HW_V1
|
|
Título del Test:
![]() HW_V1 Descripción: examhwv1 |



| Comentarios |
|---|
NO HAY REGISTROS |
|
NO.1 After the ECS is bound, it can provide external access through a fixed public IP address. Mirroring. System disk. Data disk. Elastic IP. NO.2 How many cloud disks can be mounted on an elastic cloud server?. 8. 9. 10. 11. NO.3 When external network traffic enters Load balancer, which component first enters?. Firewall. nginx. LVS. Health Check. NO.4 What are the prerequisites for creating a cluster?. The elastic cloud server has been created. Created VPC. AK/SK certificate has been uploaded to CCE. Elastic load balancing has been created. NO.5 What are the types of elastic scaling policy?. Timing policy. Cycle policy. Alarm policy. Random policy. NO.6 When the system disk is faulty, the cloud disk can be created through the backup of the system disk and mounted as a system disk on the cloud server. True. False. NO.7 How many buckets can an OBS account create?. 50. 100. 200. 300. NO.8 What can a shared image provider do?. Share the specified image. Delete the shared image. Adding mirrored shared tenants. Delete Mirrored Shared Tenants. NO.9 Before creating a file system, which information needs to be configured?. AS. VPC. EIP. ELB. NO.10 The container image repository supports uploading images. True. False. NO.11 What needs to be created to communicate between two VPCs?. SNAT. .Peer to peer connection. EIP. Work Order. NO.12 The management console can view all types of Huawei cloud service products. True. False. NO.13 Which is not Huawei cloud computing service?. Flexibility. Bare metal service. Image service. Elastic File Service. NO.14 In the cloud computing environment, confidentiality, integrity and availability are still the fundamental security requirements on the user side. True. False. NO.15 Which of the goals of cloud computing security services does not include?. User security. Cloud Platform Security. Data security. Service security. NO.16 Which of the following is the procedure for using CCE?. 1. Create an application 2, upload the image 3, create a cluster. 1. Create a cluster 2, create an application 3, upload the image. 1. Upload the image 2, create an application 3, create a cluster. 1. Create a cluster 2, upload the image 3, create an application. NO.17 How many types of scaling strategy can be supported by elastic scaling?. 4. 3. 2. 1. NO.18 You can access Workspace using a terminal device such as an iPad. True. False. NO.19 Relational database service RDS can meet the changing needs of the game industry, effectively shorten the research and development cycle and reduce research and development costs. True. False. NO.20 The monitoring data retention time of different aggregation periods is inconsistent. How many days does the indicator data of the aggregation period remain for 1 hour?. 10. 20. 155. 300. NO.21 Which of the following is not the main usage scenario of VPC?. Virtual Machines Visit Each Other. Desktop Cloud Access Huawei Mall. Virtual Machine Access to Extranet. VPN access virtual machine. NO.22 What kinds of terminal types are supported by Workspace?. iOS. Android. Windows PC. Windows Phone. NO.23 What does Elastic Cloud Server use for data storage?. Flexibility. Mirroring. Cloud Drive. Exclusive cloud. NO.24 Workspace supports user authentication using Microsoft Active Directory. True. False. NO.25 What are the key features of IAM Unified Identity Authentication?. Centralized control users and security credentials. Centralized control user access. User group-based permissions. Support Huawei customer service operations. NO.26 Which container application management features are provided by CCE?. Rolling upgrade. Flexibility. Application monitoring. Viewing events. NO.27 The cloud dedicated service is a dedicated network service that connects the local data center to the public cloud. What kind of green line does the cloud only support?. MPLS VPN. IPSec VPN. SSL VPN. OSPF VPN. NO.28 Cloud disks must be used with an elastic cloud server. True. False. NO.29 What are the benefits of containers?. More efficient virtualization. Safer application. Faster delivery and deployment. Easier migration and expansion. Simpler management. NO.30 Which of the following actions will result in charges?. Create EIP. Create subnet. Create VPC. Createsecurity group. NO.31 Which of the following states can be deleted directly by the shared file system?. Creating. Not available. Deleting. Delete failed. NO.32 In order to monitor the Huawei elastic cloud server use the cloud monitoring service, you need to install the plug-in separately on the elastic cloud server. True. False. NO.33 File system data stores data use Erasure Code. True. False. NO.34 