It Q&M management refers to the comprehensive management of IT software and hardware operating environments (such as software environment and network environment), IT service systems, and IT Q&M personnel by using related methods, methods, technologies, systems, processes, and documents, in IT O&M, which of the following events needs to be handled immediately?A . Prompt...Continue reading
Which of the following statements are CORRECT about the host that provides external block storage for Cinder?A . Cinder-API provides an interface for processing block storage access requestsB . The Cinder-Volume service is responsible for dealing with storage servers, such as Swift and Ceph, to create and delete volumesC . The Cinder-Scheduler assigns tasks...Continue reading
ITIL best practices refer to the advanced ITSM methodology to understand enterprise requirements and implement sustainable management during IT service management. Which of the following is the IT service operation process in the ITIL best practice system?A . Event management, incident management, problem management, request fulfillment, and access managementB . Incident management, problem management,...Continue reading
Provides distributed monitoring solutions, including monitoring events and monitoring performance. The former is used to detect the causes of abnormal IIS running, and the latter is used to establish the user system performance benchmark. Which of the following software is used to monitor the system?A . ZabbixB . PythonC . CobblerD . SaltStack View...Continue reading
Nova is a virtual server deployment and service computing module developed by NASA. Which of the following statements about common terms in components is incorrect? A. Flavor refers to the configuration template created for the VM instance B. Security group rules are used to define remote access permissions for users C. keypair refers to...Continue reading
Each step in the automatic deployment process is automated, which can bring significant benefits including efficiency. What are they key elements?A . Software development automationB . Script-based deploymentC . Common deployment scriptsD . Version control View Answer Answer: A...
The service design describes how to develop a blueprint for service architecture, processes, policies, and documents. Which of the following does not belong to the capacity management defined by the ITIL service design?A . Component Capacity ManagementB . Business capacity managementC . Cabinet space managementD . Service capacity management View Answer Answer: C Explanation:...Continue reading
The private cloud is constructed independently for an enterprise and provides the most effective control over data, security, and service quality. Private clouds can be built by enterprise IT departments or cloud platform service providers. An enterprise can deploy its own network or application services on the cloud platform. Private clouds can be deployed...Continue reading
Large-scale cloud data centers use regions, AZs, and DCs to organize resources and ensure security management.A . TrueB . False View Answer Answer: A...
Which of the following is the common data access level in a cloud data center?A . Heterogeneity (NFS level)B . Block level (Block level)C . General level (UFS level)D . File-level (File level) View Answer Answer: B...