Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H13-531_V2.0 Questions and Answers

Question # 6

(Multiple choice) Regarding the functions of each service in FusionSphere OpenStack, which of the following descriptions is incorrect?

A.

hostVBSprocess withOSDProcess communication exception

B.

GlanceProvides query, upload and download of virtual machine images

C.

MDCProcess exception

D.

hostVBSinternal error

Full Access
Question # 7

In useRainbowspecialwindowsMigrating virtual machines toHCSIn the platform scenario, which parameters of the destination virtual machine need to be configured by the migration personnel when creating a migration task?

A.

The port used by the destination virtual machine to communicate with the source virtual machine

B.

The number of disks of the destination virtual machine

C.

The disk capacity of the destination virtual machine

D.

destination virtual machineIPaddress

Full Access
Question # 8

For cloud servers with shared volumes mounted in FusionCloud, applying for the cloud server backup CSBS service is not supported.

service instances and cloud server high-availability CSHA service instances

A.

TRUE

B.

FLASE

Full Access
Question # 9

(Single-choice questions) FusionComputeThere is a virtual machine bound to the host, and the current customer needs to upgrade the storage system

used by the virtual machine. Which of the following methods can migrate the disks of the virtual machine on this storage?

A.

Unable to meet requirements

B.

Virtual Machine Live Migration Changes Datastore

C.

Virtual machine live migration changes hosts and datastores

D.

Virtual Machine Live Migration Change Host

Full Access
Question # 10

Disaster recovery protects business, and backup protects data.

A.

Truel

B.

False

Full Access
Question # 11

The following aboutManageOneDescription of the approval process, which options are correct? (multiple choice)

A.

VDCadministrator andVDCThe salesperson can define the approval process.

B.

The approval process supports real-time modification of wells to take effect in the release state.

C.

Each level of approval process can specify one or more approvers, as long as any approver approves, the approval of this level is passed.

D.

The approval process can set up multi-level approval, up to5class correct.

Full Access
Question # 12

In the operation analysis, the administrator can know the number of devices, resource utilization, capacity, tenant resources, alarms, etC. of the data center in real time according to which of the following content, through the overallKPIsand health to discover and solve problems in a timely manner to support operations?

A.

icon

B.

sheet

C.

report

D.

data

Full Access
Question # 13

Is the option correct?

A.

On the same physical host, allGuest Physical Memorycan be larger than the physical host'sHost Physical Memory

B.

On the same physical host, allGuest Physical MemoryMust be less than or equal to the physical host'sHost Physical Memory

C.

In a virtual machine, all applications correspond toGuest virtual memorycan be larger than the virtual machine'sGuest Physical Memory

D.

Already in a virtual machine, all applications correspond toGuest Virtual MemoryMust be less than or equal to the virtual machine's Guest Physical Memory

Full Access
Question # 14

Disaster recovery is to restore the system or business from the failure or paralysis caused by the disaster to the normal operating state, and the activities and

processes designed, the national standard level of disaster recovery capability is divided into6class,PTO/RPO There is a slight correlation with the disaster recovery

capability level. Which of the following options describes the correlation is wrong?

A.

Disaster Recovery Capability Level2level correspondenceRTOfortwenty fourhours or more,RPOfor1day to day7sky.

B.

Disaster Recovery Capability Level1level correspondenceRTOfor2days or more,RPOfor1day to day7sky

C.

Disaster Recovery Capability Level Up CorrespondenceRTOfor12hours or more,RPOhours to1sky.

D.

Disaster Recovery Capability Level4level correspondenceRTOhours to2sky,RPOhours to2skycorrect

Full Access
Question # 15

(Multiple choice) The following aboutFusionComputeMemoryQosdescription, which options are incorrect?

A.

MemoryQoSTechnology works just as well with physical machines.

B.

open memoryQoSAfter that, the memory space that the virtual machine can use can exceed the memory size set by the virtual machine

C.

through memoryQosIt can solve the problem of resource preemption during memory reuse

D.

MemoryQoSThe technique mainly achieves the answer by setting memory reservation and memory share

Full Access
Question # 16

(True or False ) Fusion access backup server in Backup Server Which of the following components' files are supported for backup and data ?

A.

VLB

B.

ITA

C.

HDC

D.

WI

Full Access
Question # 17

(Judgment question) After the user logs in to the machine, if all theFusionAccessThe infrastructure virtual machine, the recorded users can still use the virtual machine desktop normally.

A True

C. False

Full Access
Question # 18

(Single-choice questions) FusiercComputeTwo virtual machines in the cluster that can communicate with each other cannot communicate with each other after the administrator performs which of the following operations?

A.

The administrator adjusted the port group of one of them

B.

The administrator adjusted one of theVMdescription of

C.

One of the administrator's adjustmentsVMmemory size

D.

The administrator adjusted the disk capacity of one of them

Full Access
Question # 19

(Multiple Choice) In FusionCompute, when adding shared storage to multiple hosts, which of the following operations is correct?

