You are on page 1of 298

1) What are basic characteristics of cloud computing?

(O)
A. On-demand self-service
B. broad network access methods
C. Resource pooling
D. fast and scalable
E. Measurable services

All

2) Which of the following is generally used to provide application development and running
environments?
A. IaaS
B. PaaS
C. SaaS

3) Pain Points of Current Enterprise IT Infrastructure includes:


A. Slow Business Launch
B. Complicated Lifecycle Management
C. High TCO
D. I/O Bottleneck

All

4) Which of the following are deployment models of cloud computing?


A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community/Industry cloud

All

5) The development of Cloud Computing includes:


A. Virtualization
B. Private Cloud
C. Public Cloud
D. Hybrid Cloud

All

6) What is Huawei Cloud Positioning?


A. Focus on IaaS
B. Enable PaaS
C. Converge SaaS
All

7) Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)

ABC

8) Which are part of HUAWEI CLOUD ecosystem?


A. Huawei Cloud Marketplace
B. Huawei Cloud Academy
C. Partners
D. Developers

All

9) Which belongs to Huawei Cloud Developer Center Ecosystem Catalog?


A. Developer Contest
B. Cloud Expert
C. Sign-Up Platform
D. MVP
E. Student Innovation and Entrepreneurship Program
F. Yunzhi Club

All

10) How many types of login users does HUAWEI CLOUD support?
A. 1
B. 2
C. 3
D. 4

11) Which of the following service is used by an ECS to store data? (O)
A. AS
B. IMS
C. EVS
D. DeC

12) Which of the following are ECS types? (O)


A. General computing (General Computing, General Computing Plus)
B. Memory-optimized (Memory Optimized, Large Memory)
C. High Performance Computing (High & Ultra High Performance Computing)
D. Big Data (Ultra High I/O, Disk Intensive)
E. Computing-accelerated (GPU Accelerated, FGPA High Performance)

All

13) ECSs can be charged in yearly/monthly or metered mode (pay per use).
A. True
B. False

14) Is an ECS a physical server?


A. Yes
B. No

15) All OSs support key-authenticated ECS logins.


A. True
B. False

16) Which of the following policies does AS support?


A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy

ABC

17) Which is not an action of Bandwidth scaling policy?


A. Reduce
B. Double
C. Set to
D. Add

18) What is used by an ECS to store data?


A. Auto Scaling
B. Elastic Volume Service
C. Cloud Container Engine
D. Cloud Eye
B

19) Auto Scaling (AS) is charged.


A. True
B. False

20) AS supports the following instance removal policies:


A. Oldest instances created based on the oldest configuration
B. Newest instances created based on the oldest configuration
C. Oldest instances
D. Newest instances

All

21) AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False

22) Alarm policies support system monitoring and custom monitoring.


A. True
B. False

23) An instance added to an AS group by an AS policy cannot be manually removed from the
group.
A. True
B. False

24) AS can automatically adjust ECS and bandwidth resources.


A. True
B. False

A
25) Which of the following policies can be configured to increase the number of instances in an
AS group at a predetermined time each week?
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above

26) Which of the following statements about AS is incorrect?


A. AS can automatically adjust the number of instances in an AS group based on preset
policies.
B. AS can perform health checks on instances in an AS group.
C. Instance protection can be enabled on specified instances in an AS group.
D. AS does not allow users to view the status of instances in an AS group.

27) Which of the following statements about scaling actions is incorrect?


A. When the number of instances in an AS group is not the same as expected, a scaling
action is triggered.
B. After an AS group is disabled, changing the number of expected instances triggers a
scaling action.
C. When a trigger condition of an AS policy is met, a scaling action is triggered automatically.
D. Lifecycle hooks help users better manage scaling actions.

28) Which of the following statements about AS configuration is correct?


A. An AS configuration defines the specifications of ECSs to be added to an AS group.
B. An AS configuration that has been created can be modified as needed.
C. After an AS group is enabled, its AS configuration cannot be changed.
D. An unlimited number of AS configurations can be created.

29) How many types of policies does AS support?


A. 0
B. 1
C. 2
D. 3

30) Which of the following policies are supported by AS?


A. Alarm policy
B. Scheduled policy
C. Periodic Policy
D. Random policy

ABC

31) How can instances be added to an AS group?


A. By an AS policy
B. Manually
C. By a change to the number of expected instances
D. By AS configuration

ABC

32) Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Network Inbound/Outbound Rate
C. Disk Read/Write Requests
D. Memory Usage
E. Custom monitoring metrics
F. GPU Usage/GPU Memory Usage
G. EVS Disk Usage/EVS Disk I/O Read/Write
H. Performance Status

All

33) Which operations can be performed on an AS policy?


A. Manually Execute an AS Policy
B. Modify
C. Enable
D. Create/Delete
E. Disable

All

34) Which of the following services are associated with AS?


A. Cloud Eye
B. Virtual Private Cloud (VPC)
C. Elastic Load Balance (ELB)
D. Elastic Cloud Server (ECS)

All

35) Which operations are required to use ECS to create a Windows image?
A. Configure the Windows ECS.
B. Install Cloudbase-Init.
C. Create a Windows private image.
D. Query and cleanup network rule files.

ABC

36) What is the type of the image converted based on an existing ECS?
A. Public image
B. Private image
C. Shared image
D. EulerOS image

37) Which of the following components are included in an ECS?


A. vCPUs
B. Memory
C. Image
D. EVS disk

All

38) Before creating a data disk image from a data disk, ensure that the ECS has a system disk
and the data disk is not empty.
A. True
B. False

39) What image types does IMS support?


A. Public image
B. Private image
C. Encrypted image
D. Shared image

ABD

40) Private images can be classified into:


A. System disk image
B. Data disk image
C. Full-ECS image
D. Snapshot

ABC

41) If the ECS uses a static IP address, configure DHCP for the ECS, allowing it to dynamically
obtain an IP address.
A. True
B. False

42) When creating image Cloudbase-init should be installed on OS to ensure that configuration
of newly created ECSs from the image can be customized.
A. True
B. False

43) Image creation fails if entered System disk capacity is less than System disk capacity of
external image file.
A. True
B. False

44) Use to Create Private Image (single Choice)


Full ECS Image using ECS
System Disk using ECS
System Disk using OBS File-my answer
System Disk using external Image

45) EVS provides the scalable, virtual block storage service, and the backend of EVS is based
on a distributed architecture.
A. True
B. False

46) VBD EVS disks support only basic SCSI read/write commands.
A. True
B. False

47) Which of the followings are EVS disk types does ECS support?
A. Ultra-high I/O
B. High I/O
C. Common I/O
D. Latency optimized ultra-high I/O

All
48) How many servers can a shared EVS disk be attached to at most?
A. 5
B. 7
C. 8
D. 16

49) EVS can be attached to:


A. OBS
B. ECS
C. BMS
D. VPC

BC

50) An EVS disk can be backed up only when it is in the ( ) state.


A. Available
B. In-use
C. Error
D. Deletion failed

AB

51) Does VBS Support Cross-Region Backup and Restoration?


A. True
B. False

52) HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup
Service (VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults

All

53) VBS does not support backing up EVS disks in batches.


A. True
B. False

B
54) On which of the following services does VBS depend?
A. Elastic Cloud Server
B. Elastic Volume Service
C. Object Storage Service
D. Image Management Service

BC

55) ( ) records operations of VBS resources, facilitating query, audit, and backtracking
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.

56) VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security.
A. True
B. False

57) VBS provides the data backup function for EVS disks. The created data backups can be
used to create EVS disks.
A. True
B. False

58) Which of the following are OBS application scenarios?


A. Massive storage resource pool
B. Static web hosting
C. Big data storage
D. Backup
E. Archiving

All

59) Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs

AB
60) Access requests to OBS can be controlled by,
A. ACLs
B. Bucket policies
C. User signature authentication
D. Server-side encryption

ABC

61) What is the data durability of OBS?


A. 10 nines (99.99999999%)
B. 11 nines (99.999999999%)
C. 12 nines (99.9999999999%)

62) What is the basic storage unit in OBS?


A. File
B. Block
C. Object
D. Bucket

63) Which of the following operations on buckets is not available in OBS?


A. Creation
B. Formatting
C. Modification
D. Deletion

64) If you download an object of the Standard storage class through a HUAWEI CLOUD ECS
server, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity

65) If you download an object of the Archive storage class to your local computer over the
Internet, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration

66) If a customer has some data to store and the data will be downloaded for only 10 times in a
year, which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage

67) Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.

68) Which of the following statements about lifecycle rules is correct?


A. Lifecycle rules support transition between storage classes by hour.
B. Lifecycle rules for objects of historical versions take effect only when versioning is enabled
for the bucket.
C. Lifecycle rules for objects of historical versions cannot be configured if versioning is not
enabled for the bucket.

69) Which of the following items cannot be configured when creating a bucket?
A. Region where bucket resides
B. Storage class of a bucket
C. Bucket policy
D. Static website hosting

70) Which of the following items cannot be configured when uploading an object?
A. File path
B. Storage class of the object
C. KMS encryption
D. File size
D

71) Which storage classes does OBS offer?


A. Archive storage class
B. Backup storage class
C. Infrequent Access storage class
D. Standard storage class

ACD

72) Which of the following are the application scenarios of SFS?


A. Media processing
B. Log management
C. Content management and web directories
D. High-performance computing (HPC)

ACD

73) SFS is charged in pay-per-use or monthly/yearly flat fee mode.


A. True
B. False

74) SFS includes the SFS and SFS Turbo products.


A. True
B. False

75) SFS supports the EXT4 and NTFS protocols.


A. True
B. False

76) SFS can be connected to the AD domain controller for permission control.
A. True
B. False

B
77) SFS (Capacity Oriented) allows ECSs in different VPCs to access the same file system.
A. True
B. False

78) What is the maximum size of a single file supported by SFS Capacity Oriented?
A. 32 TB
B. 64 TB
C. 128 TB
D. 240 TB

79) What is the maximum size of a single file supported by SFS Turbo?
A. 16 TB
B. 32 TB
C. 64 TB
D. 128 TB

80) SFS (Turbo) allows ECSs in different VPCs to access the same file system.
A. True
B. False

81) What is the maximum bandwidth supported by SFS?


A. 2 GB/s
B. 5 GB/s
C. 10 GB/s
D. 20 GB/s

82) What is the maximum bandwidth supported by SFS Turbo?


A. 150 MB/s for Turbo Standard
B. 350 MB/s for Turbo Performance
C. 150 GB/s for Turbo Standard
D. 350 GB/s for Turbo Performance

AB
83) Which of the following file protocol is supported by SFS Turbo?
A. NFS v3
B. NFS v4
C. SMB 2.0/2.1/3.0
D. EXT4

84) What is the minimum latency of SFS Turbo Performance?


A. 10 ms
B. 5 ms
C. 2 ms
D. 1 ms

85) What is the minimum latency of SFS Turbo Standard?


A. 10 ms
B. 5 ms
C. 2 ms
D. 1 ms

86) What is the minimum latency of SFS?


A. 20 ms
B. 3 ms
C. 2 ms
D. 1 ms

87) What is the maximum IOPS supported by SFS Turbo?


A. 5,000
B. 10,000
C. 20,000
D. 30,000

88) Which of the following protocols are supported by SFS?


A. NFS v3
B. NFS v4
C. FTP
D. EXT4

89) Which of the following are mainstream storage types in the industry?
A. Block storage
B. File storage
C. Object storage
D. Backup storage

ABC

90) Which of the following are HUAWEI CLOUD file storage services?
A. SFS
B. SFS Turbo
C. SFS Plus
D. All of the above

AB

91) Which scenarios does SFS suit?


A. HPC
B. Media
C. File sharing
D. Game

ABC

92) Which scenarios does SFS Turbo suit?


A. HPC
B. Media
C. High-performance websites
D. Software development

AC

93) An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False

A
94) Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category?
A. ECS
B. BMS
C. IMS
D. SFS

95) GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops,
graphics rendering and engineering drawing run in virtualization environment.
A. True
B. False

96) Which of the following are the advantages of the VPC service?
A. Secure & Reliable
B. Flexible Configuration
C. High Speed Access/Dynamic BGP
D. Interconnection between VPCs

All

97) Which of the following operation incurs charges?


A. Create an EIP
B. Create a subnet
C. Create a VPC
D. Create a security group

98) The Virtual Private Cloud (VPC) service enables you to provision logically isolated,
configurable, and manageable virtual networks, improving the cloud resource security and
simplifying network deployment.
A. True
B. False

99) Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?
A. Customizing CIDR blocks
B. Customizing access control policies
C. Accessing the Internet using EIPs
D. Connecting a local data center using a VPN or Direct Connect connection

All
100) Which of the Following CIDR blocks care available for VPC Service?
A. 10.0.0.0/8
B. 172.16.0.0/16
C. 192.168.0.0/16

All

101) Which of the following cannot be configured in a VPC?


A. Subnet
B. Security group
C. Elastic IP address
D. Bandwidth
E. Load balancing

102) To enable RDP access to a created Windows ECS, which port must be opened by an
inbound security group rule?
A. 37
B. 53
C. 3389
D. 80

103) Which of the following must be configured to enable an ECS without a bound EIP to access
the Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing

104) How many network interface cards (NICs) does an ECS functioning as a SNAT server
require?
A. 1
B. 2
C. 3

105) Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.

106) Which of the following can enable an ECS in a VPC to communicate with a host in a private
data center?
A. Internet connection
B. VPN
C. VPC peering connection

107) Which of the following is optional when you create a subnet?


A. Name
B. CIDR block
C. Gateway
D. Tag

108) If you have high requirements on network stability and availability, which of the following
EIP types must you choose:
A. Static BGP
B. Dynamic BGP

109) Which of the following CIDR blocks is not supported by the VPC service?
A. 10.0.0.0 – 10.255.255.255
B. 172.16.0.0 – 172.31.255.255
C. 192.168.0.0 – 192.168.255.255
D. 255.255.0.0 – 255.255.255.255

110) Which of the following are VPC features?


A. Secure isolation
B. Flexible deployment
C. Dynamic BGP
D. Hybrid deployment
All

111) Which of the following is NOT a component of the ELB service?


A. Firewall
B. Load Balancer
C. Listener
D. Instance (VM or application container)

112) Elastic Load Balance (ELB) can work independently.


A. True
B. False

113) AS must work with Elastic Load Balance (ELB).


A. True
B. False

114) Which of the following functions are supported by ELB?


A. Creating a load balancer
B. Deleting a load balancer
C. Querying a load balancer
D. Adjusting the bandwidth

All

115) Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm

116) Which of the following load balancing algorithms are provided by ELB?
A. Weighted round robin
B. Weighted least connections
C. Source IP hash
D. Encryption algorithm
E. Weighted
ABC

117) Which of the following protocols requires certificates?


A.TCP
B.UDP
C.HTTP
D.HTTPS

118) Which of the following protocols does ELB support?


A.TCP
B.UDP
C.HTTP
D.HTTPS

All

119) ELB supports servers running different OSs.


A. True
B. False

120) Which of the following services can be used to view real-time monitoring data of load
balancers and listeners?
A.Cloud Container Engine
B.Cloud Eye
C.Auto Scaling
D.Virtual Private Cloud

121) Which of the following statement about Direct Connect is incorrect?


A.Direct Connect is a high-speed, low-latency, stable, and secure dedicated network
connection that connects user's local data center to a VPC on a cloud.
B.Direct Connect uses the Internet tunneling technology on the public network.
C.To create a direct connection, users need to create a connection, a virtual gateway, and a
virtual interface.
D.Currently, only the yearly/monthly billing mode is supported.

B
122) To delete direct connection, you need to delete Virtual interface and the virtual GW bound
with the virtual interface first
A. True
B. False

123) Can I access multiple VPCs using a direct connection?


A. True
B. False

124) Direct Connect enables a user to set up a dedicated network connection between a local
data center and the public cloud. Currently, which of the following connection type is supported
by Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN

125) In Route Mode, Static Route & BGP are supported?


A. True
B. False

126) To unsubscribe an operations connection, you need to delete the hosted connection
depends on it, and then delete the virtual gateway and virtual interface associated with it.
A. True
B. False

127) In Huawei Cloud VPN, only IPsec is supported?


A. True
B. False

128) Direct Connect supports only duration based (Yearly/Monthly) billing mode?
A. True
B. False
A

129) Huawei Cloud VPN uses pay-per-use pricing?


A. True
B. False

130) Select incorrect related to VPN GW connection:


A. In VPN, local GW is HUAWEI CLOUD IP address
B. In VPN, Remote GW is the public IP address of the VPN connection in your DC
C. In VPN, Local Subnet specifies the VPC subnets that need to communicate with your DC
D. In VPN, Remote Subnet specifies the subnets of your DC

131) Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both

132) Which of the following policies must be consistent between the local and remote sides of a
VPN that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec

CD

133) Can VPN gateway have multiple connections?


A. True
B. False

134) Does the IPsec VPN Support Automatic Negotiation?


A. True
B. False
A

135) What are customer requirements for cloud security?


A.CSA Top Threats
B.National legal compliance requirements
C.Service continuity
D.Data confidentiality

All

136) Which of the following are CSA TOP threats?


A. Account hijacking
B. Malicious internal personnel
C. Data leakage and loss
D. Abuse and malicious use of cloud services
E. Insufficient management of identity, credentials, and access
F. Insecure ports and APIs

All

137) Data Security includes:


A. DEW (Data Encryption Workshop)
B. HSS (Host Security Service)
C. CGS (Container Guard Service)
D. DBSS (Database Security Service)

AD

138) Which of the following statements about AAD is incorrect?


A. AAD does not support high-defense IP address access for multiple lines.
B. The Anti-DDoS cluster provides Layer 4 DDoS attack cleansing and works with GameCC
for attack blocking.
C. The WAF cluster provides DDoS attack cleansing and web CC defense on Layer 7.
D. AAD supports various cloud services.

139) With data security as its core, HUAWEI CLOUD builds a series of security services to meet
the particular needs. Security services include:
A. Data Security
B. Host Security
C. Application Security
D. Network Security

All

140) Which of the following security services can be used to protect websites?
A. WAF
B. VSS
C. SCM
D. Anti-DDoS

All

141) What are the basic functions of HSS?


A. Asset management
B. Vulnerability management
C. Baseline inspection
D. Intrusion detection

All

142) Which of the following statements about HTTPS site protection is incorrect?
A. When an HTTPS service is released to users, the HTTPS certificate needs to be uploaded
for using WAF.
B. No matter whether the original website server provides HTTPS or HTTP services, users
can have HTTPS services when using WAF.
C. The basic edition does not support HTTPS protection.
D. A domain name can choose to use either HTTP or HTTPS protocols only.

143) Which of the following problems can WAF solve?


A. The service server of an e-commerce website cannot respond to normal requests because its order
interface is overly invoked.
B. Numerous exclusive and beautiful pictures on a website are crawled by competitors in batches.
C. A website faces threats such as SQL and command code injection.
D. The website server is infected with viruses and CPU usage remains high.

ABC

144) Which of the following scenarios can WAF apply to?


A. The official website of a university deployed on the education portal
B. An enterprise portal in a self-deployed data center
C. A testing website deployed in a LAN
D. An open website deployed on the platforms of other cloud vendors

ABD

145) Which of the following is NOT a capability of Web Application Firewall (WAF)?
A. Anti-SQL injection
B. Anti-Webshell uploading
C. Anti-leeching
D. Anti-traffic attack

146) WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False

147) Which of the following problems can VSS solve?


A. Help tenants detect web vulnerabilities.
B. Help users detect weak passwords of the host.
C. Guide tenants in fixing the root cause of security vulnerabilities.
D. Help tenants repair or intercept vulnerabilities.

ABC

148) Which of the following statements about VSS is incorrect?


A. VSS is installation and maintenance free, requiring no extra labor cost. The service is
offered in the basic (free of charge) and professional (additional fees) editions to meet the
requirements of users.
B. VSS is easy to use and can be enabled with one click.
C. VSS is able to dynamically adjust the scanning frequency to ensure service availability.
D. Users need to manually upgrade the vulnerability library before scanning to improve
scanning accuracy.

149) Which of the following statements about VSS is incorrect?


A. VSS has no industry restrictions and can be widely applied in industries such as finance,
government, and transportation.
B. Users should have obtained a HUAWEI CLOUD account before using VSS.
C. If a tenant's web site or applications can be accessed through the public network, VSS is
available.
D. The tenant needs to deploy services on VMs of HUAWEI CLOUD.

150) Which of the following domain name types is *.huaweicloud.com?


A. Single domain name
B. Wildcard domain name
C. Multiple domain names
B

151) What are the challenges of defending against DDoS attacks?


A. Limited performance of the protection device
B. Insufficient service capabilities
C. Low Internet bandwidth

All

152) Which of the following protocols does AAD support?


A. TCP
B. UDP
C. HTTPS
D. HTTP

All

153) Which of the following service is a data security service?


A. Host Intrusion Detection (HID)
B. Host Vulnerability Detection (HVD)
C. Key Management Service (KMS)
D. SSL/TLS Certificate Service (SCS)

154) EVS Disks are associated with one Back-up Policy?


A. True
B. False

155) OBS can access through OBS Console or OBS Browser


A. True
B. False

156) A file system can be mounted to ECSs in different VPCs?


A. True
B. False

157) AS can only dynamically add or reduce ECS in Specified interval?


A. True
B. False

158) Anti DDOS can mitigate which kind of attack:


A. Volume attack
B. Brute force

159) Which of the following statements about KMS are correct?


A. The key and random numbers are generated by the certified third-party hardware security
module.
B. The master key of a user is stored redundantly online.
C. KMS is deeply integrated with computing and storage services such as ECS, EVS, IMS, OBS, EVS,
and VBS. KMS is used to manage the keys of these services.
D. The number of keys can be dynamically adjusted based on service development.

All

160) Which of the following statements about KMS are correct?


A. KMS provides views for users to uniformly manage encryption keys so that the usage of all keys
can be visualized.
B. Users can control the key and manage the lifecycle covering key generation, rotation, and
destruction.
C. Users can easily manage the encryption key used for encrypting data stored in your applications by
invoking APIs.
D. With the built-in auditing capability, KMS logs provide detailed information about access keys to
help you meet regulatory compliance.

All

161) Which of the following statements about Dedicated HSM are correct?
A. The key calculation of Dedicated HSM is performed on an exclusive encryption card. Services for
different tenants are isolated without affecting performance.
B. Dedicated HSM supports China-invented encryption algorithms such as SM1, SM2, SM3, and SM4.
C. Dedicated HSM is recommended for all data encryption requirements on the cloud to ensure
security.
D. Dedicated HSM is a hosting service that can automatically perform time-consuming tasks, such as
hardware presetting, software patching, high availability, and backup.

ABD
162) Which of the following problems does a website tenant not need to consider when selecting
a package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume

163) Which of the following are the advantages of SCM?


A. Improved website security
B. Optimized website image
C. Higher search engine rankings

All

164) Which of the following domain name types does SCM support?
A. Single domain name
B. Wildcard domain name
C. Multiple domain names

All

165) What layer attacks Anti DDOS can withstand?


A. Layer 4 to Layer 7

166) Which of the following technologies does SA use?


A. Big Data
B. Web Crawlers
C. Encryption
D. ID Authentication

AB

167) Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False

168) Server Monitoring includes:


A. Basic Monitoring
B. OS Monitoring
C. CPU Monitoring
D. Disk Monitoring
AB

169) Which rollup methods does Cloud Eye support ( )?


A. Max.
B. Min.
C. Avg.
D. Sum
E. Variance

All

170) Cloud Eye can be used to:


A. monitor the utilization of service resources
B. track the running status of cloud services
C. configure alarm rules and notifications
D. respond to resource changes

All

171) Which tool monitors RDS DB.


A. ECS
B. VPC
C. OBS
D.Cloud Eye

172) Which of the following DB instances can RDS create? (O)


A. MySQL
B. SQL Server
C. MongoDB
D. PostgreSQL

ABD

173) The Key Features of RDS include:


A. High Availability
B. Backup and Restoration
C. DB Instance Monitoring
D. High security

ABC
174) RDS does not support data backup or restoration.
A. True
B. False

175) To retrieve Alarm History for 7 days. What Service you will use? (Single Choice)
A. SMN
B. CTS
C. ECS
D. RDS

176) Where to restore RDS instance from?


A. Xxx
B. ECS
C. VPC
D. OBS

177) HUAWEI CLOUD EI provides 45 services and 142 functions.


A. True
B. False

178) What are the advantages of HUAWEI CLOUD EI service ModelArts? (O)
A. Readily acquired
B. Fast training
C. Fast launch
D. One-stop

All

179) Which of the following Huawei Cloud EI APIs are vision related?
A. Face Recognition
B. Image Recognition
C. Content Moderation
D. Image search

All
180) DWS is the Enterprise - Class Data Warehouse.
A. True
B. False

181) Which EI service can implement large scale data analysis and query?
A. DLF
B. DWS
C. DIS
D. GES

182) Which of the following is NOT a security feature on API Gateway?


A. App authentication
B. Request throttling
C. IP address blacklist
D. Security sandbox

183) What SDK Languages Does API Gateway Support?


A. Java
B. Go
C. Python
D. C#
E. JavaScript
F. PHP
G. C
H. C++
I. Android
J. Delphi

All except J

184) You can enable API Gateway and create and manage APIs for free? You pay only for
the number of API calls received and the amount of data transmitted.
A. True
B. False

185) Do I Need to Publish an API Again After Modification?


A. True
B. False
A

186) By default, an API can be called up to 200 times per second?


A. True
B. False

187) ECS Login Modes?


A. Key pair
B. OTP Token
C. Fingerprint
D. Password

AD

188) What are Auto Scaling Policy Actions? (multiple choice)


A. Modify
B. Replicate
C. Enable
D. Delete

ACD

189) AS Policies that dynamically expand? (single Choice)


A. Random
B. Alarm
C. Schedule
D. Periodic

190) Which are VPC access control functions?


A. Security group
B. Network access list
C. Fingerprint
D. Password

AB

191) The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason?
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed

192) Cloud computing is a model that enables users to obtain resources (such as computing,
storage, network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers.
A. True
B. False

193) Which of the following statements about hybrid clouds is incorrect?


A.They centrally manage enterprises' resources on both public and private clouds.
B.They allow service applications to move seamlessly between public and private clouds.
C.They leverage both public and private cloud advantages to optimize resource configuration.
D.Applications can be deployed only on the public cloud.

194) How long does it take to obtain an ECS? (S)


A. Several seconds
B. Several minutes
C. Several hours
D. Several days

195) Traffic from internet will hit to the which device first?
A. Firewall
B. NGIX
C. ELB

196) If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new
disk?
A. True
B. False

B
197) Which scaling action is not performed on Bandwidth scalling policy?
A. Replicate
B. Add
C. Reduce
D. Set to

198) Which component is not deleted automatically when DB instance is deleted?


A. manual backup

199) You can change CPU or memory of a DB instance


A. True
B. False

200) The management console can be used without logging in.


A. True
B. False

201) After creating ECS, bandwidth cannot be changed.


A. True
B. False

202) When creating ECS you can use File injection function to initialize it.
A. True
B. False

203) The server does not need to be stopped before restoring EVS disk data using VBS backup.
A. True
B. False

204) How are regions divided?


A. Based on AZ
B. Geographic location and Network Latency
C. Cluster servers

205) Logging function of a bucket – where can log file be stored?


A. Any bucket
B. Enable logging
C. The bucket on which logging is enabled
D. All other buckets except the one which is logging

206) When compared with shared file systems what are the advantages of SFS:
A. Robust reliability
B. Seamless integration
C. File sharing
D. Easy operations, high cost- (wrong, should be low)

ABC

207) Primary DB instance can replicate data to secondary DB Instances in :


A. Asynchronous
B. Semi-synchronous
C. Synchronous

AB

208) What is ECS lifecycle?


A. Start
B. Stop
C. Restart
D. Delete

All

209) which of the following is not included in devcloud:


A. Data backup
B. Project Management
C. Code Check
D. Cloud build

A
210) Bucket A has been configured a policy not to allow any users to access it. Object B is inside
Bucket A. Object B has an ACL that allows any users to access it. Therefore, object B can be
access anonymously by any user.
A. True
B. False

211) “Faster Inclusive AI Development”?


