Exam4Training

Huawei H13-527-ENU Huawei HCIP Cloud Computing V4.0 Online Training

Question #1

If Tools are not installed on the virtual machine on FusionCompute, which of the following functions can be implemented?

  • A . Create a virtual machine snapshot
  • B . Virtual machine live migration
  • C . Safely shut down the virtual machine
  • D . Configure an IP address for the virtual machine

Reveal Solution Hide Solution

Correct Answer: D
Question #2

The large page memory of the host is configured in FusionComute, which can optimize the efficiency of host internal training access and improve system performance.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #3

FusionCompute is a basic component in FusionSphere, which is mainly responsible for the virtualization of hardware resources and the centralized management of virtual resources, business resources, and user resources.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #4

The storage resources in FusionCompute correspond to IP-SAN, FC-SAN, NAS, FusionStorage and local hard drives.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #5

After FusionCompute sets HA resource reservation, when the cluster resources are extremely tight, the reserved resources will be preferentially allocated to virtual machines to ensure the normal operation of the business.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #6

Which of the following descriptions about FusionCompute memory reuse is incorrect?

  • A . The FusionCompute system turns on the memory reuse technology by default, and can only be turned off using the command line in the background.
  • B . Memory replacement technology is to dump the data that has not been accessed for a long time in the memory to the hard disk, and then read it when needed.
  • C . Memory sharing allows multiple virtual machines to share memory pages with the same data content.
  • D . Memory reuse technology can reduce hardware procurement costs.

Reveal Solution Hide Solution

Correct Answer: A
Question #7

In FusionCompute, when the virtual machine’s disk mode is in subordinated type, which of the following descriptions is correct?

  • A . The subordinated disk is not included in the snapshot, and the changes will be written to the disk immediately and will become invalid after restart.
  • B . The subordinated disk is not included in the snapshot, and the changes will be written to the disk immediately and permanently.
  • C . The subordinated disk is included in the snapshot, and the changes will be written to the disk immediately and permanently.
  • D . The subordinated disk is included in the snapshot, and the changes will be written to the disk immediately and become invalid after restart.

Reveal Solution Hide Solution

Correct Answer: C
Question #8

Which of the following disk modes can be used to store user personal data and be shared among multiple virtual machines like a USB flash drive?

  • A . Normal
  • B . Independent – non-persistent
  • C . Independence – Enduring
  • D . Subordination

Reveal Solution Hide Solution

Correct Answer: C
Question #9

What is the incorrect description about virtio?

  • A . Compared to full analog devices, virtio has better performance.
  • B . The use of virtio devices requires the installation of special device drivers.
  • C . The virtio drivers of FusionCompute are all included in Tools.
  • D . When I/O is frequent, the server CPU usage rate is high.

Reveal Solution Hide Solution

Correct Answer: B
Question #10

Which memory reuse technology can reclaim physical memory temporarily not used by virtual machines and allocate them to virtual machines that need to reuse memory?

  • A . Memory bubbles
  • B . Memory replacement
  • C . Memory transparent huge pages
  • D . Memory sharing

Reveal Solution Hide Solution

Correct Answer: A

Question #11

Which of the following descriptions about storage hot migration is wrong?

  • A . Support the migration of non-persistent disks.
  • B . Support for real-time migration of virtual machine disks without affecting user usage, so that planned storage maintenance and storage migration can be performed without interrupting business.
  • C . Storage hot migration can be migrated between different storage devices within the same storage device under storage virtualization management.
  • D . It does not support hot migration of mounted " shared " disks and disks of linked clone virtual machines.

Reveal Solution Hide Solution

Correct Answer: A
Question #12

In FusionCompute, which of the following descriptions of virtual machine templates is incorrect?

  • A . The virtual machine is cloned as a template: After the cloning is completed, the virtual machine can still be used normally.
  • B . Template cloning as template: After cloning is completed, the original template still exists.
  • C . Convert the virtual machine to a template: After the conversion, the virtual machine can still be used normally.
  • D . Import template: Some parameter settings can be adjusted to make it slightly different from the local virtual machine template.

Reveal Solution Hide Solution

Correct Answer: C
Question #13

In the FusionCompute system, which of the following descriptions is incorrect?

  • A . If it is bound to a USB device, the virtual machine cannot be migrated to another host.
  • B . Virtual machine export is a kind of virtual machine hot migration.
  • C . If the " Bind with selected host " option is not checked, the virtual machine will not be able to add pass-through devices.
  • D . Support the migration of virtual machines across clusters.