A.

Check all hosts when initializing storage resources

B.

When the shared storage type is IP SAN, ensure that the storage network of the host and the business interface of the storage are connected. C. Check the corresponding host when adding data storage

C.

Check all hosts when associating storage devices

Full Access
Question # 20

In the distributed virtual switch of FusionCompute, which of the following are required for the virtual machine to communicate with the external network communicate with each other?

A.

port group

B.

uplink

C.

virtual network card

D.

storage interface

Full Access
Question # 21

In a FusionSphere server virtualization scenario, if you add a host to a cluster where IMC has been set up, the host supports. The supported CPU feature set must be equal to or lower than the CPU feature set set by the cluster IMC.

A.

wrong

B.

right

Full Access
Question # 22

(Multiple choice) During installationFusionSphere OpenStackWhat are the required network planes?

A.

External OM

B.

External_Base

C.

Internal_Base

D.

Extermal_API

Full Access
Question # 23

Use HuaweiBCmanager eBackupdata backup and useLAN-BaseIn networking mode, when a user backs up a virtual machine, what does the backup agent do?

A.

TowardsVRMorvcenterIssue a backup task

B.

received fromCANSnapshot of the virtual machine sent by the host

C.

Distribute backup tasks to production storage

D.

Receive backup data from production storage

Full Access
Question # 24

(multiple choice)FusionSphere OpenStackBy which of the following dimensions can a logical host befc-nova-computePerform performance evaluation, select the logical host with the best overall performance, and schedule cluster resources?

A.

vCPUUtilization

B.

vCPUreservation rate

C.

remaining memory resources

D.

vCPUremaining resources

Full Access
Question # 25

(multiple choice)FusionSphere OpenStack OMregistered onKVMType image, which of the following image formats are supported?

A.

raw

B.

vhd

C.

iso

D.

qcow2

Full Access
Question # 26

In FusionCompute, which of the following are the reasons for the abnormal heartbeat connection between the CAN host and the VRM?

A.

CNAshost offline

B.

CNAThe host is in maintenance mode

C.

CNAThe host management network port is abnormal

D.

CNAhost process exception

Full Access
Question # 27

(multiple choice) About the following FusionCloudvirtual private cloud inVPCdescription, which options are correct?

A.

Each user can apply for multiplevPC.

B.

By default, in differentVPCmiddleECScannot access each other.

C.

VPCIt can realize the isolation of computing resources at the network level.

D.

eachVPCOnly one subnet can be created below.

Full Access
Question # 28

(Multiple Choice) HuaweiManageOne ServiceCenterDuring active/standby deployment, a singleServiceCenterThe virtual machine is faulty, and the service cannot be recovered

even after restarting the virtual machine. Which of the following are possible reasons?

A.

temporary changeiptablesRules result in restricted access to virtual machines

B.

The network where the virtual machine is locatedIPconflict

C.

The host where the virtual machine is located is faulty

D.

The file system of the virtual machine is corrupted

Full Access
Question # 29

FusionComputeuseIP SANStorage, probabilistic failure when creating disk, which of the following may cause this failure?

A.

Data consistency check is enabled on the storage resource

B.

storage interfaceVLAN IDwrong setting

C.

LUNbad block

D.

Configure a separate network plane to host virtualizationSANStore heartbeat traffic

Full Access
Question # 30

If there is a problem with the HDC process, you need to use the command service---restart to restart

Full Access
Question # 31

In the Huawei FusionCloud 6.3 solution, which of the following are the disaster recovery services that tenants can apply for?

work? (many)

A.

CSDR

B.

VBS

C.

VHA

D.

CSBS

Full Access
Question # 32

In the FusionCloud private cloud scenario, the following descriptions about NAT gateway related concepts are correct. What are the items? ( many)

A.

There are four types of NAT gateways: small, medium, large and extra large

B.

To create a NAT gateway, you must specify the VPC, subnet, and NAT gateway specifications where the NAT gateway is located

C.

The specifications of the NAT gateway will affect the maximum number of connections and the number of new connections per second of the SNAT function, and the data throughput

The amount is determined by the bandwidth of the Elastic IP

D.

The set composed of five elements: destination IP address, destination port, and transport layer protocol is regarded as a DNAT connect

Full Access
Question # 33

In the failover process of the cloud server disaster recovery service CSDR of FusionCloud R6, there are mainly Next few steps, which of the following is the correct failover sequence? ( one)

1. Through BCManager, one-click completion (the storage layer LUN configuration can be read and mounted to the disaster recovery side computing node

Pull up the disaster recovery cloud host and access the disaster recovery VPC) related configuration.

2. Switch the access authentication component Keystone.

3. Switch the Host domain name record of ManageOne SC to resolve the IP address and switch the external DNS record.

4. Switch the service delivery system to ManageOne SC.

5. The tenant logs in to the disaster recovery virtual machine, and checks and starts the business system.

A.