With regard to cloud hard disk backup, what is the correct answer?. After deleting the cloud disk, the backup data is also deleted. After deleting the cloud hard disk, you can also use the backup to restore the cloud hard disk. After deleting the cloud hard disk, you can also use backup to create cloud hard disk. After deleting the cloud disk, the backup data will not be deleted. NO.35 Cloud computing is a model, it can acquire the required resources (for example, computing, storage, networks, applications and services) from configurable resource sharing pool anytime, anywhere, easily and on demand. Resources can be quickly provisioned and released, minimizing the workload of managing resources and interaction with service providers. True. False. NO.36 What is wrong with Anti-DDoS traffic cleaning?. Web vulnerability security detection capabilities. Provides the ability to configure and modify Anti-DDoS related parameters for public network IP (Requests per second, HTTP requests per second, single source IP connections). Provides the public network IP protection capabilities of elastic cloud hosts and load balancing devices. Provides the ability to view the monitoring capabilities of a single public IP network, including the current protection status, current protection configuration parameters, traffic conditions 24 hours ago to the present and 24 hours of abnormal events (cleaning and black holes). NO.37 Which of the following is the procedure for using CCE?. 1. Create an application 2, upload the image 3, create a cluster. 1. Create a cluster 2, create an application 3, upload the image. 1. Create a cluster 2, upload the image 3, create an application. 1. Upload the image 2, create an application 3, create a cluster. NO.38 Which of the following key technologies are used by SSA (Security Situation Awareness Service)?. Big data technolog. Reptile Technology. Encryption technology. Identity authentication technology. NO.39 When creating an ECS, you can initialize the ECS through the file injection function provided by the system. True. False. NO.40 The problem with traditional PC office is?. High cost of operation and maintence management. Poor video playback experience. Unable to monitor the use of PC. Poor software compatibility. NO.41 The two sites communicate across the Internet. IPSec VPNs can be deployed at both ends of the firewall to protect the traffic between the two intranets. True. False. NO.42 Which of the following does not include the key features of WAF (Web Application Firewall)?. Prevent excessive traffic. Anti-SQL injection. Anti-theft chain. Anti-Webshell Upload. NO.43 How many monitoring panels can the user create on the overview page?. 1. 2. 3. 4. NO.44 The alarm threshold consists of three parts: aggregation mode (original data, maximum value, minimum value, average value, variance value), judgment conditions (>, >=, <, <=, =), and critical value. It is used to configure alarms condition. True. False. NO.45 As an important component of cloud security services, network security implements network isolation, responds to network attacks and ensures network security. True. False. NO.45 As an important component of cloud security services, network security implements network isolation, responds to network attacks and ensures network security. Timing policy. Cycle policy. Alarm policy. Random policy. NO.47 The Workspace data transmission process is encrypted through TLS. True. False. NO.48 What steps do I need to take to create a Windows image from a cloud server?. Configure the Windows server. Install Cloudbase-init tool. Creating a Windows Private Image. View and Clean Up the Network Rules File. NO.49 Which level of cloud service is usually provided for the application to run the development environment?. IaaS. PaaS. SaaS. NO.50 How many alarm rules can users create?. 20. 50. 80. 100. NO.51 When the average value is selected as the aggregation method, when the user presses to view the data range, the peak inconsistency may occur. True. False. NO.52 The user can add or delete the monitoring charts of the focused instance resources on the home page of the cloud monitoring overview, and can serve as an object of important attention instances, and can support multi-index comparison functions, so that each login to the cloud monitoring platform can be timely checked. True. False. NO.53 Which of the following is NOT the main application scenario of KMS (Key Management Service)?. Network transmission data encryption. User personal data encryption and decryption. Core data encryption and decryption. Key Information Assets Encryption and Decryption. NO.54 After the RDS is enabled with HA, what are the available synchronization modes