New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Huawei H13-511_V5.5 Dumps

Page: 1 / 12
Total 116 questions

HCIA-Cloud Computing V5.5 Exam Questions and Answers

Question 1

KVM is a type of paravirtualization. It can implement CPU and memory virtualization, but not device I/O virtualization.

Options:

A.

TRUE

B.

FALSE

Question 2

Common storage networks include direct attached storage (DAS), network attached storage (NAS), and storage area network (SAN). SANs are divided into Fibre Channel storage area networks (FC SANs) and IP storage area networks (IP SANs).

Options:

A.

TRUE

B.

FALSE

Question 3

Enterprise administrators provision virtual desktops and perform routine maintenance through virtual desktop service management. Which of the following are the provisioning proportion modes of preset virtual desktops in desktop provisioning management?

Options:

A.

1:1

B.

1:N

C.

1+1

D.

M:N

Question 4

Which of the following statements istrueabout the FusionCompute storage architecture?

Options:

A.

Physical storage media that deliver storage space for virtualization are called storage devices.

B.

LUNs allocated by Huawei Distributed Storage can be encapsulated as datastores.

C.

After storage resources are converted to datastores and associated with hosts, virtual disks can be created for VMs.

D.

FusionCompute uniformly encapsulates storage units of storage resources into datastores.

Question 5

Match the following VLAN interface types with their descriptions.

as

Options:

Question 6

Which of the following commands are used to view common files on Linux?

Options:

A.

less

B.

more

C.

vim

D.

cat

Question 7

Which of the following statements aretrueabout deploying Compute Node Agent (CNA) and Virtual Resource Management (VRM) in Huawei FusionCompute?

Options:

A.

CNA can be deployed on virtual machines or physical servers.

B.

If the VRM nodes are deployed on physical servers, the active and standby VRM nodes must be deployed on two physical servers.

C.

If the VRM nodes are deployed on virtual machines, you need to select two hosts in the management cluster and deploy the active and standby VRM VMs on these hosts.

D.

VRM can be deployed on virtual machines or physical servers.

Question 8

Which of the following statements aboutservice adjustmentin FusionAccess aretrue?

Options:

A.

A computer whose assignment type isAssign a Computer to Multiple UsersorAssign Computers to a Desktop Groupcannot be assigned again after being unassigned.

B.

If a computer whose assignment type isAssign a Computer to a Useris unassigned and then assigned again, the computer automatically starts. After the virtual desktop icon on the WI turns on, wait about three minutes and then log in.

C.

If a computer whose assignment type isAssign a Computer to a Useris unassigned and then assigned again, the computer can only be assigned to the original user and cannot be assigned to other users.

D.

A computer whose assignment type isAssign a Computer to a Useris automatically shut down after being unassigned.

Question 9

Which of the following statements is false about the Libvirt component?

Options:

A.

Both KVM and Xen can invoke APIs provided by Libvirt to manage virtualization platforms.

B.

Libvirt provides programming interfaces in multiple languages. You can directly invoke APIs provided by Libvirt to perform operations on VMs.

C.

Libvirt is a set of library functions that are invoked by other technologies to manage VMs on servers.

D.

Libvirt is a closed-source project. It is a very powerful management tool.

Question 10

Which of the following statements about the differences between a domain and an OU are true?

Options:

A.

Users can log in to a domain but not to an OU.

B.

Group policies can be configured for both OUs and domains.

C.

An OU can exist in a domain, and a domain can also exist in an OU.

D.

Both OUs and domains can contain AD objects.

Question 11

A router manages path information by managing its___

Options:

Question 12

During FusionAccess virtual desktop provisioning, when a VM is being created, which of the following components checks whether the specified VM group and desktop group exist?

Options:

A.

HDC

B.

GaussDB

C.

HDA

D.

HDP

Question 13

Which of the following statements aretrueabout the features and functions of the FusionCompute virtualization suite?

Options:

A.

Allowing users to add or reduce VM resources on demand without interrupting applications.

B.

Supporting x86- or Arm-based servers, various storage devices, and mainstream Linux/Windows operating systems, thereby allowing mainstream applications to run on virtualization platforms.

C.

Allowing users to define service level agreement (SLA) policies to control VM resources, thereby allocating physical resources based on application priority.

D.

Automatically migrating workloads based on preset policies, thereby optimizing resource allocation, system response efficiency, and user experience.

Question 14

Cloud-native technologies enable organizations to build and run scalable applications in public, private, or hybrid cloud environments. Which of the following isnota representative cloud-native technology?

Options:

A.

Service mesh

B.

Virtualization

C.

Microservice

D.

Container

Question 15

Which of the following storage types isrecommendedfor VRM deployment during Huawei FusionCompute installation?

Options:

A.

IP SAN

B.

FC SAN

C.

Local storage

D.

NAS

Question 16

Hypervisor is the key to virtualize compute resources.7Which of the following is also called a hypervisor?

Options:

A.

VPM

B.

VRM

C.

VNM

D.

VMM

Question 17

A bare VM is required when creating a virtual desktop template on FusionAccess. Which of the following statements aretrueabout creating a bare VM?