Reveal Solution Hide Solution

Correct Answer: B
Question #14

When FusionCompute converts the template to a virtual machine, the attributes such as the operating system type and version number of the virtual machine are inherited from the template, and the attributes such as the number of CPUs can be customized.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #15

On FusionCompute, the premise that the DP M function is available is that the BMC information of the host is configured.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #16

Which of the following batch operations cannot be performed by FusionCompute?

  • A . Add hosts in batches
  • B . Migrate virtual machines in batches
  • C . Binding network ports in batches
  • D . Associate storage resources in batches

Reveal Solution Hide Solution

Correct Answer: D
Question #17

Each cluster in FusionCompute can only create one distributed virtual switch.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #18

In FusionCompute, what is the correct connection relationship between virtual network interfaces?

  • A . vNIC (VW) >vPort (DVS) >pNIC (network card) >port (switch)
  • B . vNIC (VI) >pNIC (network card) >vPort (DVS) >port (switch)
  • C . vNIC (VI) >pNIC (network card) >port (switch) >vPort (DVS)
  • D . Port (DVS) >vWIC (VM) >pNIC (network card) >port (switch)

Reveal Solution Hide Solution

Correct Answer: A
Question #19

The load balancer can automatically perform a health check on the WI to ensure that all user requests can be allocated to the available WI.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #20

What kind of protocol is the load balancer used to distribute user requests to different components?

  • A . TRUECP
  • B . SIP
  • C . HTTP S
  • D . SSL

Reveal Solution Hide Solution

Correct Answer: C

Question #21

Regarding the description of the shortcomings of the PCoIP desktop cloud protocol, which is incorrect?

  • A . This protocol can maximize the use of network bandwidth.
  • B . Native PCoIP does not have the ability to redirect peripherals such as serial and parallel ports.
  • C . Compared with other desktop cloud protocols, the transmission reliability is low.
  • D . This protocol belongs to the rendering protocol on the host side and has poor compatibility.

Reveal Solution Hide Solution

Correct Answer: D
Question #22

During the daily operation and maintenance of FusionAccess, Huawei desktop cloud administrators can use TCM tools to manage virtual desktops, making self-service maintenance more convenient and greatly improving operational efficiency.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #23

Which of the following desktops is not supported by the FusionAccess desktop cloud solution?

  • A . VIP Desktop
  • B . Offline desktop
  • C . VDI dedicated desktop
  • D . Resource Pool Desktop

Reveal Solution Hide Solution

Correct Answer: B
Question #24

Which of the following is not the procedure to configure the Linux infrastructure virtual machine of Huawei Desktop Cloud?

  • A . Install the operating system
  • B . Set virtual machine mutual exclusion
  • C . Set virtual machine self-recovery properties
  • D . Install HAD

Reveal Solution Hide Solution

Correct Answer: D
Question #25

What is the role of DHCP in Huawei Desktop Cloud?

  • A . Assign IP addresses, gateways, and DNS to the virtual machines of the desktop cloud infrastructure.
  • B . Provide domain name resolution function for each virtual desktop.
  • C . Assign IP address, gateway, DNS for each virtual desktop.
  • D . Assign permissions to each virtual desktop.

Reveal Solution Hide Solution

Correct Answer: C
Question #26

If a group policy is set for the domain huawei.com, the computer configuration in this group policy will be applied to all computers in this domain.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #27

A large multinational company’s IT system needs to use AD.

Regarding the planning of AD, which of the following descriptions is incorrect?

  • A . Within each subdomain and between different departments, different users and devices can be managed separately by setting different 0Us.
  • B . According to the different regions of the department, establish different sub-domains, but there should be as few sub-domains as possible.
  • C . There is no need to synchronize user data between different subdomains.
  • D . Adopt multi-domain deployment, different regions have different sub-domain strategies, management, maintenance, and deployment are more complicated than a single domain.

Reveal Solution Hide Solution

Correct Answer: C
Question #28

What is the correct sequence of the virtual machine registration process?

① The virtual machine asks AD to initiate a request to verify the validity of the DC domain name;

② The virtual machine selects a DC to initiate a registration request;

③ The HDA process is started;

④ HDC issues license version information and desktop group information to virtual machines

  • A . ①②③④
  • B . ③①②④
  • C . ②①③④
  • D . ③②①④

Reveal Solution Hide Solution

Correct Answer: B
Question #29

Which of the following methods cannot rule out the problem that the virtual machine in the Huawei desktop cloud cannot be logged in?