2-4-3-1-5

B.

3-4-2-1-5

C 3-2-4-1-5

C.

4-2-3-1-5

Full Access
Question # 34

In FusionCompute, if the SRIOV pass-through NIC is used for the uplink, the virtual switch needs to select the SRIOV mode. Which of the following descriptions about the SRIOW function is correct? (many)

A.

SR-OV realizes the distribution of PCI functions to multiple virtual interfaces to share a PCI in a virtualized environment

device resources

B.

SR-IOV reduces the V/O overhead in the software simulation layer to improve the network forwarding performance of the virtual machine

C.

SR-IOV can only assign a physical NIC device to one virtual machine

D.

The port group created in the distributed switch that selects the SRIOV pass-through mode, the port type can only be used "ordinary"

Full Access
Question # 35

If the new virtual machine of FusionCompute uses the vhost-user type (DPDK) network card, it needs to be which of the following conditions are met? (many)

A.

The host where the virtual machine is located has completed the huge page configuration and takes effect

B.

The cluster where the virtual machine is located has been set to a high-performance cluster

C.

Turn on the IMC mode of the cluster where the virtual machine is located

D.

A distributed switch of the user-mode switching mode type has been created

Full Access
Question # 36

【Multiple choices】 The following 3D graphics about the Huawei Desktop Protocol HDP (Huawei Desktop Protocol)

Which of the descriptions of the display technology is correct?

A.

The GPU hardware virtualization technology virtualizes the graphics card into several VCPUs, and each VGPU is bound to a virtual machine.

The virtual machine directly accesses the VGPU as it accesses the GPU

B.

GPU hardware virtualization supports up to 64 users sharing one GPU card

C.

Through the management of graphical workstations, the graphical workstation can be imported into the desktop cloud solution, and sent to the desktop cloud solution.

End users provide the HDP protocol to access the graphics red workstation to obtain the 3D acceleration capability of the GPU

D.

GPU pass-through technology binds each physical GPU to a small number of virtual machines, and the virtual machines directly access to GPU

Full Access
Question # 37

A FusionAccess system maintenance engineer is performing data recovery operations on the ITA server. by

Which of the following descriptions about ITA data recovery is correct? ( many)

A.

The copy task in the recovery process can be completed by the remote copy software WinSCP

B.

It can be verified whether the ITA service is restored by checking whether the ITA alarm is eliminated and whether the desktop can be issued normally.

no success

C.

There is no need to uninstall and then reinstall the ITA during the recovery process

D.

After the ITA data is restored, the data from the backup time to the restore time will be lost

Full Access
Question # 38

Use the Rainbow tool for migration operations, after the migration of the operating system's magnetic, network card, system, etc.

Configuration may change. Which of the following descriptions about the system changes after the Rainbow River relocation are correct item? ( many)

A.

The license needs to be reactivated after Windows migration

B.

Disk drives may change after migration

C.

The network card MAC and IP address will change

D.

Windows dynamic disk will become a shared disk after migration

Full Access
Question # 39

Users can eitherFusionAccessModify the specifications of the virtual machine on theFusionComputeModify the specifications of the virtual

machine above.

A.

True

B.

False

Full Access
Question # 40

When FusionCompute uses NAS resources, which of the following protocols can be used to scan to storage devices? (one)

A.

FTP

B.

NFS

C.

CIFS

D.

HTTPS

Full Access
Question # 41

Register the image type in fusioncloud as Fusioncompute, which needs to be created in FusionCompute. The virtual machine template is used as an image, and only vhd image files are supported.

A.

True

B.

Fault

Full Access
Question # 42

Huawei FusionAccess cannot perform user access control based on which of the following methods? (one)

A.

The device is bound to the user

B.

Access time control

C.

TC is bound to the computer

D.

Access site control

Full Access
Question # 43

【True or False】 In order to ensure the consistency of the source and destination data after business migration, the business migration should be done before the final synchronization.

Machine out of business.

A.

True

B.

False

Full Access
Question # 44

In FusionCloud, the following description about the deployment of cinder-volume components is wrong which items? (many)

A.

HBA card is required when connecting to FC--SAN. In this scenario, cinder-volume can be deployed in virtual In the virtual host

B.

There is no need to deploy the image-cache partition when deploying the cinder-volume host

C A set of cinder-volume (at least one node) connected to only one storage pool

C.

cinder-volume can only be deployed on the control node

Full Access
Question # 45

When the administrator routinely checks Fusioncompute, it is found that a CNA host is

Machine communication is interrupted. Which of the following options would cause this behavior? (many)

A.

The network cable connected to the host network port is loose

B.

The VRM clock synchronization process is abnormal

C.

The network cable of the switch connected to the host is loose or damaged

D.

The host is restarting

Full Access
Question # 46

(Multiple choice) The following aboutFusioncomputeTo delete the description of the security group, which option is incorrect?

A.