for active and standby instances?. Synchronization. Semi-synchronous. Asynchronous. All of the above. NO.55 Huawei provides developers with the capability opening, which will help developers to integrate open capabilities of Huawei products with their upper-level applications and build differentiated innovative solutions. True. False. NO.56 High availability is not key feature of RDS. True. False. NO.57 What value does Workspace bring to customers?. Free. Get it quickly. Pay on demand. Simplified operation and maintenance. NO.58 The file system can be accessed across VPCs. True. False. NO.59 An elastic cloud server can simultaneously mount multiple cloud disks. True. False. NO.60 What are the Regions usually divided based on?. Geogrphic location and network delay dimensions. Cluster server. Availability Zone (AZ). NO.61 SCS certificates can be used for corporate website trusted certification. True. False. NO.62 What are the important functions of the IKE protocol?. Negotiate protocol parameters. Protect traffic safety. Negotiating keys and managing keys. Peer authentication. NO.63 Which item does not belong to the software development cloud?. Project Management. Code inspection. Compiling and building. Data backup. NO.64 Compared to self-built database, which one is not an RDS advantage?. ready to use. Easy management. Flexibility. Users install the database independently. NO.65 IAM refers to unified identity authentication services. True. False. NO.66 The elastic scaling service is a service that automatically adjusts its business resources through policies according to the business needs of users. True. False. NO.67 GPU desktops can be used for CAD-aided design. True. False. NO.68 What are the main types of protection for Anti-DDoS?. Anti-flow attack. Anti-data attack. Anti-violence resolution. Anti-application attack. NO.69 Which of the following description about ELB product features is incorrect?. Provide dedicated connection. Provide HTTPS certificate management. Providing both public and private networks. Automatic scaling based on traffic. NO.70 If the user wants to query the historical alarm service in the last 7 days, what services need to be opened?. Cloud Audit Service. Message Notification Server. Elastin Cloud Hosting Service. Relational database services. NO.71 SFS does not support cloud server mount of Windows operating syste. True. False. NO.72 Containers and virtual machines have similar resource isolation and distribution advantages, but they differ in functionality because the containers are virtualized operating systems rather than hardware, and the containers are more portable and efficient. True. False. NO.73 Which of the following features are supported by OBS Browser?. Static Website Hosting. Multi-version control. Cross-domain resource sharing. External bucket Mount. NO.74 Elastic load balancing automatically distributes access traffic to multiple cloud servers, expands the external service capabilities of application systems and achieves higher levels of application fault tolerance. True. False. NO.75 Cloud monitoring service is a three-dimensional monitoring platform for elastic cloud servers, bandwidth, and other resources. Can provide you with real-time monitoring of alarms, notifications, and personalized report views, allowing you to accurately grasp the status of product resources. True. False. NO.76 Workspace users want to access the U disk in the terminal device. Which of the following is correct?. Clipboard redirection. USB port redirection. Printer Redirection. The user desktop cannot access the terminal local USB device. NO.77 Cloud Container Engine is a high-performance and scalable container service that provides enterprises with the rapidly package/deploy applications, automate operations and maintenance of life cycle management capability of Docker containers, enabling you to create and deploy applications efficiently. True. False. NO.78 The elastic cloud server is billed and supports two billing methods: "packet year/month" and "pay as you go.". True. False. NO.79 Which of the following is not the main function of HVD (host vulnerability detection)?. Elastic Cloud Server Vulnerability Scanning. Elastic cloud server brute force protection. Provide Vulnerability Test Report. Vulnerability scan results query. NO.80 Availability Zone is a collection of one or more physical data centers. There is an independent wind power hydropower system. AZ logically divides resources such as computing, network, and storage into multiple clusters. True. False. NO.81 Which way can you access the container directly from the public network?. Elastic IP. Elastic load balancing. Elastic Cloud Server. Virtual Private Cloud. NO.82 PTS (Penetration Testing Service) is a security assessment service product. True. False. NO.83 In which of the following states can the cloud disk backup be created?. Available. Deleting. Delete failed. Creating. NO.84 The image created by the cloud server must be shut down. True. False. NO.85 When the cloud connection is opened, the port type is 10GE. What is the type of the port?. Electrical port. Optical port. Ethernet port. Serial port. NO.86 Workspace support 3D applications, which of the following devices need to configure?. CPUs that support hardware virtualization. GPU card. Smart Network Card. SSD hard disk. NO.87 Which RDS can be used in combination with the following cloud services to ensure network security isolation between RDS instances and other services?. ECS. VPC. CES. OBS. NO.88 Which of the following are not the supported load methods for the listener?. the maximum connection. Polling. Setting weights. the minimum connection. NO.89 Which of the following components is not part of the big data platform?. MapReduce. OpenStack. HDFS. Yarn. NO.90 Which of the following description about the ELB configuration is incorrect?. Configure a listening policy when you create a listener. Select IP when adding elastic load balancer. Selecting session retention when configuring listener. Configurable health check timeout. NO.91 The Web application firewall performs anomaly detection on HTTP requests to effectively prevent malicious network intrusions such as web page tampering, information leakage, Trojan horse implantation and so on. True. False. NO.92 What are the options for cloud computing security services?. Data protection. Operational Environmental Protection. The independence and linkage of services. Safety assessment. NO.93 The encrypted image cannot be modified to be unencrypted. True. False. NO.94 What does the elastic cloud server use to construct a logically isolated logical area?. Flexibility. . Virtual Private Cloud. Exclusive cloud. Cloud Container Engine. NO.95 Is Huawei's cloud service positioning correct?. Focus on layer I, enable layer P, aggregate layer S. Focus on layer S, enable layer P, aggregate layer I. Focus on layer P, enable layer I, aggregate layer S. Focus on layer I, enable layer S, aggregate layer P. NO.96 From which perspectives does the SSA (Security Situation Awareness Service) analyze security posture?. Global perspective. User perspective. Management perspective. Attacker's perspective. NO.97 Cloud monitoring service is currently available free of charge and no fee is charged. True. False. NO.98 What scenes does the user copy the image from?. Copy non-encrypted mirrors as non-encrypted mirrors. Copy an unencrypted image as an encrypted image. Copy the encrypted image as an encrypted image. Copy the encrypted image as a non-encrypted image. NO.99 The mirroring service provides flexible self-service and complete mirroring management capabilities. Users can create private mirrors and create or bulk copy an elastic cloud server through mirroring. True. False. NO.100 The traditional IT infrastructure architecture has been unable to support the efficient operation of enterprises. It urgently calls for the arrival of structural changes. Which is not the main reason?. Business is slow and lifecycle management is complex. TCO remains high. Critical application performance is limited by IO bottlenecks. The speed is too slow. NO.101 Which of the following services does the cloud disk backup service depend on?. Elastic Cloud Server. Cloud Drive. Object storage. Mirroring. NO.102 The time it takes to back up your cloud drive depends only on the amount of data in your cloud drive. True. False. NO.103 Which is not usage scenario of cloud monitoring?. Daily management of resources. Notice of problem. Capacity adjustment. Operation audit. NO.104 What is the user authentication method supported by Workspace?. OpenLdap. Active Directory. OpenDJ. . ApacheDS. NO.105 SFS can set read-only access control for users. True. False. NO.106 Users cannot deploy business applications on elastic cloud server as they would with traditional servers. True. False. NO.107 Which of the following does not include the key features of WAF (Web Application Firewall)?. Anti-SQL injection. Anti-Webshell Upload. Anti-theft chain. Prevent excessive traffic. NO.108 Which of the following cloud products is a data security type?. HID. HVD. KMS. SCS. NO.109 Instances added through the scaling strategy cannot be manually removed. True. False. NO.110 Which of the following statements is wrong about KMS (Key Management Service)?. Manage cloud platform and tenant keys. Use HSM (Hardware Security Module). Multi-layer key protection technology. Support and Application. |