A. DLS
B. MLS
C. ModelArts
D. GES

212) API lifecycle?


A. Create
B. Publish
C. Authorize
D. Remove

All

213) The NAT Gateway service is charged.


A. True
B. False

214) NAT Gateway supports smooth upgrade.


A. True
B. False

215) In one VPC, only one NAT gateway can be created.


A. True
B. False

216) After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False
B

217) NAT Gateway supports disaster recovery across AZs.


A. True
B. False

218) Which of the following functions of NAT Gateway can be used to enable ECSs to share an
EIP to access the Internet?
A. SNAT
B. DNAT

219) Which of the following statements about NAT Gateway is incorrect?


A. An SNAT server is more stable than the NAT Gateway service.
B. NAT Gateway supports security isolation.
C. NAT Gateway supports up to 1 million concurrent SNAT connections.
D. NAT Gateway supports up to 200 DNAT rules.

220) Which of the following statements about NAT Gateway is incorrect?


A. After the number of SNAT connections reaches the upper limit, new sessions cannot be
created.
B. Cloud Eye allows you to view the number of SNAT connections.
C. Cloud Eye allows you to view the IP addresses of top 10 VMs that occupy the largest
number of SNAT connections.
D. Cloud Eye does not support setting alarms for the number of connections.

221) Which of the following statements about NAT Gateway is correct?


A. DNAT provides services for external networks.
B. DNAT also has the concept of the number of connections.
C. DNAT supports TCP, UDP, and ICMP port mapping.
D. DNAT does not support mapping all ports.

222) Which of the following is not the component of Big Data Platform?
A. Map Reduce
B. Openstack
C. HDFS
D. Yarn

223) An ECS must be stopped before it is used to create an image?


A. True
B. False

224) An ECS can be attached to multiple EVS disks?


A. True
B. False

225) ELB provides only three types of load balancing algorithms?


A. True
B. False

226) IMS provides comprehensive and flexible self-service image management capabilities.
Users can create a private image and use it to create an ECS or multiple ECSs?
A. True
B. False

227) All Huawei Cloud services can be viewed on the management console?
A. True
B. False

228) Which of the following component can be used to set an access control whitelist to allow
specific IP addresses to access load balancers?
A. Listener
B. Backend Server
C. Backend Server Group
D. Health Check
A

229) Which of the following is not an advantage of RDS compared with self-built databases?
A. Instant Availability
B. Easy Management
C. Elastic Scaling
D. Self-Installed Databases

230) To which of the following scenario does OCR apply?


A. Image Processing
B. Image Recognition
C. Character Recognition
D. Speech Recognition

231) Which of the following can isolate RDS network resources from other services?
A. ECS
B. VPC
C. CES
D. OBS

232) Which of the following operations is not supported by EVS?


A. Attaching/Detaching
B. Capacity Expansion
C. Capacity Reduction
D. Backup

233) Which of the following are advantages of IAM?


A. Permission Management
B. Security Control
C. Agency management
D. Federated ID Authentication

All

234) Which of the following are advantages of Cloud Eye?


A. Automatic Provisioning
B. Real Time & Reliable Monitoring
C. Visualized Monitoring
D. Multiple Notification Types

All

235) A file system can be mounted to:


A. A Linux ECS
B. A Windows ECS
C. A Bare Metal Server
D. Dedicated Computing Cluster

AB

236) Which is true about instance removal:


-If number of instances is greater than in AS group, some are removed
-When removed, the balance between AZs is not taken into account
-
-

237) Does OBS support batch upload?

238) When EVS disk is detached; data will be lost?

239) After the subnet is created; CIDR block can be changed?

240) SFS can be mounted to Windows ECS?

241) CCE Auto Scaling Models?

242) What are disadvantages of building your own Database?


A. Out of the Box
B. Stable
C. Easy Manageability
D. High Investment

243) How many AS configurations can be set for AS Group?

244) What is required by a workspace user to access USB connected to a terminal?


A. Clipboard Redirection
B. USB Port Redirection
C. Printer Redirection
D. User cannot access

245) Incorrect about KMS?


A. manage cloud platform & tenants’ keys
B. uses HSM
C. uses multi-layer key protection
D. can be integrated with apps

246) How to make an app created in a container accessible externally?


A. Deploy more than 2 nodes in container cluster
B. Assign 2 GB memory to each node
C. Publish app as a service
D. Bind app to ELB

247) What is not a capability of Anti DDOS?


A. Defend against DDOS Attacks
B. Monitor Individual IP
C. Provide Interception reports for individual IP
D. Regularly scan ECS for vulnerabilities

248) If 10GE is used to connect using Direct Connect? What port is it?
A. Electrical
B. Optical
C. Ethernet
D. Serial

249) What is required on Workspace to support 3D applications?


A. CPU with Hardware Virtualization
B. GPU
C. iNIC
D. SSD

250) For Monitoring Metrics Data, the retention policy differs by roll up period. For how many
days the data is retained with one hour roll up period?
A. 10
B. 20
C. 155
D. 300

251) What is not an objective of cloud computing security services?


A. User Security
B. Cloud Platform Security
C. Data Security
D. Service Security

252) What are the issues with conventional PCs?


A. High Cost
B. Poor Video Playback
C. Poor Software Compatibility
D. PC User behavior cant be monitored

253) Not the advantage of Cloud Eye?


Can monitor 3rd party non-Huawei Cloud Services

254) Which are not the characteristics of RDS?


A. High DBA Cost
B. no need to purchase Hardware & software
C. Only need RDS Rental Fee
D. Low DBA Skill Requirment

255) Procedures to use CCE?

256) What are the pre requisites to create a container cluster?


A. ECS has been created.
B. VPC has been created
C. ELB has been created
D. AK/SK file has been uploaded to CCE
257) Stages of Lifecycle of RDS DB Instance?

258) Important protocols in IPSec framework?


A. IP B. IKE C. AH D. ESP

259) Which peripheral redirections are supported by workstation?


A. Printer
B. USB
C. File
D. Clipboard

260) Cloud Eye notification methods?

261) Capabilities of Host Intrusion Detection?


A. Delete Brute force crack attack
B. Warning of remote login attempts
C. Detect weak passwords
D. Detect permission of database process
E. Detect web backdoors

262) What are scenarios for image replication?


A. Replicate unencrypted image to unencrypted image
B. Replicate unencrypted image to encrypted image
C. Replicate encrypted image to unencrypted image
D. Replicate encrypted image to encrypted image
What are basic characteristics of cloud computing? (O)
A. On-demand self-service
B. broad network access methods
C. Resource pooling
D. fast and scalable
E. Measurable services

Which of the following is generally used to provide application development and running
environments? (AJ)
A. IaaS
B. PaaS
C. SaaS

Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category? (O)
A. ECS
B. BMS
C. IMS
D. SFS

An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False

GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops, graphics
rendering and engineering drawing run in virtualization environment. (S)
A. True
B. False

Which of the following are OBS application scenarios?


A. Massive storage resource pool
B. Static web hosting
C. Big data storage
D. Backup
E. Archiving

Which of the following components are included in an ECS? (O)


A. vCPUs
B. Memory
C. Image
D. EVS disk

ECSs can be charged in yearly/monthly or metered mode.


A. True
B. False

Which of the following service is used by an ECS to store data? (O)


A. AS
B. IMS
C. EVS
D. DeC
Which operations are required to use ECS to create a Windows image? (O)
A. Configure the Windows ECS.
B. Install Cloudbase-Init.
C. Create a Windows private image.
D. Query and cleanup network rule files.

EVS provides the scalable, virtual block storage service, and the backend of EVS is based on a
distributed architecture. (S)
A. True
B. False

Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs

Which of the following are the advantages of the VPC service?


A. Security isolation
B. Flexible deployment
C. Dynamic BGP
D. Hybrid cloud support

Which of the following operation incurs charges? (AJ)


A. Create an EIP
B. Create a subnet
C. Create a VPC
D. Create a security group

Can VPN gateway have multiple connections


True
false

Can I access multiple VPCs using a direct connection?


A. True
B. False

Which of the following is NOT a component of the ELB service?


A. Firewall
B. Load Balancer
C. Listener
D. Instance (VM or application container)

Direct Connect enables a user to set up a dedicated network connection between a local data
center and the public cloud. Currently, which of the following connection type is supported by
Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN

Which of the following service is a data security service? (O)


A. Host Intrusion Detection (HID)
B. Host Vulnerability Detection (HVD)
C. Key Management Service (KMS)
D. SSL/TLS Certificate Service (SCS)
Data Security includes:
A. DEW
B. HSS
C. CGS
D. DBSS

Which of the following is NOT a capability of Web Application Firewall (WAF)?


A. Anti-SQL injection
B. Anti-Webshell uploading
C. Anti-leeching
D. Anti-traffic attack

What are the advantages of HUAWEI CLOUD EI service ModelArts? (O)


A. Readily acquired
B. Fast training
C. Fast launch
D. One-stop

Which of the following is NOT a security feature on API Gateway?


A. App authentication
B. Request throttling
C. IP address blacklist
D. Security sandbox

Which of the following DB instances can RDS create? (O)


A. MySQL
B. SQL Server
C. MongoDB
D. PostgreSQL

The Key Features of RDS include:


A. High Availability
B. Backup and Restoration
C. DB Instance Monitoring
D. High security

The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason (S)
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed

Cloud computing is a model that enables users to obtain resources (such as computing, storage,
network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers. (M)
A. True
B. False

Which of the following statements about hybrid clouds is incorrect?


A.They centrally manage enterprises' resources on both public and private clouds.
B.They allow service applications to move seamlessly between public and private clouds.
C.They leverage both public and private cloud advantages to optimize resource configuration.
D.Applications can be deployed only on the public cloud.

How long does it take to obtain an ECS? (S)


A. Several seconds
B. Several minutes
C. Several hours
D. Several days

What is the type of the image converted based on an existing ECS? (aj)
A. Public image
B. Private image
C. Shared image
D. EulerOS image

Which of the following policies does AS support? (O)


A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy

Elastic Load Balance (ELB) can work independently.


True
False

AS must work with Elastic Load Balance (ELB).


A. True
B. False

VBS does not support backing up EVS disks in batches. (O)


A. True
B. False

On which of the following services does VBS depend? (M)


A. Elastic Cloud Server
B. Elastic Volume Service
C. Object Storage Service
D. Image Management Service

( ) records operations of VBS resources, facilitating query, audit, and backtracking) (AJ)
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.

An EVS disk can be backed up only when it is in the ( ) state. (M)


A. Available
B. In-use
C. Error
D. Deletion failed

VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security. (AJ)
A. True
B. False

Does VBS Support Cross-Region Backup and Restoration? (S)


A. True
B. False

VBS provides the data backup function for EVS disks. The created data backups can be used to
create EVS disks. (S)
A. True
B. False

Which of the following functions are supported by ELB?


A. Creating a load balancer
B. Deleting a load balancer
C. Querying a load balancer
D. Adjusting the bandwidth

Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm

API lifecycle? (AJ)


Create -publish- authorize -remove

Which of the following protocols requires certificates? (S)


A.TCP
B.UDP
C.HTTP
D.HTTPS

ELB supports servers running different OSs.


A. True
B. False

Which of the following protocols does ELB support?


A.TCP
B.UDP
C.HTTP
D.HTTPS

Which of the following services can be used to view real-time monitoring data of load balancers
and listeners? (M)
A.Cloud Container Engine
B.Cloud Eye
C.Auto Scaling
D.Virtual Private Cloud

Which of the following statement about Direct Connect is incorrect?


A.Direct Connect is a high-speed, low-latency, stable, and secure dedicated network
connection that connects user's local data center to a VPC on a cloud.
B.Direct Connect uses the Internet tunneling technology on the public network.
C.To create a direct connection, users need to create a connection, a virtual gateway, and a
virtual interface.
D.Currently, only the yearly/monthly billing mode is supported.

What are customer requirements for cloud security? (O)


A.CSA Top Threats
B.National legal compliance requirements
C.Service continuity
D.Data confidentiality

Anti DDOS can mitigate which kind of attack:


Volume attack
Brute force

WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False

Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False
Server Monitoring includes:
A. Basic Monitoring
B. OS Monitoring
C. CPU Monitoring
D. Disk Monitoring

Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)

How many types of login users does HUAWEI CLOUD support?


A. 1
B. 2
C. 3
D. 4

Is an ECS a physical server?


A. Yes
B. No

What is used by an ECS to store data? (aj)


A. Auto Scaling
B. Elastic Volume Service
C. Cloud Container Engine
D. Cloud Eye

Which of the following methods does AS use to expand resources? (S)


A. Dynamically expanding resources
B. Expanding resources as planned
C. Manually expanding resources
D. Automatically expanding resources

AS supports the following instance removal policies:


A. Oldest instances created based on the oldest configuration
B. Newest instances created based on the oldest configuration
C. Oldest instances
D. Newest instances

Which of the following policies does AS support? (O)


A. Alarm policies
B. Scheduled policies
C. Periodic policies
D. Monitoring policies

Before creating a data disk image from a data disk, ensure that the ECS has a system disk and
the data disk is not empty.
A. True
B. False

What image types does IMS support? (O)


A. Public image
B. Private image
C. Encrypted image
D. Shared image

Private images can be classified into:


A. System disk image
B. Data disk image
C. Full-ECS image
D. Snapshot

Which of the followings are EVS disk types? (O)


A. Ultra-high I/O
B. High I/O
C. Common I/O
D. Optimized I/O
E. Low Latency optimized I/O

How many servers can a shared EVS disk be attached to at most?


A. 5
B. 7
C. 8
D. 16

EVS can be attached to: (AJ)


A. OBS
B. ECS
C. BMS
D. VPC

VBD EVS disks support only basic SCSI read/write commands.


A. True
B. False

Access requests to OBS can be controlled by,


A. ACLs
B. Bucket policies
C. User signature authentication ?
D. Server-side encryption

Which of the following are the application scenarios of SFS?


A. Media processing
B. Log management ?
C. Content management and web directories
D. High-performance computing (HPC)

Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?


A. Customizing CIDR blocks
B. Customizing access control policies
C. Accessing the Internet using EIPs
D. Connecting a local data center using a VPN or Direct Connect connection

Which of the Following networks could be VPC subnet. (S)


/24
/24
/24
/23 ALL PRIVATE SUBNETS

HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup Service
(VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults

Which of the following load balancing algorithms are provided by ELB? (AJ)
A. A. Weighted round robin
B. B. Weighted least connections
C. C. Source IP hash
D. D. Encryption algorithm
E. Weighted

Which of the following security services can be used to protect websites?


A. WAF
B. VSS
C. SCM
D. Anti-DDoS

Which rollup methods does Cloud Eye support ( )?


A. Max.
B. Min.
C. Avg.
D. Sum
E. Variance

Which of the following are deployment models of cloud computing?


A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community/Industry cloud
What is the data durability of OBS?
A. 10 nines (99.99999999%)
B. 11 nines (99.999999999%)
C. 12 nines (99.9999999999%)

What is the basic storage unit in OBS?


A. File
B. Block
C. Object
D. Bucket

Which of the following operations on buckets is not available in OBS?


A. Creation
B. Formatting
C. Modification
D. Deletion

If you download an object of the Standard storage class through a HUAWEI CLOUD ECS server,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity

If you download an object of the Archive storage class to your local computer over the Internet,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration

If a customer has some data to store and the data will be downloaded for only 10 times in a year,
which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage

Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.

Which of the following statements about lifecycle rules is correct?


A. Lifecycle rules support transition between storage classes by hour.
B. Lifecycle rules for objects of historical versions take effect only when versioning is enabled
for the bucket.
C. Lifecycle rules for objects of historical versions cannot be configured if versioning is not
enabled for the bucket.

Which of the following items cannot be configured when creating a bucket?


A. Region where bucket resides
B. Storage class of a bucket
C. Bucket policy
D. Static website hosting

Which of the following items cannot be configured when uploading an object?


A. File path
B. Storage class of the object
C. KMS encryption
D. File size

Which storage classes does OBS offer? (O)


A. Archive storage class
B. Backup storage class
C. Infrequent Access storage class
D. Standard storage class

The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable,
and manageable virtual networks, improving the cloud resource security and simplifying network
deployment. (S)
A. True
B. False

Which tool monitors RDS DB.


ECS
VPC
OBS
And correct one

Which of the following cannot be configured in a VPC? (S)


A. Subnet
B. Security group
C. Elastic IP address
D. Bandwidth
C. Load balancing

Which of the following must be configured to enable an ECS without a bound EIP to access the
Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing

How many network interface cards (NICs) does an ECS functioning as a SNAT server require?
A. 1
B. 2
C. 3

Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
Which of the following can enable an ECS in a VPC to communicate with a host in a private data
center?
A. Internet connection
B. VPN
C. VPC peering connection

To delete direct connection you need to delete Virtual GW and virtual interfaces first
True
False

Select incorrect related to VPN GW connection:


In VPN local GW is HUAWEI CLOUD IP address

Which of the following CIDR blocks is not supported by the VPC service? (S)
A. 10.0.0.0 – 10.255.255.255
B. 172.16.0.0 – 172.31.255.255
C. 192.168.0.0 – 192.168.255.255
D. 255.255.0.0 – 255.255.255.255

Which of the following is optional when you create a subnet?


A. Name
B. CIDR block
C. Gateway
D. Tag

If you have high requirements on network stability and availability, which of the following EIP
types must you choose:
A. Static BGP
B. Dynamic BGP

Which of the following policies must be consistent between the local and remote sides of a VPN
that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec
SFS is charged in pay-per-use or monthly/yearly flat fee mode.
A. True
B. False

SFS includes the SFS and SFS Turbo products.


A. True
B. False

SFS supports the EXT4 and NTFS protocols.


A. True
B. False

SFS can be connected to the AD domain controller for permission control.


A. True
B. False

SFS allows ECSs in different VPCs to access the same file system.
A. True
B. False

What is the maximum size of a single file supported by SFS?


A. 32 TB
B. 64 TB
C. 128 TB
D. 240 TB

What is the maximum bandwidth supported by SFS?


A. 2 GB/s
B. 5 GB/s
C. 10 GB/s
D. 20 GB/s

Which of the following file protocol is supported by SFS Turbo? (O)


A. NFS v3
B. NFS v4
C. SMB 2.0/2.1/3.0
D. EXT4

What is the minimum latency of SFS Turbo?


A. 10 ms
B. 5 ms
C. 2 ms
D. 1 ms

What is the maximum IOPS supported by SFS Turbo?


A. 5,000
B. 10,000
C. 20,000
D. 30,000

Which of the following protocols are supported by SFS?


A. NFS v3
B. NFS v4
C. FTP
D. EXT4

Which of the following are mainstream storage types in the industry?


A. Block storage
B. File storage
C. Object storage
D. Backup storage

Which of the following are HUAWEI CLOUD file storage services?


A. SFS
B. SFS Turbo
C. SFS Plus
D. All of the above

Which scenarios does SFS suit?


A. HPC
B. Media
C. File sharing
D. Game

Which scenarios does SFS Turbo suit?


A. HPC
B. Media
C. High-performance websites
D. Software development

Which of the following statements about AAD is incorrect?


A. AAD does not support high-defense IP address access for multiple lines.
B. The Anti-DDoS cluster provides Layer 4 DDoS attack cleansing and works with GameCC
for attack blocking.
C. The WAF cluster provides DDoS attack cleansing and web CC defense on Layer 7.
D. AAD supports various cloud services.

What is the basic capability of HSS?


A. Risk analysis and prevention capability
B. Attack defense capability
C. Intrusion detection capability

Which of the following statements about HTTPS site protection is incorrect?


A. When an HTTPS service is released to users, the HTTPS certificate needs to be uploaded
for using WAF.
B. No matter whether the original website server provides HTTPS or HTTP services, users
can have HTTPS services when using WAF.
C. The basic edition does not support HTTPS protection.
D. A domain name can choose to use either HTTP or HTTPS protocols only.

Which of the following problems does a website tenant not need to consider when selecting a
package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume

Which of the following statements about VSS is incorrect?


A. VSS is installation and maintenance free, requiring no extra labor cost. The service is
offered in the basic (free of charge) and professional (additional fees) editions to meet the
requirements of users.
B. VSS is easy to use and can be enabled with one click.
C. VSS is able to dynamically adjust the scanning frequency to ensure service availability.
D. Users need to manually upgrade the vulnerability library before scanning to improve
scanning accuracy.

Which of the following statements about VSS is incorrect?


A. VSS has no industry restrictions and can be widely applied in industries such as finance,
government, and transportation.
B. Users should have obtained a HUAWEI CLOUD account before using VSS.
C. If a tenant's web site or applications can be accessed through the public network, VSS is
available.
D. The tenant needs to deploy services on VMs of HUAWEI CLOUD.

Which of the following domain name types is *.huaweicloud.com?


A. Single domain name
B. Wildcard domain name
C. Multiple domain names

Which of the following are CSA TOP threats? (O)


A. Account hijacking
B. Malicious internal personnel
C. Data leakage and loss
D. Abuse and malicious use of cloud services
E. Insufficient management of identity, credentials, and access
F. Insecure ports and APIs

What are the challenges of defending against DDoS attacks?


A. Limited performance of the protection device
B. Insufficient service capabilities
C. Low Internet bandwidth

Which of the following protocols does AAD support?


A. TCP
B. UDP
C. HTTPS
D. HTTP

What are the basic functions of HSS? (S)


A. Asset management
B. Vulnerability management
C. Baseline inspection
D. Intrusion detection

What are the application scenarios of HSS?


A. Security risk management
B. Intrusion detection
C. Security compliance

Which of the following problems can WAF solve?


A. The service server of an e-commerce website cannot respond to normal requests because its order
interface is overly invoked.
B. Numerous exclusive and beautiful pictures on a website are crawled by competitors in batches.
C. A website faces threats such as SQL and command code injection.
D. The website server is infected with viruses and CPU usage remains high.

Which of the following scenarios can WAF apply to?


A. The official website of a university deployed on the education portal
B. An enterprise portal in a self-deployed data center
C. A testing website deployed in a LAN
D. An open website deployed on the platforms of other cloud vendors

Which of the following problems can VSS solve?


A. Help tenants detect web vulnerabilities.
B. Help users detect weak passwords of the host.
C. Guide tenants in fixing the root cause of security vulnerabilities.
D. Help tenants repair or intercept vulnerabilities.

Which of the following statements about KMS are correct?


A. The key and random numbers are generated by the certified third-party hardware security
module.
B. The master key of a user is stored redundantly online.
C. KMS is deeply integrated with computing and storage services such as ECS, EVS, IMS, OBS, EVS,
and VBS. KMS is used to manage the keys of these services.
D. The number of keys can be dynamically adjusted based on service development.
Which of the following statements about KMS are correct?
A. KMS provides views for users to uniformly manage encryption keys so that the usage of all keys
can be visualized.
B. Users can control the key and manage the lifecycle covering key generation, rotation, and
destruction.
C. Users can easily manage the encryption key used for encrypting data stored in your applications by
invoking APIs.
D. With the built-in auditing capability, KMS logs provide detailed information about access keys to
help you meet regulatory compliance.

Which of the following statements about Dedicated HSM are correct?


A. The key calculation of Dedicated HSM is performed on an exclusive encryption card. Services for
different tenants are isolated without affecting performance.
B. Dedicated HSM supports China-invented encryption algorithms such as SM1, SM2, SM3, and SM4.
C. Dedicated HSM is recommended for all data encryption requirements on the cloud to ensure
security.
D. Dedicated HSM is a hosting service that can automatically perform time-consuming tasks, such as
hardware presetting, software patching, high availability, and backup.

Which of the following are the advantages of SCM?


A. Improved website security
B. Optimized website image
C. Higher search engine rankings

Which of the following domain name types does SCM support?


A. Single domain name
B. Wildcard domain name
C. Multiple domain names

Auto Scaling (AS) is charged.


A. True
B. False

AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False

Alarm policies support system monitoring and custom monitoring.


A. True
B. False

An instance added to an AS group by an AS policy cannot be manually removed from the group.
A. True
B. False

AS can automatically adjust ECS and bandwidth resources. (O)


A. True
B. False

Which of the following policies can be configured to increase the number of instances in an AS
group at a predetermined time each week? (M)
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above

Which of the following statements about AS is incorrect?


A. AS can automatically adjust the number of instances in an AS group based on preset
policies.
B. AS can perform health checks on instances in an AS group.
C. Instance protection can be enabled on specified instances in an AS group.
D. AS does not allow users to view the status of instances in an AS group.

Which of the following statements about scaling actions is incorrect? (M)


A. When the number of instances in an AS group is not the same as expected, a scaling
action is triggered.
B. After an AS group is disabled, changing the number of expected instances triggers a
scaling action.
C. When a trigger condition of an AS policy is met, a scaling action is triggered automatically.
D. Lifecycle hooks help users better manage scaling actions.

Which of the following statements about AS configuration is correct?


A. An AS configuration defines the specifications of ECSs to be added to an AS group.
B. An AS configuration that has been created can be modified as needed.
C. After an AS group is enabled, its AS configuration cannot be changed.
D. An unlimited number of AS configurations can be created.

How many types of policies does AS support?


A. 0
B. 1
C. 2
D. 3

Which of the following policies are supported by AS? (AJ)


A. Alarm policy
B. Scheduled policy
C. Periodic Policy
D. Random policy

How can instances be added to an AS group? (M)


A. By an AS policy
B. Manually
C. By a change to the number of expected instances
D. By AS configuration

Which operations can be performed on an AS policy?


A. Execute now
B. Modify
C. Enable
D. Delete
E. Disable

Which of the following services are associated with AS?


A. Cloud Eye
B. Virtual Private Cloud (VPC)
C. Elastic Load Balance (ELB)
D. Elastic Cloud Server (ECS)

Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Inband Incoming Rate
C. Disk Read Requests
D. Memory Usage
E. Custom monitoring metrics

Which of the following are ECS types? (O)


A. Storage-optimized
B. Computing-accelerated
C. Computing-optimized
D. Memory-optimized
E. General computing

Which of the following are VPC features?


A. Secure isolation
B. Flexible deployment
C. Dynamic BGP
D. Hybrid deployment

Advantages of VPC are:


A. Secure and Reliable
B. Flexible Configuration
C. High-Speed Access
D. Interconnection??

Which operations are required for creating a Windows image using an ECS?
A. Configure the Windows ECS
B. Install Cloudbase-Init
C. Create a Windows private image
D. View and delete network rule files

The NAT Gateway service is charged.


A. True
B. False

NAT Gateway supports smooth upgrade.


A. True
B. False

In one VPC, only one NAT gateway can be created.


A. True
B. False

After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False

NAT Gateway supports disaster recovery across AZs.


A. True
B. False

Which of the following functions of NAT Gateway can be used to enable ECSs to share an EIP to
access the Internet?
A. SNAT
B. DNAT

Which of the following statements about NAT Gateway is incorrect?


A. An SNAT server is more stable than the NAT Gateway service.
B. NAT Gateway supports security isolation.
C. NAT Gateway supports up to 1 million concurrent SNAT connections.
D. NAT Gateway supports up to 200 DNAT rules.

Which of the following statements about NAT Gateway is incorrect?


A. After the number of SNAT connections reaches the upper limit, new sessions cannot be
created.
B. Cloud Eye allows you to view the number of SNAT connections.
C. Cloud Eye allows you to view the IP addresses of top 10 VMs that occupy the largest
number of SNAT connections.
D. Cloud Eye does not support setting alarms for the number of connections.

Which of the following statements about NAT Gateway is correct?


A. DNAT provides services for external networks.
B. DNAT also has the concept of the number of connections.
C. DNAT supports TCP, UDP, and ICMP port mapping.
D. DNAT does not support mapping all ports.

Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both

Pain Points of Current Enterprise IT Infrastructure includes: (M)


A. Slow Business Launch
B. Complicated Lifecycle Management
C. High TCO
D. I/O Bottleneck

RDS can restore backup


-true

Traffic from internet will hit to the which device first (AJ)

1. firewall
2. NGIX
3. ELB
4.