There is no virtual machine in the security group. If there is a virtual machine in the security group, you need to move the virtual machine out of the security group

B.

The authorization behavior between the security group to be deleted and other security groups does not affect the removal operation

C.

Except for a security group to which the virtual machine belongs, other security groups are not affected by the virtual machine

D.

After the security group is deleted, all security group rules in the group are deleted at the same time

Full Access
Question # 47

Which of the following descriptions about FusionSphere Openstack related components is wrong? ( one)

A.

Swift is a scalable redundant storage system. Adopt a fully symmetric, resource-oriented distributed system framework

Structure design, all components are scalable, avoid spreading due to single point of failure and affecting the operation of the entire system

B.

Heat can orchestrate complex cloud applications and implement metering and monitoring of assets by calling OpenStack APIs according to the defined templates

C.

Ironic provides a series of AP interfaces for managing physical machines, which can

From the installation of the operating system on the physical machine to the removal of the physical machine for maintenance

D.

Cinder provides a unified interface, on-demand allocation, and persistent block storage service for the cloud platform.

Access different types of back-end storage in a dynamic way

Full Access
Question # 48

(True or False)FusionaccessSupports monitoring of resource load by manual or automatic means. Shut down virtual machines that are not in use.

A.

True

B.

False

Full Access
Question # 49

(True or False)ManageOneIn the operation plane, if the parentVDCQuotas are limited (e.g.100indivualvCPU, 320GBmemory), the childVDCSupport is set to unlimited quotA.

A.

True

B.

False

Full Access
Question # 50

In FusionSphere OpenStack, which of the following Nova components can interface with different virtualization platforms?

A.

nova - compute

B.

nova - conductor

C.

nova-scheduler

D.

nova-api

Full Access
Question # 51

(Multiple choice) The following aboutFusionComputeDescription of security groups and rules, which option is incorrect?

A.

The prerequisite for deleting a security group is that there are no virtual machines in the security group.

B.

Changes to security group rules need to be manually applied to virtual machines within the security group

C.

You must create a security group before adding rules.

D.

Before adding rules, the security group will deny all by default

Full Access
Question # 52

The following aboutFusionAccessIn the description of the virtual machine disk configuration mode during fast provisioning, which options are correct?

A.

When the virtual machine template is a full copy template, the configuration mode must be normal delay zero

B.

When the virtual machine template is a full copy template, the configuration mode is recommended to be normal delay zero.

C.

When the virtual machine template is a linked clone template, the configuration mode is recommended to be thin

D.

When the virtual machine template is a linked-clone template, the configuration mode must be condensed Correct

Full Access
Question # 53

(Multiple choice) Which of the following isFusionCompute. What are the necessary conditions for a virtual machine to communicate properly with other virtual machines?

A.

Configure the correct virtual machineIPaddress

B.

Configure the correct configuration for this virtual machineMA, Caddress

C.

Configure pinning for this virtual machineIPaddress

D.

Configure the gateway address for this virtual machine

Full Access
Question # 54

Compared with traditional physical desktops, which of the following are the characteristics of cloud desktops?

A.

desktop standardization

B.

mobile office

C.

Terminal and data isolation

D.

automated scheduling

Full Access
Question # 55

In the following description about forward proxy settings in CPS, which is the correct option? ( many)

A.

Different services can use different forward proxy addresses.

B.

The system defaults to the forward proxy rules of the External APl network plane that serves the students.

C.

The system enforces that different services must use the same forward proxy rules.

D.

The forward proxy rules configured by default in the system cannot be modified.

Full Access
Question # 56

【Fill in the blanks】 During the use of the Huawei desktop cloud system, one virtual machine needs to be assigned to multiple users

When using it, the administrator needs to add virtual machine users to the virtual desktop. When the "distribution method" is -----

The virtual machine can only perform additional user operations.

Full Access
Question # 57

The following description about VDC role and VDC tenant model in ManageOne operation management is correct

What are the items? ( many)

A.

VDC roles include operation administrator, VDC administrator, maintenance administrator, VDC salesperson,

VDC read-only administrators and custom roles

B.

The VDC administrator has the highest authority for operation management

In the

C.

VDC tenant model, project resources are isolated from each other. One VDC can contain multiple projects, and one project

You can also own multiple VDCs

D.

For multinational or trans-provincial companies, subsidiaries or provincial companies can be divided into first-level VDCs, and special-level VDCs.

Divisions into secondary VDCs

Full Access
Question # 58

Which of the following descriptions about the virtual private cloud VPC in Fusioncloud are correct? ( many)

A.

VPC can realize the isolation of computing resources at the network level.

B.

Only one subnet can be created under each VPC.

C.

Each user can apply for multiple VPCs.

D.

By default, ECSs in different VPCs cannot communicate with each other.

Full Access
Question # 59

[Multiple Choices] Which of the following descriptions about VNC logging in to a virtual machine are correct? (many)

A.

VNC login may touch end user data and should be used with caution.

