Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H13-522 Questions and Answers

Note! Following H13-522 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H13-522 Questions and Answers

Question # 6

The service operation process mainly contains event status management, event management, request fulfillment, and problem management

A.

TRUE

B.

FALSEs

Full Access
Question # 7

Which of the following statements are correct about Cinder? (Multiple Choice)

A.

Cinder is a storage resource management system which provides persistent block storage resources for VMs.

B.

Cinder can encapsulate backend storage resources and provide unified APIs for external users.

C.

Cinder manages volumes, including volumes, volume types, and volume snapshots.

D.

Cinder can be used to attach volumes but cannot separate volume snapshots.

Full Access
Question # 8

What actions are taken to prevent against security risks in the cloud?

A.

Understand related supervision regulations.

B.

Run standard security software.

C.

Encrypt everything.

D.

Understand the cloud storage architecture in use.

Full Access
Question # 9

Virtual HA refers to a function that when the host where service VMs are located is faulty, FusionCompute can detect the fault in real time and restart the VMs on another normal host in the cluster, thereby ensuring service continuity.

A.

TRUE

B.

FALSE

Full Access
Question # 10

Who shall be responsible for monitoring the customer system in IaaS?

A.

Internet service providers

B.

Cloud service providers

C.

Customers

D.

Data specialists

Full Access
Question # 11

How many IPSec SAs will be created when one IPSec channel is created using AH+ESP in IPSec?

A.

2

B.

3

C.

4

D.

1

Full Access
Question # 12

Which of the following types of VPN are suitable for staff on business trip to connect to the enterprise intranet over the public network? (Multiple Choice)

A.

GREVPN

B.

L2TPVPN

C.

SSL VPN

D.

L2TP Over IPSec

Full Access
Question # 13

Which of the following components is not required for cloud data center O&M in private cloud scenario?

A.

OperationCenter

B.

eSight

C.

CSB

D.

FusionSphere OpenStack OM

Full Access
Question # 14

Which of the following statements is incorrect about the data center service migration scenario?

A.

Services are migrated from traditional data centers to cloud data centers.

B.

Traditional data centers are taken over by cloud data centers after being cloudified.

C.

Services are migrated from the existing cloud data centers to other cloud data centers.

D.

Services are migrated from cloud data centers to traditional data centers.

Full Access
Question # 15

ManageOne can be integrated with third-party systems, such as an SMS/email gateway, USM, and AD server,

A.

TRUE

B.

FALSE

Full Access
Question # 16

Which of the following roles is responsible for initial configuration of Operation Center?

A.

System administrator

B.

Monitoring personnel

C.

Maintenance personnel

D.

Development personnel

Full Access
Question # 17

PaaS(Platform-as-a-Service) is a mode of providing platforms as a service. The platforms can generally consist of middleware, databases, and development tools.

A.

TRUE

B.

FALSE

Full Access
Question # 18

FusionSphere OpenStack supports the third-party FTP and FTPS backup servers. No matter whether FusionSphere OpenStack supports third-party servers, the backup package is saved on the local PC in seven copies.

A.

TRUE

B.

FALSE

Full Access
Question # 19

Which of the following layer does FusionSphere focuses on?

A.

IaaS

B.

PasS

C.

SaaS

D.

MaaS

Full Access
Question # 20

Which of the following VM migration issue complicates security auditing?

A.

Different types of data may be mixed in the same physical machine.

B.

After a VM is transferred from a physical server to another one, no alarms or traces for auditing are generated.

C.

Performance is reduced.

D.

The customer's VMs are hardened.

Full Access
Question # 21

The eSight single-node system can be deployed on a VM. Only the Windows operating system is supported. The network traffic analysis and management component and the WLAN wireless positioning function are not supported.

A.

TRUE

B.

FALSE

Full Access
Question # 22

Which of the following statements is incorrect about the Configuration Management System (CMS)?

A.

CMS is a part of the service knowledge management system.

B.

CMS must contain all service data covering employees, providers, location, service units, customers, and users.

C.

CMS contains tools used to collect, store, manage, upgrade, and display configuration items and their relationships.

D.

CMS contains information of events, problems, known issues, changes, and release.

Full Access
Question # 23

ServiceCenter can be deployed in a single data center but cannot be deployed across data centers.

A.

TRUE

B.

FALSE

Full Access
Question # 24

Storage devices in FusionCompute need to be scanned. These devices refer to physical storage devices, such as IP SAN, AdvancedSAN, and NAS.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Which of the following best describes the advantages of SaaS?

A.

Security responsibilities are shifted to other companies to shoulder, which belittles some disadvantages like high cost and low flexibility.

B.

Flexible service provision and SECaaS service providers' extensive knowledge and high efficiency lead to a higher service flexibility and continuity.

C.

