New Year Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H13-811_V3.0 Questions and Answers

Question # 6

host monitoring supports monitoring of elastic cloud servers and bare metal servers.

A.

True

B.

False

Full Access
Question # 7

Elastic cloud servers between different availability zones in the same area cannot communicate with each other.

A.

True

B.

mistake

Full Access
Question # 8

Which of the following services does not belong to security management

A.

SSL certificate management

B.

Container Security Service

C.

Security Expert Service

D.

Situational awareness

Full Access
Question # 9

Which of the following file system types does Resilient File Service have?

A.

SFS

B.

SFS Turbo Standard

C.

SFS Turbo enhanced

D.

SFS Turbo Performance Type

Full Access
Question # 10

Which of the following database examples supports GIS geographic information processing and is suitable for location application systems?

A.

SQLServer

B.

MongoDB

C.

MySQL

D.

PostgresQL

Full Access
Question # 11

Which SDK language does the API gateway support?

A.

Java

B.

C

C.

РHР

D.

delphi

Full Access
Question # 12

Sending alarm information is sent through the message notification service.

A.

True

B.

mistake

Full Access
Question # 13

loT Internet of Vehicles solution, All used HUAWEI CLOUD El Which services?

A.

Map Reduce service MRS

B.

Data Access Service DIS

C.

Real-time streaming computing service Cloud Stream

D.

Graph Computing Service GES

Full Access
Question # 14

Description of Virtual Gateway,Which of the following is wrong?

A.

When deleting a virtual gateway, there is no need to delete the virtual interface bound to it

B.

The virtual gateway is bound to the user's local data centerVPC

C.

When configuring the virtual gateway, only the ones directly connected to the virtual gateway can be configuredVPC

D.

virtual gateway is the access router of the physical leased line

Full Access
Question # 15

Which of the following functions does RDS provide?

A.

Users can set alarm rules for relational database

B.

Users can set automatic backup strategies and create manual backups, And use the backup to restore the database instance

C.

Cloud DBA can help you conduct a comprehensive analysis of the instance, Centralized reflection of the performance and operating status of the database instance. Via Cloud D

D.

BA diagnosis and diagnosis opinions, You can maximize the discovery of existing or potential health problems in the database, And deal with it in time

E.

Users can create and delete database instances, Modify the database port number

Full Access
Question # 16

When creating an elastic cloud server, The elastic cloud server can be initialized through the "file injection" function provided by the system.

A.

True

B.

mistake

Full Access
Question # 17

What can't be achieved in the description of the use of elastic load balancing?

A.

Check the health of the service node

B.

Eliminate single points of failure

C.

Forwarding of Layer 2 and Layer 3 data

D.

Allocate service node pressure

Full Access
Question # 18

What applications and services does Huawei Cloud Application Supermarket provide?

A.

Developer tools

B.

commercial software

C.

Basic software

D.

professional service

Full Access
Question # 19

Which of the following is not a capability of the software development cloud?

A.

Compile and build

B.

data backup

C.

Code check

D.

Project management

Full Access
Question # 20

When modifying the VPN connection, which of the following parameters can be modified?

A.

Remote network

B.

VPN connection name

C.

This terminal network

D.

Remote gateway

Full Access
Question # 21

by creating(), The system can automatically back up the cloud hard disk at a set point in time.

A.

Backup

B.

Label

C.

Backup strategy

D.

shared

Full Access
Question # 22

Description of cloud server group, Which of the following is correct?

A.

There is no association between the cloud server group and the cloud server group

B.

Elastic cloud servers in the same cloud server group will try to be created on the same host

C.

Elastic cloud servers in the same cloud server group will be created on different hosts as dispersed as possible

D.

The elastic cloud servers in the cloud server group comply with the sameone Strategy

Full Access
Question # 23

Elastic scaling service is based on the user's business needs, A service that automatically adjusts its business resources through strategies.

A.

True

B.

False

Full Access
Question # 24

Install Cloudbase before creating a private image-init. The purpose of this tool is to ensure that new cloud servers created with private images can be customized.

A.

True

B.

False

Full Access
Question # 25

What are the deployment modes of cloud computing?

A.

Private Cloud

B.

Hybrid cloud

C.

Community Cloud Industry Cloud

D.