If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new disk.
True
False
Which scaling action is not performed on Bandwidth scalling policy

1. replicate

API Gateway supports SDKs of:


Java
Go
Python
C#
JavaScript
PHP
C
C++
Android
Delphi

What are AI app in vision


Face Recognition
Image Recognition
Content Moderation
Image search

Which component is not deleted automatically when DB instance is deleted


manual backup

You can change CPU or memory of a DB instance


True
false

WHICH IS NOT THE PART OF AI BIG DATA


Openstack

How are regions divided


-Based on AZ
-Geographic location and Network Latency
-Cluster servers

Which are a part of HUAWEI CLOUD ecosystem


-Marketplace
-Academy
-Partners
-Developers

The management console can be used without logging in.


-True
-False

After creating ECS bandwidth cannot be changed/


-True
-False

When creating ECS you can use File injection function to initialize it.
-True
-False

Which is not an action of Bandwidth scaling policy:


-Reduce
-Double
-Set to
-Add

When creating image Cloudbase-init should be installed on OS to ensure that configuration of


newly created ECSs from the image can be customized.
-True
-False

Server needs to be stopped before restoring EVS disk data using VBS backup.
-True
-False

Logging function of a bucket – where can log file be stored?


-Any bucket
-Enable logging
-The bucket on which logging is enabled
-All other buckets except the one which is logging

When compared with shared file systems what are the advantages of SFS:
-Robust reliability
-Seamless integration
-File sharing
-Easy operations, high cost- (wrong, should be low)

In Huawei Cloud VPN only IPsec is supported


-True
-False

What is the use of SA?


-Identification authentication
-Encryption
-Web crawlers
-Big data

Which is true about instance removal:


-If number of instances is greater than in AS group, some are removed
-When removed, the balance between AZs is not taken into account
-
-

Image creation fails if entered System disk capacity is less than System disk capacity of external
image file.
-True
-False

Which are VPC access control functions?


-Security group
-Network access list
-Fingerprint
-Password

Which EI service can implement large scale data analysis and query ?
-DLF
-DWS
-DIS
-GES

ECS lifecycle?
Start-Stop-Restart-Delete

Primary DB instance can replicate data to secondary DB Instances in :


Asynchronous
Semi-synchronous

which of the following is not included in devcloud:

A. Data backup
B. Project Management
C. Code Check
D. Cloud buildup

Bucket A has been configured a policy not to allow any users to access it. Object B is inside Bucket A. Object B
has an ACL that allows any users to access it. Therefore, object B can be access anonymously by any users.
True
False

What layer Anti DDOS support


Layer 4 to Layer 7

“Faster Inclusive AI Development”


DLS
MLS
ModelArts
GES

Huawei Cloud Positioning


Focus on IaaS, Enable PaaS, Aggregates SaaS

ECS Login
Key pair
OTP Token
Fingerprint
Password

What are BW Scaling (multiple choice)


Modify
Replicate
Enable
Delete
AS Policies that dynamically expand? (single Choice)
Random
Alarm
Schedule
Periodic

Use to Create Private Image (single Choice)


Full ECS Image using ECS
System Disk using ECS
System Disk using OBS File-my answer
System Disk using external Image

RDP ports used for xxx. inbound traffic

37
53
3389
80

Retrieve Alarm History for 7 days. What Service you will use. (Single Choice)
SMN
CTS-my answer
ECS
RDS

Where to restore RDS instance


Xxx
ECS
VPC
OBS

ELB Algorithms not provided (single choice)


Least Connections
Maximum connections
Round Robin
Weight

Status of File system that can be deleted (single Choice)


Creating
Deleting
Disable
Deleting failed

Not feature of VPC………(single Choice)


Authenticity
XXX
Integrity
Timeliness-my answer

EVS Disks Associated one Back up Policy


True
False

OBS can access through OBS Console or OBS Browser


True
False

File System can be mounted to Multiple ECS?


True
False

AS can only dynamically added or reduces ECS in Specified interval?


True
False
1. Elastic Volume Service (EVS) is a scalable virtual block storage service based on the
distributed architecture. [Score: 1]
The correct answer is A. Right.

2. What is the payment mode of Workspace? [Score: 1]


Answer: D. Pay-per-use (score: 1)

3. VBS does not support batch backup of EVS disks. [Score: 1]


Your answer: B. False (score: 1)

4. Which of the following functions are supported by OBS Browser? [Score: 1]


Answer: A. Static website hosting B. Versioning C. Cross-domain resource sharing D. Mounting to an
external bucket C. Cross-domain resource sharing D. Mounting to an external bucket

5. Which of the following are the major defense types of Anti-DDoS? [Score: 1]
Your answer: (null) Correct answer: A. Traffic attack defense|D. Application attack defense

6. After RDS HA is enabled, which of the following primary/standby DB instance


synchronization modes are available? [Score: 1]
Your answer: (null) Correct answer: B. Semi-synchronous | C. Asynchronous

7. In the cloud computing environment, confidentiality, integrity, and availability are still the
fundamental security requirements of users. [Score: 1]
Your answer: (null) Correct answer: A. Correct

8. Which of the following port types is 10GE when you enable Direct Connect? [Score: 1]
Your answer: (empty) Correct answer: B. Optical port

9. Instances added using AS policies cannot be manually removed. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

10. Huawei provides capability openness for developers to integrate the capabilities opened
by Huawei products with upper-layer applications and build differentiated innovative
solutions. [Score: 1]
Your answer: (null) Correct answer: A. Correct

11. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer is: D. After the capacity of an EVS disk is expanded, you can use
this backup to restore data. After the data is restored, the size of the EVS disk remains unchanged.

12. Which of the following protocols is not supported when the load balancer is a private
network load balancer? [Score: 1]
Your answer: (null) Correct answer: B.UDP

13. How many types of AS policies can be configured? [Score: 1]


Your answer: (empty) Correct answer: B.3

14. The AS service can only dynamically add or reduce server resources based on the
specified time period. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

15. Which of the following scenarios does object storage apply to? [Score: 1]
Your answer: (null) Correct answer: A. Massive storage resource pool|B. Static website hosting|C. Big
data storage|D. Backup|E. Archiving
16. After creating an AS group by following the wizard, you need to manually enable the AS
group. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

17. What Can I Do If the Disk Capacity of an ECS Is Insufficient? [Score: 1]


Your answer: (null) Correct answer: C. Expanding the capacity of disks

18. Cloud Container Engine (CCE) is a high-performance and scalable container service. It
provides enterprises with Docker container lifecycle management capabilities, such as quick
application packaging and deployment and automatic O&M, helping you efficiently deploy
applications. [Score: 1]
Your answer: (null) Correct answer: A. Correct

19. What Is ECS Lifecycle Management? [Score: 1]


Your answer: (null) Correct answer: A. Delete ECS|C. Power off|D. Power on
20. Which of the following terminals can access Workspace? [Score: 1]
Your answer: (null) Correct answer: A.iOS|B.Android|C.Windows PC

21. ECSs are billed in yearly/monthly or pay-per-use mode. [Score: 1]


Your answer: (null) Correct answer: A. Correct

22. How Can I Create a Private Image? [Score: 1]


Your answer: (null) The correct answer is: A. Create from cloud server|C. Create from external image file

23. Cloud Eye is free of charge. [Score: 1]


Your answer: (null) Correct answer: A. Correct

24. Which of the following file access protocols is supported by SFS? [Score: 1]
Your answer: (null) Correct answer: D.NFS

25. If the system disk is faulty, you can use the backup of the system disk to create an EVS
disk and attach it to the ECS as the system disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

26. Unlike traditional servers, users cannot deploy service applications on ECSs. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

27. In which of the following states can an EVS disk be backed up? [Score: 1]
Your answer: (empty) The correct answer is A. Available.

28. After an application is created, the CPU, memory, and network usage of the container
cannot be monitored. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

29. What is the type of the image converted from an ECS? [Score: 1]
Your answer: (empty) Correct answer: B. Private image

30. Which of the following services can work with EVS? [Score: 1]
Your answer: (Null) Correct answer: A. Elastic Cloud Server (ECS)|C. Volume Backup Service (VBS)|D.
Cloud Eye

31. What is the full name of ECS? [Score: 1]


Your answer: (null) Correct answer: A. Elastic Cloud Server
32. The VPN supports interconnection between two VPCs. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

33. Which of the following statements about hybrid cloud is incorrect? [Score: 1]
Your answer: (Null) Correct answer: D. Applications can be deployed only in the public cloud.

34. How many buckets can be created for an OBS account at most? [Score: 1]
Your answer: (null) Correct answer: B.100

35. Which of the following methods is correct for a Workspace user to access a USB flash
drive on a terminal? [Score: 1]
Your answer: (null) Correct answer: B. USB port redirection

36.VPC. The subnet segment can be modified after being created. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

37. IAM - What are the key features of identity authentication? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Centralized control of users and security credentials |
B. Centralized control of user access | C. User group-based rights | D. Support for Huawei customer
service agent maintenance

38. Which of the following service resource metrics can be monitored by Cloud Eye? [Score:
1]
Your answer is as follows: (Null) Correct answer: A. Virtual Private Cloud (VPC)|B. Elastic Computing
Service (ECS)|C. Distributed Cache Service (DCS)|D. Elastic Load Balance

39. Which of the following is not the key of WAF? [Score: 1]


Your answer is: (Null) The correct answer is: D. Preventing excessive traffic.

40. Which of the following services helps you monitor RDS resources in real time? [Score: 1]
Your answer: (null) Correct answer: D.CES

41. Which of the following is not the main reason why traditional IT infrastructure
architecture cannot support efficient operation of enterprises and urgently calls for
architecture transformation? [Score: 1]
Your answer is: (empty) The correct answer is: D. The network speed is too slow.

42. If no EIP is bound to a VM, you can configure a custom route for the VM to access the
Internet. [Score: 1]
Your answer: (null) Correct answer: A. Correct

43. The alarm threshold consists of the set mode (raw data, maximum value, minimum value,
average value, and variance), judgment condition (>, ≥, <, ≤, and =), and critical value. The
set mode is used to configure alarm conditions. [Score: 1]
Your answer: (null) Correct answer: A. Correct

44. What operations can the shared image provider perform? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Specifying an image to be shared | B. Deleting a
shared image | C. Adding a tenant who can share an image | D. Deleting a tenant who can share an image

45. The AS service must be used together with elastic load balancing. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
46. Compared with traditional file sharing storage, what are the advantages of SFS? [Score:
1]
Your answer: (null) The correct answer is: A. File sharing|B. Seamless integration|D. High reliability

47. VBS can create backups for EVS disks and use the backups to roll back EVS disks,
maximizing user data accuracy and security. [Score: 1]
Your answer: (null) Correct answer: A. Correct

48. To enable two sites to communicate with each other across the Internet, deploy
IPSeC.VPN on the firewalls at both sites to protect the mutual access traffic between the
intranets at the two sites. [Score: 1]
Your answer: (null) Correct answer: A. Correct

49. The cloud security service system consists of five parts: network security, data security,
application security, security evaluation, and security support. [Score: 1]
Your answer: (null) Correct answer: A. Correct

50. Which of the following are the main functions of HID? [Score: 1]
Your answer: (null) Correct answer: A. Brute force cracking detection | B. Remote login notification | C.
Weak password detection | D. Database process permission detection | E. Web page backdoor file
detection

51. Which of the following is not an RDS DB instance category? [Score: 1]


Your answer: (null) The correct answer is D. Disk.

52. What are the alarm statuses of Cloud Eye? [Score: 5]


Your answer: (null) Correct answer: A. Alarm|B. Normal|C. Insufficient data|D. Close

53. Similar to traditional server disks, EVS disks allow you to format EVS disks attached to
ECSs, create file systems on the EVS disks, and store data persistently. [Score: 1]
Your answer: (null) Correct answer: A. Correct

54. Which of the following management functions are supported by ELB? [Score: 5]
Your answer is as follows: (null) Correct answer: A. Create a load balancer. |B. Delete a load balancer. |C.
Enable a load balancer. |D. Disable a load balancer.

55. What computing services does Huawei public cloud provide? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Auto Scaling|B. Elastic Cloud Server|C. Image
Management Service

56. SFS cannot be attached to an ECS running the Windows OS. [Score: 1]
Your answer: (null) Correct answer: A. Correct

57. What are the prerequisites for creating a cluster? [Score: 1]


Your answer: (Null) Correct answer: B. A VPC has been created.|C.AK/SK certificate has been uploaded
to CCE.

58. What information needs to be configured before creating a file system? [Score: 1]
Your answer: (null) Correct answer: B.VPC
59. Which of the following statements about KMS is incorrect? [Score: 1]
Your answer: (Null) Correct answer: A. Managing the cloud platform and tenant keys

60. Identity and Access Management (IAM) refers to the identity and authentication service.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

61. Which of the following is not a Huawei computing cloud service? [Score: 1]
Your answer: (null) Correct answer: D. Scalable File Service

62. Which of the following are basic features of cloud computing? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. On-demand self-service|B. Wide network access|C.
Resource pooling|D. Fast elastic scaling|E. Measurable service

63. Which of the following is not a major function of Anti-DDoS? [Score: 1]


Your answer: (Null) Correct answer: D. Periodically scan ECS vulnerabilities.

64. Which of the following are the application scenarios of SFS? [Score: 5]
Your answer: (null) The correct answer is: A. Media processing|B. Log management|C. Content
management and home directory|D. High-performance computing

65. If a user wants to query historical alarms in the last seven days, which of the following
services needs to be enabled? [Score: 1]
Your answer: (Null) The correct answer is A. Cloud Trace Service.

66. Which of the following components receives traffic from the Internet first after the traffic
enters LoaD.balancer? [Score: 1]
Your answer: (null) The correct answer is C.LVS.

67. Penetration testing service (PTS) belongs to security evaluation service products. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect

68. Which of the following image types are supported by IMS? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Public image|B. Private image|C. Shared image

69. To use Cloud Eye to monitor Huawei ECSs, you need to install the plug-in on the ECSs.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect

70. If the capacity of the data disk attached to the ECS is insufficient, you must detach the
disk and purchase a new one. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

71. Which of the following statements about Anti-DDoS traffic cleaning is incorrect? [Score:
1]
Your answer: (Null) Correct answer: A. Web vulnerability detection
72. Attach the EVS disk to an ECS. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

73. Which of the following operations will incur fees? [Score: 1]


Your answer: (blank) The correct answer is A. Create an EIP.

74. What are the types of EVS disks? [Score: 1]


Your answer: (null) Correct answer: A. Ultra-high I/O|B. High I/O|C. Common I/O|D. Optimized I/O

75. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. Multiple EVS disks can be associated with a backup policy for
batch backup.
76. Which of the following operations cannot be performed by the recipient of a shared
image? [Score: 1]
Your answer: (null) The correct answer is: A. Sharing the specified mirror.

77. The size of the exported image is not limited. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

78. RDS can meet the ever-changing requirements of the gaming industry, effectively
shortening the R&D period and reducing R&D costs. [Score: 1]
Your answer: (null) Correct answer: A. Correct

79. If the status of an alarm rule remains unchanged, the system sends an alarm notification
to the user only when the alarm rule is in the status for the first time. [Score: 1]
Your answer: (null) Correct answer: A. Correct

80. Data in the file system is stored using erasure codes. [Score: 1]
Your answer: (null) Correct answer: A. Correct

81. Which of the following user authentication modes is supported by Workspace? [Score: 1]
Your answer: (null) The correct answer is B.Active Directory.

82. WAF detects anomalies of HTTP requests to prevent malicious network intrusions, such
as web page tampering, information leakage, and Trojan horse implantation. [Score: 1]
Your answer: (null) Correct answer: A. Correct

83. All types of HUAWEI CLOUD service products can be viewed on the management
console. [Score: 1]
Your answer: (null) Correct answer: A. Correct

84. If only one AS policy is enabled in the AS group and the action in the AS policy is to add
two instances, how many instances are there in the AS group? [Score: 1]
Your answer: (empty) Correct answer: D. Uncertain

85. High availability is not a key feature of RDS. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

The CCE does not support Elastic Load Balance. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

87. Which of the following images is a standard image provided by the public cloud platform
and is visible to all users? [Score: 1]
Your answer: (blank) Correct answer: A. Public image

88. The management console can be used without login. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

89. What Does an ECS Use to Build a Logical Zone That Is Logically Isolated? [Score: 1]
Your answer: (null) Correct answer: B. Virtual private cloud

90. When an EVS disk is detached from an ECS, the data on the EVS disk will be lost.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect
91. Which of the following EVS disks can be directly created on the EVS console? [Score: 1]
Your answer: (null) Correct answer: B. Data disk

92. What are the methods of adding instances to an AS group? [Score: 1]


Your answer: (null) Correct answer: A. Scaling action|B. Manually adding instances|C. Changing the
expected number of instances

93. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three
times, disable versioning for the bucket, and upload object aaa for three times. After the
preceding operations are complete, how many objects are displayed in the bucket basic
information? [Score: 1]
Your answer: (null) Correct answer: B.4

94. Workspace supports user authentication using Micrlslft Active Directory. [Score: 1]
Your answer: (null) Correct answer: A. Correct

95. Which of the following cloud products is a data security type? [Score: 1]
Your answer: (null) Correct answer: C.KMS (key management service)

Elastic Load Balance automatically distributes access traffic to multiple ECSs to balance
their service load. It enables you to achieve higher levels of fault tolerance in your
applications and expand application service capabilities. [Score: 1]
Your answer: (null) Correct answer: A. Correct

97. Network security, as an important part of cloud security services, implements network
isolation, responds to network attacks, and ensures network security. [Score: 1]
Your answer: (null) Correct answer: A. Correct

98. The AS service automatically adjusts service resources based on users' service
requirements and policies. [Score: 1]
Your answer: (null) Correct answer: A. Correct

99. The 0BS supports the batch upload function. [Score: 1]


Your answer: (null) Correct answer: A. Correct

100. What CIDR Blocks Does a VPC Support? [Score: 1]


Your answer: (null) Correct answer: A.192.168.0.0/23|B.172.16.0.1/24|C.10.0.0.5/24|D.10.0.25.0/24

101. Which of the following is not a major application scenario of VPC? [Score: 1]
Your answer: (None) The correct answer is B. The desktop cloud accesses Huawei Vmall.

102. Images can be uploaded to the container image repository. [Score: 1]


Your answer: (null) Correct answer: A. Correct

103. If you use an ECS to create an image, the ECS must be stopped. [Score: 1]
Your answer: (null) Correct answer: A. Correct

104. What are the benefits of Workspace to customers? [Score: 1]


Your answer: (null) The correct answer is: B. Quick access | C. Pay-per-use | D. Simplified O&M

105. Which of the following statements are correct? [Score: 1]


Your answer is: (Null) Correct answer is: B. The parameters of the created file system cannot be modified.
|C. The file system can access different AZs of the same VCP. |D. The performance of the SFS file system
increases with the capacity increase.
106. How Many Monitoring Panels Can I Create at Most on the Dashboard Page? [Score: 1]
Your answer: (empty) Correct answer: B.2.

107. How Long Does It Take to Apply for an ECS? [Score: 1]


Your answer: (empty) Correct answer: B. Minutes

108. Which of the following shared file systems can be directly deleted? [Score: 1]
Your answer: (null) Correct answer: B. Unavailable

109. GPU desktops can be used for CAD auxiliary design. [Score: 1]
Your answer: (null) Correct answer: A. Correct

110. Cloud Eye is a multi-dimensional monitoring platform for resources such as Elastic
Cloud Servers (ECSs) and bandwidth. You can monitor alarms, notifications, and
personalized report views in real time to accurately learn about the product resource status.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

111. Which of the following statements is incorrect? [Score: 1]


Answer: (null) Correct answer: A. Create a folder named br..ra/1 in the OBS bucket. |B. OBS Cosole
supports batch deletion of buckets. |D. You have created 101 buckets using OBS Cnsole.

112. After an ECS is created, you can change the ECS specifications if they do not meet your
requirements. [Score: 1]
Your answer: (null) Correct answer: A. Correct

Which of the following key technologies are used by situational awareness? [Score: 1]
Your answer: (null) The correct answer is: A. Big data technology | B. Crawler technology

114. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. After an EVS disk is deleted, you can use a backup to create an
EVS disk. |D. After an EVS disk is deleted, the backup data will not be deleted.

115. What applications and services are provided by HUAWEI CLOUD Marketplace?
[Score: 1]
Your answer: (null) Correct answer: A. Basic software|B. Business software|C. Developer tools|D.
Professional services

116. Which of the following is not a major function of WTP? [Score: 1]


Your answer: (null) Correct answer: D. SQL injection prevention

117. CCE allows you to view application logs and events. [Score: 1]
Your answer: (null) Correct answer: A. Correct

118. Which of the following is not a capability of DevCloud? [Score: 1]


Your answer: (null) Correct answer: D. Data backup

119. Which of the following belong to the life cycle management of database instances?
[Score: 1]
Your answer is as follows: (Null) Correct answer: A. Adding a read replica|B. Viewing DB instance
information|C. Expanding the storage space of the database|D. Deleting the database cluster|E. Rebooting
the database instance
120. The encrypted mirror cannot be changed to an unencrypted mirror. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

121. CCE allows you to directly use official Docker Hub images. [Score: 1]
Your answer: (null) Correct answer: A. Correct

122. Users can use OBS on OBS Console or OBS Browser. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

123. What Are the Steps for Creating a Windows Image Using an ECS? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Configure the Windows server. |B. Install Cloudbase-
Init. |C. Create a Windows private image.

124. How many alarm rules can be created at most? [Score: 1]


Your answer: (null) Correct answer: B.50

125. Which of the following are the objectives of cloud computing security services? [Score:
1]
Your answer is as follows: (null) Correct answer: A. Data protection|B. Operation environment
protection|C. Service independence and linkage|D. Security evaluation

126. Relational Database Service (RDS) users can modify database configurations to achieve
optimal performance. [Score: 1]
Your answer: (null) Correct answer: A. Correct

127. How many common services can be added to My Favorites at most? [Score: 1]
Your answer: (empty) Correct answer: C.7

128. SFS can set read-only permissions for users. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

129. When creating a monitoring panel, you can add a maximum of () monitoring indicators
to a view. [Score: 1]
Your answer: (null) Correct answer: B.5

130. The time required for backing up an EVS disk depends only on the volume of data in the
EVS disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

131. Which of the following can be used to monitor ECSs? [Score: 1]


Your answer: (null) Correct answer: B. Cloud Eye

132. What do I need to create for two VPCs to communicate with each other? [Score: 1]
Your answer: (null) Correct answer: B. Peering connection

133. Multiple EVS disks can be attached to an ECS. [Score: 1]


Your answer: (null) Correct answer: A. Correct

134. The GPU is applicable to graphics rendering, engineering drawing, and desktop cloud
scenarios. [Score: 1]
Your answer: (null) Correct answer: A. Correct

135. Data security ensures confidentiality and integrity of user data applications and storage
in the cloud computing environment. [Score: 1]
Your answer: (null) Correct answer: A. Correct

136. What is the basis for the division of Regions? [Score: 1]


Your answer: (empty) Correct answer: A. Geographical location and network latency

137. What are the deployment modes of cloud computing?' [Score: 1]


Your answer: (Null) Correct answer: A. Private cloud|B. Public cloud|C. Hybrid cloud|D. Community
cloud/Industry cloud

138. Which of the following load balancing modes is not supported by listeners? [Score: 1]
Your answer: (null) Correct answer: A. Maximum connection|C. Set weight

139. What are the scenarios of user replication chain compensation? [Score: 1]
Your answer: (null) Correct answer: B. Replicate the unencrypted image as an encrypted image. |C.
Replicate the encrypted image as an encrypted image. |D. Replicate the encrypted image as an unencrypted
image.

140. Which of the following is not the application scenario of Cloud Eye? [Score: 1]
Your answer: (null) Correct answer: D. Operation audit

141. Which of the following components is not included in the big data platform? [Score: 1]
Your answer: (null) Correct answer: B. OpenStack

142. Which of the following is not a main application scenario of KMS? [Score: 1]
Your answer: (Null) The correct answer is: A. Network transmission encryption

143. What are the benefits of containers? [Score: 1]


Your answer is as follows: (Null) The correct answer is: A. More efficient virtualization | B. More secure
running applications | C. Faster delivery and deployment | D. Easier migration and expansion | E. Simpler
management

144. To implement dynamic resource expansion, which of the following policies is selected
when you create an AS policy? [Score: 1]
Your answer: (blank) Correct answer: C. Alarm policy
145. Which of the following is not a major function of HVD? [Score: 1]
Your answer: (Null) Correct answer: B. ECS brute-force cracking prevention

146. Alarm notification is the action taken when an alarm is triggered. You can set or disable
alarm notification when creating or modifying an alarm. [Score: 1]
Your answer: (null) Correct answer: A. Correct

147. What are the problems of traditional VDI? [Score: 1]


Your answer: (empty) Correct answer: D. High fixed investment cost

148. Data outsourcing and service outsourcing are the main security challenges faced by
users in cloud computing. [Score: 1]
Your answer: (null) Correct answer: A. Correct

149. What Are the ECS Login Authentication Modes? .c\'\ [Score: 1]
Your answer: (empty) Correct answer: A. Password|D. Key pair

150. Which of the following is NOT true of the LEADS philosophy? [Score: 1]
Your answer: (null) Correct answer: E.S: Service
151. A policy is configured for bucket A to prevent any user from accessing objects in bucket
A. Bucket A contains object B, which is configured with an ACL to allow anonymous users
to access object B. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

152. Which of the following methods can be used to directly access a container from the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Elastic IP address

153. What are the advantages of VPC? [Score: 1]


Your answer is: (empty) The correct answer is: A. Security isolation|B. Soul deployment|C. Dynamic
BGP|D. Hybrid cloud deployment is supported.

154. Which of the following is a disadvantage of self-built databases? [Score: 1]


Your answer: (empty) The correct answer is D. High investment.

155. Which of the following statements about the ELB product functions is incorrect? [Score:
1]
Your answer is: (empty) The correct answer is: A. Provide a private line connection.

156. Which of the following services does VBS depend on? (Multiple-choice question)
[Score: 1]
Your answer: (Null) Correct answer: B. Cloud hard disk|C. Object storage

157. Workspace data is encrypted using TLS during transmission. [Score: 1]


Your answer: (null) Correct answer: A. Correct

158. How Many AS Configurations Can Be Configured in an AS Group? [Score: 1]


Your answer: (empty) Correct answer: A.1

159. EVS disks must be used with ECSs. [Score: 1]


Your answer: (null) Correct answer: A. Correct

160. Which of the following is incorrect about ELB configuration? [Score: 1]


Your answer: (null) Correct answer: B. You can select an IP address when adding an Elastic Load
Balance.

161. The next decade of IT infrastructure evolution in the cloud computing era is from
separation to convergence. No matter how spirally the IT architecture evolves, which of the
following statements about customer values and driving forces is incorrect? [Score: 1]
Your answer: (Null) Correct answer: B. Higher efficiency in service deployment and lifecycle
management

162. When IPSec VPN is used for communication, the encryption and decryption check is
performed on the firewalls at both ends. [Score: 1]
Your answer: (null) Correct answer: A. Correct

163. Which of the following statements are correct? [Score: 1]


Your answer is: (Null) The correct answer is: A. VBS provides data protection for EVS disks. |B. VBS can
be used to quickly restore data when an EVS disk is faulty. |C. VBS is implemented based on the snapshot
technology. |D. VBS supports online backup.