  • A . Check by TCM.
  • B . Users log in to check virtual machine through FusionCompute on VNC
  • C . Try whether the same TC can log in to other virtual machines normally.
  • D . Check the desktop cloud system through FusionCare.

Reveal Solution Hide Solution

Correct Answer: A
Question #30

What is the correct process of replicating virtual machine issuance?

① Check whether the virtual machine IP can be reachable;

② Create virtual machine;

③ Add users to the desktop group;

④ Join the virtual machine to the domain

  • A . ②①③④
  • B . ②④③①
  • C . ②①④③
  • D . ②③④①

Reveal Solution Hide Solution

Correct Answer: C

Question #31

Which of the following is the correct sequence of the desktop cloud virtual machine login process?

① User authentication

② Access WI

③ Pre-connection

④ Get a list of virtual machines

  • A . ①②③④
  • B . ②①③④
  • C . ②①④③
  • D . ①②④③

Reveal Solution Hide Solution

Correct Answer: C
Question #32

Which of the following descriptions about the daily operation and maintenance specifications of Huawei Desktop Cloud is incorrect?

  • A . Pay attention to the number of unregistered users. If there is a large area of unregistered users, analyze the reasons and deal with it urgently.
  • B . Emergency alarms such as abnormal server heartbeat, restart, and abnormal data service need to be dealt with in time.
  • C . If the license is about to expire, you need to process it in time and apply for a new license.
  • D . After the storage resource and computing resource utilization rate exceeds 100%, start the expansion task.

Reveal Solution Hide Solution

Correct Answer: D
Question #33

In which way can desktop virtual machines be migrated?

  • A . On the FusionCompute Portal interface, find the virtual machine to be migrated, and click the " Migrate " button on the virtual machine tab.
  • B . Find the virtual machine ID on the FusionAccess Portal interface, log in to the HDC component backend, and enter the corresponding command line to migrate.
  • C . Find the virtual machine ID on the FusionAccess Portal interface, log in to the backend of the WI component, and enter the corresponding command line to migrate.
  • D . On the FusionAccess Portal interface, find the virtual machine to be migrated, and click the " Migrate " button.

Reveal Solution Hide Solution

Correct Answer: A
Question #34

When the desktop virtual machine cannot be connected, you can use vDesk to detect and automatically repair the repairable options.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #35

Windows operating system running for a long time may have the problem of insufficient memory and system running slowly because pf the high CPU resources occupied by the process. It is recommended that the system administrator restart the user virtual machines in batches every 3-5 days.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #36

Regarding the operation of the HUAWEI desktop cloud system, which of the following descriptions is incorrect?

  • A . Users are prohibited from uninstalling the.NET Framework software of the desktop virtual machine to prevent the virtual desktop from malfunctioning due to missing related services.
  • B . In order to make the desktop virtual machine system run more smoothly, users can install optimization software by themselves to clean up and optimize the registry and junk files.
  • C . In order to avoid the leakage of desktop information when the desktop virtual machine is not used for a period, the user needs to activate the system default screen saver.
  • D . The user is not allowed to start the sleep mode when using the desktop virtual machine to prevent the loss of user data after the desktop virtual machine sleeps.

Reveal Solution Hide Solution

Correct Answer: B
Question #37

Regarding DHCP backup, which of the following descriptions is incorrect?

  • A . The backup path needs to be configured on the DHCP server.
  • B . DHCP information needs to be configured in the "Alarm Components" of FusionAccess.
  • C . It is necessary to set "Whether to enable backup" to " Yes" in FusionAccess "System Management > Initial Configuration > Domain /O U".
  • D . Need to install the monitoring agent on the DHCP server.

Reveal Solution Hide Solution

Correct Answer: B
Question #38

Regarding the TC terminal access security authentication process in FusionAccess, which of the following descriptions is incorrect?

  • A . After the switch detects the authentication request sent by the TC, it sends the authentication information to the AD server for processing through the Radius protocol.
  • B . TC after the certificate is detected, it will automatically switch to initiate the EAP-TLS of 802.1x two-way certificate authentication.
  • C . The certificate on the TC is issued from the CA based on the TC information.
  • D . After the TC is powered on, it will check whether it has a certificate, if not, it will automatically apply for a certificate from TCM.

