Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H13-531_V2.0 - HCIE-Cloud Computing (Written) V2.0

Page: 9 / 16
Total 765 questions

When backing up data, which backup method is the most space-saving, and which method is most suitable for restoring data quick? ( one)

A.

Full backup, Incremental backup

B.

Differential backup, full backup C. Incremental backup, full backup

C.

Incremental backup, differential backup

D.

full backup, differential backup

When eReplication performs disaster recovery on data, an agent needs to be installed on the protected host, using to identify the application information; for virtual machine disaster recovery, there is no need to install agent.

A.

TRUE

B.

FALSE

A FusionAccess system maintenance engineer is performing data recovery operations on the ITA server. by

Which of the following descriptions about ITA data recovery is correct? ( many)

A.

The copy task in the recovery process can be completed by the remote copy software WinSCP

B.

It can be verified whether the ITA service is restored by checking whether the ITA alarm is eliminated and whether the desktop can be issued normally.

no success

C.

There is no need to uninstall and then reinstall the ITA during the recovery process

D.

After the ITA data is restored, the data from the backup time to the restore time will be lost

The desktop cloud can completely replace the traditional physical desktop and realize the refined management and control of the enterprise desktop.

A.

TRUE

B.

FALSE

Which of the following descriptions about NUMA technology is correct? (many)

A.

The speed of CPU access to memory in the same Node is similar to that of accessing memory in other Nodes

B.

NUMA technology divides the CPU into different groups (Nodes), each Node consists of one or more CPUs,

And have independent local memory, I/O and other resources

C.

Consider NUA topology when allocating memory and CPU, providing initial placement, load balancing, and dynamic memory migration etc. function

D.

Non-uniform Memory Architecture (Non-uniform Memory Architecture) solves multiprocessor systems Scalability issues in

Which of the following items may cause the OpenStack Cinder-volume component to be abnormal? (many)

A.

DNS configuration error

B.

Cinder-volume node time is inconsistent

C.

The back-end storage network configuration is incorrect

D.

The network of the storage management plane is abnormal

The Neutron project provides network services in OpenStack. In native scenarios, virtual

The internal communication of a single node and the communication of virtual machines across nodes need to be supported by the virtual machine network inside the physical host.

Among them, the virtual network bridge (or virtual machine switch) is a kind of important homogeneous element in the virtual network, and carries the control

A series of flow tables issued by the level, such as

The virtual bridge is implemented by --- open source software. (Please fill in the English abbreviation)

Which of the following descriptions about disaster recovery technology is wrong? (Multiple)

A.

Disaster recovery can achieve RPO=0

B.

Backups are generally performed periodically

C.

Disaster recovery can replace the role of backup

D.

RTO=0 during backup and recovery

[Judgment] eBackup only supports data backup in virtualization scenarios.

Physical machine, but also supports disaster recovery of virtual machine.

A.

TRUE

B.

FALSE

In Huawei's private cloud FusionCloud, the CMP role is FushionSphere OpenStack.

It is responsible for resource abstraction, resource allocation and scheduling, and application lifecycle management.

A.

TRUE

B.

FALSE

Which of the following options are the basic services of FusionCloud 6.3? (many)

A.

NTP

B.

IMS

C.

LVS

D.

CSBS

In the next FusionCloud, the user is using the Linux type public image to create an elastic cloud server After that, some operations belong to high-risk or prohibited dry operation, the following descriptions of ECS high-risk or prohibited operations,

Which one is wrong?

A.

Modifying the permissions or names of system directories may cause the system to fail to run or start normally

B.

Modifying the system default DNS SERVER (/etc/resolv.conf may result in a one-key reset password function unavailable

C.

Deleting system directories or files may cause the system to fail to operate or start normally

D.

Modifying the content of the /etc/issue file may cause the system release version to not be recognized

When installing FusionCloud 6.3, which of the following statements is correct? (many)

A.

When FusionCloud 6.3 is installed, the deployment scenario needs to be determined.

B.

FusionCloud 6.3 is installed uniformly using FCD.

C.

Fusioncloud 6.3 requires manual installation of all components.

D.

Fusioncloud 6.3 needs to determine the cloud service type during installation, and the installation is completed at one time.

Using Rainbow to migrate the virtual machine of the original Hper-V virtualization platform to FusionSphere

In the cloud platform, which of the following descriptions are correct? ( many)

A.

Support Windows system file-level migration CPU utilization control

B.

Rainbow hConvertor can support offline migration

C.

Support Linux system file-level migration timing startup

D.

Both Windows system and Linux system migration tasks support block-level migration

An enterprise plans to deploy FusionC loud, when the business storage FusionStorage adopts. _Deployment method

During deployment, you need to manually install and configure the storage node operating system. (Please fill in the deployment

Way)