164. To enable the log management function of an OBS bucket, which permissions on the
target OBS bucket must be granted to the log delivery user group? [Score: 1]
Your answer: (null) Correct answer: B. Write permission|C. View ACL permission
165. Users can use terminals such as iPad to access Workspace. [Score: 1]
Your answer: (null) Correct answer: A. Correct

166. Which of the following methods can be used to set the access permission for anonymous
OBS object users? [Score: 1]
Your answer: (null) Correct answer: B. Setting the ACL for OBS objects|C. Setting the policy for OBS
objects

167. The minimum management unit of RDS is an instance. [Score: 1]


Your answer: (null) Correct answer: A. Correct

168. What are the types of VPNs based on service usage? [Score: 1]
Your answer: (null) Correct answer: A. Access VPN|B.lntranet VPN|C.Extranet VPN

169. Which of the following functions are provided by ECS? [Score: 1]


Your answer is: (Null) Correct answer: A. Users can create and delete VMs, modify VM specifications,
and start and stop VMs. B. Users can add and uninstall extension NICs, and add EIPs, attach and detach
disks. |C. Users can view information about their ECSs on the management console. |D. Users can set ECS
alarm rules.

170. The file system can be accessed across VPCs. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

171. What are the important functions of IKE? [Score: 1]


Your answer: (null) Correct answer: A. Negotiation protocol parameters|C. Negotiation key and key
management|D. Peer identity authentication

172. After an ECS is created, the bandwidth used by the ECS cannot be changed. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

173. What Are the AS Policy Types? [Score: 1]


Your answer: (null) Correct answer: A. Scheduled policy|B. Periodic policy|C. Alarm policy

From which perspectives does situational awareness analyze security posture? [Score: 1]
Your answer: (null) Correct answer: A. Global perspective|B. User perspective|D. Attacker perspective

175. Which of the following is the procedure for using the CCE? [Score: 1]
Your answer is as follows: (Null) Correct answer: C.1. Create a cluster. 2. Upload an image. 3. Create an
application.

176. Which of the following is not an advantage of RDS compared with self-built databases?
[Score: 1]
Your answer: (null) Correct answer: D. Users install the database by themselves.

177. As an important part of the cloud security service, application security ensures the
security of elastic cloud computing servers and cloud computing applications running on
them from the perspective of operating system and application security protection. [Score: 1]
Your answer: (null) Correct answer: A. Correct

178. Which of the following devices needs to be configured for Workspace to support 3D
applications? [Score: 1]
Your answer: (null) Correct answer: B.GPU card
179. During VPC creation, which of the following parameters can be used to automatically
obtain an IP address? [Score: 1]
Your answer: (null) The correct answer is A.DHCP.

180. Workspace has the following security protection mechanisms: [Score: 1]


Your answer is as follows: (Null) Correct answer: A. Data is separated from terminals, and data is not
stored on terminals. |B. Data is encrypted using TLS during transmission. |C. Data is isolated from other
tenants using VPCs. |D. Peripheral channels can be managed and controlled. Read-only redirection is
supported. Data cannot be copied to peripheral storage.

181. Which of the following functions are supported by the 0BS Console? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Static website hosting | B. Versioning | C. Cross-
domain resource sharing | D. Adding external buckets

182. What are the application scenarios of VBS? [Score: 1]


Your answer: (null) Correct answer: A. Hacker attack or virus attack|B. Data deleted by mistake|D.
Application error

183. What is the audio sampling rate in Workspace? [Score: 1]


Your answer: (null) The correct answer is C.44.1 kHz.

184. Which of the following constitute the Huawei public cloud ecosystem? [Score: 1]
Your answer: (Null) Correct answer: A. Marketplace|B. Developer Community|C. Partner|D. Huawei
cloud service certification engineer

185. Containers and virtual machines have similar resource isolation and allocation
advantages, but have different functions because containers are more portable and efficient
due to the fact that containers are virtualized operating systems rather than hardware. [Score:
1]
Your answer: (null) Correct answer: A. Correct

186. Direct Connect is a private network service that connects your local data center to the
public cloud. Currently, which of the following private lines is supported by Direct Connect?
[Score: 1]
Your answer: (null) Correct answer: A.MPLS VPN

187. IPSec VPN is an encrypted tunneling technology. It uses encrypted security services to
establish secure and comprehensive communication tunnels between different networks.
Which of the following is not the feature that ensures the transmission of data packets on the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Timeliness

188. On the Dashboard page, you can add or delete monitoring graphs of key monitored
objects. The graphs can be used to compare multiple monitored objects. You can view the
graphs in a timely manner each time you log in to the Cloud Eye console. [Score: 1]
Your answer: (null) Correct answer: A. Correct

189. IMS provides flexible self-service and comprehensive image management capabilities.
Users can create private images and use images to create ECSs or replicate ECSs in batches.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

190. Which of the following management operations is not supported by EVS disks? [Score:
1]
Your answer: (null) The correct answer is C. Reduce the capacity.

191. What is the return value when a user-defined monitoring indicator is successfully
uploaded using the Open API? [Score: 1]
Your answer: (null) The correct answer is B.201.

192. What are the concepts of VPC? [Score: 1]


Your answer: (null) Correct answer: A. Subnet|B.EIP|C. Security group|D.VPN

193. VPCs can be connected to traditional data centers through private lines or VRNs to
flexibly integrate resources. [Score: 1]
Your answer: (null) Correct answer: A. Correct

194. Which of the following statements about the positioning of Huawei cloud services are
correct? [Score: 1]
Your answer: (null) The correct answer is: A. Focus on the IaaS layer, use the PaaS layer, and aggregate
the SaaS layer.

195. What Are the Advantages of CCE? [Score: 1]


Your answer is: (Null) The correct answer is: A. Microservice governance: Decouple a single architecture
into multiple containers, making the system more flexible. |B. Provide a continuous container delivery
platform. Container images are used throughout the development and O&M phases, and the environment
configuration is unified, fast service provisioning|C. VMs are isolated into multiple containers (with fine-
grained containers) and applications are built on containers to improve resource utilization.|D. The system
automatically and elastically expands the capacity to quickly respond to concurrent peaks

196. After an ECS is bound to a (), the ECS can be accessed through a fixed public IP
address. [Score: 1]
Your answer: (blank) Correct answer: D. Elastic IP address

197. ECS indicates the Auto Scaling (AS) service. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

198. When multiple VMs are created, you can bind multiple EIPs to enable multiple VMs to
access the Internet at the same time. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

199. When creating an ECS, you can use the file injection function provided by the system to
initialize the ECS. [Score: 1]
Your answer: (null) Correct answer: A. Correct

200. Which of the following layer is the cloud service that provides the application running
and development environment? [Score: 1]
Your answer: (null) Correct answer: B.PaaS

201. Certificates of the SCS can be used for trusted authentication of enterprise websites.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

202. What data does an ECS use for storage? [Score: 1]


Your answer: (null) Correct answer: C. Cloud hard disk

203. Which of the following are RDS functions? [Score: 1]


Your answer is as follows: (Null) Correct answer: A. Creating a database cluster |B. Expanding the disk |C.
Adding a read-only version |D. Creating/Restoring a snapshot |E. Restoring a backup to a specified time
point

204. How Many EVS Disks Can Be Attached to an ECS? [Score: 1]


Your answer: (empty) Correct answer: D.11

205. An availability zone (AZ) is a collection of one or more physical data centers with
independent cooling, fire extinguishing, moisture-proof, and electricity facilities. Within an
AZ, computing, network, and storage resources are logically divided into multiple clusters.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

206. Which of the following cloud services is not a computing cloud service? [Score: 1]
Your answer: (null) Correct answer: C. Virtual private cloud

207. How Many RDS DB Instances Can Each User Create by Default? [Score: 1]
Your answer: (null) Correct answer: B.20

208. Which of the following is not the target of cloud computing security services? [Score: 1]
Your answer: (null) Correct answer: B. Cloud platform security

209. Cloud Eye is an open resource monitoring platform that provides resource monitoring,
alarm reporting, and notification services. [Score: 1]
Your answer: (null) Correct answer: A. Correct

210. Which of the following commands is used to tag an image? [Score: 1]


Your answer: (null) The correct answer is A.docker tag.

211. When the average value is selected as the collection mode, the peak values may be
different when users switch the data range. [Score: 1]
Your answer: (null) Correct answer: A. Correct

212. What are the disadvantages of traditional PC office? [Score: 1]


Your answer is (empty) Correct answer: A. High O&M costs

213. Which of the following containerized application management functions are provided by
CCE? [Score: 1]
Your answer: (null) Correct answer: A. Rolling upgrade|B. Elastic scaling|C. Application monitoring|D.
Viewing events

214. Compared with self-built databases, RDS has more costs and O&M workloads. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect

215. Cloud computing is a model that enables the required resources (e.g., computing,
storage, network, applications, and services) to be obtained from the shared pool of
configurable resources anytime, anywhere, conveniently, and on demand. Resources can be
quickly provisioned and released, and the workload of managing resources and interaction
with service providers can be minimized. [Score: 1]
Your answer: (null) Correct answer: A. Correct

216. What operations do I need to perform to enable the created application to be accessed
from the outside? [Score: 1]
Your answer is: (Null) The correct answer is: C. When creating an application, publish the application as a
service.

217. Which of the following statements about the ELB function cannot be implemented?
[Score: 1]
Your answer: (null) Correct answer: D. Layer 2 and Layer 3 data forwarding

218. Which of the following is not a feature of RDS? [Score: 1]


Your answer is: (empty) The correct answer is: A. Expensive OBA costs

219. Which of the following cloud services can be used together with RDS to ensure network
security isolation between RDS instances and other services?
Your answer: (null) Correct answer: B.VPC

220. The retention period of monitoring data in different aggregation periods is different.
How long is the retention period of metric data in an aggregation period of 1 hour? [Score: 1]
Your answer: (null) The correct answer is C.155.

221. Which of the following is not an advantage of CES? [Score: 1]


Correct answer: D. Monitoring third-party non-HUAWEI CLOUD services

222. Which of the following commands is used to upload images from the Docker client to
the image repository? [Score: 1]
Your answer: (null) Correct answer: B.docker push
1, ELB provides three types of load balancing algorithms.

@ True

O False

An ECS must be stopped beforeit is used to create an image.


KX

© Tre

@ false

3, RDS does not support data backup orrestoration.

© Tre

© False

6, The ECS have to be stopped when do EVS backup.

O Tne

@ False

5, IMS provides comprehensive and flexible self-service image management capabilities. Users can create a
private image and use it to create an ECS or multiple ECSs.

@ Twe
O False

7, An ECS can be attached with multiple EVS disks.

© Tne

© False

8, WAF detects abnormal requests to prevent networkintrusions such as webpage tampering,information le


and Trojan horse implantation.

@ Te
O False

9. file system can be mounted to ECSsin different VPCs.

© True

@ False
10, Currently, only IPsec VPNs are supported.

© Tne

© False

11, Which of the following operationsis not supported by EVS?

@ A. Capacity reduction

© B. Capacity expansion

© C.Backup

© D.Attaching/Detaching
12, To enable remote RDP access to a created Windows ECS, which ofthe following ports must be opened |
an inboundsecurity group rule?

A5S3
0

B. 33
0

C. 3389
®

D.80
o

13, Which ofthe following is not an advantage of RDS compared withself-built databases?

© Elastic scaling

@ 68.Self-installed databases

‘OC. Easy management

‘© D. Instantavailability

14, Which of the following can isolate RDS network resources from other services?

O AECS

© B.0BS

@ c.vec

© b.cES
15, Which SDKlanguage is NOT supported on API Gateway?

@ A Delphi

O BJava

© C.PHP

oO Dc

16, Which of the following is not an action of the bandwidthscaling policy?

O A.Reduce

O BSetto

© C.Add

@ D.Double

17, Whichof the following can monitor SFS performance indicators?

@ Cloud Eye

O B. Auto Scaling

© C.CloudContainer Engine

© OD.VirtualPrivate Cloud

18, Which ofthe following is not a HUAWEI CLOUD computing service?

© A. Image ManagementService

®@ 8B.Scalable File Service

© C.Bare Metal Service

O D.AutoSealing
19, Which ofthe following is NOT a componentofthe big data platform?

O A.Map Reduce

© 8.Yam

O C.HDFS

® D.Openstack

20. Which ofthe following is used by ECSto store data?

© A. Image

© 8B. Dedicated Cloud

© ©. AutoScaling

@ D.EVS disk

21, Which of the following policies can be configured to increase the numberofinstances in an AS groupat
predetermined time each week?

O AAllofthe above

® B.Periodic policy

© C.Scheduled policy

© D.Alarm policy

22, To whichofthe following scenarios does OCRapply?

© A. Image recognition

@ 8. Character recggnition

© C.Speech recognition

OD. Image processing


23, Which of the following components can be used to set an access controlwhitelist to allow specific IP
addresses to access load balancers?

© A. Backendserver

© 8B. Backend server group

@ C.Listener
R
O D.Health check

24, () records operations of VBS resources,facilitating query, audit, and backtracking.

O A.Cloud Eye

O 8.Elastic Volume Service

© C.Cloud Tracefgrvice

O D. Object Storage Service

25, Which ofthe following protocols requirescertificates?

@A nugps

O B.UDP

© c.TcP

O D.HTTP

26, Which of the following statementabout Direct Connect is incorrect?

O A.Currently, only the yearly/monthly billing mode is supported.

® B. Direct Connect usestheInternet tunneling technology on the public network.

© . To create a direct connection, users need to create a connection,a virtual gateway, and a virtual interface.

fo} D. Direct Connectis a high-speed, low-latency,stable, and secure dedicated network connection that connectsuser's
local data center to a VPC on a cloud.
27, Which ofthe following key technologies does SA use?

@ A.Bigdata

OB.Identity authentication

© .£ncryption

@ OD. Web crawlers

28, Which ofthe following CIDR blocks does the VPC service support?

G A.100.0.5/24

@ 8B. 10.0.25.0/24

@ Cc. 192.168.0.0/23

@ 0. 172.16.0.1/24

29. Which ofthe following are advantages of Cloud Eye?

©@ A. Multiple notification types

@ B. Visualized monitoring

@ C. Real-timeand reliable monitoring

@_D. Automatic provisioning

30, Which of the following types of images does IMS support?

@ A Public image

@ 8B.Private image

O C.Secret image

@ D.Shared image

31, A file system can be mounted to ().

© Aa Dedicated Computing Cluster (OCC)

OB. Bare Metal Server (BMS)

@ C.alinux—cs

@ D.a Windows ECS


32, Which of the following are advantages of Identity and Access Management(|AM)?

(@ Security control

@ 8. Federated identity authentication

(@ C. Agency management

@ D. Permission management

33, Which of the following HUAWEI CLOUD EI APIs are vision-related?

& A. Image recognition

@ 8B. Content Moderation

@ C.ImageSearch

@ OD. Face Recognition

34, Which of the following EVS disk types does ECS support?

@ A.Common /0

@ 8B.Ultra-high 1/0

@ C.High Oo

@ OD.Latency-optimized ultra-high 1/0.

1.Pain Points of Current Enterprise IT Infrastructure includes(multiple choices):

A. Slow Business Launch

B. Complicated Lifecycle Management


8

C. High TCO
8

D. 1/0 Bottleneck
1.Cloud Computing Characteristics include(multiple choices):

A. On-demand self-service

B. Broad networkaccess
8

C. Rapid scalability
8

D. Resource pooling

. Cloud Computing Deployment Models can be(multiple choices):

A.Private cloud

B. Industry cloud
a

C. Rapid cloud
oa

D, Public cloud

1.A regionis a distinct logical area.

O true

@ falseeW

2. An availability zone (AZ) contains one or multiple physical data centers.

@ truev

© false
1
-Huawei Cloud Network Services includes:

A. VPC

O B.OBS

Cc. ELB

© D.SFS

. Which of the Following Compute Services Does HUAWEI CLOUD Provide?(multiple choices)
=

A.Elastic Cloud Server(ECS)

B. AutoScaling (AS)

C, Image ManagementService (IMS)

©) D.Elastic Volume Service (EVS)

-Huawei Cloud Career Certifications includes: (multiple choices)


=

AHCIA

B.HICP

CHCIE

OO D.HICM

Which belongs to HUAWEI CLOUD Developer Center Ecosystem Catalog? (multiple choices)

A, Developer Contest

B. Cloud Expert

C, Sign-up Platform

D. MVP
1, The ITUAWEI CLOUD Partner Network (I ICPN) is a global partner program for | IUAWCI CLOUD.

© truev

O false

1. You can view, purchase, use, and operate various HUAWEI CLOUD service products after you have logged in to
the management console.

@ truv

O false

2, The management console manages various services such as computing, storage, network, security, management
and deployment, application services, databases,data analysis, enterprise applications, and DevCloud.

@ truev

O false

1.What is used by an ECSto store data?(single chaice)

© A.Auto Scaling

© B.Elastic Volume Service #

O C.Cloud Container Engine

© D.Cloud Eye

1, High-performance computing ECSsprovide a large number of CPU cores, large memory size, and high
throughput.

@ truev

© false

1. Linux OS support key-authenticated ECS logins.

@ truev

© false
1, Which of the following methods does AS use to expand resources?(multiple choice)

A. Dynamically expanding resources

B. Expanding resources as planned

@ C. Manually expanding resources


&

D. Automatically expanding resources

Quiz-2

0 points possible (ungraded)

1.AZ Specifies a physical region where resources use independent power supplies and networks. AZs are physically
isolated but interconnected throughan internal network.

@ truev

O false
1.AS supportsthe following instance removal policies:(multiple choices)

A.Oldestinstances created based onthe oldest configuration

B.Newestinstancescreated based onthe oldest configuration

C.Oldestinstances

D.Newestinstances

1.Which ofthe following policies does AS support?(multiple choices)

AAlarm policies

B.Scheduledpolicies

C.Periodic policies

O D.Monitoringpolicies
1.Private images can heclassified into: (multiple choices)

A.System disk image


a

B.Data disk image


a

C.Full-ECS image
a

© D.Snapshot

1.If the ECS uses a static IP address, configure DHCPforthe ECS,allowingit to dynamically obtain an IP address.

@ truev

O false

1. What image types does IMS support?(multiple choices)

A. Public image

B. Private image

© C. Encrypted image

D. Shared image

1.VBD EVSdisks support only basic SCSI read/write commands.

@ truev

© false

1.EVS can be attached to:(multiple choices)

© A.OBS

B.ECS

C.BMS

f) DPC
1.How many servers can a shared EVS disk be attached to at most?(single choice)

OAS

O B7

Oo C8

© D164

2.Which ofthe followings are EVS disk types?(multiple choices)

A.Ultra-high |/O

B.High /O

C.Common I/O

O D.Optimized I/O

1.HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume BackupService (VBS) to protect your
data against:(multiple choices)

A.viruses

B.unintentional deletions

Csoftwarefaults

D. hardwarefaults

1.OBSis relatively inexpensive, reducing customers’ costs.

@® truev

O false

1.VBS provides the data backup function for EVS disks. The created data backupscan beusedto create EVS disks.

@ truev

O false
1.Object Storage Service (OBS) is a stable, secure,efficient, and easy-to-use cloud storageservice.

@ truev

© false

2. The Advantages of Product OBS are:(multiple choices)

A. Stable

B. Efficient

C. Secure

D. Easy to use

1.0BS supportsfine-grained permission control for buckets and objects through bucketpolicies.

© truev

© false

1.Users can collect OBS resource operation records through CTSservice to facilitate future query, audit and
backtracking.

@ ATrueY

O B. False
1.Advantagesof SFS include:(multiple choices)

A. File sharing

B, Elastic scalability

C. Superior performance andreliability

D. Durable

. CIFS is a protocol used for networkfile access.


=

@® truev

© false

2. A file system provides users with shared file storage service through NFSor CIFS.

© truev

O false

1.Which ofthe following are the application scenarios of SFS?(multiple choices)

A.Media processing

B.Log management
8

C.Content managementand webdirectories

D.High-performance computing (HPC)


1.Advantages of VPC are:(multiple choices)

A. Secure and Reliable

B, Flexible Configuration

C. High-Speed Access

D. Interconnection

1.A VPC providesanisolated virtual network for ECSs.

@® truv

O false

1. Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?(multiple choices)

Customizing CIDR blocks

Customizing access control policies

Accessing the Internet using EIPs

Connecting a local data center using a VPN or Direct Connect connection


2.The related service includes: (multiple choices)

A. ECS

B. ELB

C. Cloud Eye

D. Cloud Trace Service

1.Advantages of ELB include: (multiple choices)

A, High availability

B, High flexibility

C. High performance

OD. High I/O speed

2.Basic Operations include:(multiple choices)

A, Create, delete, or query load balancers.

B. Add, modify, or deletelisteners.

C. Add or remove backend servers.

D. Create, modify, or delete certificates,

1,Which ofthe following load balancing algorithms are provided by ELB? (multiple chaices)

A. Weighted round robin

B, Weighted least connections

C, Source IP hash

OD, Encryption algorithm


2.Whichof the following protocols are supported by ELB? (multiple choices)

A. TCP

B. UDP

Cc HTTP

D. HTTPS

1.DC does not support BGP dynamic routing.

© true

® falsew

.In Route Mode, Static route and BGP are supported.

© truev

© false

1.Cloud Eyeis a monitoringservice that can help you capturethe status of your Direct Connect connections.

® truev

© false

1,Multiple Connections can access One VPC.

@ truev

© false

1.VPN is used to establish a secure and encrypted public network communication tunnel between the remote user
and the VPC.

@ truev

O false
1.Whatbilling modes does VPN support?(multiple choices)

A. pay by bandwidth

B. pay by networktraffic

OC. Pay by year/month

OD, Pay per use

1.Current VPN connection supports IPsec VPN protocol.

@® truev

© false

1. With data security as its core, HUAWEI CLOUD builds a series of security services to meet the particular
needs.security services include:(multiple choices)

A. Data Security

B. Host Security

C. Application Security

D. Network Security

2. Data Security includes:(multiple choices)

A. DEW

OB. HSS

O ccGs

D. DBSS
1.You can use Cloud Eye to:(multiple choices)

A.monitortheutilization of service resources

B.track the runningstatus of cloud services

C.configure alarm rules and notifications

D.respondto resource changes

. Which of the following security services can be usedto protect websites? (Multiple choices)

A.WAF

B.VSS

C.SCM

D.Anti-DDoS
8

2.Cloud Eye Advantagesinclude:(multiple choices)

A. Automatic provisioning

B.Real-time and reliable monitoring


8

C.Visualized monitoring
3

D. Multiple notification methods


8

1. Server Monitoring includes:(multiple choices)

A. Basic Monitoring

B. OS Monitoring

OC. CPU Monitoring

OD. Disk Monitoring


1. Advantages ofRelational Database Service include:(multiple choices)

A,InstantAvailability

B. High Reliability

C, High Security

D, Elastic Scaling

Which aggregation methods does Cloud Eye support?(multiple choices)

A. Max

B. Min

C. Avg

D. Sum

1. The Key Features of RDS include:(multiple choices)

A, High Availability

B. Backup and Restoration

C. DB Instance Monitoring

D. High security
1. You can reboota DB instance only whenits status is Available.

@® truev

© false

1.Among HUAWEI CLOUD EI services, ModelArtsusesthe self-developed Moxing deep learning framework to
accelerate algorithm developmentandtraining.

@ truev

O false

1.Al Applications in Vision include:(multiple choices)

A. Face Recognition

B. Image Recognition

C. Content Moderation

D. ImageSearch

1,DWSis the Enterprise - Class Data Warehouse.

© truev

© false

1, Massive Repetition Scenario makes you facus on high-valuedservices.

© truevd

O false

1, Opening APIs greatly promotes service innovation and standardization of existing services.

@ truv

O false
2. API Gateway doesn't supportall API integration and opening on HUAWEI CLOUD.

O true

@ falseW

1.You can enable API Gateway and create and manageAPIs for free.

@® truevd

O false
1. The minimum managementunit of RDSis an instance.
Yeah. Wrong
2. ECS refers to the Auto Scaling (AS) service.
Yeah. Wrong
3. Whatare the key features of IAM?
A. Centralized control of users and security credentials
B. Centralized user access control
C. User group-basedrights
D. Huawei customer service agent maintenance
4. The VPC subnet segment can be modified after being created.
Yeah. Wrong
5. VBS can create backups for EVS disks and use the backupstoroll back EVS
disks, ensuring user data accuracy and security to the maximum extent.
\Yeah. Wrong
6. Which of the following statements about KMS is incorrect?
A. Management cloud platform and tenant key
B. HSM (hardware security module)
C. Multi-layer key protection technology
D. Support for application combination
7. Which of the following doesnot exist in the listener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode

8. On the Dashboard page, you can add or delete monitoring icons of concerned
instances. Supports multi-indicator comparison so that users can view the
Yeah. Wrong
9. Relational Database Service (RDS) users can modify database configurations to achieve optimal performance.
Yeah. Wrong
10. The size of the exported imageis not limited.
Yeah. Wrong
11. The ASservice can only dynamically add or reduce server resources based on the specified time period.
Yeah. Wrong
12. Which of the following statements aboutSFSis correct?
A. A file system can be mountedto an ECS and canbelongtodifferent VPCs.
B. Parameters cannot be modified forthe file system that is successfully created.
C. The file system can access different AZs in the same VPC.
D. The performanceofthe SFS file system improveswith the increase of capacity.
13. Which of the following imagesis a standard image provided by the public cloud platform andisvisible to all users?
A. Public image
B. Private images
C. Shared image
D. Market image
14. The GPUis applicable to graphics rendering and engineering drawingin virtualization environments and desktop cloud scenarios.
Yeah. Wrong
15. Whatare the typesof AS policies?
A. Scheduled policy
B. Periodic policy
C. Alarm policy
|p. Randompolicy
16. Which of the following scenarios are involved in image replication?
A. Copying an unencrypted image to another unencrypted image
B. Replicating an unencrypted image as an encrypted image
C. Replicating an encrypted image as an encrypted image
D. Replicate an encrypted image to an unencrypted one.
17. Allowsusers to set read-only permissions for SFS.
Yeah. Wrong
18. Which of the following load balancing modesare not supportedbylisteners?
A. Maximum number oflinks
B. Polling
C. Set weights.
D. Minimum connection
19. Which of the following methods can be usedto set the access permission for anonymous users of OBS objects?
A. Set an ACL for the OBS bucket.
B. Set the ACL for OBS objects.
C. Set a policy for OBS objects.
D. Set a policy for the OBS bucket.
20. OBS supports batch upload.
Yeah. Wrong
21. WhatAre the Steps for Creating a Windows Image Using an ECS?
A. Configure the Windowsserver.
B. Install Cloudbase-Init.
C. Creating a Windowsprivate image
D. View and clear networkrule files.

22. You must stop the ECS beforeusing it to create an image.


Yeah. Wrong
23. Which of the following is not a major application scenario of VPC?
A. VMs access each other.
B. Desktop cloud access to Huawei Vmall
C. The VM accesses the external network.
D. VPN access to VMs

24. To implement dynamic resource expansion, which of the following policies is


selected when youcreate an AS policy?

A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy
25. Which of the following parameters is used to automatically obtain an IP address during VPC creation?
A.DHCP
B. Network segment
C. Partitioning
D. Gateway
26. Which of the following is not the application scenario of Cloud Eye?
A. Daily resource management
B. Issue notification
C. Capacity adjustment
D. Operation audit
27. Which of the following is not a capability of DevCloud?
A. Project management
B. Code check
C. Compile and build
D. Data backup
28. Cross-VPCaccessto file system is supported.
Yeah. Wrong
29. WhatAre the ECS Login Authentication Modes?
A. PasswordB. PasswiC.Fingerprint D. Key pair
30. Huawei provides developers with functional development, which will help
developers integrate the functions developed by Huaweiwith their upper-layer
applications to build differentiated and innovative solutions.