Reveal Solution Hide Solution

Correct Answer: C
Question #39

What information does not need to be collected when FusionAccess fails?

  • A . FusionCompute build time
  • B . System version number
  • C . Customer live network information
  • D . Time of failure

Reveal Solution Hide Solution

Correct Answer: A
Question #40

What is the maximum number of client connections allowed in FusionAccess when the license is not loaded?

  • A . 40
  • B . 50
  • C . 60
  • D . 30

Reveal Solution Hide Solution

Correct Answer: B

Question #41

Which of the following regarding the description of FusionCare description is incorrect?

  • A . FusionCare can be set to collect logs periodically to avoid excessive repetitive manual operations.
  • B . FusionCare can collect the running logs of the various components of FusionAccess and the operating system of the user’s virtual machine.
  • C . FusionCare can check the health status of all CNA nodes and FusionAccess infrastructure virtual machines, and generate a health check report.
  • D . FusionCare can collect and package logs of all CNA nodes and FusionAccess infrastructure virtual machines.

Reveal Solution Hide Solution

Correct Answer: B
Question #42

Which component in the FusionSphere virtualization suite can complete the backup of the virtual machine?

  • A . FusionCompute
  • B . FALSEusionManager
  • C . OceanStor BCManager eBackup
  • D . UltraVR

Reveal Solution Hide Solution

Correct Answer: C
Question #43

Which virtualization technology does FusionCompute ‘s CPU virtualization use?

  • A . Paravirtualization
  • B . Operating system virtualization
  • C . Hardware-assisted virtualization
  • D . Full virtualization

Reveal Solution Hide Solution

Correct Answer: C
Question #44

Which of the following descriptions about FusionCompute is correct?

  • A . VRM supports both virtual deployment and physical deployment. Single-node deployment is recommended to reduce the resource occupation of the cluster.
  • B . FALSEusionCompute contains two functional modules, CNA and VRM. CNA is a virtualized operating system that provides virtualization capabilities for computing, storage, and network resources. VRM is used for virtual resource management.
  • C . The CNA virtualization system uses sojourn virtualization.
  • D . VRM can manage virtualized resources and physical resources.

Reveal Solution Hide Solution

Correct Answer: B
Question #45

Which of the following description of the virtual machine is incorrect?

  • A . With virtualization technology, multiple virtual machines can be run on one physical machine at the same time.
  • B . Virtual machines can run operating systems and applications like physical machines.
  • C . With virtualization, physical equipment is no longer needed.
  • D . Computing virtualization can realize the reuse of computing resources.

Reveal Solution Hide Solution

Correct Answer: C
Question #46

Non-uniform Architecture solves the scalability problem in multiprocessing systems.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #47

When FusionCompute enables memory reuse, virtual machine hot migration is performed. If part of the virtual machine data is in the swap space, the migration time will be longer.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #48

The customer storage system needs to be upgraded, and one existing virtual machine is bound to the host. Which of the following technologies is recommended to upgrade the storage system online?

  • A . Virtual machine hot migration changes the host.
  • B . Virtual machine hot migration changes the host and data storage.
  • C . Unable to meet demand.
  • D . Virtual machine hot migration to data storage.

Reveal Solution Hide Solution

Correct Answer: D
Question #49

Which one of the following descriptions of DRS is correct?

  • A . In order to achieve the best resource scheduling effect, it is recommended that the CPU, memory, network, and storage configurations of the hosts in the cluster are as the same as possible, so that the virtual machine can be migrated to any host in the cluster
  • B . It is recommended to set the time-sharing value of resource scheduling to a conservative strategy when the business pressure is high, and set to a medium or advanced strategy when the business pressure is small.
  • C . The advanced rules of resource scheduling can be used to meet some special needs. For example, when two virtual machines are in the active/standby relationship, it can be configured as an aggregation strategy to improve data interaction performance between virtual machines.
  • D . Resource fullness can be configured with different measurement factors. If memory reuse is used, it is recommended to configure it according to CPU scheduling.