B.

through VNC, the administrator can connect and view the interface of the virtual machine, which is convenient for the management of the virtual machine

And maintenance.

C.

After VNC logs in to the Linux virtual machine, the administrator cannot log in to the virtual machine via SSH.

D.

The virtual machine without Tools installed cannot log in with VNC.

Full Access
Question # 60

After the cloud disaster recovery service is upgraded, which of the following descriptions of the impact on the current system is correct?

A.

BCManager eReplication: Only supports online upgrade, and does not need to be restarted during the upgrade process

Operating system, after the upgrade is completed, the protection group or recovery plan can be executed after the automatic refresh of resources under the site is completed.

B.

eBackup: Back up by means of always full backup

C.

ManageOne SC. After the upgrade, the backup console cannot be logged in, and the cloud backup service is interrupted

D.

Fusion Sphere OpenStack: During the completion of the upgrade, the host OS will automatically restart, during the restart

Some services cannot access the subnormal phenomenon

Full Access
Question # 61

Which of the following reasons will cause the user virtual machine to fail to start, and the status of the virtualized local disk becomes read only? (many)

A.

File metadata corruption

B.

Super block corruption

C.

The access control module is damaged

D.

The auxiliary distribution module is damaged

Full Access
Question # 62

In FusionAccess, when administrators deploy VAG/VLB components, enter FusionAccess

After the installation interface, you should select "Software >———— and then install the vAG and VLB components respectively.

Fill in the corresponding interface words)

Full Access
Question # 63

FusionAccess adopts the industry-leading high-definition fidelity-desktop protocol, and can

Fully connected to a centralized virtual desktop. (Please fill in the English abbreviation)

Full Access
Question # 64

The desktop cloud can completely replace the traditional physical desktop and realize the refined management and control of the enterprise desktop.

A.

TRUE

B.

FALSE

Full Access
Question # 65

Which of the following will not cause the HA failure of the virtual machine in FusionCloud?

A.

Large page memory is not configured

B.

Affinity settings exist for the virtual machine

C.

The MongoDB service of the management node is abnormal

D.

There are no idle computing resources on the host

Full Access
Question # 66

In the process of operation and maintenance management, the relevant functional components of the data center can be accurately identified, and the

Design capabilities, define monitoring indicators that match the technical characteristics of the component, and through active and passive management,

Ensure the normal operation of each management component of the data center to the greatest extent. The above describes the four operation and maintenance objectives of the data center.

______ in the bid

Full Access
Question # 67

Data disaster recovery is divided into virtual machine layer, SAN network layer and

array layer.

A.

TRUE

B.

FALSE

Full Access
Question # 68

Which of the following descriptions about the functions of the FusionCloud Task Center TaskCenter is wrong? (one)

A.

The VDC administrator can view the task execution status and task execution status of the VDC and its subordinate VDCs in the task list.

The creator of the task, the start time of the task, the end time, etc.

B.

The operation administrator can view the task execution status and task creation status of all operation administrators in the task list. Builder, task start time, end time, etc.

C.

The agent administrator can view the task execution status of its agent VDC and its subordinate VDCs in the task list,

The creator of the task, the start time of the task, the end time and other information

D.

The VDC salesperson can view the task execution status and task execution status of this VDC salesperson and its subordinate VDC salespersons.

The creator of the task, the start time of the task, the end time, etc.

Full Access
Question # 69

FusionSphereIn server virtualization scenariosFusionAccessThe virtual machine is stored inFusionComputeAfter the interface is removedFusionAccessThe

virtual machine state corresponding to the management interface remains unchangeD.

A.

True

B.

False

Full Access
Question # 70

FusionCloudcloud server backup inCSBSService support withRegiondifferent withinAzreplication and recovery between Region

replication and local recovery, but does not support cross-Regionrecovery.

A.

True

B.

False

Full Access
Question # 71

(multiple choice) aFusionComputeThe cluster where the virtual machine is located is powered onHAfunction, in which of the following scenarios, the virtual machine does not fail after a failureHAto other hosts in the cluster?

A.

virtual machineHApolicy is enabled

B.

Virtual machines run on shared storage mounted to all hosts in the cluster

C.

Binding the virtual machine to the host

D.

The virtual machine is created in a specificCNAsAnswer on the host's local disk

Full Access
Question # 72

(Multiple choice) Business migration is a high-risk operation. Which of the following factors will affect business migration?

A.

business type

B.

OS type

C.

Migration method

D.

Web environment

Full Access
Question # 73

Which of the following is incorrect about the description of Fusioncompute's virtualization antivirus capabilities?

A.

When running functions such as virus scanning and killing, it only takes up very little computing resources of the user virtual machine, which is used to run antivirus functions

B.

FusionComputeThe virtualized antivirus function consumes a lot of user virtual machine network resources due to its dependence on the network.

C.

FusionComputeVirtualized antivirus eliminates the need to install full antivirus software on user virtual machines

D.

