Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-921_V1.0 - HCIE-Data Center Network (Written) V1.0

Page: 3 / 8
Total 239 questions

The following: "Support docking with the community or third-party commercial OpenStack + third-party cloud management platform." "What level of the CloudFabric solution architecture is described?"

A.

Network service layer

B.

Business presentation/collaboration layer

C.

Network Analysis/Control Layer

D.

Compute the access layer

Which of the following descriptions of container technology and virtual machine technology is wrong?

A.

Container images are smaller than virtual machines

B.

Containers start up faster than virtual machines

C.

Containers don't need separate kernels

D.

Containers are more isolated than virtual machines

Which of the following needs to be configured in OpenStack when configuring intranet cross-VPC access (over the wall) in OpenStack? ?

A.

Networking

B.

Routing

C.

VPC interworking

D.

Specify the source firewall

In the Multi-Site scenario of a CloudFabric solution, what are the correct items in the following description of Layer 2 interoperability?

A.

In the mapped VNI mode, the Fabric GW at both ends uses BGP EVPN to negotiate a mapped VNI, and all packets sent to the peer end are routed using the mapped VNI VXLAN packing

B.

In practice, different sites have their own independent VNI space, so VXLAN tunnels inside different sites are likely to use different VNI C. Layer 2 interconnection is supported in two modes: local VNI and mapped VNI

C.

In local VNI mode, the local VNI of the local Fabric GW is used as the outbound VXLAN packet to encapsulate VXLAN packets to the VNI

Of the basic concepts of computing virtualization technology, which of the following is the operating system running within a VM?

A.

Host OS

B.

Guest Machine

C.

Guest OS

D.

Hypervisor

OpenStack abstracts networks based on Neutron components, including Network, Subnet, and Port Which one is wrong?

A.

The virtual machine is associated with the network through a port

B.

Neutron's ML2 plug-in components provide Network, Subnet, and Port services

C.

A subnet is an IPv4/IPv6 address segment, and the subnet needs to be mapped to the network

D.

Network is an isolated Layer 2 network, including VLANs and VXLANs

Which of the following monitoring log levels does iMaster NCE-FabricInsight support?

A.

0 ~ 4

B.

0 ~ 7

C.

0 ~ 5

D.

0 ~ 6

Which of the following describes the error of the three-level rollback function supported by iMaster NCE-Fabric?

A.

Network-wide rollback allows you to roll back the entire network configuration to before the configuration change to quickly restore services

B.

The three-level rollback function supports manual backup and automatic backup, and supports automatic recovery when the network is abnormal

C.

Tenant snapshots are backups and restores of the network at tenant granularity

D.

Service rollback supports single-point service recovery

There are three main ways to achieve I virtualization: full virtualization, paravirtualization, and hardware-assisted virtualization. The following description of 1/O anthropomorphism, what are the correct terms?

A.

Full virtualization: Completely use software to emulate real hardware, such as a keyboard and mouse

B.

Paravirtualization: Introduce a privileged virtual machine (Doman0) to run the hardware driver, and the rest of the GuestOS is accessed by 1/0 devices through the privileged virtual machine

C.

Hardware-Assisted Virtualization: The 1/O device driver is installed directly in the virtual machine operating system and can be used without any modification to the operating system

D.

Compared with para-virtualization and hardware-assisted virtualization, full virtualization has the lowest latency and the best performance

iMaster NCE-Fabric provides an intelligent event function based on user intent, which can close the loop on fault events. Which of the following is a closed-loop approach to business failures?

A.

This section displays the details of the abnormal re-insurance flow monitoring

B.

Notify the user of a failure

C.

Provide a remediation plan

D.

Fix the network configuration associated with an unknown link