Security software standardization makes SaaS outsourcing infeasible.

D.

SaaS applications, excluding antimalware software and anti-spam applications, are sophisticated in many fields and can be used widely.

Full Access
Question # 26

Which of the following systems cannot be interconnected with Operation Center?

A.

VRM

B.

vCenter

C.

Keystone

D.

ServiceCenter

Full Access
Question # 27

A server can have only one eSight installed.

A.

TRUE

B.

FALSE

Full Access
Question # 28

Which of the following functions is configured from Operation Center to an interconnected system to allow users to log in to the interconnected system through My Link on Operation Center without entering the user name and password?

A.

Resource management

B.

Routine monitoring

C.

SSO

D.

Real-time monitoring

Full Access
Question # 29

Which of the following is incorrect about the stateless computing profile of eSight?

A.

To facilitate stateless computing, configurations to be migrated are uniformly managed through a profile.

B.

By defining and implementing a profile, the device replacing a damaged device can obtain the same physical attributes of the damaged device.

C.

A computing node can be associated with multiple profiles.

D.

A group of profiles with the same configuration policy corresponds to the stateless device group concept. Configuration policies in the group profile are the same.

Full Access
Question # 30

Which of the following statements about backup types is correct?

A.

A full backup is a complete copy of all the data created at a certain point in time.

B.

An incremental backup is performed based on the changes since the last backup.

C.

A differential backup is performed based on the changes since the last full backup.

D.

Differential backup occupies the smallest storage space among all backup types.

Full Access
Question # 31

Which of the following may cause communication between VMs out of the network security control?

A.

Most of the cyber security systems cannot identify the traffic of the encrypted VMs.

B.

Communication between VMs in a server is not perceived by physical security devices.

C.

VM images use the tools that can enable communication between VMs to bypass firewalls.

D.

The client operating system can activate the secret mode.

Full Access
Question # 32

Which of the following statements about FusionCompute cluster management is incorrect?

A.

The computing resource scheduling automation technology can determine whether to migrate a VM based on the CPU usage, memory usage, or both the CPU and memory usage.

B.

In power management, hosts can be powered on or powered off manually or automatically.

C.

The VM migration rules include the keep-VMs-together, mutually-exclusive-VM, and the VM-to-host-group rules.

D.

The IMC policy supports only live migration of Intel CPU series. CPUs from other vendors can be configured with this policy.

Full Access
Question # 33

When a user configures the mapping between physical networks and ports, which of the following mapping modes need high-performance iNICs? (Multiple Choice)

A.

User-mode EVS

B.

OVS

C.

Hard passthrough

D.

DVS

Full Access
Question # 34

What networks are used in the Active-Passive DR Solution? (Multiple Choice)

A.

Replication data network

B.

Service data network

C.

Storage network

D.

DR management network

Full Access
Question # 35

The security policy matching rule is as follows: search for the manually configured inter-zone security policy. If no such a policy is found, discard the data packet directly.

A.

TRUE

B.

FALSE

Full Access
Question # 36

Which of the following is incorrect about IT service organizations in different modes?

A.

Traditional IT service organizations are internal IT providers.

B.

IT service organizations in the private cloud mode are shared service units.

C.

IT service organizations in the private cloud mode are internal IT providers.

D.

IT service organizations in the public cloud mode are external providers.

Full Access
Question # 37

After FusionSphere OpenStack is installed and configured, storage_data network exceptions are detected, indicating that the storage_data network cannot be accessed. Which of the following reasons is impossible?

A.

The storage_dataO plane is configured, but no backend storage is configured for Cinder.

B.

The IP address and storage service IP address of storage_data0plane are not in the same network segment..

C.

Backend storage configured for Cinder is incorrect.

D.

The storage network plane is not configured.

Full Access
Question # 38

Who shall be responsible for data security after data is transferred to a third party for storage according to most of data protection laws?

A.

The third party

B.

The source data administrator who hires the third party

C.

Each individual user who submits personal information

D.

The third party and initial administrator

Full Access
Question # 39

Which of the following statements is incorrect about the FusionSphere OpenStack OM resource pool configuration?

A.

You must first specify the availability zone (AZ) to which the host group belongs and then select hosts from the AZ to create a host group.

B.

If the resource pool is to interconnect with FusionCompute, the AZ needs to be consistent with the AZ configured in the FusionCompute storage cluster.

cd. The external network is used to connect to the network outside the system and cannot be the Internet.

C.

fc-nova-computeXXX is in fact a group of FusionCompute computing clusters interconnected with FusionSphere OpenStack.

Full Access
Question # 40

Which of the following attacks do not belong to network-layer attacks?

A.

IP spoofing attacks

B.

Smurf attacks

C.

ARP spoofing attacks

D.

ICMP attacks

Full Access