FusionComputeThe virtualized antivirus function performs virus scanning and real-time monitoring through the exchange of host physical memory, with high efficiency and

high speed

Full Access
Question # 74

Which of the following is incorrect about the description of the cloud server disaster recovery service in the FusionSphere private cloud solution?

A.

After the cloud service data center is built, customers can apply for cloud server disaster recovery services to ensure the business continuity of the cloud server. The whole process does not require administrators to operate in the background

B.

Storage layer replication disaster recovery technology used by server disaster recovery service

C.

In order to provide cloud server disaster recovery services, the back-end storage needs to enable the remote replication function

D.

In order to provide cloud server disaster recovery services, the storage used by the protected cloud server can beAdvancedSAN

Full Access
Question # 75

In FusionComupte, two virtual machines in the same port group on the same host cannot communicate, which of the following

Not the cause of this failure?

A.

virtual machineIPConfiguration error

B.

Physical router failure

C.

Virtual machine firewall configuration error

D.

DVSworking abnormally

Full Access
Question # 76

FusionComputeThe virtual machine fails to create a memory snapshot. Which of the following conditions may cause this failure?

A.

Another virtual machine on the current host is taking a memory snapshot

B.

The host "host memory multiplexing" of the cluster where the virtual machine is located is disabled

C.

The guest operating system does not support creating memory snapshots

D.

The virtual machine is bound to a shared disk

Full Access
Question # 77

(multiple choice)RainbowBlock-level migration is used in which of the following scenarios?

A.

purpose of planningVMThe disk space size is expanded or reduced relative to the source end

B.

The partition structure needs to be consistent with the source side

C.

Hosts with lots of small files

D.

Hosts with high disk usage

Full Access
Question # 78

In the scenario where FusionSphere OpenStack is connected to KVM and FusionCompute, the description of virtual machine creation is as follows:

Which of the following is incorrect?

A.

in dockingFusionComputein the scene,HA,DRS, thermal migration and other advanced features areVRMto fulfill

B.

The creation methods of virtual machine cloud disks are different in two scenarios

C.

nova-computepasslibvirtinterface to completeKVMCreation of virtual machines

D.

in dockingFusionComputeIn the scene, thenova- schedulerto schedule to decide which one to chooseCANHost

Full Access
Question # 79

In Huawei BCManager eBackup, LAN-Free can only be used for SAN storage, and LAN-Base can only be used for non-SAN storage

A.

True

B.

False

Full Access
Question # 80

In Huawei FusionSphere OpenStack, which of the following Nova components can run on the control node and computing on the node?

A.

nova-scheduler

B.

nova-conductor

C.

nova-api

D.

nova-compute

Full Access
Question # 81

FusionSphereIn a server virtualization scenario, if you configure functions, which of the following network requirements are correct?

A.

Hosts in the cluster are associated with the sameDVS

B.

All hosts are associated with the sameDVS

C.

Hosts in the cluster are connected to the same physical switch

D.

All hosts are connected to the same physical switch

Full Access
Question # 82

What is the process for using the Rainbow Migration Tool?

A.

Install Migration Tool --- Create PurposeVM---Data Migration---Data Synchronization

B.

create purposeVM---Install Migration Tool---Data Synchronization---Data Migration

C.

create purposeVM---Install Migration Tool---Data Migration---Data Synchronization

D.

Install Migration Tool --- Create PurposeVM---Data Synchronization---Data Migration

Full Access
Question # 83

Which of the following is impossible regarding the correspondence between FusionAccess virtual groups and desktop groups?

A.

Virtual Group (Full Replication) - Desktop Group Type (Dynamic Pool)

B.

Virtual Group (Linked Clones) - Desktop Group Type (Static Pool)

C.

Virtual Group (Full Copy) - Desktop Group Type (Proprietary)

D.

Virtual Groups (Linked Clones) - Desktop Group Type (Proprietary)

Full Access
Question # 84

(Multiple Choice) Use HuaweiBCManager eBackupWhen data backup occurs, which of the following types of networks can backup data be sent from production storage to backup storage?

A.

bearFC-SANofFCnetwork

B.

bearer in the production networkIPnetwork

C.

bearIP-SANofIPnetwork

D.

bearFusionStorageofIBInternet

Full Access
Question # 85

Which of the following descriptions about Fusioncompute snapshots is incorrect? (one)

A.

A virtual machine can create multiple snapshots. When a virtual machine is restored using a snapshot, the subsequent snapshots will be lost effect.

B.

All virtual machines on a host can only create one memory snapshot at the same time.

C.

Snapshots can be saved within the virtual machine existing condition.

D.

Snapshots can save both virtual machine settings and data on virtual machine disks.

Full Access
Question # 86

Which of the following capabilities is not within the scope of EVS (cloud disk) snapshot capabilities

A.

Create snapshots to protect snapshot point-in-time data

B.

Rollback snapshot restores the data at the snapshot point in time to the original disk

C.

