Got it

H13-522 HCNP-Cloud-FCDC Mock Exam

Latest reply: Jan 16, 2017 07:23:45 1752 1 0 0 0
1. (Multiple Answer) Which of the following are key characteristics of cloud computing?
      A. On-demand utilization              B. Self-service
      C. Rapid service deployment       D. Elastic scaling

2. (Multiple Answer) What are the models of cloud computing?
      A. Private cloud    B. Public cloud  C. Hybrid cloud  D. Desktop cloud

3. (Multiple Answer) Which of the following components consist of FusionSphere?
      A. FusionManager                B. FusionInsight
      C. FusionCompute               D. FusionAccess

4. (T or F) FusionSphere is quoted based on the number of physical CPUs and VMs.

5. (T or F) FusionManager supports unified management on hardware and virtual resource pools.

6. (Single Answer) Which of the following statement is INCORRECT about FusionSphere security?
      A. System streamlining and hardening for improving system security: The security of virtualization platforms is improved by taking measures, such as using simplified OSs and auditing logs. The services and kernel of OSs are core OS content, which cannot be adjusted.
      B. Network security isolation: Network security is protected by taking measures, such as isolating service networks from infrastructure platform networks, isolating VMs using VLANs, isolating security groups, performing dynamic ARP probing, and suppressing broadcast packets.
      C. Account security management: Complying with the account-role model, each role is managed based on rights (such as the rights to create a VM or volume) and domains (in the dimension of logical clusters).
      D. User information security: User information security is protected by controlling data access rights, clearing bits, and encrypting data disks.

7. (Single Answer) Which of the following statement is INCORRECT about unified FusionSphere resource management?
      A. FusionManager supports unified management on hardware devices, virtual resources, and applications.
      B. FusionManager supports unified management on both cloud and non-cloud resources.
      C. FusionManager supports unified management on midrange computers.
      D. FusionManager supports heterogeneous hardware management and virtualization management.

8. (Multiple Answer) Which of the following achieve experienced FusionSphere project delivery?
      A. Comprehensive integration service tools.
      B. E2E data migration solutions.
      C. Lack of service migration experience.
      D. A mature migration flow.

9. (Multiple Answer) Which of the following statements are CORRECT about memory sharing used in Huawei computing virtualization memory multiplexing?
      A. The VMs sharing memory must be running the same OS.
      B. VMs can only read data from shared memory.
      C. When a VM is required to write data into memory, a new piece of memory must be allocated, and the mapping must be changed.
      D. Enabling and disabling memory sharing increases overheads.

10. (Multiple Answer) Which of the following statements are INCORRECT about online computing resource adjustment in Huawei computing virtualization?
      A. Not all OSs support online vCPU and vRAM adding.
      B. If a guest OS does not support live computing resource adding, the added resources take effect after the VM is restarted.
      C. FusionCompute supports live deletion of CPUs and memory.
      D. All OSs support online vCPU and vRAM adding.

11. (Multiple Answer) Which of the following statements are CORRECT about host NUMA in Huawei computing virtualization?
      A. Host NUMA deploys the physical memory of a VM on a node and limits the vCPU scheduling range of the VM to the physical CPU on the same node.
      B. Host NUMA ensures that the NUMA topology is transparently transmitted to applications running on host OSs to optimize NUMA for key applications and shorten memory access latency, thereby improving VM performance.
      C. Host NUMA optimizes the NUMA topology when VM programs are running.
      D. Host NUMA selects VMs from the node with insufficient CPU resources and reallocates the VM CPU resources to the node with sufficient CPU resources. This function eliminates the VM performance bottleneck due to insufficient CPU resources on a node.

12. (Single Answer) Which of the following snapshot technologies does not deteriorate the performance of the original volume?
      A. Row       B. Cow       C. WA

13. (T or F) FusionStorage uses the redirect-on-write (ROW) technology when storing snapshot data. Snapshot creation does not deteriorate the performance of the original volume.

14. (Single Answer) Some Huawei desktop cloud users incorrectly set their VM IP addresses to gateway IP addresses, causing the network access failure of other desktop cloud users. Which of the following functions can be enabled to prevent this issue from occurring?
      A. ARP broadcast packet suppression for VMs.
      B. IP broadcast packet suppression for VMs.
      C. Prohibition against IP address changing.
      D. IP and MAC address binding.

15. (Multiple Answer) Which of the following statements are INCORRECT about the data transmission of an SR-IOV NIC?
      A. Each VF requires a separate queue pool.
      B. PFs distribute data packets to required VFs.
      C. SR-IOV passthrough bypasses the hypervisor, thereby featuring high performance.
      D. The data exchange between the VMs on the same physical server does not require an NIC.

16. (Multiple Answer) Which of the following statements are CORRECT about hardware virtualization firewalls connected to FusionManager?
      A. FusionManager centrally manages hardware firewalls.
      B. A virtual network created in FusionManager can associate with the firewalls virtualized from a physical firewall device.
      C. The commands for setting elastic IP addresses, NAT, ACL, and VPN in FusionManager are issued to the hardware virtualization firewall.
      D. A hardware virtualization firewall also functions as a layer 3 gateway of a virtual network.

17. (Multiple Answer) Which of the following statements are CORRECT about software load balancers used in the Huawei cloud computing environment?
      A. The HA proxy load balancing software is deployed on VMs.
      B. Software load balancers feature flexible deployment and simplified management, requiring no additional hardware.
      C. Due to limited performance, software load balancers do not apply in high-throughput scenarios.
      D. Software load balancers implement their own HA using VM HA.

18. (Single Answer) Based on which does NAPT identify servers?
      A. Private IP addresses
      B. Public IP addresses
      C. Source port numbers
      D. Destination port numbers

19. (T or F) FusionSphere supports access control over and rights- and domain-based management on Portal users, facilitating orderly system maintenance carried out by the maintenance team with responsibilities demarcated.

20. (Multiple Answer) Which of the following data-level DR models are supported by the Huawei cloud computing DR backup solution?
      A. Host-based replication DR
      B. Storage-based replication DR
      C. CDP DR
      D. Cloud active-active DR

Answers:
/ 1 ABCD / 2 ABC / 3 AC / 4 F / 5 T / 6 A / 7 C / 8 ABD / 9 ABCD / 10 CD / 11 AD / 12 A / 13 T / 14 D / 15 BCD / 16 ABCD / 17 ABCD / 18 D / 19 T / 20 AB
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.