Yeah. Wrong
31. Which of the following are RDS functions?
A. Create a databasecluster.
B. Expand the disk capacity.
C. Adding a read replica
D. Creating or restoring a snapshot
E. Restore the backup to a specified time point.
32. Whichof the following functions are provided by OBS Console?
A. Static website hosting
B. Multi-version control
C. Cross-domain resource sharing
D. Mounting external buckets

33. Attach the EVS disk to an ECS so thatthe disk can be used directly.
Yeah. Wrong
34. Which of the following statements about VBS are correct?
A. After an EVS disk is deleted, its backup datais also deleted.
B. After an EVS disk is deleted, you can use the backup to restore the EVS disk.
C. After an EVSdisk is deleted, you can still use the backup to create the EVSdisk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
35. How Can | Add Instances to an AS Group?
A.Scaling action
B. Manually add instances.
C. Change the number of expected instances.
D. AS configuration
36. Alarm ni ication is the action taken whenan alarmis triggered. Users can
set or disable alarm notification when creating or modifying an alarm.
Yeah. Wrong
From which aspects doessituational awarenessanalyze security posture?
A. Global perspective
B. User perspective
C. Managementperspective
D. Attacker perspective
38. After an application is created, you can change the application by replacing the image of the application.
Yeah. Wrong
39. ECSsare billed in yearly/monthly or pay-per-use mode.
Yeah. Wrong
40.A policy is configured for OBS bucketA to prevent any user from accessing
objects in the bucket. Bucket A contains object B, which is configured with the
ACL permission to allow anonymous usersto access object B. In this way, users
can access object B anonymously.
Yeah. Wrong
41. Which of the following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and home directory
D. High-performance computing

42. IMS providesflexible self-service and comprehensive image capabilities.


Users can create private images and use imagesto create ECSs in batches or
replicate ECSsin batches.

Yeah. Wrong
43. WhenIPSec VPNis used for communication, the encryption and decryption
check is performed onthe firewalls at both ends.
Yeah. Wrong
44. VBS doesnot support batch backup of EVS disks.
\Yeah. Wrong

45. Identity and Access Management(IAM)


Yeah. Wrong

A. Read permission
B. Write permission
C. ACL permission
D. Modify the ACL permission.
47. Which of the following is the image type converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
48. What are the concepts of VPC?
A. Subnet B.EIP C. Security group D. VPN

1. After an ECSis created, the bandwidth used bythe ECS cannotbe changed.
Yeah. Wrong
2. Which ofthe following operations is charged?
A. Create an EIP.
B. Create a subnet.
C. Create a VPC.
D. Create a security group.
3. Which of the following doesnotexistin thelistener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode
4. Whichof the followingis not the target of the cloud computing security service?
A.Usersecurity
B. Cloud platform security
C. Data security
D. Service security
5. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and homedirectory
D. High-performance computing
6. Which of the following EVSdisks can be directly created on the EVS console?
A. System disk B. Data disk C. Delta disk D. Mirror disk
The ASservice must be used with Elastic Load Balance.
Yeah. Wrong
8. Which ofthe following statements about VBSare correct?
A. VBS has no quota limit.
B. If the capacity of an EVS disk is expandedafter the disk is backed up, the disk capacity remains unchangedafter the disk is restored using the backup data.
C. If you back up an EVS disk and then expandits capacity, you cannot use the backupto restore the disk
data. This is because the disk spacewill be restored to theoriginal size after the restoration.
D. After the capacity of an EVS disk is expanded,the disk space remains unchangedif the EVS disk is backed up and the backup is usedto restore data.
9. Whatis the full name of ECS?
Elastic Cloud Server

10. WhatArethe Stepsfor Creating a WindowsImageUsing an ECS?


A. Configure the Windowsserver.
B.Install Cloudbase-Init.
C. Creating a Windowsprivate image
D. View andclear networkrulefiles.
11. Which type ofimageis converted from theelastic and server images?
A. Public image
B. Private images
C. Shared image
D. Market image
12. To enable the log management function of an OBS bucket, which ofthe following permissions of the target OBS bucket must be granted to the log delivery user group?
A. Read permission
B. Write permission
C. ACL permission
D. Modify the ACL permission.
13. VPCs can be connected to traditional data centers throughprivate lines or VPNsto flexibly integrate resources.
Yeah. Wrong
14.If the capacity of the data disk attached to the ECSis insufficient, you must detachthe disk and purchase a new one.
Yeah. Wrong
15. The size of the exported imageis notlimited.
Yeah. Wrong
16. Whichof the following imagesis a standard image provided bythe public cloud platform andisvisible to all users?
A. Public image
B. Private images
C. Shared image
D. Market image

17. The VPC subnet segmentcan be modified after being created.


Yeah. Wrong
18. Which of the following componentsis not a componentofthe big data platform?
A.MapReduce
B.OpenStack
C.HDFS
DYarn
19. Attach the EVSdisk to an ECS so thatthe disk can be used directly.
Yeah. Wrong
20. The AS service can only dynamically increase or decrease server resources based on a specified period.
Yeah. Wrong
21. SFS cannotbe attached to an ECS running the WindowsOS.
Yeah. Wrong
22. After an ECSis created, you can changeits specifications if they do not meet your requirements.
Yeah. Wrong
23. Whatare the key features of IAM?
A. Centralized control of users and security credentials
B. Centralized user access control
C. User group-based rights
D. Huawei customer service agent maintenance
24. What are the important functions of IKE?
A. Negotiation protocol parameters
B. Protecting traffic security
C. Key negotiation and management
D. Peer identity authentication
25. The managementconsole can be used without login.
Yeah. Wrong
26. Whichofthe following statements aboutVBSis incorrect?
A. VBS is based on the snapshot technology and supports online backup.
B. VBS supportsfull backup and incremental backup.
C. You do not need to stop the server when using a backup to restore an EVSdisk.
D. When backing up EVSdisks, you do not needto stop the server.
27. Whatarethe alarm statuses of Cloud Eye?
A. Alarms B. Normal C. Insufficient dat D. Close
28. What Data Doesan ECS Use?
EVSdisk
29. After the external networktraffic reaches the load balancer, which of the following componentsis the first componentto receive the traffic?
AFirewall B.nginx CLVS D.Health Check
30. Whatis the return value whena user-defined monitoring indicator is successfully uploaded using the Open API?
Return value: 201
31. Before creating an imageusingan ECS,ensure that the ECS has been stopped.
Yeah. Wrong
32. The cloud security service system consists offive parts: networksecurity, data security, application security, security evaluation, and security support.
Yeah. Wrong
33. Database Service RDS Users Can Modify Database Configurations to Achieve Optimal Performance
Yeah. Wrong
34. Which ofthe following functions are supported by OBS Browser?
A.Static website hosting
B. Multi-version control
C. Cross-domain resource sharing

35. Whatare the application scenarios of VBS?


A. Hackerattacksorvirus attacks
B. Data is deleted by mistake.
C. Data archiving and retention
D. The application program is faulty.
36. In the cloud computing environment, confidentiality, integrity, and availability are still the fundamental security requirementsof users.
Yeah. Wrong
37. RDS can meet the ever-changing requirementsof the gaming industry, shorten the R&D period, and reduce R&Dcosts.
Yeah. Wrong
38. Multiple EVS disks can be attached to an ECS.
Yeah. Wrong
39. Which of the following statements about SFSare correct?
A.A file system can be mountedto an ECS and can belong to different VPCs.
B. Parametersof created file systems cannot be modified.
C. The file system can access different AZs in the same VPC.
D. The performance of the SFS file system improves with the increase of capacity.
40. Which ofthe following are RDS functions?
A. Create a databasecluster.
B. Expandthe disk capacity.
C. Adding a read replica
D. Creating or restoring a snapshot
E. Restore the backup to a specified time point.
41. Which ofthe following load balancing modesis not supported bylisteners?
A. Maximum nun B. Polling C. Set weights. D. Minimum connection

42. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three times, disable
versioning for the bucket, and upload object aaa for three times. After the preceding operations are
complete, how manyobjectsare displayed in the bucket basic information?
Quantity: 4
43. Whichofthe following statements about Anti-DDoS traffic awarenessis incorrect?
A. Web vulnerability security detection
B. Configures and modifies anti-DDoS parameters for public IP addresses.
C. Provides protection for public IP addresses of ECSs and load balancing devices.
D. Monitors a single public IP addressin the obstetrics department, including the current defense status,
current defense configuration parameters,traffic since 24 hours ago, and one event within 24 hours.

1. If two sites communicate with each otheracross the Internet, IPSec VPN can be deployed on
the firewalls at both sites to protect the mutual accesstraffic betweenthe intranets at the two
sites.
Yeah. Wrong
2. Which ofthefollowing statements about hybrid cloudis incorrect?
‘A. Unified management ofpublic and private cloud resources
B. Service resourcesare migrated betweenthe public cloud and private cloud.
C. Optimal resourceallocationthrough hybrid cloud
D. Applications can only be deployedonthe public cloud.
3. Cloud computing is a modelthatenables users to obtain required resources from the shared
pool of configurable resources anytime, anywhere, and on demand.
Yeah. Wrong
4. All types of HUAWEI CLOUDproducts can be viewed on the managementconsole.
Yeah. Wrong
5. Whichofthefollowing doesnotexist in the configuration for creatinga listener?
A. Load balancer protocol/port
B. VPC
C. HTTPScertificate
D. Load mode
6. Whichofthefollowingis not a major function of WTP?
A. Websitefile protection
B. Alarm information recording
C. Protection details stati S
D. SQLinjection prevention
7. Which of the followingare the main functions of HID?
A.Bruteforce cracking detection
B. Remotelogin notification
C. Weak password detection
D. Checkthe database processpermission.
E. Webpage file detection
8. Whentheaveragevalueis selected as the aggregation mode, the peak values may be inconsistent when users switch the data range.
Yeah. Wrong
9. Which of the following statementsis incorrect?
A. Create a folder named br..ra/1 in the OBS bucket.
B. OBS Console supportsbatch deletion of buckets.
C. OBS Console supports batch deletion of objects.
D. A user has created 101 buckets using OBS Console.
10. Whichofthefollowing functionsare provided by the ECS service?
‘A. Users can create and delete VMs, modify VM specifications, andstart and shut down VMs.
B. Users can add and uninstall extension NICs, add EIPs, and attach and detach disks.
C. Users can view information about their ECSs on the management console.
D. Users can set ECS alarm rules.

11. RDS meets the ever-changing requirementsof the gaming industry, shortens the R&D period, and reduces R&D costs.
Yeah. Wrong
12. Which of the following services can work with EVS?
A. Elastic Cloud Server
B. Image ManagementService (IMS)
C. Volume Backup Service (VBS)
D. Cloud monitoring service
13. Application security is an importantpart of the cloud security service. It ensures the
security of elastic cloud computing servers and cloud computing applications running on them
from the perspective of operating system and application security protection.
Yeah. Wrong
14. Which of the following statements about VBS is incorrect?
A. VBS is based on the snapshot technology and supports online backup.
B. VBS supportsfull backup and incremental backup.
C. You do not needto stop the server whenusing a backup to restore an EVSdisk.
D. When backing up EVS disks, you do not need to stop the server.
15. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content managementand home directory
D. High-performance computing
16. Whatare the application scenarios of VBS?
A. Hackerattacks orvirus attacks
B. Data is deleted by mistake.
C. Dataarchiving andretention
D. The application program is faulty.
21. An availability zone (AZ) is a collection of one or more physical data centers with
independentcooling, fire extinguishing, moisture-proof, andelectricity facilities. Within an AZ,
computing, network, storage, and other resourcesare logically divided into multiple clusters.

Yeah. Wrong
22. Which type of image is converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
23. Which of the following operations can be performed by a shared image provider?
A. Sharing a specified image
B. Delete the shared image.
C. Add a tenant to whom an image is shared.
D. Delete the tenant who shares the image.
24. Which of the following statements about the ELB function cannot be implemented?
A. Eliminate single points offailure.
B. Sharing service node pressure
C. Check the health status of service nodes.
D. Layer 2 and Layer 3 data forwarding
25. When enabling Direct Connect, whatis the port type if the port type is 10GE?
Optical port
26. How long doesit take to apply for an ECS?
A few minutes.
27. OBS supports batch upload.
Yeah. Wrong
28. What are the types of EVS disks?
A. More than I/O B. High I/O C. Common |/C D. Optimized 1/0
29. The VPC subnet segment can be modified after being created.
Yeah. Wrong

30. Data security ensures confidentiality and integrity of user data applications and storagein the cloud computing environment.
Yeah. Wrong
31. Before creating an imageusing an ECS, ensurethat the ECS has been stopped.
Yeah. Wrong
32. Users cannotdeployservice applications on ECSsasif they wereusingtraditional servers.
Yeah. Wrong
33. Whichofthefollowingis not a basic concept of ELB?
A.Firewall
B. Load balancer
C. Listener
D.Instance (VM orapplication container)
34. Whichofthefollowingis not the main application scenario of KMS?
A.Data transmission encryption
B. Personal data encryption
C. Coreservice data encryption
D. Key information asset encryption
35. Which of the following statements aboutVBS are correct?
A. After an EVSdisk is deleted, its backup data is also deleted.
B. After an EVSdiskis deleted, it can be restored using a backup.
C. After an EVSdisk is deleted, you can still use the backup to create the EVS disk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
36. Which of the following componentsis not included in the big data platform?
A.MapReduce
B.OpenStack
C.HDFS.
D.Yarn
41. VPCs can be connected totraditional data centers through private lines or VPNstoflexibly integrate resources.
Yeah. Wrong
42. After an ECSis created,its bandwidth cannot be modified onceit is determined.
Yeah. Wrong
43. The webapplicationfirewall performs anomaly detection on HTTPrequeststo effectively
prevent malicious network intrusion behaviors such as web page tampering, information
leakage, and Trojan horse implantation.
Yeah. Wrong
44, Whatare the advantagesof SFS over traditional file sharing storage?
A.File sharing
B. Seamlessintegration
C. The operationis simple butthe cost is high.
D. High reliability
45. When multiple VMsare created, you can bind an EIP to multiple VMsto enable the VMsto accessthe Internetat the sametime.
Yeah. Wrong
46. IMSprovidesflexible self-service and comprehensive image managementcapabilities.
Users can create private images and use the imagesto create ECSsor load ECSsin batches.
Yeah. Wrong
47. RDSusers can modify database configurationsto achieve optimal performance.
Yeah. Wrong
48. A policyis configured for OBS bucketA to prevent any userfrom accessingobjectsin the
bucket. Bucket A contains object B, which has an ACLthat allows anonymoususers to access.
Then,users can access object B anonymously.
Yeah. Wrong
49. Alarm notificationis the action taken whenan alarm is triggered. Users can setor disable
alarm notification when creating or modifying an alarm.
Yeah. Wrong

1, Whatare the componentsof an ECS?


A.CPU B. Memory C. MirrorinD. Elastic Volume Service
2. What operations do | need to perform to enable the created application to be accessed from the external network?
A. The numberof nodesin the cluster exceeds 2.
B. The memory of each node exceeds 2 GB.
C. Release an application as a service when creating the application.
D. The Elastic Load Balance must be bound.
3. How Long DoesIt Take to Apply for an ECS?
A few minutes.
A. Which ofthe following protocols are important in the IPSec framework?
AIP B.IKE CAH D.ESP.
5. Whatare the types of VPNs based onservice usage?
A.Access VPN
B.Intranet VPN
C.Extranet VPN
D.Lay2 and Lay3 tunnel VPN
6. Attach the EVS disk to an ECS.
Yeah. Wrong
7. Which ofthe following statements about VBSis incorrect?
A. VBS is based on the snapshot technology and supportsonline backup.
B. VBS supportsfull backup and incremental backup.
C. You do not need to stop the server when using a backup to restore an EVS disk.
D. Whenbacking up EVSdisks, you do not need to stopthe server.
8. EVS disks can be used only with ECSs.
Yeah. Wrong
9. Whencreating multiple VMs, you can bind oneEIP to multiple VMsto enable them to accessthe Internet at the sametime.
Yeah. Wrong
10. Whencreating an ECS, youcan use thefile injection function provided by the system toinitialize the ECS.
Yeah. Wrong

11. Which ofthe following statements about Anti-DDoStraffic cleaning is incorrect?


A. Webvulnerability security detection
B. Configures and modifies anti-DDoS parameters for public IP addresses.
C. Provides protection for public IP addresses of ECSs andload balancing devices.
D. View the monitoring capability of a single public IP address.
12. Which ofthe following are the main functions of HID?
A. Brute force cracking detection
B. Remote login notification
C. Weak password detection
D. Check the database process permission.
E. Web pagefile detection
13. What computing services does Huawei public cloud provide?
A.Autoscalingservice
B. Elastic Cloud Server
C. Image ManagementService(IMS)
D. Elastic Volume Service
14. The webapplicationfirewall performs anomaly detection on HTTP requeststo effectively prevent mal us network intrusion behaviors such as web page
tampering, information leakage, and Trojan horse implantation.
Yeah. Wrong
15. Which of the following statementsaboutthe positioning of Huaweicloud servicesare correct?
Focus onthelaaSlayer, enable the PaaS layer, and aggregate the SaaSlayer.
16. To enable the log managementfunction of an OBS bucket, whichof the following permissionsof the target OBS bucket must be granted to the log delivery user group?
A. Read permission
B. Write permission
C. ACLpermission
D. Modify the ACL permission.
17. VBScan create backups for EVS disks and use the backupstoroll back EVSdisks, maxi \g user data accuracy andsecurity.
Yeah. Wrong
18. Which of thefollowing statements aboutthe ELBfunction cannot be implemented?
A. Eliminatesinglepointsoffailure.
B, Sharing service nodepressure
C. Health checkfor service nodes
D.Layer 2 andLayer 3 data forwarding
19. Cloud computing is a modelthat enables users to obtain required resourcesfrom the shared pool ofconfigurable resources anytime, anywhere,and on demand.
Yeah. Wrong
20. Which ofthefollowingis not a majorfunction of Anti-DDoS?
A. DDoSattack protection
B. Monitoring a single IP address
C. Report on interceptionof a single IP address
D.Periodically scan ECS vulnerabilities.

21. How Can I Add Instances to an AS Group?


A. Scaling action
B. Manually add instances.
C. Modify the expectedinstance
D. ASconfiguration
22. The SFScan controlthe read-only permission ofusers.
Yeah. Wrong
23. Which ofthe following statements about health check are correct?
A.If no recovery is received within the timeoutperiod,a failure is considered.
B. Check whetherthe path protocol supports HTTPS.
C. Whenthe numberoffailures exceeds the health threshold, the service is unavailable.
D. When the number offailures exceeds the unhealthy threshold, the service is unavailable.

The ASservice must be used with Elastic Load Balance.


Yeah. Wrong
25. Whichofthe following service resource metrics can be monitored by Cloud Eye?
A.Virtual private cloud
B. Elastic computing service
C. Distributed cache service
D. Elastic Load Balance
26. IPSec VPNis an encrypted tunnelcalculation. It uses encrypted security services to establish confidential and secure communication tunnels betweendifferent
networks. Whichof the following is not the feature that ensures packet transmission on the public network?
A. Timelines B. Integrity C. AuthentiD. Confidentiality
27. How Can| Monitor ECSs?
A. Cloud Container Engine
B. Cloud Eye
C. Elastic scaling
D.Virtual private cloud
28. Whichofthe following aggregation modesis supported by instance monitoring in Cloud Eye?
A. Maximun B.Square dif C. Standarc D. Average
29. Whatis the maximum numberof alarm rules thatcan be configured?
1000 records
30. Whichofthe followingload balancing modesare not supported bylisteners?
A. MaximunB.Polling _C. Set weig D. Minimum connection
31. Whichofthe followingis not a major function of SIS?
A.Security level assessment
B. Active and passive security concepts
C.Security configuration evaluation
D.Securityintelligence collection
32. Whatare thetypes of ASpolicies that can be configured for AS?
3 types
33. VPCscanbe interconnected withtraditional data centers throughprivate lines or VPNs to flexibly integrate resources.
Yeah. Wrong
34, Which of the following services can be used together with RDS to ensure network security isolation between RDSinstances andotherservices?
A.ECS B.VPC C.CES, D.OBS
35. Which of the following shared file systems can be directly deleted?
A.Creating B. Unavailabl C. Deleting D. Deletionfailed.

36. Which of the following statements about SFS are correct?


A. A file system can be mountedto an ECS and can belongto different VPCs.
B. Parameters of created file systems cannot be modified.
C. The file system can access different AZs in the same VPC.
D. The performance of the SFSfile system improves with the increase of capacity.
37. Which of the following constitute the Huawei public cloud ecosystem?
A. Application market
B. Developer community
C. Partners
D. Huawei and service certification engineers
38. Which ofthe following imagetypes are supported by IMS?
A. Public image
B.Private images
C. Shared image
D.Secret mirroring
39. Multiple EVS disks can be attached to an ECS.
Yeah. Wrong
40. The GPUis applicable to graphics rendering and engineering drawingin the virtualization environment and desktopcloud scenarios.
Yeah. Wrong
41. Whichofthe followingfunctions are supported by OBS Browser?
A. Static website hosting
B. Multi-version control
C. Cross-domain resourcesharing
D. Mounting external buckets
42. Networksecurity, as an importantpart of cloud security services, implementsnetworkisolation to cope with network attacks and ensure network security.
Yeah. Wrong
43. Whichofthe following statements is incorrect?
A. Create a file named br..ra/1 in the OBS bucket.
B. OBS Console supports batch deletion of buckets.
C. OBS Consolesupportsbatch deletion of objects.
D. A userhas created 101 buckets using OBS Console.
44, How manytypesofusers canlog in to Huawei Enterprise Cloud?
2 types
45. How Many EVSDisks Can Be Attached to an ECS?
10 PCS
46. Whenan EVSdiskis detached from an ECS, the data on the EVS disk will be lost.
Yeah. Wrong
47. Whichofthe following parameters is used to automatically obtain an IP address during VPC creation?
A.DHCP B. Network C. Partition D. Gateway
48. If the capacity of the data disk attached to the ECSis insufficient, you must detach the disk and purchase a new one.
Yeah. Wrong
49. Whichofthe following EVSdisks can be directly created on the EVS console?
A. System d B. Data disk C. Delta dis D. Mirrordisk
50. Which ofthe following is not an advantage of CES?
A. Real-time
B. Save money
C. Multiple notification modes
D. Monitoring third-party non-HUAWEI CLOUDservices
51. Relational Database Service (RDS) users can modify database configurations to achieve optimal performance.
Yeah, Wrong
52. The AS service automatically adjusts service resources based on service requirementsand policies.
Yeah. Wrong
53. What CanI Do If the Disk Capacity of an ECSIs Insufficient?
A. Detachinga disk
B. Reinstall the operating system.
C. Expandthedisk capacity.
D. Changethe operating system.
HCIA H35-660
TRUE OF FALSE
1. With control and user plane separation (CUPS) on the core network, the user can be
moved closer to users to reduce transmission delay.
a. True .. Ok

b. False

2. In the initial phase of 5G network construction, operator predominantly provide data service
for customers. (T/F)
a. True. _Ok

b. False.

3. Open trail specification alliance (OTSA) predominately promots the release and application of
28 GHz spectrums. –TF
a. True ..Ok

b. False

4. In eMBB application scenarios, 5G significantly improved user experience for mobile


broadband servies? _TF
a. True _ok

b. False

5. 5G technology uses licensed frequency bands. Therefore mobile operators can provide identity
authentication and core signaling security. ..TF
a. True ..Ok

b. False

6. 3GPP release 16 describes only the URLLC and mMTC scenarios.


a. True

b. False .. Ok

7. In the 5G era, services will shioft from 2C to emerging vertical industries, including 2B2C, @B,
2H. ..TF
a. True ..Ok

b. False

8. High frequency mmWave is predominately uses 5G wireless coverage. -TF


a. True

b. False .. Ok

9. The first wave of communication 5G predominately targets eMBB services.


a. True Ok

b. False

10. Standards formulated by Open trial specification alliance (OTSA) also belong to 5G
specifications of 3GPP.
a. True

b. False _Ok

11. Device-to-Device (D2D) allows devices to communicate with each other without
requiring a network?
a. True. _Ok

b. False

12. Using 5G to implement AR and assist industrial operation guidance is


typical eMBB scenario
a. True. _Ok

b. false

13. Open Trial specification Alliance (OTSA) predominantly promotes the release and
application of 28 GHz spectrum.
a. True. _Ok

b. False

14. 3GPP Release 15 protocols are divided into three stage : non standalone (NSA)
networking, late drop
a. True._ Ok

b. False.

15. Cloud pc is one of the three important eMBB services defined by Huawei in cloud X
a. True. ._Ok

b. False.

16. Sub-3 GHz spectrum resources can be dynamically shared with 5G spectrums by
using the cloud AIR technology
a. true ….ok

b. false

17. 5G uses edge computing to offload traffic, guaranteeing low latency


a. True _Ok

b. False

18. The 5G technology is a requirement for automated driving.


a. true

b. false ……ok
19. Using a 5G-based transmission line inspection drone can extend the inspection range to
several kilometers away.
a. True ..Ok

b. False

20. In the initial phase of 5G network construction, vertical industry applications should
have low requirements for continuous coverage.
a. True …. ok

b. false

21. With the network slicing technology, operators can increase revnue and reduce
expenditure, opening up more service scenarios.
a. True ..Ok

b. False

SINGLE CHOICE
22. Which of the following is the main advantage of the using massive MIMO over
traditional MIMO? SC
a. Multiplexing gain

b. Single-channel array gain

c. 3d beamforming gain .. Ok

d. Diversity gain

23. Which of the following key technologies is used to improve data transmission reliability and
reduce retransmission caused by data transmission errors, Thereby indirectly improving
spectral efficiency? _SC
a. F-OFDMA _Ok //

b. High-order modulation

c. Channel codding _OK

d. Massive MIMO

24. Which of the following Terms refers to the base station in the radio access network in 5G?
a. NodeB

b. eNodeB

c. gNodeB .. Ok

d. BTS

25. In 5G, what is the maximum number of RBs when the subscriber spacing is 30KHz and
bandwidth is 100 MHs? – SC
a. 273 _Ok
b. 106

c. 200

d. 100

26. In the IMT2020 vision, which of the following is correct ratio of 5G service delay to the 4G
service delay?
a. 1/50 ..Ok

b. 1/10

c. 1/100

d. 1/20

27. WHICH OF THE FOLOLOWING ARE THE KEY FACTORY FOR OPERATORS TO SELECT NSA OR SA
NETWORKING? -MC
a. Inventory network devices ..Ok

b. Return on Investment .. OK

c. Terminals .. Ok

d. Technology maturity ..Ok

28. Which of the following frequency bands is used by the Verizon 5F home?
a. 3.5G Hz

b. 28 Ghz ..oK

c. 40 GHz

d. 2.6 GHz

29. Which of the following is disadvantage of wired (power Line) AMI Technology?
a. Low Capacity

b. Immature Technology

c. Difficult deployment .. Ok

d. Unable to traverse transformers

30. Who is the applicant for the network slicing? -SC


a. Tenant .. Ok

b. Subscribe

c. Proprietor

d. User
31. Which of the following is the key 5G capability required by monitoring applications such as
connected intelligent infusion in smart healthcare?
a. Low-power small-packet transmission. _ok

b. Wireless ultra-broadband access.

c. Anytime, anywhere wireless

d. Contiguous coverage

32. Which of the following is the user plane function module on the core network in 5G SA
networking? SC
a. AMF

b. UDM //HSS

c. SMF

d. UPF // (PDN-GW + SGW) .. Ok

33. In the 3GPP R15 protocol, which of the following is 5G mmWave? SC


a. Spectrum above 3GHz

b. Spectrum above 20Ghz. _Ok

c. Spectrum above 10Ghz

d. Spectrum above 5GHz

34. What is minimal air interface latency required in the 5G URLLC application scenario in
IMT-2020 vision? -SC
a. 1 ms .. Ok

b. 10 ms

c. 5 ms

d. 100 ms

35. Internet of Vehicle (IoV), Requires coordination of network intelligence and


infrastructure from vehicle -mounted information services?
a. True .. OK

b. False

36. Which of the Following Standards could potentially undermine global 5G unification
and cause the industry ch ain to break? –SC
a. IEEE

b. 3GPP

c. OTSA .. OK
d. 3GPPs

37. Which one of the following must be cloudified first to implement the could -based
network structure? –SC
a. Core network ..Ok

b. Terminal

c. RAN

d. Bearer Network

38. In which 3GPP release were the 5G standards first introduced? -SC
- Release 15 .. Ok

- Release 16

- Release 10

- Release 8

39. During 5G Standardization, which of the following is the SA (standalone) architecture


developed in? -SC
- Phase1.2 .. Ok

- Phase 2.1

- Phase 2.2

- Phase 1.1

40. Which of the following statements is incorrect about uploading AR/VR teaching content
to the cloud? -SC
- AR/VR images and audios are efficiently encoded into audio and video streams in the client.
_Ok

- The cloud computing capability is used to run, render display, and control AP Applications.

