Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H13-531_V2.0 - HCIE-Cloud Computing (Written) V2.0

Page: 14 / 16
Total 765 questions

In FusionCloud, which of the following may be the possible reasons for the failure of cloud disk creation? (multiple choice)

A.

Insufficient storage resources in the resource pool

B.

The ManageOne operation and maintenance plane resource pool cannot obtain data

C.

The configuration of the cloud disk type label is incorrect

D.

Nova component exception

The security management mechanism of the desktop cloud FusionAccess system includes access security, user information security and

And desktop management component security. Which of the following is about user information security? (one)

A.

FusionAccess adopts the mechanism of SSL and certificate authentication for terminals to ensure that only secure terminals are

to access the desktop cloud

B.

FusionAccess supports fingerprint login authentication, dynamic password authentication, USBKey authentication, and fixed terminal

Authentication and other login methods C. The information transmission from the desktop cloud system client to the server, and the information transmission between the internal components of the system are all

Based on SSL encryption mechanism to ensure the security of information transmission

C.

FusionAccess reinforces the operating system and management system of the management server to ensure that the entire

Security of desktop cloud management system

Which of the following descriptions about Fusioncompute snapshots is incorrect? (one)

A.

A virtual machine can create multiple snapshots. When a virtual machine is restored using a snapshot, the subsequent snapshots will be lost effect.

B.

All virtual machines on a host can only create one memory snapshot at the same time.

C.

Snapshots can be saved within the virtual machine existing condition.

D.

Snapshots can save both virtual machine settings and data on virtual machine disks.

A virtual machine fails in FusionCompute. In the following description of business operations, the error is which items? (multiple choice)

A.

Force shutdown of the virtual machine

B.

Modify the startup mode of the virtual machine

C.

Restore the system disk of the virtual machine

D.

Delete the files in the Tools installation directory

In FusionAccess, AD group policy is a very important configuration in deployment and operation and maintenance.

——— and domain can set group policy.

(fill in the English abbreviation)

To ensure the reliability of 0perationCenter, you can deploy the

Operation Center. When a major failure occurs in the data center where the Operationcenter production site is located (such as a major natural

disaster), the disaster recovery site takes over the business to ensure the normal operation of the data center business. Executable sh config in action

backup.sh command to configure production site and disaster recovery site. Which of the following does not execute the sh config backup.sh command

The result of post-system feedback?

A.

Drop disaster recovery configuration.

B.

Modify current disaster recovery configuration.

C.

Add disaster recovery configuration.

D.

Delete current disaster recovery configuration.

When using Rainbow for virtual machine migration, winSrcAgent will automatically identify the operating system type of the source virtual machine (judgment new)

A.

TRUE

B.

FLASE

Which of the following components is not involved in the process of Fusion access issuing virtual desktops?

A.

HDC

B.

WI

C.

ITA

D.

GaussDB

In a FusionCloud private cloud, configure a VPC service instance by creating a VPC service instance

The network services meet the needs of different business applications. The following descriptions about VPC related concepts are wrong

Which one is it?

A.

SNAT network service meets the needs of using a small number of public network IPs to access the external network

B.

Provide a secure and isolated network environment, and create subnets in VPC

C.

The virtual machine under Type I can communicate with the DC external device through the dedicated line service and can be automatically configured by the system

D.

Realize three-layer intercommunication between different isolated domains such as web, APP, and DB through VPC Peering

In the FusionCloud private cloud environment, the elastic IP service refers to the

Binding of associated cloud hosts in the network, so that business resources in the VPC can pass through a fixed public IP address

Provide external access services or access the public network. The following description about elastic IP binding cloud host, error

Which is it?

A.

When using the routing network to search for the cloud host network card, the list only displays the cloud host network card corresponding to the network

B.

When using the IP address to search for the cloud host network card, if the cloud host network card corresponding to the entered IP address is not

Bind the elastic IP, the search result is all the network cards under the cloud host that can be bound to the elastic IP

C.

When using the IP address to search for the cloud host network card, if the input IP address corresponds to the cloud host network card

The elastic IP has been bound, the search result is empty

D.

When the elastic IP of one cloud host belongs to the same external network, these cloud hosts need to apply for external external network, cannot directly share the bandwidth of the same external network

existrainbowmigrateWindowsWhen a virtual machine is used, which ports are recommended to be opened on the source virtual machine

A.

80

B.

445

C.

8899

D.

22

In ManageOne, the administrator can know what is in the user's system through the user monitoring session.

Online users and the addresses of these users accessing the system, the time of access, and the roles they belong to.

A, TRUE

B. FALSE

During the desktop cloud maintenance process, the operation and maintenance engineers regularly sequence and restart the infrastructure according to the business. The following is about regular.

What is wrong with restarting the infrastructure virtual machine?

A.

After restarting the ITA master node, the service being issued will be interrupted. It is recommended to restart without the service being issued.

B.

The time period for restarting the virtual machine cannot conflict with the time period of other automatic scheduled tasks

C.

In the scenario where the desktop access service passes through the gateway, restarting the virtual machine of the active or standby VAG/LB node does not affect the use of the connected users

D.

In the scenario where the desktop access service does not pass through the gateway, restarting the virtual machine of the main VAGNLB node does not affect the use of the connected users

Security administrators can maintain user, role and action set information and reset other User password, in which role information maintenance includes which of the following common operations (multiple choices)

A.

Modify role information

B.

Import role information

C.

View role information

D.

delete role information

Which of the following functions does CPU virtualization in Fusioncompute support? (multiple choice)

A.

Support heterogeneous servers

B.

CPU resource over-allocation

C.

QOS

D.

Support Windows and Linux virtual machines to increase CPU online