Delete the snapshot, delete the snapshot completely, cancel the data protection at this point in time

D.

Snapshot sharing, share snapshots to specified tenants

Full Access
Question # 87

In Huawei Fusioncompute, it is necessary to modify a certain disk of the virtual machine. Which of the following operations can be implemented?

(single choice)

A.

Change the status of the disk from available to unavailable

B.

Change the mode of the disk from slave to independent-persistent

C Change the capacity of the disk from 80G to 8G

D Change the configuration mode of the disk from thin to normal

Full Access
Question # 88

Which of the following functions does CPU virtualization in Fusioncompute support? (multiple choice)

A.

Support heterogeneous servers

B.

CPU resource over-allocation

C.

QOS

D.

Support Windows and Linux virtual machines to increase CPU online

Full Access
Question # 89

An enterprise plans to deploy Huawei FusionCloud and perform disaster recovery on Huawei Cloud. Due to financial constraints,

Considering the economy and security, you can use the --- service to integrate FusionCloud with Huawei

Cloud connectivity.

Full Access
Question # 90

FusionCloudis one of the public cloud products

A.

True

B.

False

Full Access
Question # 91

In FusionCloud 6.x, which of the following statements about backup is wrong?

A.

Backup protocol supports local, via FTP/SFTP to third-party server and OBS

B.

In order to ensure the stable operation of the system, backup and recovery of management data can ensure that the impact on the business is reduced to

lowest

C.

For the business recovery of CloudOpera, the same business can choose multiple backups to restore the actual file information

D.

The system supports both automatic backup and manual backup of data

Full Access
Question # 92

Which of the following scenarios is not suitable for linked-clone desktops

A.

The school's teaching desktop

B.

HD mapping desktop

C.

Office desks in the library

D.

call center desktop

Full Access
Question # 93

An enterprise plans to deploy OLTP database applications on FusionCloud, and the back-end data storage uses Huawei

OceanStor 6800 V5 storage. Which of the following configuration descriptions for storage RAID is the most appropriate?

A.

RAID5 4D+1P

B.

RAID6 4D+2P

C.

RAID10

D.

RAID5 8D+1P

Full Access
Question # 94

The distributed switch function of Fusion compute is similar to that of a physical switch. Which of the following options can link virtual machines

and physical network? (multiple choice)

A.

downlink

B.

Uplink

C.

port group

D.

VLAN Pool and Subnet Alarm Definition Rules

Full Access
Question # 95

To ensure the reliability of 0perationCenter, you can deploy the

Operation Center. When a major failure occurs in the data center where the Operationcenter production site is located (such as a major natural

disaster), the disaster recovery site takes over the business to ensure the normal operation of the data center business. Executable sh config in action

backup.sh command to configure production site and disaster recovery site. Which of the following does not execute the sh config backup.sh command

The result of post-system feedback?

A.

Drop disaster recovery configuration.

B.

Modify current disaster recovery configuration.

C.

Add disaster recovery configuration.

D.

Delete current disaster recovery configuration.

Full Access
Question # 96

There are two indicators for disaster recovery, RTO and RPO, which are correct (multiple choice)

A.

A service fails at 7:05, the service is restored at 7:30, the restored service data is the data at 7:00, and the RTO is 30 minutes

B.

A service fails at 7:05, the service is restored at 7:30, the restored service data is the data at 7:00, RPO for 30 minute

C.

A service fails at 7:05, the service is restored at 7:30, the restored service data is the data at 7:00, and the RPO is 5 minutes

D.

A service fails at 705, the service is restored at 7:30, the restored service data is the data at 7-00, and the RTO is 25 minutes answer

Full Access
Question # 97

In today's IT industry, the amount of data is growing rapidly, new; regulations are constantly introduced, in order to prevent data Loss, the protection business can be quickly switched after an accident, continue to work normally, the business will be designed when planning Disaster recovery and backup solutions, which of the following statements about disaster recovery and backup is false? ( one)

A.

If there is only disaster recovery, the production side has wrong operations, or the system upgrade fails, etc., it will be Synchronizing to the disaster recovery side will also cause data or business interruption.

B.

The backup is generally performed periodically. Once the data is damaged, the data will be restored from the recovery time to the last backup time. data in between will be lost.

C.

If there is only backup, the business cannot be recovered quickly, and data recovery takes time. During this time, the business cannot be used. For a certain industry, such business interruption cannot be tolerated.

D.

If there is only disaster recovery, business can be quickly recovered and data can be protected.

Full Access
Question # 98

The correct option for the agentless feature description of ebackup is

A.

No need to install agent on VRM

B.

No need to install the agent on the backup storage

C.

No agent needs to be installed on the protected virtual machine

D.

No need to install an agent on the CNA

Full Access
Question # 99

In Huawei FusionAccess, linked clone desktops can be reassigned after being deallocated.

A, TRUE

B. FALSE

Full Access
Question # 100

The source platform supported by Rainbow can be x86 architecture or Kunpeng architecture (judgment)

A.