- Rendering with high requirements on latency is deployed close to user that service data does
not need to be transmitted to the core network.

- The edge cloud deployment architecture is recommended to meet the low latency requirements
of services.

41. Which one of the following servi ces belongs to URLLS application scenario? -SC
- Automated driving ..Ok

- Intelligent meter reading

- Intelligent parking

- AR/VR

42. Which of the following 5G chipsets does not support 5G mode? –SC
- Balong 5000

- Exynos 5110

- X55

- X50 .. OK

43. What diversity of connections can 5G deliver in the mMTC application scenario in IMT -
2020 Vision? –SC
- 100,000 Connections per square kilometer

- 1 million connections per square kilometer ..OK

- 10 million connections per square kilometer

- 10,000 connections per square kilometer

44. Which of the following is not advantage of a thin client in the cloud X service?
a. Easy deployment and management

b. Efficient storage ..Ok

c. Mobile

d. Low cost

45. Which ogf the following is the ideal rate of reliability for cooperative
automated drinving?
a. 0.999%

b. 0.999999%

c. 0.9999%

d. 0.99999% .. Ok

46. Which of the following smart healthcare applications projects is dependent on 5G


networks? -SC
a. Remote surgery through a robot .. OK

b. Medical care monitoring

c. Patient Locating

d. Infusion monitoring

47. In an industrial internet sensors are used to monitor the status. Which one of the
following requirement in this case?
a. Low delay

b. Large bandwidth

c. High reliability.
d. Massive connections ..Ok

48. During 5G standardization, which of the following is the SA (standalone) architecture


developed in?
a. Phase 2.2

b. Phase 1.1

c. Phase 2.1

d. Phase 1.2 ..Ok

49. Which of the following services is the most suitable for terminals to implement
DRX?_ SC
a. VR gaming

b. Automated driving

c. Video on-live

d. Intelligent meter reading ..Ok

50. Which of the following is the low -altitude ra2nge where drones can work? _SC
a. 2000 m

b. 100 m

c. 1000 m .. Maybe

d. 60 m

51. Which of the following is the terms refers to the base station in the radio network
access in 5G? _SC
a. NodeB

b. eNodeB

c. BTS

d. gNodeB ..Ok

52. Which of the following coding schemes is predominately used for traffic channel in 5G?
_SC
a. LDPC ..Ok

b. Convolutional code

c. Polar code

d. Turbo coding

53. Which of the following TV definitions is equivalent to the definition of the pre -VR full
view 4K 2D content? -SC
a. 240p ..Ok

b. 1080p

c. 480p

d. 720p

54. Which following service scenario of the smart grid does a separate 5G E@E need to be
used? -SC
a. Power distribution network protection and control ..Ok

b. Mobile operations

c. Intelligent meter reading

d. Voice-base dispatch service (trunking group)

55. Which one of the following technologies enables 5G to better support drone services? -
SC
a. AAU vertical coverage. _Ok

b. More connected users

c. Lower service delay.

d. Large cell bandwidth

56. Which one of the following serves as the mail application service for 5G deployment
phase in the Europe and the United states? -SC
a. Internet of Vehicles (IoV)

b. Cloud VR

c. Smart manufacturing

d. FWA (Home broadband access) ..Ok

57. Which of the following TV definition is equivalent to the definition of the 8K 2D


content in an entry -level full-view scenario? –SC
a. 240p

b. 480p ..Ok

c. 720p

d. 1080p

58. Which of the following has the highest requirement for the network bandwidth in B -
Scan?
a. Ultrasonic imaging ..Ok

b. Operation control
c. Real-time call

d. Communication between doctors and patients

59. Which of the following is the highest modulation order as defined by 3GPP release 15?
_SC
a. 16QAM

b. 1024QAM

c. 64QAM

d. 256QAM ..Ok

60. Which of the following security feature of the 5G can identify illegal attacks and reduce
the impact of attacks? -SC
a. Availability ._Ok

b. Integrity

c. Confidentiality

d. Traceability.

61. Which of the fowling is a solution for 5G to switch uplink transmission to the sub -3 GHz
low frequency band. Effectively compensating for insufficient uplink coverage of the C -
Band? _SC
a. UL and DL decoupling ..Ok

b. Carrier aggregation

c. Duplex technology

d. Multiple access technique

62. Which of the following is the mail requirement for 5G network performance for
services such as smart building and smear lamp? -SC
a. Latency

b. Rate

c. Connections ..Ok

d. Mobility

63. Which of the following is the most advanced aspect of the development phase of IoV?
_SC
a. Fully Automated parking

b. Lase change assistance

c. Automated driving urban areas _Ok

d. Automatic driving in lanes


64. which of the following is the minimum value of ultra -high voltage (UHV) of a power
system? -SC
a. 330 KV

b. 220 KV

c. 800 KV ... Ok

d. 35 KV

65. Which one of the following 5G service application does the V2X apply to? _SC
a. IoV _Ok

b. smart grid

c. Drone

d. IoT

66. Which of the following 5G security features, which one can be used to record
operations for security audit? _SC
a. Availability

b. integrity

c. Traceability ….ok

d. confidentiality

67. Which of the following service scenarios is the most suitable for terminal to implement
DRX? _SC
a. Intelligent meter reading ..ok

b. video on-live

c. VR gaming

d. Automated driving

68. Which one of the following is the standard configuration for antennas on 5G mobile
phones for commercial use ?_SC
a. 2T2R

b. 4T4R

c. 2T4R _Ok

d. 4T4R

69. Which of the following statements is correct about the 5G service -oriented
architecture? _SC
a. Service-based interface

b. Network service are not open to external system _OK

c. Network functions are decoupled and modularized


d. Network function are combined and deployed as required

70. which of the following chips is the world’s first commercial single -chip multi-mode
(2g/3g/4g/5g)5g modem? _SC
a. Balog 5000 ..Ok

b. 5X50/X55

c. CXMM-8160

d. D.Exynos 5510

71. 3G significantly promotes the development of smart healthcare .which of the following
application scenarios is the most demanding? _SC
a. A.remote consultation. …. ok

b. patient locating

c. remote surgery _Ok

d. wireless monitoring

72. Which of the following companies the claimed that it will no longer develop 5G
terminal baseband chipsets?_SC
a. QUALCOMM

b. Huawei

c. intel …… ok

d. Samsung

73. Which of the following statements is correct about data splitting with Option 3x? _SC
a. Bearer-bases data splitting

b. Data splitting on the gNodeB side _OK

c. Direct data splitting by the EPC

d. Data splitting on the eNodeB side

74. Which of the following medical applications does not need to be supported by 5G? _SC
a. Remote B-scan

b. Remote robot endoscope

c. Remote surgery

d. Patient locating _Ok

75. Which of the following is the recommended position for deploying the user data
processing module for automated driving? _SC
a. Edge cloud _Ok
b. Regional Cloud

c. Core cloud

d. Access network

76. Which one the following 5G terminals converts 5G signals into Wi -Fi signals
for WTTx services? _SC
a. Router

b. CPE _Ok

c. Smartphone

d. Mifi.

77. Which of following is the 5G IoV alliance organization?


a. OTSA

b. X.lab

c. 5GAA ….ok

d. 3GPP

78. Which of the following companies has claimed that it will no longer develop 5G
terminal baseband chipsets?
a. Intel .. Ok

b. Samsung

c. Huawei

d. Qualcomm

79. Which of the following medical applications does not need to be supported by 5G?
a. Patient Locating .. Ok

b. Remote surgery

c. Remote robot endoscope

d. Remote B-scan

80. In the IMT2020 vision, which of following is correct ratio of 5G servic e delay to the 4G
service delay?
a. 1/100

b. 1/20

c. 1/10

d. 1/50 ….ok
81. Which of the following is the maximum bandwidth of 5G mmWave defined by 3GPP
release 15 ?
a. 400 MHz ….ok

b. 8.50 MHz

c. 200 MHz

d. 100 MHz

82. Which of the following organization defines 5G standards?


a. 3GPP

b. 3GPP2

c. OTSA

d. JEE

83. Which of the following is a new service in the 5G era?


a. SMS

b. High-reliability and low-latency services ……ok

c. Mobile internet

d. N8-LoT

84. Which of following coding schemes is predominantly used for traffic channel in 5G?
a. palor code

b. turbo coding

c. convolutional code

d. LDPC ……ok

85. Which one of the following serves the main application service for 5G in early
deployment phase in European union and the united states?
a. internet of vehicle (IoV)

b. cloud VR

c. FWA (home broadband access) ._Ok

d. smart manufacturing

86. Which of following V2X service statements is incorrect?


a. centralized deployment ….. ok

b. third-party algorithm deployment framework

c. centimeter level positioning

d. capable of evolution to cooperative automated driving

87. Which one of the following levels of precision are possible with the 3G+RTK
function?
a. to the centimeter

b. to the meter

c. to the submitter ._Ok

d. to the millimeter

88. Which of the followin g is the maximum round trip time (RTT) of 5G -V2X?
a. 10ms

b. 5ms

c. 20ms ._Ok

d. 50ms

89. Significantly promotes the development of smart care. Which of the following
application scenarios in the most demanding?
a. Wireless monitoring

b. Remote surgery ._Ok

c. patient locating

d. Remote construction

90. Which of the following is the rate of reliability for cooperative automated driving
a. 0.99999% ._Ok

b. 0.9999%

c. 0.9999999%

d. 0.999%

91. Which of the following is the maximum round trip time (RTT) of 5G -V2X?
a. 10ms

b. 5ms

c. 20ms ._Ok

d. 50ms

92. Which of the following is minimum latency requirement of 1080p cloud games?
a. 100 ms …ok

b. 1s

c. 1ms

d. 10ms

93. Which one of the following serves the main application service for 5G in early
deployment phase in european union and the united states?
a. internet of vehicle (IoV)
b. cloud VR

c. FWA (home broadband access) ._Ok

d. smart manufacturing

94. Which of the following 5G service application does unmanned aerial vehicle (UAV) refer
to?
a. SMART grid

b. AUTOMATED DRIVING

c. IoT

d. Drone ._Ok

95. Which following 5G scenario specification is predominately completed in the 3GPP


R15 version
a. mMTC

b. uRLLC

c. eMBB ._Ok

d. MBB

96. What is the maximum throughput provide by 5G in the eMBB application scenario in
IMT-2020 vision?
a. 10Gbps ._Ok

b. 100Mbps

c. 1Gbps

d. 100Gbps

97. Which of the following is the key technology to enhance high -altitude coverage 5G
network?
a. UL and decoupling

b. f-OFDMA

c. 256QAM

d. Massive MIMO ._Ok

98. Which of the following architectures can be used with the multi -stream aggregation
(MSA) technology to implement coordination between LTE and 5G?

a. option2

b. option3x ._Ok

c. option 3 ._Ok

d. option 3a ._Ok
99. internet of vehicles (IOV), requires coordination of network intelligence from
vehicle-mounted information service to intelligent transportation

a. true ._Ok

b. false

100. Which of the following is the main advantage of using massive MIMO over
traditional MIMO
a. diversity gain

b. 3d beamforming gain ._Ok

c. single-channel array gain

d. multiplexing gain

101. Which of the following operation in remote s urgery require network support?
a. operational control ._Ok

b. real-time construction audio video

c. control desktop

d. surgery footage

102. Which one of the following can be achieved with level 3 of automated driving?
a. occasional automatic intervention driving

b. auxiliary functions such as driving reminder

c. Conditional automated driving requiring continuous from the driver …..ok

d. autonomous driving

103. Which one of the subcarriers spa cing yield the highest spectral efficient for 5G
cells on 50MHz bandwidth?
a. 15kHz ….ok

b. 60kHz

c. 30KHz

104. Which one of the following solutions cannot reduce end -to-end delay?
a. RTT optimization over the air interface

b. using a low latency bearer network

c. control and user plane separation (CUPS) on the core network

d. large-capacity spectrum bandwidth …. ok

105. Which of the following is not an advantage of a thin client in the cloud x se rvice?
a. low cost

b. mobile

c. efficient storage ….ok


d. easy deployment and management

106. Which of the following is true 100 Mbps eMBB service?


a. tik tok

b. face time

c. 1080 video

d. 8k VR

107. Which one of the following solution cannot reduce end -to-end delay ?
a. large-capacity spectrum bandwidth ….. ok

b. control and user plane separation ( CUPS) on the core network

c. RTT optimization over the air interface

d. using a low-latency bearer network

108. In an industrial internet, sensors are used to monitor the status. which one of the
following is the network requirement case?
a. massive connections ….ok

b. high reliability

c. low delay

d. large bandwidth

MULTIPLE CHOICE
109. Which of the following are major challenges in the 5G era? -MC
a. Explosive increase of connected devices ..Ok

b. Ultra-Low latency for communication between vehicles ..Ok

c. Fast handover on mobile networks

d. Surging increase of MBB data traffic ..Ok

110. Which of the following items are included in the 5G phase 3 test led by IMT -
2020 (5G) promotion Group? –MC
a. Field test of the NSA architecture.

b. Inter-vendor compatibility test.

c. Indoor test of the SA architecture ..Ok

d. Field test of the SA architecture ..Ok

111. Which of the following is the pain points relating to PC gaming Experience? -MC
a. Low Hardware investment

b. No anywhere anytime access .. Ok


c. Piracy ..Ok

d. High Software price .. OK

112. 5G can achieve reliable and controllable 5A ubiquitous communication between


humans, between humans and things, between things Other than “anytime” and
“Anywhere”. Which other three options are part of the 5G concept? –MC // 5A=
Anyone, Anytime, Anything, Anywhere ,Any-device
a. Anyone .. Ok

b. Anyhow .. Ok

c. Any device .. Ok

d. Anything.. Ok

113. Which of the following are members of the 5G Open Trial Specification Alliance
(OTSA)? -MC
a. SKT .. Ok

b. Vodafone

c. Verizon .. Ok

d. DCM .. Ok

114. Which of the following are the key requirements of power distribution
automation on communication networks? -MC
a. Millisecond-level Ultra-low latency .. Ok

b. High isolation .. Ok

c. High reliability .. Ok

d. Ultra-high bandwidth

115. Which of the following belong to 5G NSA networking? MC


a. Options 2 // SA (NGC)

b. Option 3x .. Ok (CP will eNodeB, UP will be by gNodeB which is directly connect to EPC)

c. Option 3a .. Ok (Data rendering CP for eNodeB, UP => EPC statically)

d. Option 3 .. Ok //early drop family (Every thing will be on LTE eNodeB)

// Option 4 -> (CP will be NGC, UP will be shared eNodeB and gNodeB)

// Option 4a-> (Data rendering CP for eNodeB, UP => EPC statically)

// option 7-> (LTE will be dependent on 5G network.

116. Which of the following benefits does 5G bring to automated driving? –MC
a. Removing single-vehicle intelligence and achieving intellegetn coordination. ..Ok

b. Interactive perception and experience improvement. ..OK


c. Low latency. Reducing read uncertainty ..Ok

d. Making up for the constraints on sensors due to distance and environment. ..Ok

117. In the following terminal m oving speeds are supported for 5G? -MC
a. 300 Km/h .. Ok

b. 500 Km/h .. Ok

c. 600 Km/h

d. 400 km/h .. Ok

118. Which of the following massive MIMO statements are correct? -MC
a. Massive MIMO uses Large-scale antenna arrays ..Ok

b. Massive MIMO improves capacity of a single call .. Ok

c. Only horizontal beamforming is available

d. Legacy wide beams are replaced with narrow beams by adjusting then beam weight. ..Ok

119. Which of the following are disadvantages of using drones on 4G communication


networks? –MC
a. Delivering flight control command is slow. ..Ok

b. The signal strength is dtrong when lower the 120 from the ground but the connection
is easly lost when the height exceeds 120m. ..Ok

c. The uplink data rate is low. _Ok

d. The drone height is not within the mail lobe of the ground station antenna. The air signals are
in disarray. There is no primary coverage cell. Frequent handovers caus significant downlink
interference for terminals. ..OK

120. Which of the following security technologies are used on a 5G network? -MC
a. End-to-end security protection between PLMNs . _Ok

b. 256-bit encryption algorithm. _OK

c. Integrity protection on the user plane over the air interface. ..Ok

d. Encrypted IMSI transmission. _Ok

121. Which of the following are 5G technologies defined in 3GPP release 15? _MC
a. Massive MIMO _OK

b. Flexible sub-frame structure _OK

c. New mutli-access technology

d. New waveform _Ok

122. Which of the following URLLS statements are correct? _MC


a. In mid-2018, 3GPP release completed the URLLC basic version, By the end of 2019, the
completed version of 3GPP release 16 was provided. _Ok

b. The typical application scenarios of URLLS include automated driving, drones, and
telemedicine. _Ok

c. URLLS services require a delay of less than 10 ms _OK

d. URLLS mainly considers the requirements on network delay. _Ok

123. Which of the following technical solutions reduce the 5G delay? _MC
a. Shortening the resource allocation interval _Ok

b. Dynamic uplink and down link resources allocation _Ok

c. F-FDMA

d. D2D communication _Ok

124. Which of the following are pain points relating to PC gaming experience? _MC
a. High software price _OK

b. Piracy ..Ok

c. No anywhere anytime access _OK

d. Low hardware investment

125. Which of the following NSA networking statements are correct? _MC
a. Capable of provisioning new services such as URLLC

b. LOW Investment in the initial phase of 5G deployment _OK

c. Requiring continuous coverage provided by the 5G base solutions

d. Deployment based on legacy 4G networks _Ok

126. Which of the following URLLS statements are correct? _MC


a. URLLS mainly considers the requirements on network delay. _ok

b. URLLC service require a delay of less than 10 ms. _Ok

c. The typical application scenario of URLLS include automated driving. ,drones ,and
telemedicine. _Ok

d. In mid-2018, 3GPP release 15 completed the URLLS basic version by the end of 2019, the
completed version of 3GPP release 16 was provided _Ok

127. Which of following are advantages of accessing 5G at ? _MC


a. Higher reliability than optical fibers

b. Flexible deployment …..ok

c. optical fiber-class rate…..ok


d. Rapid deployment and go-to-market …..ok

128. Compared with traditional plat preservation which of the following advantages
does drone-based plant preservation have? _MC
b. higher efficiency than manual operations ….ok

c. 30% less medicine is used, saving water and protecting the environment. …ok

d. precise operation ….ok

e. high security due to man-machine separation ….ok

129. Which of the following are the development phases of C -V2X?


a. GSM-V2X

b. LTE-V2X….ok

c. 5G=V2X…..ok

d. UMTS-V2X

130. Which or the following are members of the 5G open trail specification Alliance
(OTSA) ?
a. SKT…..ok

b. Vodafone

c. Verizon….ok

d. DCM…ok

131. Which of following are the key of intelligent distributed power distribution
automation on commination network?
a. Millisecond-level ultra-low latency …..ok

b. high isolation ….ok

c. high reliability….ok

d. massive access form tens of millions of terminals

132. Which of the following are advantages of accessing 5G at home?


a. rapid deployment and go to market ……ok

b. optical fiber-class rate ……ok

c. higher reliability than optical fiber

d. flexible deployment ……ok

133. Which of the following scenarios involve edge computing?


a. AR

b. IOT

c. Auxiliary sensitive computing.

d. Iov
134. Which of the following NSA networking statement are correct?
a. deployment based on legacy 4G networks

b. requiring continues coverage provide by 5G base stations

c. capable of provisioning new services such as URLLC

d. low investment in the initial phase of 5G deployment

135. which of the following loV application scenarios con be impl ement by 5G-V2X?
a. in vehicle infotainment (IVI)….ok

b. Visualized traffic operation and scheduling …..ok

c. door-to-door traffic information service

d. vehicle-road coordination ….ok

136. which of the following options are supported by 3GPP release lateDrope?
a. option2

b. option2. _Ok

c. Option3

d. option7. _Ok

137. which of the following are service seniors where VR is predominately used?
a. industrial manufacturing

b. Gaming ._Ok

c. Video ._Ok

d. Education ._Ok

138. Which of the following benefits are bought by 5G to doctors and patients?
a. more efficient and timely ._Ok

b. more secure

c. more economical ._Ok

d. solving the shortage medical staff ._Ok

139. Which of the following are commercial product in the 5G terminal industry
a. vehicle-mounted mobile module ._Ok

b. mobile handheld ._Ok

c. mobile MiFi hotspot device

d. home cpe gateway ._Ok

140. Which of the following are commercial products in the 5G terminal industry?
a. vehicle-mounted mobile module ._Ok

b. mobile handheld terminal ._Ok


c. mobile MIFI hotspot device

d. home CPE gateway ._Ok

141. Which of the following are points of electronic power telecommunication?


a. public network GPRS with low rate and long delay unable to
provision telecontrol, tele indication and telemetering, slow fault locating ._Ok

b. high cost for monitoring service carried by operator 4G network

c. low security and reliability of electric power services carried on public network ._Ok

d. incapable of collecting electric consumption information, costly manual meter reading


._Ok

142. Which of the following advantages are experienced by cloud game user?
a. no need to buy expensive hardware

b. game playing anytime withing waiting free of installation, upgrade or maintenance.

c. cloud archiving available anytime allowing seamless switchover between different


devices

d. gaming running on the cloud, which facilitates copyright protection

143. Which of the following statement is correct about data splitting with option 3x?
a. data splitting on the eNodeB side

b. direct data splitting by EPC

c. data splitting on the gNodeB side._Ok

d. bearer-based data splitting


HCIA-AI (Artificial Intelligence)
48. Python regular expressions are a special sequence of characters that makes it easy to check if
a string matches a pattern

A. True (Right Answers)


B. False

Answer: A

47. Which of the following products is related to artificial intelligence? (Multiple Choice)

A. Alpha Go (Right Answers)


B. Self-driving (Right Answers)
C. Voice input (Right Answers)
D. Huawei Mate mobile phone (Right Answers)

Answer: ABCD

49. What operating systems does Python support'? (Multiple Choice)

A. DOS (Right Answers)


B. Linux (Right Answers)
C. Mac OSX (Right Answers)
D. Windows (Right Answers)

Answer: ABCD

50. Which of the following about the description of the number of rows and columns for the
determinant is correct'?

A. The number of rows is greater than the number of columns


B. The number of rows is equal to the number of columns (Right Answers)
C. The number of rows is less than the number of columns
D. The number of rows has no relationship with the number of columns

Answer: B

43. Machine Learning Service is a data mining and analytics platform service that helps users
quickly discover data patterns and build predictive models through machine learning techniques
and deploy them as predictive analytics solutions

A. True (Right Answers)


B. False Answer: A
44. Which of the following about the description of expectations and variances is incorrect?

A. Expectation reflects the average level of random variable values


B. The variance reflects the degree of deviation between the random vanable and its
mathematical expectation
C. Expectation and variance are both nominal characteristics of random variables
D. The greater the expectation, the smaller the variance (Right Answers)

Answer: D

45. The Python dictionary is widely identified by " {} and the internal data consists of the key
and its corresponding value

A. True (Right Answers)


B. False

Answer: A

46. Which of the following options is not a tensor attribute?

A. Name (Logo)
B. Shape (Dimensionality)
C. Type (Type)
D. Node (Node) (Right Answers)

Answer: D

40. Which of the following conditions is not a condition that n-fold Bernoulli trials need to meet?

A. Each test was repeated under the same conditions


B. There are only two possible outcomes for each trial, i.e. event A occurs and event A does
not occur
C. Each test itself is obeying normal distribution (Right Answers)
D. The results of each tnal are independent of each other

Answer: C

41. The Python language can use multiple statements on the same line, separated by commas

A. True
B. False (Right Answers)

Answer: B
42. Which of the following files is the graph structure of TensorFlow saved in?

A. checkpoint file
B. index file
C. cpkt file
D. metafile (RightAnswers)

Answer: D

37. Which of the following about the dictionary in Python is correct? (Multiple Choice)

A. Each key and its corresponding value need to be separated by (Right Answers)
B. Separate the different key-value with (Right Answers)
C. The entire dictionary is included in the "{} " (Right Answers)
D. The keys of the dictionary are unique and the data type is uniform (Right Answers)

Answer: ABCD

38. The determinant of square matrix A is a scalar

A. True (Right Answers)


B. False

Answer: A

39. Which of the following about the gradient descent is incorrect?

A. Random gradient descent is a commonly used one in gradient descent


B. Gradient descent includes random gradient descent and batch gradient descent
C. The gradient descent algorithm is fast and reliable (Right Answers)
D. Random gradient descent is one of the commonly used optimization algorithms in deep
learning algorithms

Answer: C

34. Which of the following conditions do the randomized trials need to meet? (Multiple Choice)

A. It can be repeated under the same conditions (Right Answers)


B. There may be more than one possible outcome for each trial and all possible
outcomes of the tnal can be clarified in advance (Right Answers)
C. All results of the test cannot be clarified in advance
D. It is not possible to determine which result will appear before conducting a test
(Right Answers)

Answer: ABD
35. In a neural network, knowing the weight and deviations of each neuron is the most important
step if you know the exact weights and deviations of neurons in some way. you can approximate
any function. What is the best way to achieve this?

A. Random assignment, pray that they are correct


B. Search for a combination of weight and deviation until the best value is obtained
C. Assign an initial value to iteratively update weight by checking the difference
between the best value and the initial. (Right Answers)
D. The above is not correct

Answer: C

36. What are the regularizations in deep learning? (Multiple Choice)

A. L1 norm, L2 norm (Right Answers)


B. Data set enhancement (Right Answers)
C. Integration method (Right Answers)
D. Dropout (RightAnswers)

Answer: ABCD

29. Which of the following data types does Tensor Flow not support?

A. int8
B. float32
C. double64 (Right Answers)
D. bool

Answer: C

30. In TensorFlow. data is represented in the form of tensors and calculation charts

A. True
B. False (Right Answers)

Answer: B

31 Python is a fully object-oriented language Which of the following options belong to the
Python object? (Multiple Choice)

A. Function (Right Answers)


B. Module (Right Answers)
C. Number (Right Answers)
D. Character string (Right Answers)

Answer: ABCD
32. Which of the following options belong to Tensor Flow concept? (Multiple Choice)

A. Tensor (Right Answers)


B. Vanables (Right Answers)
C. Placeholder (Right Answers)
D. Operation (Right Answers)
E. Conversation (Right Answers)

Answer: ABCDE

26. Deep learning algorithms can be divided into supervised learning and unsupervised learning

A. True (Right Answers)


B. False

Answer: A

27. The matrix produced by the exchange of matrix A rows and columns is called the transpose
of A What are the correct properties of matrix transposition? (Multiple Choice)

A. (A T) T = A (Right Answers)
B. (A + B) T = AT +BT (Right Answers)
C. (!EA) T = JEAT (Right Answers)
D. (AB) T = A T +BT

Answer: ABC

28. What quotation marks can the Python language use? (Multiple Choice)

A. Single quotes (Right Answers)


B. Double quotes (Right Answers)
C. Three quotes (Right Answers)
D. Four quotes

Answer: ABC

21. The Python list can be identified by " [] ", and the default index of the first element from left
to right is 1

A. True
B. False (Right Answers)

Answer: B
22. What are the core concepts in TensorFlow? (Multiple Choice)

A. Gridding
B. Calculation Chart (Right Answers)
C. Dot Product
D. Tensor (Right Answers)

Answer: BD

23. Which of the following is not included in the recurrent neural network usage scenario?

A. Machine translation
B. Speech recognition
C. Image style migration (Right Answers)
D. Text generation

Answer: C

24. Numerical calculations refer to the method and process of effectively using the digital
computer to solve the approximate problem of mathematical problems, and the discipline
consisting of related Theories. Which of the following processes are involved in solving actual
problems with a computer? (Multiple Choice)

A. Know the actual problem (Right Answers)


B. Mathematical model (Right Answers)
C. Numerical calculation method (Right Answers)
D. Programming (Right Answers)
E. Computer calculation results (Right Answers)

Answer: ABCDE

25. Which of the following is not the difference between Python 2 and Python 3?

A. print
B. Unicode
C. import (Right Answers)
D. xrange

Answer: C
16. What of the following does belong to convolutional neural network (CNN)? (Multiple
Choice)

A. VGGNet (Right Answers)


B. ResNet (Right Answers)
C. AlexNet (Right Answers)
D. GoogleNet (RightAnswers) Answer: ABCD

17. What is wrong description of the normal distribution?

A. In natural phenomena and social phenomena, many random variables obey or


approximate a normal distribution
B. The normal distribution takes the maximum value at the mean
C. The larger the standard deviation, the steeper the normal distribution curve (Right
Answers)
D. The larger the standard deviation, the slower the normal distribution curve

Answer: C

18. Which of the following options is not a reason for traditional machine learning algorithms to
promote the development of deep learning?

