Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H13-531_V2.0 - HCIE-Cloud Computing (Written) V2.0

Page: 12 / 16
Total 765 questions

Backup supports two backup methods. CBT does not keep snapshots on the production side, and occupies its storage space.

Smaller, snapshots are stored on the production side compared to snapshots, which take up more storage space.

A.

TRUE

B.

FALSE

In FusionCompute, if the SRIOV pass-through NIC is used for the uplink, the virtual switch needs to select the SRIOV mode. Which of the following descriptions about the SRIOW function is correct? (many)

A.

SR-OV realizes the distribution of PCI functions to multiple virtual interfaces to share a PCI in a virtualized environment

device resources

B.

SR-IOV reduces the V/O overhead in the software simulation layer to improve the network forwarding performance of the virtual machine

C.

SR-IOV can only assign a physical NIC device to one virtual machine

D.

The port group created in the distributed switch that selects the SRIOV pass-through mode, the port type can only be used "ordinary"

Which of the following are the functions provided by the operation plane of ManageOne? (many)

A.

VDC Management

B.

Application management

C.

Application resource monitoring

D.

project management

Which of the following cloud services are supported by the three TYPE scenarios of FusionC1oud? ( many)

A.

OBS

B.

EIP

C.

VAPP

D.

AS

In the FusionCloud private cloud solution, the following is about the cloud server disaster recovery service CSDR deployment And the description of the switching scheme, which one is wrong? ( one)

A.

CSDR is a cross-region fire tolerance. When it needs to be used, at least two regions need to be planned. According to the two

The distance and delay of the Region can determine whether to use synchronous replication or asynchronous replication

B.

Tenants can create their production business in any Region, and create placeholders in another Region

Virtual machine, occupying the private 1P address of the virtual machine is recommended to be consistent with the production virtual machine to reduce in-app virtualisation

Interaction between machines

C.

The tenant creates a protection instance through the CSDR service, and it is recommended to protect all VMs in key applications to

Reduce the complexity of tenant business deployment and recovery

D.

When a disaster occurs in a data center, the disaster recovery administrator logs in to BCManager eReplication

Manual failover of protection instances and manual startup of placeholder virtual machines

[Judgment] In the ManageOne operation plane, if the parent VDC has unlimited quota (that is, the quota upper limit is source pool), the child VDC support is set to unlimited quota.

A.

TRUE

B.

FALSE

Which of the following descriptions about VDI and IDV of the desktop cloud architecture are correct? (many)

A.

VDl is a complete technological innovation, and the fixed office adopts the structure of thin terminal + cloud virtual desktop

B.

VDI can be extended to any terminal, and there is no local data, which solves the problem of high management and maintenance costs of traditional solutions, and high efficiency. Low rate, insecurity, etc.

C.

The IDV scheme introduces local virtual desktops, which reduces the complexity of the terminal and makes management and maintenance more difficult and less expensive.

Compared with traditional PC or VDI, it is greatly improved

D.

Compared with traditional PC+ management software, IDV has only made small improvements, generally including mirror server+

Management software + local virtual desktop terminal

Which of the following descriptions about FusionCloud's cloud disk service EVS are correct? (many)

A.

Calling the externally open interface of EVS can realize EVS application, expansion and deletion and other functions.

B.

EVS needs to be mounted to ECS and formatted before it can be used normally.

C.

EVS provides basic block storage functions.

D.

EVS supports creating cloud disk snapshots.

In the process of operation and maintenance management, the relevant functional components of the data center can be accurately identified, and the design capabilities of the components can be understood and determined.

Define the monitoring indicators that match the technical characteristics of the component, and through active and passive management, to maximize the guarantee of data in the normality of each management component of the heart, the above description is of the four operation and maintenance goals of the data center————

Which of the following information is mainly monitored by the FusionAccess gateway (multiple choice)

A.

Gateway basic information

B.

Virtual Machine Usage Information

C.

Basic information of components

D.

User connection information

In FusionCompute, what is the north-south flow of business data?

A The virtual machines in the data center access each other

B. Traffic generated by customers accessing the data center through the Internet

C. Cross-data center mutual access between virtual machines

D. Virtual machine live migration

In FusionAccess, when creating a virtual machine template, if required ------ group members can also log in

If you want to record a virtual machine, you need to check "Configure user login" when creating a virtual machine template

Resource pool planning considerations include geographic location, application type, virtualization type, resource type, etc. point. Which of the following descriptions about resource pool design in cloud computing planning are correct?

A.

Resource type: Divide different resource pools according to device model, manufacturer, performance, etc.

B.

Application type: According to the needs of the application, divide different resource pools based on the SLA capability requirements, such as according to the enterprise

Core business applications and general applications are divided into different resource pools

C.

Virtualization type: Divide different resource pools according to different virtualization systems used, or combine virtualization and

Divide non-virtualized resources into different resource pools

D.

Geographical location: Different resource pools can be divided based on latitudes such as DC, site or branch structure

In the user login connection process of FA, after the user clicks the virtual desktop icon on the WI page, the following information is also included:

Which steps (multiple choice)

A.

ITA sends username and password to virtual machine

B.

HDC checks whether licnese is satisfied

C.

The virtual machine uses the domain account password to log in to AD for authentication

D.

TC establishes a login connection with the virtual machine

UItraVR supports centralized and distributed deployment. Which of the following statements about centralized and distributed deployment is wrong?

A centralized deployment scenario, UltraVR server is deployed at the production site and disaster recovery site

B. Centralized deployment scenario, UltraVR server is deployed at the disaster recovery site

C In the distributed deployment scenario, the UltraVR server is deployed at the disaster recovery site

D. In the distributed deployment scenario, the UtraV monthly server is deployed on the production site and the disaster recovery site