TRUE

B.

FLASE

Full Access
Question # 101

An enterprise uses the cloud server backup service CSBS to ensure the security and accuracy of data.

After the data is damaged, use the cross-Az off-site backup copy to restore, generally need to manually update or switch DNS.

into business traffic switching. Manual switching is relatively time-consuming and can be deployed—the service realizes the above-mentioned business traffic.

switch automatically. (Fill in uppercase English abbreviations)

Full Access
Question # 102

In FusionAccess, when creating a virtual machine template, if required ------ group members can also log in

If you want to record a virtual machine, you need to check "Configure user login" when creating a virtual machine template

Full Access
Question # 103

In FusionAccess, AD group policy is a very important configuration in deployment and operation and maintenance.

——— and domain can set group policy.

(fill in the English abbreviation)

Full Access
Question # 104

In MangeOne, after the system installation and commissioning are completed, the security administrator needs to Users with the same role are granted different permissions to improve operation and maintenance efficiency and ensure system security. The following is about authorization planning

Which description of the principle is correct?

A.

If the scope of management objects for multiple roles is exactly the same, plan the scope of management objects for each role separately.

B.

Plan users with exactly the same responsibilities into the same role, and assign users with different responsibilities from other users

Plan for different roles.

If the application operations required by multiple roles are exactly the same, plan the application operation set separately for each role or not.

Plan the application action set.

C.

If the management scope and application operations of multiple roles are exactly the same, plan common applications for these roles

The operation set but the scope of management objects is planned separately for each role.

Full Access
Question # 105

FusionCloud supports the capability of one cloud and multiple pools, and supports heterogeneous virtualization. VMware and KVM virtualization.

The pool can be connected to the same Az for easy scheduling and management.

A.

TRUE

B.

FALSE

Full Access
Question # 106

The FusionAccess WI has displayed a list of virtual machines, but the virtual machine desktop cannot be logged in. Recommended for this situation.

Check from which of the following aspects? (multiple choice)

A.

Whether the template virtual machine is configured with an administrator password.

B.

Whether AD and HDC are double-clicked abnormally.

C.

Whether other users have logged in to the virtual machine.

D.

Whether the virtual machine cloudClient client is deleted by mistake.

Full Access
Question # 107

Resource pool planning considerations include geographic location, application type, virtualization type, resource type, etc. point. Which of the following descriptions about resource pool design in cloud computing planning are correct?

A.

Resource type: Divide different resource pools according to device model, manufacturer, performance, etc.

B.

Application type: According to the needs of the application, divide different resource pools based on the SLA capability requirements, such as according to the enterprise

Core business applications and general applications are divided into different resource pools

C.

Virtualization type: Divide different resource pools according to different virtualization systems used, or combine virtualization and

Divide non-virtualized resources into different resource pools

D.

Geographical location: Different resource pools can be divided based on latitudes such as DC, site or branch structure

Full Access
Question # 108

A virtual machine fails in FusionCompute. In the following description of business operations, the error is which items? (multiple choice)

A.

Force shutdown of the virtual machine

B.

Modify the startup mode of the virtual machine

C.

Restore the system disk of the virtual machine

D.

Delete the files in the Tools installation directory

Full Access
Question # 109

The following description about FusionCompute clusters, hosts and virtual machines, which option is incorrect of?

A.

Whether multiple hosts belong to the same cluster depends on whether they use the same shared storage

B.

A cluster is composed of storage and network resources associated with multiple host machines.

C.

Virtual machines can be migrated across clusters

D.

Hosts can be moved between different clusters

Full Access
Question # 110

in the user login connection process of FA, if the virtual machine is accessed through the TC, the HDC will. Which of the following information is generated?

A.

Address ticket

B.

Virtual Machine IP and Port

C.

Token

D.

Login ticket

Full Access
Question # 111

There is a one-to-one relationship between TA components and HCD components in FusionAccess, and one set of ITA can only manage one set of HDC (judgment).

broken)

A.

TRUE

B.

FLASE

Full Access
Question # 112

Which of the following scenarios requires manual data backup of each service instance in FusionCloud? (many)

A.

Routine backup

B.

Before the server replaces the hard disk

C.

Before upgrading the service instance

D.

Before major business adjustments

Full Access
Question # 113

In Rainbow's migration implementation process, it is necessary to build a

Create the target virtual machine on the target platform according to the proposed specifications. The following description about creating the destination virtual machine is correct.

What are the items? ( many)

A.

When creating a Windows destination virtual machine, if it is created through VRM, the disk mode type must be "Subordinate"

B.

If the system disk of the Linux source is in MBR format, the first disk of the destination virtual machine cannot be smaller than 2047GB

C.

It is recommended that the CPU and memory of the destination virtual machine be greater than or equal to the source specifications

D.

When creating the destination virtual machine, you must add a description containing the "Rainbow" field for the destination virtual machine

Full Access