Public cloud

Full Access
Question # 26

The description of the redundant physical leased line is the following error?

A.

Redundant physical dedicated lines are more reliable to prevent accidents and ensure smooth business operations

B.

Redundant leased lines require users to set the main physical leased line and standby physical leased line by themselves

C.

When two dedicated lines are connected to different access points in the same area, Then the two physical dedicated lines are redundant for each other

D.

When a physical dedicated line fails, The system will automatically switch to another physical dedicated line

Full Access
Question # 27

Which of the following parameters need to be configured for Cloud Monitoring to create an alarm rule?

A.

Monitoring indicators

B.

Alert strategy

C.

Monitoring time

D.

Alert level

Full Access
Question # 28

Which of the following is wrong about the description of the expected number of instances in elastic scaling?

A.

The number of expected instances cannot be less than the minimum number of instances

B.

can trigger the scaling activity by manually adjusting the expected number of instances

C.

The trigger element method of the scaling strategy changes the number of expected instances

D.

The number of expected instances cannot be greater than the maximum number of instances

Full Access
Question # 29

The access control strategy is one of the security protection components provided by the API gateway.

A.

True

B.

False

Full Access
Question # 30

What are the ways to connect to the public network (Internet)?

A.

Elastic public network ip

B.

Cloud monitoring

C.

NAT gateway

D.

Elastic load balancing

Full Access
Question # 31

Which item does not exist in the configuration of creating Listener?

A.

Load balancer protocol port

B.

Load method

C.

HTTPSE certificate

D.

Belonging VPC

Full Access
Question # 32

What service is CloudTable based on?

A.

HDFS

B.

OBS

C.

MySQL

D.

HBase

Full Access
Question # 33

RDS can be used in combination with which of the following cloud services ,So as to ensure that the RDS instance is safely isolated from other services on the network?

A.

VPC

B.

OBS

C.

ECS

D.

CES

Full Access
Question # 34

What are the product advantages of VPC?

A.

Flexible deployment

B.

dynamicBGP

C.

Safe isolation

D.

Support hybrid cloud deployment

Full Access
Question # 35

The main function of database security service does not include which of the following?

A.

Anti-reptile

B.

Database firewall

C.

Database audit

D.

Sensitive data discovery and desensitization

Full Access
Question # 36

twenty one OSBrowser is an object storage service client running on Linux systems.

A.

True

B.

mistaken

Full Access
Question # 37

file system can be mounted to()superior.

A.

Elastic cloud server for Linux system

B.

Dedicated computing cluster

C.

Bare metal server

D.

Elastic cloud server for Windows system

Full Access
Question # 38

HUAWEI CLOUD El What solutions are provided?

A.

Park Agent

B.

Traffic agent

C.

Industrial Agent

D.

Internet of Vehicles Intelligent Body

Full Access
Question # 39

relational database binding()Later, it can be accessed through the external network

A.

Flexible ip

B.

Data disk

C.

system disk

D.

Mirroring

Full Access
Question # 40

Each cloud server backup can only create one whole machine image, For cloud server backups that have already created the entire machine image, the entire machine image cannot be created anymore.

A.

True

B.

False

Full Access
Question # 41

In order to use the ping program to test the communication status between elastic cloud servers, Which of the following protocols need to be added to the security group?

A.

HTTPS

B.

TCP

C.

HTTP

D.

ICMP

Full Access
Question # 42

Which of the following methods can be used to set the access permissions for anonymous users of OBS objects?

A.

OBS bucket ACL

B.

About OBS Object Policy

C.

About OBS Bucket Policy

D.

OBS object ACL

Full Access
Question # 43

After the object storage service creates a bucket successfully, Cannot change area, so, When creating a bucket, choose the region carefully.

A.

True

B.

mistake

Full Access
Question # 44

When creating a whole machine image, Which mirror sources can be selected?

A.

Bare metal server

B.

Cloud server backup

C.

Mirror file

D.

Cloud Server

Full Access
Question # 45

Which option below is Huawei's cloud A1 chip?

A.

Inferentia

B.

MLU100

C.

Cloud TPU

D.

Ascend 910

Full Access
Question # 46

Elastic Cloud Server is bound( ), you can provide access to the outside through a fixed public network I address.

A.

system disk

B.

Mirroring

C.

Data box

D.