Options:

A.

TheConfiguration Modeof the system disk must be set toCommon.

B.

NICs cannot be added when creating a linked-clone bare VM, but NICs can be added when the linked-clone template is used for quick provisioning.

C.

The NIC can be the service-plane distributed virtual switch (DVS) and port group of the user VM.

D.

TheConfiguration Modeof the system disk must be set toThin provisioning.

Question 18

In FusionCompute, which of the following isnota prerequisite for VM live migration?

Options:

A.

The VM must be in the running state.

B.

The uplink of the distributed virtual switch (DVS) where the VM NIC resides must be associated with both the source and target hosts.

C.

The IMC policy of the cluster must be configured.

D.

The datastore to which the VM disk belongs must be associated with both the source and target hosts.

Question 19

Programs and data must be loaded into memory for CPU processing, and then be placed on external storage for long-term preservation.

Options:

A.

TRUE

B.

FALSE

Question 20

Which of the following statements is false about concepts of virtualization?

Options:

A.

A guest OS is the OS running on a virtual machine (VM).

B.

A host machine is a physical machine.

C.

A host OS is the virtualization software layer.

D.

A guest machine is a VM.

Question 21

In the OpenStack solution,Swiftprovides persistent block storage.

Options:

A.

TRUE

B.

FALSE

Question 22

Which of the following statements about the differences betweenuser groupsandorganizational units (OUs)aretrue?

Options:

A.

OUs and user groups are Active Directory objects.

B.

An OU can contain objects such as accounts, computers, printers, and shared folders.

C.

Group policies can be configured for both OUs and user groups.

D.

A user group can only contain accounts.

Question 23

Which of the following FusionAccess componentsdoes not have backup data?

Options:

A.

License

B.

WI

C.

VLB

D.

vAG

Question 24

Which of the following statements is false about virtualized storage?

Options:

A.

LUNs allocated by Huawei Distributed Block Storage can be encapsulated as data stores.

B.

Storage virtualization abstracts storage devices to a data store so that each VM can be stored as a group of files in a directory on the data store.

C.

A data store is a logical repository that is similar to a file system. It combines storage devices of different types and provides a unified model to store VM files.

D.

Storage virtualization greatly improves storage resource utilization.

Question 25

Which of the following statements are true about system encapsulation and Sysprep (system encapsulation tool) for creating a full copy template on FusionAccess?

Options:

A.

Sysprep can delete specific system information from an installed Windows image.

B.

Sysprep can be used to reset Windows product activation.

C.

System encapsulation can complete system installation in minutes.

D.

During system encapsulation, you cannot add software to the system.

Question 26

In Huawei FusionCompute, a VM running Linux is created. In this scenario, which of the following does the guest OS run in?

Options:

A.

VRM

B.

CNA

C.

Linux VM

D.

VNA

Question 27

Which of the following statements is false about the graphical user interface (GUI) and the command-line interface (CLI) of Linux?

Options:

A.

The CLI is more suitable for routine maintenance than the GUI.

B.

The GUI consumes more system resources than the CLI.

C.

It is more efficient to operate the Linux CLI using the keyboard than to operate the GUI using the mouse.

D.

The GUI has higher permissions than the CLI, allowing it to modify the kernel and hide files.

Question 28

In Huawei FusionAccess, Huawei Desktop Protocol (HDP) classifies displayed bitmaps. It uses a lossless compression algorithm for text and a lossy compression algorithm for nonsensitive data, saving bandwidth without compromising user experience.

Options:

A.

TRUE

B.

FALSE

Question 29

FusionCompute adopts hardware-assisted virtualization technology to reduce memory virtualization overhead.

Options:

A.

TRUE

B.

FALSE

Question 30

To enhance the security of user desktops, FusionAccess supports diverse access management policies. Which of the following statements about access management policies are true?

Options:

A.

MAC address-based access control. This policy can be applied only to users or user groups.

B.

Time-based access control. This policy implements only whitelist control. Users can log in to desktops only in the specified time segment.

C.

IP address-based access control. This policy implements blacklist and whitelist control and allows configuring a single IP address or IP address segment.

D.

Certificate-based access control. This policy is applied globally.

Question 31

Match the following RAID levels with their respective descriptions.

as

Options:

Question 32

Which of the following statements isfalseabout virtualization concepts?

Options:

A.

A guest OS is the operating system running on a virtual machine (VM).

B.

A guest machine is a virtual machine (VM).

C.

A host machine is a physical machine.

D.

A host OS is the virtualization software layer.

Question 33

FusionCompute integrates physical CPU and memory resources on hosts into a compute resource pool and divides the resources into virtual CPU and memory resources for VMs. The compute resources actually used by a VM cannot exceed the specifications of the hardware resources on the host because the CPU and memory resources used by the VM must be provided by the same host. If this host malfunctions, the system automatically assigns another host to the VM to provide compute resources.

Options:

A.

TRUE

B.

FALSE

Question 34

On FusionAccess, modifying or deleting a full copy template will affect the virtual machines created using the template.

Options:

A.

TRUE

B.

FALSE

Page: 1 / 12
Total 116 questions