A. Dimensional disaster
B. Local invanance and smooth regulanzation
C. Manifold learning
D. Feature Engineering (Right Answers)

Answer: D

19. The commonly used functions for mathematical operations in Python are basically in the
math module and the cmath module

A. True (Right Answers)


B. False

Answer: A

20. What does not belong to supervised learning?

A. Logistic regression
B. Support vector machine
C. Decision tree
D. Principal component analysis (Right Answers)

Answer: D
12. There are many commercial applications for machine learning services What are the main
business scenarios covered? (Multiple Choice)

A. Financial product recommendation (Right Answers)


B. Predictive maintenance (Right Answers)
C. Telecom customer retention (Right Answers)
D. Retailer grouping (Right Answers)

Answer: ABCD

13. What is wrong description of the Python module?

A. The Python module is a Python file that ends with py and contains Python object
definitions and Python statements
B. The Python module allows you to logically organize your Python code snippets
C. Python modules can define functions, classes, and variables, but the module does not
contain executable code (Right Answers)
D. Assigning relevant code to a module can make your code better and easier to understand

Answer: C

14. Which of the following options is not the session mode used by TensorFlow?

A. Explicitly call the session to generate function


B. Explicitly call the session to close function
C. Through the Python context manager
D. Multiple POST queries (Right Answers)

Answer: D

15. Principal Component Analysis (PCA) is a statistical method A set of variables that may be
related to each other is transformed into a set of linearly related variables by orthogonal
transformation The converted set of variables is called the principal component

A. True
B. False (Right Answers)

Answer: B

9. Python tuples are identified by "0" and internal elements are separated by

A. True
B. False (Right Answers)

Answer: B
10. What are the numeric types of Python? (Multiple Choice)

A. int (integer type) (Right Answers)


B. long (long integer type) (Right Answers)
C. float (floating point type) (Right Answers)
D. complex (complex number type) (Right Answers)

Answer: ABCD

11. What is the English abbreviation for Al?

A. Automatic Intelligence
B. Artrfical Intelligence (Right Answers)
C. Automatic Information
D. Artrfical Information

Answer: B

8. There are a lot of data generated during the training of the neural network What mechanism
does TensorFlow use to avoid excessive input data?

A. Client
B. feed
C. placeholder (Right Answers)
D. fetch

Answer: C

7. The history of robots is not long In 1959, the United States. Engelberg and Devol made the
world’s first generation of industrial robots, and the history of robots really began

According to the development process of the robot, it is usually divided into three generations,
respectively are (Multiple Choice)

A. Teaching Reproduction Robot (Right Answers)


B. Robot with sensation (Right Answers)
C. Robots that will think
D. Intelligent robot (Right Answers)

Answer: ABD
2. Functions are well-organized, non-reusable code segments used to implement a single, or
associated function

A. True
B. False (Right Answers)

Answer: B

3. What is wrong description of back propagation?

A. The learning process of the back propagation algorithm consists of a forward propagation
process and a back-propagation process
B. The back propagation algorithm is a learning algonthm suitable for multi-layer neural
networks, which is based on the gradient descent method
C. The back propagation phase sends training inputs to the network to obtain an
stimuli response (Right Answers)
D. The back propagation algorithm is mainly repeated by two loops (excitation propagation,
weight update) until the response of the network to the input reaches the predetermined
target range

Answer: C

4. In May 1997. the famous "Human-Machine Wars" final computer defeated Kasparov, the
world chess king, with a total score of 3 5 to 2 5 Is this computer called?

A. Dark blue (Right Answers)


B. Dark green
C. Ponder
D. Blue sky

Answer: A

5. What are the service categories included in Huawei Cloud El Enterprise Intelligence?
(Multiple Choice)

A. El visual cognition (Right Answers)


B. El online games
C. El speech semantics (Right Answers)
D. El industry scene (Right Answers)

Answer: ACD
6. As the following, what are the Python language design philosophy? (Multiple Choice)

A. Beautiful (Right Answers)


B. Expensive
C. Explicit (Right Answers)
D. Simple (RightAnswers)

Answer: ACD

1. What is the subject of artificial intelligence?

1. Mathematics and Physiology


2. Psychology and Physiology
3. Linguistics
4. Comprehensive interdisciplinary and marginal disciplines (Right Answers)

Answer: D

33. The following are the description of the distribution function, distribution law. and density
function of random variables, which is incorrect?

A. Distribution law can only describe the value rule of discrete random variables
B. The density function can only describes the value rule of continuous random vanables
C. Discrete random variables have no distribution function (Right Answers)
D. Distribution function describes the value rule of random variables

Answer: C

98. Which of the following description of the validation set is wrong?

A. The verification set can coincide with the test set. (Right Answers)
B. The test set can coincide with the training set
C. The subset used to pick hyperparameters is called a validation set
D. Typically 80% of the training data is used for training and 20% is used for verification.

Answer: A

99. Which of the following can optimization problem be classified according to the constraints?
(Multiple choice)

A. equality constraints (Right Answers)


B. Inequality constraints (Right Answers)
C. Unconstrained conditions (Right Answers)
D. Semi-constraint conditions

Answer: ABC
100. Which of the following are the characteristics of the Python language? (Multiple choice)

A. Explanatory (Right Answers)


B. Process onented
C. Object-oriented (Right Answers)
D. Dynamic data type (Right Answers)

Answer: ACD

95. The timestamps in the Python language are represented by how long fin seconds) elapsed
from midnight (epoch) on January 1. 1970

A. True (Right Answers)


B. False

Answer: A

96. Convolutional neural networks are more suitable for dealing with speech recognition
problems

A. True
B. False (Right Answers)

Answer: B

97. What are the results returned by the if conditional statements in the Python language*?
(Multiple choice)

A. TRUE (Right Answers


B. 0
C. FALSE
D. Null

90. TensorFlow is the second generation of artificial intelligence learning system developed by
Google based on ().

A. DistBelief (Right Answers)


B. PaleyFunction
C. ConvexOne
D. Infinity
Answer: A
91. The Python language can use the "#" at the beginning of a single line of code for code
comments

A. True (Right Answers)


B. False

Answer: A

92. According to the definition of information entropy, what is the bit entropy of throwing a
uniform coin?

A. 0
B. 05
C. 1 (Right Answers)
D. . -1

Answer: C

93. Artificial intelligence is currently suitable for scenarios with {’known environment, clear
objectives, and predictable actionsji Deep learning in the fields of image recognition, speech
recognition, translation, etc . artificial intelligence basically has human recognition ability even
surpassing human beings Based on these capabilities it has been applied to many scenes, such as
medical care and public safety However, there is still a lack of reasoning and cognition

A. True (Right Answers)


B. False

Answer: A

94. Python authors deliberately design very restrictive grammars that make bad programming
habits (such as the next line of if statement not indented to the right) cannot be compiled

A. True (Right Answers)


B. False

Answer: A

86. What model is not a cyclic neural network*?

A. RNN
B. LSTM
C. GBDT (Right Answers)
D. GRU

Answer: C
87. Under the large-scale relationship analysis scenario, which of the following options does not
belong to the three high demands of massive relationship processing?

A. Efficient relationship discovery data for massive data


B. Efficient shanng of massive data (Right Answers)
C. Efficient storage and access requirements for massive amounts of data
D. High scalability and high availability requirements for relational analysis platforms

Answer: B

88. What are the commonly used loss functions7 (Multiple choice)

A. Mean variance (Right Answers)


B. Sigmoid cross entropy (Right Answers)
C. Soft max cross entropy (Right Answers)
D. Sparse cross entropy (Right Answers)
E. Weighted Sigmoid Cross Entropy (Right Answers)

Answer: ABCDE

89 What are the steps that are not part of the operation of a Python file object?

A. open
B. delete (RightAnswers)
C. read
D. write
E. close

Answer: B

81. The for loop statement in the Python language can iterate through the items in any sequence

A. True (Right Answers)


B. False

Answer: A

82. Convolutional neural networks are more suitable for image recognition problems than cyclic
neural networks

A. True (Right Answers)


B. False

Answer: A
83 Huawei Cloud El builds enterprise intelligence services based on three-tier services Which of
the following options does not belong to Layer 3 services?

A. Basic platform services


B. General domain services
C. Industry sector services
D. Integration services (Right Answers)

Answer: D

84. Which of the following is true about unsupervised learning?

A. Unsupervised algorithm only processes "features" and does not process "tags"
(Right Answers)
B. Dimensionality reduction algonthm is not unsupervised learning
C. K-means algorithm and SVM algorithm belong to unsupervised learning
D. None of the above

Answer: A

85. Which of the following options is not the TensorFlow build process9

A. Building a calculation chart


B. Input tensor
C. Generate a session
D. Update weights (Right Answers)

Answer: D

77. TensorFlow Operations and Computation Graph are not - run in the Session

A. True
B. False (Right Answers)

Answer: B

78. What is in the category of artificial intelligence7 (Multiple choice)

A. Action (Right Answers)


B. Perception (Right Answers)
C. Cognition (Right Answers)
D. None of the above

Answer: ABC
79. The Python language does not allow embedding another loop body in a loop body

A. True
B. False (Right Answers)

Answer: B

80. What are the mainstream deep learning open source tools? (Multiple choice)

A. TensorFlow (Right Answers)


B. Caffe (Right Answers)
C. Torch (Right Answers)
D. Theano (Right Answers)
E. Scikit-leam

Answer: ABCD

73. X. Y are random variables. C is a constant, the nature of the difference in the following
options, which is wrong? (Multiple choice)

A. D(C)=0
B. D(X+Y)=D(X)+D(Y) (RightAnswers)
C. D(CX)=C*C*D(X)
D. D(XY)=D(X)D(Y) (RightAnswers)

Answer: BD

74. Vector is a number

A. True
B. False (Right Answers)

Answer: B

75. About Bayesian formula P(W|X)=P(X|W)‘P(W)/P(X) What is the correct description?

A. P(W|X) is a prior probability


B. P(X|W) is a conditional probability (Right Answers)
C. P(W) is the postenor probability
D. P(X) is the posterior probability

Answer: B
76. Cyclic neural networks are more suitable for dealing with image recognition problems

A. True
B. False (Right Answers)

Answer: B

69. As shown below, which is the following matrix A characteristic value? (Multiple choice)

A. 2 (Right Answers)
B. -2
C. -4
D. 4 (Right Answers)

Answer: AD

70.Only matrix A and matrix B have the same number of rows and columns. A and B can be
added

A. True (Right Answers)


B. False

Answer: A

72. which of the following are the cloud services provided by Huawei Cloud El Visual
Cognition'? (Multiple choice)

A. Text recognition (Right Answers)


B. Face recognition (Right Answers)
C. Image recognition (Right Answers)
D. Content detection (Right Answers)
E. Image processing (Right Answers)

Answer: ABCDE

64. Which of the following are the characteristics of TensorFlow? (Multiple choice)

A. Open source (Right Answers)


B. Convenience (Right Answers)
C. C Mature (RightAnswers)
D. Flexible (RightAnswers)

Answer: ABCD
65. Which is the correct description of the Python creation function? (Multiple choice)

A. The function created starts with the def keyword followed by the function name and
parentheses. (Right Answers)
B. The parameters need to be placed in parentheses (Right Answers)
C. The function content starts with a colon and needs to be indented (Right Answers)
D. Return the result with return and the function ends (Right Answers)

Answer: ABCD

66. About Python correct tuple which is correct description1? (Multiple choice)

A. The difference between a list and a tuple is that the elements of the tuple cannot be
modified (Right Answers)
B. The list uses square brackets, and the tuple uses parentheses (Right Answers)
C. Tuple creation is very simple, just add elements in parentheses and separate them
with commas (Right Answers)
D. When a tuple contains only one element, you need to add a comma after the
element. j£ (Right Answers)

Answer: ABCD

67. What research areas does artificial intelligence have? (Multiple choice)

A. Natural language processing (Right Answers)


B. Computer Vision (Right Answers)
C. Machine learning (Right Answers)
D. Speech recognition (Right Answers)

Answer: ABCD

68. TensorFlow supports multi-TPU cluster computing

A. True (Right Answers)


B. False

Answer: A

59. The trace operation returns the sum of the diagonal elements of the matrix Therefore, the
trace of matrix A and its transposed matrix are equal

A. True (Right Answers)


B. False

Answer: A
60. GAN is a deep learning model and one of the most promising methods for unsupervised
learning in complex distribution in recent years

A. True (Right Answers)


B. False

Answer: A

61. Which of the following options is not central to linear algebra?

A. Probability theory (Right Answers)


B. Linear transformation
C. Matrix theory
D. Vector space

Answer: A

62. A scalar k is multiplied by matrix A equal to k and each of the numbers in A is multiplied

A. True (Right Answers)


B. False

Answer: A

63. What are the conditions for m row n column matrix A and p row q column matrix B to be
multiplied9

A. m=p. n=q
B. n=p (Right Answers)
C. m=n
D. p=q

Answer: B

54. What are the commonly used activation functions? (Multiple Choice)

A. sigmoid (Right Answers)


B. tanh (Right Answers)
C. relu (RightAnswers)
D. danish

Answer: ABC
54. What are the commonly used activation functions? (Multiple Choice)

A. sigmoid (Right Answers)


B. tanh (Right Answers)
C. relu (RightAnswers)
D. danish

Answer: ABC

56. What is the incorrect relationship between neural networks and deep learning?

A. The concept of deep learning stems from the study of artificial neural networks.
B. A neural network algorithm with multiple hidden layers is a deep learning algorithm
C. Single layer neural networks are also a type of deep learning (Right Answers)
D. Convolutional neural networks are a type of deep learning

Answer: C

57. Which of the following environments does not support to install the TensorFlow?

A. Linux
B. Mac OS
C. Docker
D. OpenStack (RightAnswers)

Answer: D

58. Deep learning is a branch of machine learning

A. True (Right Answers)


B. False

Answer: A

51. Deep learning makes it easy to derive simple mathematical functions from a large amount of
high-dimensional data to describe complex decision interfaces

A. True
B. False (Right Answers)

Answer: B
52. Which of the following does not belong to automatic hyper parameter optimization
algorithm?

A. Grid search
B. Random gradient descent (Right Answers)
C. Random search
D. Model-based hyper parameter optimization

Answer: B

53. What are the characteristics of Python code? (Multiple Choice)

A. legibility (RightAnswers)
B. Simplicity (Right Answers)
C. Rapidity
D. Scalability (RightAnswers)

Answer: ABD

149. How many spaces does PEP 8 stipulate that Python's first line indentation needs to indent?

A. 1
B. 2
C. 4 (Right Answers)
D. 8

Answer: C

150. What are the Python language data types'? (Multiple Choice)

A. numbers (Right Answers)


B. string (Right Answers)
C. list (Right Answers)
D. tuple (Right Answers)
E. dictionary (Right Answers)

Answer: ABCDE

144. The number of rows and columns of the three matrices A. B. and C is 3 rows and 2
columns. 2 rows. 3 columns. 3 rows and 3 columns, which of the following operations is
meaningful?

A. AC
B. BC (RightAnswers)
C. A+B Answer: B
145. The constituent elements of the Python identifier include numbers, letters, and underscores

A. True (Right Answers)


B. False

Answer: A

146. Which description is wrong about the hyper parameter'?

A. Hyper parameters are parameters that set values before the algorithm begins learning
B. Most machine learning algorithms have hyper parameters
C. Hyper parameters cannot be modified (Right Answers)
D. The value of the hyper parameter is not learned by the algorithm itself

Answer: C

147 Which of the following is not a module in the Tensor Flow library?

A. tf.nn
B. tf layers
C. tf boost (Right Answers)
D. tf.contrib

Answer: C

148. As shown in the figure below, what is the value of the determinant A?

124578369A=

A. 24
B. 18
C. -24
D. 0(RightAnswers)

Answer: D

140. Which is wrong with the Python module time introduction method 9

0 import time
1 from time import *
2 import time as t
3 from time (Right Answers)

Answer: D
141. In what year did Huawei officially provide services in the form of cloud services and
combined with more partners to provide richer artificial intelligence practices?

A. 2002
B. 2013
C. 2015
D. 2017 (Right Answers)

Answer: D

142. Which description is wrong about the lambda function of the Python language?

A. lambda is just an expression, and the function body is much simpler than def
B. The body of a lambda can be an expression or a block of code
C. The lambda function can access the parameters in the global namespace
D. The lambda function accepts only one parameter value (Right Answers)

Answer: D

143. The meaning of artificial intelligence was first proposed by a scientist in 1950. and at the
same time a test model of machine intelligence was proposed Who is this scientist?

A. Minsky
B. Zade
C. Turing (Right Answers)
D. Von Neumann

Answer: C

135. Which of the following statement about the matrix is incorrect?

A. The arbitrary matrix is multiplied by the unit matrix and will not change
B. The transpose of the symmetric matrix A is also A itself
C. The transpose of the orthogonal matrix A is equal to the inverse of A
D. There is no inverse matrix for the diagonal matrix. (Right Answers)

Answer: D

136. Which is not a deep learning algorithm?

A. Self-encoder
B. Convolutional neural networks
C. Recurrent neural networks
D. Support vector machine (Right Answers)

Answer: D
137. TensorFlow is Google's first generation of proprietary machine learning systems

A. True
B. False (Right Answers)

Answer: B

138. Which of the following schools does the neural network study belong to?

A. Symbolism
B. Connectionism (Right Answers)
C. Behaviorism
D. None of the above

Answer: B

139. Reducing the gap between the training error and the test error will result in over-fitting How
to prevent over-fitting? (Multiple Choice)

A. Cross validation (Right Answers)


B. Integration method (Right Answers)
C. Increase regulanzation (Right Answers)
D. Feature Engineering (Right Answers)

Answer: ABCD

134. X. Y are random variables. C is a constant, which of the following description about the
nature of the mathematical expectation is incorrect?

A. E(C) = CA. E(C) = C


B. E(X+Y) = E(X)+E(Y)
C. E(CX) = CE(X)
D. E(XY) = E(X)E(Y) (RightAnswers)

Answer: D

133. The correlation coefficient, also known as the linear correlation coefficient, is used to
measure the linear relationship between two variables, which is a real number greater than zero

A. True
B. False (Right Answers)

Answer: B
132. Which of the following neural network structures will share weights? (Multiple choice)

A. Convolutional neural network (Right Answers)


B. Recurrent neural network (Right Answers)
C. Fully connected neural network
D. All of the above

Answer: AB

127. The TensorFlow framework does not support Windows systems

A. True
B. False (Right Answers)

Answer: B

128. Which of the following descriptions of the depth feedforward network is correct?

A. Deep feedforward network is a kind of neural network (Right Answers)


B. The deep feedforward network has only one hidden layer
C. The unit on the hidden layer of the deep feedforward network will have countless
D. Deep feedforward network is used to deal with linear problems

Answer: A

129. The time interval in the Python language is a floating-point fraction in seconds

A. True (Right Answers)


B. False

Answer: A

130. Which of the following is not part of the deep learning development framework'?

A. CNTK
B. Keras
C. BAFA (Right Answers)
D. MXNet

Answer: C
131. Which of the following are included in the application scenarios of TensorFlow? (Multiple
choice)

A. Speech recognition (Right Answers)


B. Face recognition (Right Answers)
C. Image style changes (Right Answers)
D. Autopilot (Right Answers)

Answer: ABCD

123. Self-encoder is an unsupervised learning algorithm

A. True (Right Answers)


B. False

Answer: A

124. The number or matrix is stored in the tensor

A. True
B. False (Right Answers)

Answer: B

125. Which of the following descriptions about the Recurrent Neural Network (RNN) is correct?

A. Can be used to process sequence data (Right Answers)


B. Cannot process vanable length sequence data
C. Unlike convolutional neural networks, parameters of RNN cannot be shared
D. The units above the hidden layer are not associated with each other

Answer: A

126. Artificial intelligence is a new technical science that studies and develops theories, methods
and application systems for simulating, extending and extending human intelligence It is one of
the core research areas of machine learning

A. True
B. False (Right Answers)

Answer: B
118. In order for a machine to be intelligent, it must be knowledgeable Therefore there is a
research field in artificial intelligence, which mainly studies how computers automatically
acquire knowledge and skills to achieve self-improvement. What is the branch of this research
called*?

A. Expert system
B. Machine learning (Right Answers)
C. Neural Network
D. Natural language processing

Answer: B

119. Which of the following descriptions about Python program are correct? (Multiple choice)

A. The program consists of modules (Right Answers)


B. Module contains statements (Right Answers)
C. statement contains an expression (Right Answers)
D. Expressions create and process objects (Right Answers)

Answer: ABCD

120. Huawei Machine Learning Service MLS is a one-stop platform that supports the entire
process of data analysis Which of the following is not a feature of MLS7

A rich library of machine learning algorithms.

machine learning program is intuitive and easy to use

Distributed and scalable big data computing engine

Support for the R language, but does not support the Python language (Right Answers)

Answer: D

121. Training error will reduce the accuracy of the model and produce under-fitting How to
improve the model fit? (Multiple choice)

A. Increase the amount of data (Right Answers)


B. Feature Engineering (Right Answers)
C. Reduce regularization parameters
D. Add features (Right Answers)

Answer: ABD
122. Which of the following is not a way for the Tensor Flow program to read data4?

A. Preload data
B. Feeding data
C. Read from the file
D. Write a file format reader (Right Answers)

Answer: D

113. Which of the following description of the number of rows and columns of the matrix is
correct?

A. The number of rows is greater than the number of columns


B. The number of rows is equal to the number of columns
C. The number of rows is less than the number of columns
D. The number of rows has no relationship with the number of columns. (Right
Answers)

Answer: D

114 Which of the following is the computing model of TensorFlow?

A. Calculation chart (Right Answers)


B. Tensor
C. Conversation
D. Variable Answer: A

115. Which of the following can improve the computational efficiency of the neural network
model? (Multiple choice)

A. TPU (Right Answers)


B. GPU (RightAnswers)
C. FPGA (Right Answers)
D. Large-scale distributed cluster (Right Answers)

Answer: ABCD
116. Which of the following statements about Python are correct? (Multiple choice)

A. Invented in 1989 by the Dutch Guido van Rossum. the first public release was issued
in 1991. (Right Answers)
B. Python is purely free software and the source code follows the GPL (GNU General
Public License) protocol (Right Answers)
C. Python syntax is simple and clean One of the features is to force blank characters to
be used as statement indentation (Right Answers)
D. Python is often nicknamed glue language, which can easily connect various modules
made in other languages (Right Answers)

Answer: ABCD

117. Which of the following does not belong to long-term memory LSTM (Long Short-Term
Memory) network architecture'?

A. Memory door (Right Answers)


B. Forget the door
C. Input door
D. Output door

Answer: A

110. What are the advantages of Python? (Multiple choice)

A. Simple (Right Answers)


B. Free (RightAnswers)
C. High-level language (Right Answers)
D. Rich library (Right Answers)

Answer: ABCD

111. Python script execution mode includes interactive mode and script mode

A. True (Right Answers)


B. False Answer: A

112. Which of the following features does Python support'? (Multiple choice)

A. Inheritance (RightAnswers)
B. Heavy load (Right Answers)
C. Derived (Right Answers)
D. Multiple mhentance (Right Answers)

Answer: ABCD
105. In which year was the first introduction of "artificial intelligence"?

A. 1946
B. 1960
C. 1916
D. 1956 (RightAnswers)

Answer: D

106. Which of the following description about the relationship between the Poisson distribution
and the binomial distribution is correct?

A. The mathematical model of the Poisson distribution and the binomial distribution are
both Lagrangian models
B. Poisson distnbution is an approximation of the binomial distnbution when n is very
large and p is small (Right Answers)
C. Poisson distnbution has no relationship with binomial distribution
D. Poisson distribution can replace binomial distnbution

Answer: B

107. Which of the following is not an artificial intelligence school?

A. Symbolism
B. Statisticahsm (RightAnswers)
C. Behaviorism
D. Connectionism

Answer: B

108. Which of the following does the convolutional neural network structure not include'?

A. Convolutional layer
B. Pooling layer
C. Loop layer (Right Answers)
D. Fully connected layer

Answer: C

109. Which of the following functions can numerically stabilize overflow and underflow*?

A. Softminus function
B. Softplus function
C. Soft max function (Right Answers)
D. Softmin function Answer: C
101. Which of the following are the elements of artificial intelligence9 (Multiple choice)

A. Algorithm (Right Answers)


B. Computing power (Right Answers)
C. Data (Right Answers)
D. Scene (Right Answers)

Answer: ABCD

102. Which of the following is not a specific technology of artificial intelligence?

A. Knowledge map
B. Machine translation
C. Riemann geometry (Right Answers)
D. Semantic understanding

Answer: C

103. Which of the following statements about overflow and underflow in numerical calculations
is correct? (Multiple choice)

A. Underflow occurs when the number close to zero is rounded to zero (Right Answers)
B. Overflow occurs when the number close to zero is rounded to zero
C. Overflow occurs when a large number of levels are approximated as jt> or - jP
(Right Answers)
D. Underflow occurs when a large number of levels are approximated as or - jb

Answer: AC

104. Which of the following description about Python regular expression is not correct?

A. Python has added the re regular expression module since version 1.5.
B. re regular expression module gives the Python language all the regular expression
functionality
C. re regular expressions are powerful tools for working with strings
D. re regular expressions can only process stnng data, not numeric data. (Right
Answers)

Answer: D
171. Which of the following description is wrong about the image recognition cloud service?

A. The service identifies specific objects such as skyscrapers, buildings, and ships.
B. The service can also identify the sea. city, port and other scenes
C. The service can perform semantic analysis on the content in the image to extract labels
with specific abstract meanings
D. The service can provide object and scene labels, and can also provide more
conceptual labels (Right Answers)

Answer: D

169. What is not the optimization method in deep learning?

A. Random gradient descent


B. Back propagation algorithm
C. Principal component analysis (Right Answers)
D. Momentum

Answer: C

170. Information theory is a branch of applied mathematics The main research is to quantify how
much information a signal contains. Who is the first to propose information theory?

A. Minsky
B. Tunng
C. Simon
D. Shannon (RightAnswers)

Answer: D

164. Deep learning is different from machine learning and there are no unsupervised algorithms

A. True
B. False (Right Answers)

Answer: B

165. What are the implementation modes of TensorFlow? (Multiple Choice)

A. Stand-alone mode (Right Answers)


B. Distributed mode (Right Answers)
C. Reverse mode
D. Forward mode

Answer: AB
166. What are the application scenarios for the break statement in the Python language7
(Multiple Choice)

A. Any Python statement


B. while loop statement (Right Answers)
C. for loop statement (Right Answers)
D. Nested loop statement (Right Answers)

Answer: BCD

167. TensorFlow only supports Python and R language

A. True
B. False (Right Answers)

Answer: B

168. What are the commonly used gradient descent optimization functions? (Multiple Choice)

A. Random gradient descent (Right Answers)


B. Adadelta (Right Answers)
C. Adagrad (Right Answers)
D. momentum (RightAnswers)
E. RMSProp (Right Answers)

Answer: ABCDE

159. Huawei firmly believes that the value of Al is ultimately reflected in solving the actual
business problems of the enterprise Therefore. Huawei is firmly committed to the development
of Al technology, focusing on domain solutions, focusing on basic technologies and enabling
platforms, and working with industry practice leaders to develop industry solutions

A. True (Right Answers)


B. False

Answer: A

160. The Python dictionary is identified by and the internal data consists of the key and its
corresponding value

A. True (Right Answers)


B. False

Answer: A
161. In Huawei Cloud El Enterprise Intelligence, which basic platform services are included9
(Multiple Choice)

A. Machine learning (Right Answers)


B. Deep learning (Right Answers)
C. Graph engine (Right Answers)
D. Batch processing (Right Answers)

Answer: ABCD

162. Linear algebra is a branch of algebra that deals with linear problems. The linear relationship
is that the relationship between exponential objects is expressed in ( ) times form*?