Reveal Solution Hide Solution

Correct Answer: B
Question #50

In FusionAccess, when distributing a fully replicated virtual machine of the "static multi-user" type, after changing the display name of the virtual machine, delete the Tomcat domain account added after adding the domain.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B

Question #51

In FusionAccess, if the user inserts a USB device, the page prompts " Driver needs to be installed ", it may be caused by a problem with the USB device itself.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #52

In Fuionlccoss, when reclaiming the "dynamic multi-user" type of virtual machine desktop, it is also necessary to remove the user from the "dynamic multi-user" type of user group.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #53

FusionAcces supports the use of Backup Server to temporarily backup all components. When the backup space is sufficient, the backup server will save the backup data within 10 days; When the backup space is insufficient, the system will generate an alarm message, and the administrator needs to manually remove the unnecessary backup files.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #54

In FusionAccess, after the administrator reclaims the "static multi-user" type of virtual machine desktop, it does not affect the user’s independent execution authority, and the user can still access desktop resources through the self-maintenance channel.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #55

In FusionAccess, linked clone virtual machines share the same system master disk. If users need to install personalized applications, they can be installed in a differential disk and saved.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #56

In FusionCompute, which of the following options will be used by the port aggregation for load sharing?

  • A . Source and destination IP
  • B . Source MAC
  • C . Source and destination port groups
  • D . Source and destination ports

Reveal Solution Hide Solution

Correct Answer: C
Question #57

On the one hand, FusionCompute distributed virtual switches can configure, manage, and monitor the virtual switches of multiple servers. On the other hand, it can also ensure the consistency of network configuration when virtual machines are migrated between servers.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #58

Which of the following description of the load sharing algorithm based on source and destination IP and port is correct?

  • A . This mode is generally used in scenarios where most of the network flow is inside the Layer 2 network. At this time, the network flow can be evenly hashed by MAC.
  • B . This mode has high reliability, but the network flow will only be shared by one network card, and the other network card serves as a backup.
  • C . When there are IP and port in the message, use the source and destination IP, port and MAC for load sharing; when the message has only an IP address, use the IP address and MAC for load sharing, when the message has only a MAC address, Use MAC address for load sharing.
  • D . This mode enables the network stream to be sent to each network port completely and evenly, but large messages may be out of order.

Reveal Solution Hide Solution

Correct Answer: C
Question #59

Which one of the following descriptions about the memory reuse feature of FusionCompute is wrong?

  • A . After the host memory reuse is enabled, the specific memory reuse degree of the virtual machine can be controlled by the virtual machine memory QoS setting.
  • B . After the host memory reuse is turned off, the sum of the memory sizes of all virtual machines running on each host cannot be greater than the sum of the actual available physical memory used by the virtual machines
  • C . After setting the host memory reuse, the total number of virtual machine memory created on the host can exceed the host’s physical memory to increase the host’s virtual machine density
  • D . Turning off host memory reuse requires that the memory utilization rate of all hosts in the cluster is less than or equal to 150%

Reveal Solution Hide Solution

Correct Answer: D
Question #60

In FusionCompute, which of the following on DVS description is wrong?

  • A . Cross-server communication does not need to be forwarded through a physical switch
  • B . Due to the consumption of virtual switching modules, the switching performance is slightly lower than that of physical switches
  • C . Provide virtual network security capabilities, which can prevent the IP address of virtual machines from spoofing
  • D . Using pure software to achieve, compared with the use of physical switches, flexible function expansion

Reveal Solution Hide Solution

Correct Answer: A

Question #61

In FusionAccess, when the business plane of the virtual machine cannot communicate with the TC network plane, the virtual machine needs to add a third network card that communicates with the TC network plane in addition to the business plane network card and the management plane network card.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #62

Which of the following descriptions about the load sharing algorithm based on source and destination IP and port is correct?

  • A . This mode is highly reliable, but the network traffic will only be shared by one network card, and the other network card serves as a backup.
  • B . When there are IP and port in the message, use the source and destination IP, port, and MAC for load sharing; when the message has only an IP address, use the IP address
    Perform load sharing with MAC; when the message has only MAC address, use MAC address for load sharing.
  • C . This mode is generally used in scenarios where most of the network traffic is inside the Layer 2 network. At this time, the network traffic can be evenly hashed by MAC.
  • D . This mode enables network traffic to be sent to each network port completely and evenly, but many messages may be out of order.

Reveal Solution Hide Solution

Correct Answer: B
Question #63

Which of the following operations can be performed on a virtual machine on FusionCompute in the hibernation state?

  • A . Ordinary deletion
  • B . Convert to template
  • C . Clone the virtual machine
  • D . Restart

Reveal Solution Hide Solution

Correct Answer: A
Question #64

In FusionCompute, which of the following options is not included in the startup method of a virtual machine?