Elastic public network ip

Full Access
Question # 47

Which of the following options are the monitoring indicators of OBS?

A.

Upload traffic

B.

Number of GET requests

C.

Number of PUT requests

D.

Download traffic

Full Access
Question # 48

The API gateway service is a booster for the digital transformation of enterprises.

A.

True

B.

mistake

Full Access
Question # 49

Financial insurance users who apply for reimbursement need to provide ID cards, medical documents and other materials. Through image recognition services, information can be automatically entered and verified and proofread.

A.

True

B.

False

Full Access
Question # 50

Anti-DD Which of the following options are included in the main protection types of os?

A.

Resistant to application attacks

B.

Anti-data attack

C.

Anti-brute force cracking

D.

Anti-traffic attacks

Full Access
Question # 51

The file system supports batch creation.

A.

True

B.

False

Full Access
Question # 52

Which of the following are the main functions of the Enterprise Host Security HSS?

A.

Weak password detection

B.

Software vulnerability detection

C.

Remote login detection

D.

Malicious program detection

Full Access
Question # 53

Which of the following is wrong about the description of purchasing a physical leased line?

A.

It is recommended that you consult with the operator about the access plan and pricing plan before purchasing a dedicated line for self-service.

B.

If you want to create a managed line, you can only choose the partner purchase method.

C.

Self-purchase method After purchasing a physical dedicated line, there is no need to contact the operator to construct access to equipment in the computer room.

D.

The physical dedicated line supports both partner purchase and self-service purchase.

Full Access
Question # 54

data access service provides a one-stop big data collaborative development platform,Help users easily complete multiple tasks such as data modeling, data integration, script development, and job scheduling.

A.

True

B.

mistake

Full Access
Question # 55

What are the components of the elastic cloud server?

A.

CPU

B.

Cloud hard drive

C.

RAM

D.

Mirroring

Full Access
Question # 56

IP The Sec framework contains several protocols, which are the important ones?

A.

AH

B.

IP

C.

ESP

D.

IKE

Full Access
Question # 57

cloud hard disk supports multiple backups per day.

A.

True

B.

False

Full Access
Question # 58

What is the deduction period of API gateway?

A.

sky

B.

minute

C.

Hour

D.

Second

Full Access
Question # 59

security expert services can provide one-stop security professional services including website security physical examination, host security physical examination, security reinforcement, security monitoring, emergency response and security product hosting.

A.

True

B.

mistake

Full Access
Question # 60

Virtual machines that are not bound to EIP can access the external network by configuring custom routes.

A.

True

B.

mistake

Full Access
Question # 61

After purchasing a VPN gateway, a public network exit IP address will be automatically assigned to the VPN gateway.

A.

True

B.

False

Full Access
Question # 62

Description of VPN gateway bandwidth is the following error?

A.

You can configure alarm rules in cloud monitoring to monitor bandwidth

B.

The sum of VPN connection bandwidth can exceed the bandwidth of the VPN gateway

C.

During the use of VPN, when the network traffic exceeds the VPN bandwidth, it may cause network congestion and cause the VPN connection to be interrupted.

D.

The bandwidth of the local VPN gateway is the bandwidth shared by all VPN connections created based on the gateway

Full Access
Question # 63

Which of the following options is not an advantage of cloud hard drives?

A.

High reliability

B.

Rich specifications

C.

Can be used alone

D.

Easy to use

Full Access
Question # 64

Which of the following types of certificates are in elastic load balancing?

A.

Sub-certificate

B.

Root certificate

C.

CA certificate

D.

Server certificate

Full Access
Question # 65

Elastic Cloud Server is bound()Rear. Can be through the fixed public network IP The address provides external access.

A.

system disk

B.

Mirroring

C.

Data disk

D.

Elastic public network ip

Full Access
Question # 66

Object storage services are physical storage disks.

A.

True

B.

mistake

Full Access
Question # 67

Cloud hard disk backup cannot be used to create a new system disk.

A.

True

B.

mistake

Full Access
Question # 68

After deactivating the scaling group, Which of the following operations or activities will still be performed?

A.

Health check continues to check the health status of the instance

B.

The scaling activity will still proceed after manually adjusting the expected number of instances

C.

Stretching activities that have started will continue

D.

Instances with abnormal health checks will be removed

Full Access