After a host enters maintenance mode, stop or migrate all VMS on the host, and then perform maintenance operations.

After a host enters maintenance mode, stop or migrate all VMS on the host, and then perform maintenance operations.A . TRUEB . FALSEView AnswerAnswer: A

December 22, 2018 No Comments READ MORE +

Virtual HA refers to a function that when the host where service VMS are located is faulty,

Virtual HA refers to a function that when the host where service VMS are located is faulty, FusionCompute can detect the fault in real time and restart the VMS on another normal host in the cluster, thereby ensuring service continuity 、A . TRUEB . FALSEView AnswerAnswer: A

December 7, 2018 No Comments READ MORE +

eSight can uniformly monitor, configure, and manage various types of devices from multiple vendors.

eSight can uniformly monitor, configure, and manage various types of devices from multiple vendors.A . TRUEB . FALSEView AnswerAnswer: A

November 30, 2018 No Comments READ MORE +

External API network IP addresses need to be planned to install FusionSphere OpenStack. How many IP addresses need to be planned at least?

External API network IP addresses need to be planned to install FusionSphere OpenStack. How many IP addresses need to be planned at least?A . 3B . 5C . 7D . 9View AnswerAnswer: C

November 28, 2018 No Comments READ MORE +

Which of the following users is the default user of the OperationCenter management portal?

Which of the following users is the default user of the OperationCenter management portal?A . adminB . sysC . administratorD . cloud_adminView AnswerAnswer: A

November 8, 2018 No Comments READ MORE +

Storage devices in FusionCompute need to be scanned. These devices refer to physical storage devices, such as IP SAN, AdvancedSAN, and NAS.

Storage devices in FusionCompute need to be scanned. These devices refer to physical storage devices, such as IP SAN, AdvancedSAN, and NAS.A . TRUEB . FALSEView AnswerAnswer: B

November 1, 2018 No Comments READ MORE +

Which of the following are the user authentication methods for accessing security systems in the terminal? (Multiple Choice)

Which of the following are the user authentication methods for accessing security systems in the terminal? (Multiple Choice)A . Web-based identity authenticationB . WebAgent-based identity authentication and security authenticationC . Agent-based identity authentication and security authenticationD . Not authenticationView AnswerAnswer: ABC

October 22, 2018 No Comments READ MORE +

Which of the following is not an indicator in the disk information monitoring of eSight?

Which of the following is not an indicator in the disk information monitoring of eSight?A . Disk nameB . Health statusC . Installation statusD . Hard disk usageView AnswerAnswer: D

September 22, 2018 No Comments READ MORE +

Which of the following statements is incorrect about the dab center service migration scenario?

Which of the following statements is incorrect about the dab center service migration scenario?A . Services are migrated from traditional data centers to cloud data centers.B . Traditional data centers are taken over by cloud data centers after being cloudified .C . Services are migrated from the existing cloud data...

September 20, 2018 No Comments READ MORE +

Which of the following is not a default role of FusionSphere OpenStack 0M?

Which of the following is not a default role of FusionSphere OpenStack 0M?A . administratorB . operatorC . vdcmanagerD . VRManagerView AnswerAnswer: D

September 13, 2018 No Comments READ MORE +