  • A . Hard disk startup
  • B . Network startup
  • C . Local startup
  • D . CD-ROM startup

Reveal Solution Hide Solution

Correct Answer: C
Question #65

About the description of the virtual network of FusionCompute, which of the following is not correct?

  • A . All virtual machine NICs in the same security group will use the security group rules for network communication.
  • B . SR-IOV pass-through mode network card does not support IO ring settings.
  • C . Different IO ring sizes will affect the network performance of the virtual machine network card.
  • D . Compared with multiple queues, a single queue will take up more CPU resources of the host.

Reveal Solution Hide Solution

Correct Answer: D
Question #66

In FusionCompute, what operations cannot be performed on a stopped virtual machine?

  • A . Restart
  • B . Move
  • C . Create a consistent snapshot
  • D . Migration

Reveal Solution Hide Solution

Correct Answer: A
Question #67

In the FusionCompute system, which of the following is not a storage device?

  • A . NAS
  • B . A LUN on OceanStor
  • C . Storage pool on FusionStorage
  • D . Local hard disk

Reveal Solution Hide Solution

Correct Answer: A
Question #68

In the FusionCompute system, which is the incorrect description of the virtual machine network card?

  • A . SR-IOV pass-through mode network card supports online addition.
  • B . There is a limit to the number of network cards that can be added to each virtual machine.
  • C . The virtual machine configured with the pass-through device must monopolize the memory. After monopolizing the memory, the virtual machine’s memory will not be swapped to the swap space.
  • D . Virtual machines with memory reuse (not 100% memory reservation) cannot be configured with pass-through devices.

Reveal Solution Hide Solution

Correct Answer: A
Question #69

In FusionCompute add a IP-SAN storage, and create the data storage according to this, what are the correct steps?

  • A . Add data storage > Add host storage interface > Add storage resources > Scan storage devices
  • B . Add host storage interface > Add data storage > Scan storage devices > Add data storage
  • C . Add host storage interface > Add data storage > Add data storage > Scan storage devices
  • D . Add storage resources > Add host storage interface > Scan storage devices > Add data storage

Reveal Solution Hide Solution

Correct Answer: D
Question #70

If Tools are not installed on the virtual machine, FusionCompute cannot query the memory usage of the virtual machine.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A

Question #71

IDV can only be used with special terminals, mobile devices cannot support it.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #72

In the Huawei desktop cloud clock synchronization solution, IP-SAN, servers, switches, firewalls, or third-party devices all synchronize time from the host where the main VRM is located through the management plane.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #73

Regarding the description of HDP display technology, which of the following is incorrect?

  • A . Use lossless compression for unnatural images.
  • B . Only support Huawei’s specific self-developed image compression algorithm.
  • C . It can automatically identify unnatural images such as text, Windows frames, lines, etc. in the entire image.
  • D . Natural images such as photos and pictures are lossy compressed with an appropriate compression rate.

Reveal Solution Hide Solution

Correct Answer: B
Question #74

In the Huawei desktop cloud system software deployment plan, when multiple sets of FusionAccess use the same license component, how to deploy the license component?

  • A . Integrated deployment with HDC
  • B . Integrated deployment with WI
  • C . Separate deployment
  • D . Integrated deployment with ITA

Reveal Solution Hide Solution

Correct Answer: C
Question #75

Virtual machine desktops using GPU pass-through technology will lose features such as hot migration and HA.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #76

Which component does the license server interact with to complete the license management?

  • A . WI
  • B . HDC
  • C . ITA
  • D . TCM

Reveal Solution Hide Solution

Correct Answer: B
Question #77

What will be used to perform setting by Group Policy?

  • A . Group Policy Regulations
  • B . Filter
  • C . Rule Setter
  • D . Group Policy Object

Reveal Solution Hide Solution

Correct Answer: D
Question #78

If a group policy is set for the organizational unit Us erOU, the user configuration in this group policy will apply to all users in this organizational unit.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #79

TC can search for TC terminals managed by the TC, without the need for active connection on the TC side.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #80

Which of the following descriptions of DNS is incorrect?

  • A . On the Internet, the correspondence between domain names and IP addresses can be one-to-one or many-to-one. No matter what kind of correspondence, DNS can be resolved.
  • B . The domain controller will register its host name, IP address and role played in the DNS service period so that other computers can find this pre-controller through the DNS server.
  • C . DNS reverse resolution requires the establishment of a reverse lookup zone to resolve IP addresses into domain names.
  • D . DNS provides services for converting between domain names and IP addresses.

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version