Exam4Training

Huawei H13-511_V4.0-ENU HCIA-Cloud Computing V4.0 Online Training

Question #1

A virtual machine whose status is "running" can only clone one virtual machine at a time, the batch cloning is not supported.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #2

A company has deployed services on the FusionCompute platform. In order to optimize the memory access performance of the virtual machine, which one of the following virtual machine features needs to be used?

  • A . NUMA
  • B . Resource Hot Add
  • C . Template Deployment
  • D . Snapshot

Reveal Solution Hide Solution

Correct Answer: A
Question #3

The virtual machine network QoS policy provides bandwidth configuration control capabilities, and the QoS function supports traffic restrictions between virtual machines on the same host.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #4

Load balancing can share specific services to multiple network devices or multiple links, thereby improving service processing capabilities and ensuring high service reliability.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #5

Which of the following can achieve load balancing between different hosts in a FusionCompute cluster?

  • A . DPM
  • B . IMC
  • C . HA
  • D . DRS

Reveal Solution Hide Solution

Correct Answer: D
Question #6

In the early stage of an enterprise’s operation, two physical hosts are used to deploy the FusionCompute platform to carry services. The two hosts are in the same cluster. VM 1 runs on host A and VM 2 runs on host B. The service needs to reduce the load on host A, the technician is now migrating VM1 on host A to host B and finds that the migration cannot be completed. Which of the following is the possible reason?

  • A . The cluster has enabled the IMC policy
  • B . The cluster has enabled memory reuse
  • C . VM 2 is set to bind with host B
  • D . VM 1 and VM 2 set up mutually exclusive virtual machine policy

Reveal Solution Hide Solution

Correct Answer: D
Question #7

Which of the following is not a feature of 5G?

  • A . Wide connection
  • B . High speed
  • C . low cost
  • D . Low latency

Reveal Solution Hide Solution

Correct Answer: C
Question #8

A company is migrating its service system to the FusionComute virtualization platform, and the management plane and service plane are on different network segments. However, due to incorrect configuration, services of a Linux virtual machine cannot run normally after the migration. Which of the following methods cannot be used by engineers to log in to the faulty virtual machine for troubleshooting?

  • A . Log in to the normal virtual machine on the same network segment and then jump to the faulty virtual machine
  • B . Log in to the CNA operating system of the node and then jump to the faulty virtual machine
  • C . Log in to the virtual machine via VNC on the FusionCompute platform
  • D . Use putty to log in to the virtual machine remotely

Reveal Solution Hide Solution

Correct Answer: D
Question #9

In the FusionCompute virtualization platform, Tools are installed in the same way on all operating systems.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #10

As a rapidly developing technology in recent years, cloud computing has its own unique advantages. The advantages of cloud computing include: on-demand self-service, extensive network access, higher performance, and measurable services.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B

Question #11

Which of the following descriptions about KVM is wrong?

  • A . KVM is a kernel-based virtual machine that runs on the Linux operating system
  • B . KVM supports hardware-assisted virtualization
  • C . KVM requires Domian0 virtual machine to schedule hardware resources
  • D . KVM virtual machines exist as processes on the operating system

Reveal Solution Hide Solution

Correct Answer: C
Question #12

A bank now needs to purchase batches of hard disks to store some key data for daily operations. Which of the following hard disks is the most suitable?

  • A . SSD disk
  • B . SATA disk
  • C . SAS disk
  • D . NL-SAS disk

Reveal Solution Hide Solution

Correct Answer: A
Question #13

A company needs to expand the disk capacity of some business virtual machines due to business development, but it is found that several disks do not support capacity expansion. Which of the following is not a possible cause of the failure?

  • A . The disk is a shared disk
  • B . The disk is a differential disk
  • C . The virtual machine is in the "stopped" state
  • D . The virtual machine is in maintenance mode

Reveal Solution Hide Solution

Correct Answer: C
Question #14

Which of the following descriptions about namespaces in Linux virtual networks is wrong?

  • A . Multiple namespaces can be created within a Host
  • B . A device can only be in one namespace
  • C . From a purely network perspective, namespace can provide an independent network protocol stack
  • D . Different namespaces are isolated from each other and cannot communicate

Reveal Solution Hide Solution

Correct Answer: D
Question #15

Which of the following descriptions about ovs is wrong?

  • A . Support QoS function
  • B . Support VLAN function
  • C . Does not support web services
  • D . Does not support OpenFlow protocol

Reveal Solution Hide Solution

Correct Answer: D
Question #16

Which of the following is the most suitable cloud computing operation model for small IOE enterprises?

  • A . Hybrid cloud
  • B . Private Cloud
  • C . Community Cloud
  • D . Public cloud

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Which of the following descriptions about Libvirt components is wrong?

  • A . Libvit is a set of library functions, called by other techniques, to manage virtual machines on the machine
  • B . KVM, Xen and LXC, etc., can call the api provided by Libvir to manage the virtualization platform
  • C . Libvit is a closed source project, it is a very powerful management tool
  • D . Libvirt provides programming interfaces in multiple languages, which can be directly programmed to call the external interface provided by Libvir to realize the operation of the virtual machine

Reveal Solution Hide Solution

Correct Answer: C
Question #18

Which of the following descriptions about RAID is wrong?

