of the following content, through the overallKPIsand health to discover and solve problems in a timely manner to support operations?

A.

icon

B.

sheet

C.

report

D.

data

Full Access
Question # 110

(True or False)FusionAccessTo recycle static multi-user desktops, system administrators only need to delete them on the virtual machineUsers can.

A.

True

B.

False

Full Access
Question # 111

In FusionCompute, which of the following storage resources supports raw device mapping?

A.

FusionStorage Block

B.

SAN

C.

NASl

D.

Local Disk

Full Access
Question # 112

Fusion Sphere In server virtualization scenarios, if customers need to use software routers and VPC. Which of the following components needs to be installed in the routing network?

A.

fusionCompute

B.

fusionStorage Manage

C.

VSAM

D.

VPC

Full Access
Question # 113

HuaweiBCManager eBackupWhich of the following objects can be backed up?

A.

in a protected environmentLUN

B.

Host disks in protected environments

C.

Virtual machine disks in a protected environment

D.

Virtual Machines in Protected Environments

Full Access
Question # 114

(Multiple Choice) HuaweiManageOne ServiceCenterDuring active/standby deployment, a singleServiceCenterThe virtual machine is faulty, and the service cannot be recovered

even after restarting the virtual machine. Which of the following are possible reasons?

A.

temporary changeiptablesRules result in restricted access to virtual machines

B.

The network where the virtual machine is locatedIPconflict

C.

The host where the virtual machine is located is faulty

D.

The file system of the virtual machine is corrupted

Full Access