The following incorrect description of Huawei FusionCompute architecture is

The following incorrect description of Huawei FusionCompute architecture isA . CNA provides computing resources for virtual machinesB . VRM can run on CAN or can be deployed on a separate physical machineC . VRM provides a management portal for administratorsD . CNA can manage cluster network, storage and computing resources...

December 18, 2020 No Comments READ MORE +

The following description of the characteristics of cloud computing resource pooling is correct

The following description of the characteristics of cloud computing resource pooling is correctA . Cloud computing resource pooling is a prerequisite for achieving extensive network accessB . Cloud computing resource pooling feature can put CPU and hard disk in the same resource poolC . Cloud computing resource pooling characteristics can...

December 17, 2020 No Comments READ MORE +

ISCSI is a standardized protocol based on the _____ protocol and the SCSI instruction set.

ISCSI is a standardized protocol based on the _____ protocol and the SCSI instruction set. It is widely used in many storage networks using the ____ architecture.A . FC IP SANB . TCP / IP FC SANC . FC FC SAND . TCP / IP IP SANView AnswerAnswer: D

December 17, 2020 No Comments READ MORE +

The picture describes the service model

The picture describes the service modelA . IaaSB . DaaSC . PaaSD . SaaSView AnswerAnswer: A

December 16, 2020 No Comments READ MORE +

Which of the following virtual machine disk file formats does Huawei fusioncompute not support?

Which of the following virtual machine disk file formats does Huawei fusioncompute not support?A . VMDKB . VHDC . RAWD . QCOW2View AnswerAnswer: A

December 16, 2020 No Comments READ MORE +

In Huawei FusionCompute, the following incorrect description of the security group rule is.

In Huawei FusionCompute, the following incorrect description of the security group rule is.A . When a virtual machine has multiple network cards, you can configure a security group for each network card.B . A virtual machine can communicate with the outside world only after a security group is created and...

December 16, 2020 No Comments READ MORE +

The following are the north-south traffic (multi-select)

The following are the north-south traffic (multi-select)A . Traffic generated by virtual machine live migrationB . Traffic between virtual machines accessing each other across data centersC . Traffic generated by customers accessing data center business via the InternetD . Traffic between virtual machines inside the data centerView AnswerAnswer: B,C

December 15, 2020 No Comments READ MORE +

The storage resource types supported by Huawei FusionCompute are (multi-select)

The storage resource types supported by Huawei FusionCompute are (multi-select)A . FusionStorageB . Advanced SANC . NASD . IP SANE . FC SANView AnswerAnswer: A, B, C, D, E

December 15, 2020 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT As FusionSphere, the disk thin provisioning can be achieved is (multiple choice)A . thin provisioning and virtual storage operating system, hardware has nothing to do, so as long as the use of virtual image management system, will be able to achieve disk thin provisioningB . does not currently...

December 14, 2020 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT CPU virtualization technology can be divided into full virtualization, paravirtualization, software virtualization, and hardware-assisted virtualization.A . TRUEB . FALSEView AnswerAnswer: A

December 14, 2020 No Comments READ MORE +