  • A . RAID 6 ensures the reliability of user data by mirroring
  • B . RAID 5 ensures the reliability of user data by means of parity
  • C . RAID 0 improves storage read and write performance through striping
  • D . RAID 1 ensures the reliability of user data by mirroring

Reveal Solution Hide Solution

Correct Answer: A
Question #19

Which of the following descriptions about the OvS (Open vSwitch) function is wrong?

  • A . Divide the local area network
  • B . Building the Tunnel
  • C . Hardware Monitoring
  • D . Analog routing

Reveal Solution Hide Solution

Correct Answer: D
Question #20

Which of the following descriptions about Hypervisor is correct?

  • A . Hypervisor is equal to virtualization, and virtualization can be realized with Hypervisor
  • B . Hypervisor implements isolation between the operating system and applications and the hardware layer
  • C . Hypervisor is an operating system in host virtualization
  • D . Hypervisor running in non-root mode in hardware assisted virtualization

Reveal Solution Hide Solution

Correct Answer: B

Question #21

Which of the following descriptions about KVM is correct?

  • A . KVM is a hardware-assisted virtualization
  • B . KVM is a closed-source virtualization technology
  • C . KVM is a virtual machine on Linux
  • D . KVM uses front-end and back-end architecture to realize virtualization

Reveal Solution Hide Solution

Correct Answer: D
Question #22

Which of the following descriptions about the development of cloud computing architecture is wrong?

  • A . The resource pool is constructed from a small-scale resource virtualization integration to a larger-scale resource pool
  • B . Platform and cloud management software move from closed source and closed source to open source and open source
  • C . From IT non-critical applications to enterprise critical applications
  • D . Data form unstructured and semi-structured to structured

Reveal Solution Hide Solution

Correct Answer: D
Question #23

Which of the following descriptions about cloud computing is wrong?

  • A . Provide a unified software interface standard for upper-layer applications
  • B . The bottom layer can use virtualization technology to improve resource utilization
  • C . Support users to use cloud resources through the network using multiple devices
  • D . Using a software-defined method, the data fault tolerance is not high

Reveal Solution Hide Solution

Correct Answer: D
Question #24

In virtualization, the disk files of the virtual machine will be stored in the file system in the form of files, but from the perspective of the virtual machine operating system, the virtual machine disks, like ordinary disks, can be seen in the "hardware resources" of the system.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #25

Compared with mechanical hard disks, solid hard disks have the advantages of good shock resistance, small size, no sound insulation, small heat dissipation and low price.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #26

Solid-state drives are suitable for scenarios where data access is very frequent.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #27

Under thin provisioning, only the virtual storage space of written data will actually allocate physical storage and virtual storage space of unwritten data does not occupy physical storage resources.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #28

A company intends to purchase a batch of hard disk devices, which are mainly used to store archived data. Considering the large amount of data, it is recommended that the company purchase solid-state hard disks.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #29

When a user uses a virtual machine, the disk of the virtual machine is the same as a common hard disk on the operating system, and is a hard disk from the user’s perspective.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #30

In the NAT technology, through the server mapping function, it is possible to realize the requirement that the virtual machine inside the virtualization platform can access the external network service through the public network address.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A

Question #31

The large 2-layer network architecture can meet the large east-west traffic demand of the data center.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #32

The existing two hosts A and B are interconnected through a layer switch, and A and B belong to different VLANs. When host A sends a broadcast message to the network, host B will receive a message whose destination MAC is all "F".

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #33

When enterprises use KVM virtualization, they can choose the method of device simulation for I/O virtualization, which has good compatibility, no hardware dependence, and the user’s operating system does not need to be modified, but the I/O performance will be relatively poor.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #34

The IP SAN network mainly builds a storage network with Ethernet as the bearer. And use the iSCSI protocol for transmission.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #35

All RAID levels can enhance the fault tolerance of the system and improve the read and write performance of the storage system.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #36

When a certain end on a secondary switch is only sending messages, it cannot receive messages from another device.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #37

Using Virtio for device simulation can shorten the path of I/O requests and improve the performance of virtualization.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #38

Which of the following is not a function of a virtual machine?

  • A . Support template deployment
  • B . Support for snapshots
  • C . Support online memory size reduction
  • D . Support control through console

Reveal Solution Hide Solution

Correct Answer: C
Question #39

In FusionCompute, when virtual machines are live migrated across hosts (CPUs of different Intel models), which one of the following policies needs to be set for the cluster?

  • A . DPM
  • B . DRS
  • C . HA
  • D . IMC

Reveal Solution Hide Solution

Correct Answer: D
Question #40

Which of the following descriptions about the expansion requirements of virtual machine disks in Fusion Compute is correct?

  • A . When the data storage type to which the disk belongs is NAS storage and the configuration mode of the disk is "Normal", online increase of disk capacity is not supported
  • B . When the disk mode is "independent-non-persistent", it supports online increase of disk capacity
  • C . The data storage type to which the disk belongs must be a SAN type storage resource
  • D . When the virtual machine is in the "stopped" state, disk expansion cannot be performed

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version