A. 1 (Right Answers)
B. 2
C. 3
D. 4

Answer: A

163. "print" in Python 3 must be used with "Q"

A. True (Right Answers)


B. False

Answer: A

155. Which of the following are solutions for the Huawei Cloud El industry scenario9 (Multiple
Choice)

A. Intelligent Logistics (Right Answers)


B. Intelligent Water (Right Answers)
C. Intelligent transportation (Right Answers)
D. Intelligent Finance (Right Answers)
E. E Intelligent manufacturing (Right Answers)

Answer: ABCDE

156. Vector group a1=(1.1.1). a2=(0.2.5). a3=(1.3.6). which of the following options is correct?

A. Linear correlation (Right Answers)


B. Linear independence
C. a1+a2+a3=0
D. 2a1+a2+a3=0

Answer: A
157. What are the scenarios or industries that are suitable for using Python? (Multiple Choice)

A. Artificial intelligence (Right Answers)


B. web development (Right Answers)
C. Game development (Right Answers)
D. Hardware development

Answer: ABC

158. Which descriptions are correct about Python's index'? (Multiple Choice)

A. Index from left to right defaults from 0 (Right Answers)


B. Index from left to nght defaults from 1
C. Index from right to left defaults from-1 (Right Answers)
D. Index from right to left defaults from 0

Answer: AC

151. What are the algorithms supported by TensorFlow? (Multiple Choice)

A. CNN (Right Answers)


B. ZNN
C. RNN (Right Answers)
D. HUT

Answer: AC

152. Which is not a Python operator?

A. arithmetic operator
B. Reasoning operator (Right Answers)
C. Logical operator
D. Comparison operator

Answer: B

153. Which method is not supported in TensorFlowto define variables?

A. Random number
B. Constant
C. Calculated from the initial values of other variables
D. null (RightAnswers)

Answer: D
154. What does factors that promote the development of artificial intelligence not include?

A. Big data
B. Computing ability
C. Algorithm theory
D. Blockchain (RightAnswers)

Answer: D
HCIA BIGDATA H13-711 V2.0 EXAM DUMPS
HDFS
Q1
Which of the following are distributed storage components in the Hadoop
platform? CD
A. MapReduce
B. Spark
C. HDFS
D. HBase

Q2
In HDFS, data blocks are stored with multiple replicas. If a data block on a
node is lost, you need to manually copy a data replica to the node.
F
128MB -OneBlock

Q3
Which of the following HDFS component is responsible for storing user data?
B
A. NameNode
B. DataNode
C. ZooKeeper
D. JobTracker

Q4
NameNodes of HDFS store metadata of file systems T

Q5
Which statements about HDFS are correct? ACD
A. HDFS consists of NameNodes, DataNodes, and Clients.
B. Metadata on the standby NameNode of HDFS is directly synchronized from the
active NameNode. F
C. HDFS stores the first replica on the nearest node.
D. HDFS is ideal for Write Once Read Many (WORM) tasks.

Q6
Which statements are correct about the functions of the standby NameNode in
HDFS? AC
^^^^A. Hot spare for the active NameNode
^^^^B. The standby NameNode does not have specific memory requirements. ^^^^C.
The standby NameNode helps the active NameNode merge edit logs, reducing the
startup time of the active NameNode.
^^^^D. The active and standby NameNodes must be deployed on the same node.

Q7
Which statement is correct about uploading files from a client to HDFS?
B
^^^^A. The file data of the client is transmitted to DataNodes via NameNodes.
^^^^B. The client divides files into multiple blocks and writes data blocks
to each DataNode based on the DataNode address sequence. ^^^^C. The client
writes files to each DataNode based on the DataNode address sequence, and
then the DataNodes divide files into multiple blocks.
^^^^D. The client only uploads data to one DataNode, and the NameNode copies
blocks.
1.
block1 = 0 192.168.0.1=ip1 block2 = 2
192.168.0.2=ip2 block3 = 2
192.168.0.3=ip3
2. array
address_list = [ip1,ip2,ip3]

Q8
In HDFS, the NameNode manages metadata, and the client reads metadata from the
metadata disk of the NameNode every time when the client sends a read request
to obtain the location information about the file that is being read in the
DataNode.
NameNode memory

Q9
Which of the following statements are correct about HDFS Federation? ACD
^^^^A. A namespace uses a block pool to manage data blocks.
^^^^B. A namespace uses multiple block pools to manage data blocks. ^^^^C. The
disk space of each block pool is physically shared, but the logical space is
isolated.
^^^^D. The NameNode and namespace can be scaled-out.

Q10
When the Client writes files to HDFS, the NameNode determines the location
where the first replica is written to, and the DataNode determines the location
where other replicas are written to. F

Q11
Which of the following statements is correct about the HDFS DataNode in
FusionInsight HD? B
^^^^A. Data validity is not checked.
^^^^B. The DataNode periodically sends its block information to the
NameNode.
^^^^C. Blocks stored on different DataNodes must be different.
^^^^D. Blocks on a DataNode can be the same.

Q12
which of the following commands is used to check the integrity of data
blocks in HDFS. A
^^^^A. hdfs fsck /
^^^^B. hdfs fsck / -delete
^^^^C. hdfs dfsadmin -report
^^^^D. hdfs balancer -threshold 1

Q13
Which is the default block size of HDFS in FusionInsight HD? C
^^^^A. 32 MB
^^^^B. 64 MB
^^^^C. 128 MB
^^^^D. 256 MB

Q14
How many copies of a block are stored in HDFS of FusionInsight HD by default?
A
^^^^A. Three copies
^^^^B. Two copies
^^^^C. One copy
^^^^D. Uncertain

Q15
MapReduce
Which one is not a feature of MapReduce in Hadoop? C
^^^^A. Easy to program
^^^^B. Outstanding scalability
^^^^C. Real-time computing
^^^D. High fault tolerance

Q16
Which of the following computing tasks is MapReduce good at dealing with?
B
^^^^A. Iterative computing
^^^^B. Offline computing
^^^^C. Real-time interactive computing
^^^^D. Stream computing

Q17
YARN manages cluster resources based on Resource Manager. Which of the
following are main functions of YARN? AB
^^^^A. Cluster resource scheduling
^^^^B. Application program management
^^^^C. Log management -- node manager
^^^^D. None of the above

Q18
Which is the encapsulation of the YARN resources in Hadoop? C
^^^^A. Memory
^^^^B. CPU
^^^^C. Container
^^^^D. Disk space

Q19
Which resources can be managed by YARN in Hadoop? AB
^^^^A. Memory
^^^^B. CPU
^^^^C. Network
^^^^D. Disk space
Q20
In Hadoop, you can set the yarn.app.mapreduce.am.resource.mb parameter to
configure the memory size allocated to a container by YARN. F - AM'S
Memory

Q21
Which of the following is the correct sequence of the resource allocation
initiated by the YARN scheduler? C
^^^^A. Any host > Same rack > Local resources
^^^^B. Any host > Local resources > Same rack
^^^^C. Local resources > Same rack > Any host
^^^^D. Same rack > Any host > Local resources

Q22
If the number of replicas in HDFS is set as 3, file segments to be processed
must be transferred from hosts with three replicas every time when a task is
running. F

Q23
Which are the main features of the YARN scheduler? ABCD
^^^^A. Capacity assurance
^^^^B. Flexibility
^^^^C. Multi-leasing
^^^^D. Dynamic update of configuration files -- FusionInsight Manager

Q24
Which parameter should you configure to set the capacity of QueueA in
YARN to 30%? C
^^^^A. yarn.scheduler.capacity.root.QueueA.user-limit-factor
^^^^B. yarn.scheduler.capacity.root.QueueA.minimum-user-limit-percent
^^^^C. yarn.scheduler.capacity.root.QueueA.capacity
^^^^D. yarn.scheduler.capacity.root.QueueA.state

Q25
If a YARN cluster has sub-queues Default, QueueA, and QueueB, the capacity of
the sub-queues can be set to 60%, 25%, and 22%, respectively. F sub-queues +
QA+QB = 100%
60%+25%+22% = 97%

Q26
Which statement is incorrect if you set
yarn.scheduler.capacity.root.QueueA.minimum-user-limit-percent to 50 in
YARN? B
^^^^A. When a user submits a task, the user can use 100% of QueueA resources.
^^^^B. Each user of QueueA can obtain a maximum of 50% of QueueA resources.
^^^^C. If tasks of two users of QueueA are running, tasks of the third user
can be executed only after the resources are released. ^^^^D. Each user of
QueueA obtains 50% of resources at least.

Q27
Which command is used to view information about an application of YARN in
Hadoop? D
^^^^A. container
^^^^B. application -attempt
^^^^C. jar
^^^^D. application

Q28
Which parameter should you configure to enable the YARN log aggregation
function in Hadoop? D
^^^^A. yarn.nodemanager.local-dirs
^^^^B. yarn.nodemanager.log-dirs
^^^^C. yarn.acl.enable
^^^^D. yarn.log-aggregation-enable

Q29
Spark
Both Spark and Hadoop are not applicable to iterative computing. F

Q30
In which programming language is Spark developed? D
^^^^A. C
^^^^B. C++
^^^^C. JAVA
^^^^D. Scala - 30000 lines

Q31
Which functions are provided by Spark? AD
^^^^A. Distributed memory computing engine
^^^^B. Distributed file system -hdfs
^^^^C. Distributed data warehouse -hive
^^^^D. Stream data processing

Q32
Resilient Distributed Datasets (RDDs) are generated in file systems compatible
with Hadoop, and then the generated RDDs can be partially upgraded by invoking
RDD operators. F -- read only

Which is not the transformation operation in Spark? D


^^^^A. join
^^^^B. distinct
^^^^C. reduceByKey
^^^^D. reduce
Q33
In Spark on YARN mode, the driver runs on the client only. F

Q34
Which is used to divide stages when Spark applications are running? D
^^^^A. task
^^^^B. taskset
^^^^C. action
^^^^D. shuffle

Q35
When a Spark application is running, the failure of a task can result in
application running failures. F

Q36
In Spark on YARN mode, executors cannot be initiated for tasks on nodes without
Node Manager. T

Q37
Shuffle divides the Spark job into multiple stages. F

Q38
Spark is a memory-based computing engine; therefore, data generated when
Spark applications are running is stored in memory. T
memory is not enough -> disk

Q31
An executor of Spark can run multiple tasks at the same time. T

Q32
In a Fusion Insight HD cluster, from which services can Spark read
data?
BCD
^^^^A. YARN
^^^^B. HDFS -FS
^^^^C. Hive -DW
^^^^D. HBase -DB

Q33
Spark Streaming performs better than Storm in real-time capability. F
Q34
Which of the following are permanent processes of Spark? AB
^^^^A. JobHistory
^^^^B. JDBCServer
^^^^C. SparkResource
^^^^D. NodeManager

Q35
HBase
HBase in FusionInsight HD supports dynamic extension of columns. T

Q36
Which of the following is the default underlying file storage system for
HBase in FusionInsight HD? A
^^^^A. HDFS
^^^^B. Hadoop
^^^^C. Memory
^^^^D. MapReduce

Q37
Which of the following scenario is HBase inapplicable to? A
^^^^A. The ACID feature is required - region
^^^^B. Massive sets of data ^^^^C. High
throughput
^^^^D. Semi-structured data

Q38
Which processes are contained in the HBase component of FusionInsight HD?
AC
^^^^A. HMaster
^^^^B. Slave
^^^^C. HRegionServer
^^^^D. DataNode
Hmaster - HRegionServer
Master - Slaves

Q39
HBase in FusionInsight HD needs to connect to HMaster during data read. F
0.96Version -Hbase -need use HMaster to read data after -
Hbase -nedd use Zookeeper to read data

Q40
How is the active HMaster of HBase selected? C
^^^^A. Selected randomly
^^^^B. Determined by RegionServer
^^^^C. Determined by ZooKeeper
^^^^D. HMasters are in active-active mode.
Q41
Which service process manages regions in Hadoop HBase? C
^^^^A. HMaster
^^^^B. DataNode
^^^^C. HRegionServer
^^^^D. ZooKeeper

Q42
The minimum processing unit of HBase in Fusion Insight HD is region. Where is
the routing information between the user region and Region Server stored? D
^^^^A. Zookeeper
^^^^B. HDFS
^^^^C. Master
^^^^D. Meta table
Meta table(zookeeper) -> user region(HRegionServer)

Q43
When HBase is deployed in a FusionInsight HD cluster with N nodes, how many (
) HMaster processes and ( ) RegionServer processes are recommended? C
^^^^A. 2, 2
^^^^B. 3, N
^^^^C. 2, N
^^^^D. N, N
active hmaster
standby hmaster
HA
50-60

Q44
Which of the following is not semi-structured data? C
A. HTML
B. XML
C. Bidimensional table
D. JSON
storage in hbase

Q45
For HBase in FusionInsight HD, a table is divided by SplitKey 9, E, a, z.
Thus, how many regions does the table have? C
^^^^A. 3
^^^^B. 4
^^^^C. 5
^^^^D. 6

Q46
Which of the following is the physical storage unit of regions in HBase?
B
^^^^A. Region
^^^^B. Column family
^^^^C. Column
^^^^D. Row

Q47
What is the storage format of HBase data? A
^^^^A. HFile
^^^^B. SequenceFile
^^^^C. HLog
^^^^D. TxtFile

Q48
Which statement about HFiles in HBase is incorrect? B
^^^^A. An HFile belongs to a region.
^^^^B. An HFile contains data of multiple column families.
^^^^C. An HFile contains data of multiple columns.
^^^^D. An HFile contains data of multiple rows.

Q49
What information does the KeyValue of HFiles in HBase contain?
^^^^A. Key
^^^^B. Value
^^^^C. TimeStamp
^^^^D. KeyType
ABCD

Q50
In FusionInsight HD, which component or service is not involved in HBase data
read process? C
^^^^A. ZooKeeper
^^^^B. HDFS
^^^^C. HMaster >0.96 Version
^^^^D. HRegionServer

Q51
In FusionInsight HD, where is the routing information about regions of
HBase metadata stored? B
^^^^A. Root table
^^^^B. ZooKeeper
^^^^C. HMaster
^^^^D. Meta table
Q52
In HBase, data is written to MemStores, HLogs, and HDFS, where will a data
writing success message be returned after the data is successfully written? B
^^^^A. MemStore
^^^^B. HLog
^^^^C. HDFS
^^^^D. Memory

Q53
An HBase table meg_table with RowKey for user ID and one column for user name.
KeyValues 001:Li, 001:Mary, and 001:LiLy are written to meg_table in sequence.
Then which is returned by the command 'scan
'meg_table',{VERSIONS=>2}'? D
^^^^A. 001:Li
^^^^B. 001:Lily
^^^^C. 001:Li,001:Mary,001:LiLy
^^^^D. 001:Mary, 001:LiLy
version number
001:Li timestamp xxx-xxx-01 version1
001:Mary timestamp xxx-xxx-02 version2
001:Lily timestamp xxx-xxx-03 version3

Q54
Which of the following is the purpose of periodically executing compaction for
HBase clusters? AB
^^^^A. To reduce the number of files in the same region and the same column
family.
^^^^B. To improve data read performance.
^^^^C. To reduce data of files in the same column family.
^^^^D. To reduce the number of files in the same region.

Q55
Which of the following statements is incorrect about region splitting in HBase?
C
^^^^A. Splitting does not essentially split files, but creates reference files.
^^^^B. Splitting is to reduce the size of data in a region so that a region is
split into two regions.
^^^^C. The table suspends services during the splitting.
^^^^D. The split region suspends services during the splitting

Q56
If a region in HBase is being split, when will one HFile be split to two
regions? C
^^^^A. During the splitting
^^^^B. During the flush
^^^^C. During the compaction
^^^^D. During the HFile splitting

Q57
During HBase data read, what data needs to be read? AC
^^^^A. HFile
^^^^B. HLog
^^^^C. MemStore
^^^^D. HMaster

Q58
Which of the following statements is incorrect about BloomFilter of HBase in
FusionInsight HD? A
^^^^A. BloomFilter is used to filter data.
^^^^B. BloomFilter is used to optimize random data read.
^^^^C. BloomFilter consumes more storage resources.
^^^^D. BloomFilter can be used to precisely determine which data does not
exist.

Q59
If you need to view the current user and his/her permission group of
HBase, which command should you run in the HBase shell? B
^^^^A. user_permission
^^^^B. whoami
^^^^C. who
^^^^D. get_user

Q60
Hive
Which of the following scenarios is Hive inapplicable to? A
^^^^A. Online data analysis in real-time
^^^^B. Data mining, such as user behavior analysis, interest zoning, and
regional display
^^^^C. Data summary, such as daily and weekly user clicks and click ranking
^^^^D. Non-real-time analysis, such as log analysis and statistics analysis

Q61
Which of the following storage formats are supported by Hive in
FusionInsight HD? BCD
^^^^A. HFile
^^^^B. TextFile
^^^^C. SequenceFile
^^^^D. RCFile
Q62
Which statement is incorrect about comparisons between Hive and conventional
data warehouses? B
^^^^A. Hive is HDFS-based; therefore, Hive can store as much data as possible
theoretically. However, conventional data warehouses can only store a limited
amount of data.
^^^^B. Hive is based on the big data platform; therefore, Hive delivers a
faster query speed than conventional data warehouses.
^^^^C. Hive metadata storage is independent of data storage, so metadata is
decoupled from data, thus the flexibility is improved. However, the
conventional data warehouse is in the opposite against Hive. ^^^^D. Hive
data is stored in HDFS, providing high fault tolerance and reliability.

Q63
Which statement is incorrect about the relationship between Hive and other
Hadoop components? D
^^^^A. Hive stores data in HDFS.
^^^^B. HQL can use MapReduce to execute tasks.
^^^^C. Hive functions as a data warehouse tool in Hadoop. ^^^^D. Hive
is strongly dependent on HBase.

Q64
Which statement is incorrect about Hive in FusionInsight HD? A
^^^^A. The Hive cluster is unavailable when one HiveServer fails.
^^^^B. The HiveServer receives requests from the client, parses and runs
HQL commands, and returns the query result.
^^^^C. MetaStore provides metadata services and depends on DBService.
^^^^D. At the same time, one HiveSever is in the active state, and the other is
in the standby state.

Q65
Which of the following is not the flow control feature of Hive in
FusionInsight HD? C
^^^^A. Controls the total number of established connections.
^^^^B. Controls the number of connections established by each user.
^^^^C. Controls the number of connections established by a specific user.
^^^^D. Controls the number of established connections during a specific period.

Q66
Which of the following statements is incorrect about common tables and external
tables in Hive? D
^^^^A. Common tables are created by default.
^^^^B. External tables associate the file paths on HDFS with tables. ^^^^C.
When a common table is deleted, the metadata and data in the table are deleted.
^^^^D. When an external table is deleted, only the data in the external table
is deleted but the metadata is not deleted.

Q67
Which of the following statements about Hive table creation is correct? A
^^^^A. The external keyword must be specified when an external table is
created.
^^^^B. Once a table is created, the table name cannot be changed.
^^^^C. Once a table is created, the column name cannot be changed.
^^^^D. Once a table is created, new columns cannot be added.
Q68
Which of the following methods cannot be used to load data to the Hive table? C
^^^^A. Load the files in the local path to the Hive table.
^^^^B. Load the files in HDFS to the Hive table.
^^^^C. Hive supports the insertion of a single record using insert into.
Therefore, you can insert a single record directly using the command line.
^^^^D. Insert the result sets of other tables into the Hive table.

Q69
What are the possible causes if the Hive service status is Bad on the
FusionInsight Manager portal? ABC
^^^^A. The DBService service is unavailable. HQL->SQL
^^^^B. The HDFS service is unavailable.
^^^^C. The MetaStore instance is unavailable. Metadata in hive ^^^^D. The
HBase service is unavailable.

Q70
Which of the following statements is incorrect about Hive log collection on
FusionInsight Manager? D
^^^^A. You can specify an instance to collect logs, for example, collecting
MetaStore logs.
^^^^B. You can specify a time period to collect logs, for example, collecting
logs from 2016-01-01 to 2016-01-10.
^^^^C. You can specify a node IP address to collect logs, for example,
downloading the logs of an IP address only.
^^^^D. You can specify a user to collect logs. For example, downloading the
logs generated by user A only.

Q71
Streaming
Which of the following statements is correct about the Supervisor of
FusionInsight HD Streaming? B
^^^^A. The Supervisor is responsible for resource allocation and task
scheduling. NIMBUS
^^^^B. The Supervisor receives tasks allocated by Nimbus, and starts or stops
Workers based on actual situation.
^^^^C. The Supervisor is a process running a specific service logic. ^^^^D.
The Supervisor is a component that receives and processes data in a topology.
Zookeeper

Q72
When the Streaming component of FusionInsight HD is being installed, how many
nodes must be equipped with the Nimbus role? B
^^^^A. 1
^^^^B. 2
^^^^C. 3
^^^^D. 4

Q73
The Streaming component of FusionInsight HD has a weak dependency on ZooKeeper
and can normally provide services even if ZooKeeper becomes faulty. F

Q74
In FusionInsight HD, which of the following methods can be used for
troubleshooting if you fail to use the Shell command of the Streaming client to
view or submit a topology? AB
^^^^A. View the abnormal stack on the client to check whether the client is
faulty.
^^^^B. View the run logs of the active Nimbus to check whether the Nimbus
server is abnormal.
^^^^C. View the Supervisor run logs to check whether the Supervisor is
abnormal.
^^^^D. View the Worker run logs.

Q75
After a topology is submitted using the Shell command of the Streaming client
in the FusionInsight HD system, the Storm UI shows that the topology does not
process data for a long time. What are the possible causes? ABC
^^^^A. The topology is too complex or the concurrency is too large. As a
result, the Worker startup takes a longer time than the waiting time of the
Supervisor.
^^^^B. The slot resource of the Supervisor is exhausted. After the topology is
submitted, no slot can be allocated to start the Worker process.
^^^^C. The topology service has a logic error and cannot run properly after
being submitted.
^^^^D. When the data volume is large, the topology processing speed is slow.

Q76
Flink
Flink is a unified computing framework that supports both batch processing and
stream processing. It provides a stream data processing engine that supports
data distribution and parallel computing. T

Q77
Which of the following scenarios is Flink inapplicable to? BD
^^^^A. Batch processing
^^^^B. Iterative computing spark
^^^^C. Stream processing
^^^^D. Data storage hdfs,hbase,hive
Q78
Flink applies to applications that require high-concurrency data processing and
a millisecond-level latency. T

Q79
Similar to Spark Streaming, Flink is a time-driven real-time streaming system.
F
Spark -> time driven
Flink,Streaming -> event driven

Q80
Flink can be deployed in local or cluster mode. Other deployment modes are not
supported. F ->Cloud AWS s3/DLI service

Q81
In Flink, the ( ) interface is used for stream data processing, and the
( ) interface is used for batch processing. B
^^^^A. Stream API, Batch API
^^^^B. DataStream API, DataBatch API
^^^C. DataBatch API, DataStream API
^^^^D. Batch API, Stream API

Q80
In the technical architecture of Flink, what is the computing engine for stream
processing and batch processing? B
^^^^A. Standalone
^^^^B. Runtime
^^^^C. DataStream
^^^^D. FlinkCore

Spark - Sparkcore
Flink - Runtime

Q81
The Flink program consists of Stream data and Transformation operators. T

Q82
Which of the following statements are incorrect about Flink windows? BD
^^^^A. The scrolling windows do not overlap in time.
^^^^B. The scrolling windows overlap in time.
^^^^C. The time points of the sliding windows overlap.
^^^^D. The time points of the sliding windows do not overlap.

Q83
Flink uses the checkpoint mechanism to ensure fault tolerance during
application running. T

Q84
The checkpoint mechanism of Flink continuously draws snapshots of streaming
applications, and the status snapshots of the streaming applications can only
be stored in the HDFS file system. F

Q85
Which of the following statements is incorrect about a Flink barrier? D ^^^^A.
A barrier is periodically inserted into the data flow and flows as part of the
data flow.
^^^^B. A barrier is the core of Flink snapshots.
^^^^C. A barrier separates the data of the current periodic snapshot from that
of the next periodic snapshot.
^^^^D. When a barrier is inserted, the data flow is temporarily blocked.

Q86
In Huawei FusionInsight HD, which of the following components does Flink
strongly depend on? ABC
^^^^A. YARN Flink in yarn
^^^^B. HDFS
^^^^C. ZooKeeper
^^^^D. Kafka

Q87
Loader
Loader supports only data import and export between relational databases and
HBase. F

Q88
Which of the following methods or interfaces are provided by Loader to
implement task management? ABCD
^^^^A. Web UI
^^^^B. Linux CLI
^^^^C. REST API
^^^^D. Java API

Q89
If a Loader job fails to be executed, the data imported during the job
execution will not be automatically deleted and must be manually deleted.
F
Q90
In the FusionInsight HD system, the Loader service functions properly if only
one Loader node in a cluster is faulty. T

Q91
Which of the following nodes need to communicate with external data sources
before and after a FusionInsight HD Loader job is running? C
^^^^A. Active Loader node
^^^^B. Node that runs the YARN service job
^^^^C. All of the above
^^^^D. None of the above

Q92
When Loader is used to import and export data, data processing must be
performed during Reduce. F

Q93
Which of the following statements is correct about Loader jobs in
FusionInsight HD? B
^^^^A. If the Loader service malfunctions after submitting a job to YARN, the
job fails to be executed.
^^^^B. If a Mapper task fails after Loader submits a job to YARN for execution,
the task can be automatically retried.
^^^^C. If a Loader job fails to be executed, junk data is generated and needs
to be manually cleared.
^^^^D. After Loader submits a job to YARN for execution, Loader cannot submit
other jobs before the job is executed.

Q94
Which of the following instances must be deployed together with the
Loader instance in FusionInsight HD? D
^^^^A. DataNode
^^^^B. RegionServer
^^^^C. ResourceManager
^^^^D. NodeManager

Q95
Which of the following operations cannot be performed on Loader on
FusionInsight Manager? D
^^^^A. Start the Loader instance.
^^^^B. View the Loader service status.
^^^^C. Configure Loader parameters.
^^^^D. Switch between active and standby Loader nodes.
Q96
After a Loader job in FusionInsight HD is submitted to YARN, the job cannot be
stopped manually. F

Q97
In FusionInsight HD, when Loader imports files from the SFTP server, which of
the following file types does not require code and data conversion and delivers
the most rapid speed? C
^^^^A. text_file
^^^^B. sequence_file
^^^^C. binary_file
^^^^D. graph_file

Q98
Which of the following target ends can FusionInsight HD Loader export
HDFS data to? ABCD
^^^^A. SFTP server
^^^^B. FTP server
^^^^C. Oracle database
^^^^D. DB2 database

Q99
Which of the following is the function of the connector when FusionInsight HD
Loader creates a job? C
^^^^A. Determine the conversion steps.
^^^^B. Provide optimization parameters to improve data import and export
performance.
^^^^C. Configure how jobs are connected to external data sources.
^^^^D. Configure how jobs are connected to internal data sources.

Q100
For Loader in FusionInsight HD, a connector can be allocated to only one job.
F

Q101
In FusionInsight HD, Loader jobs are input, converted, and output in sequence.
T

Q102
In FusionInsight HD, which of the following methods cannot be used to view the
execution result of a Loader job? D
^^^^A. Using the YARN task management page
^^^^B. Using the Loader UI
^^^^C. Using alarms on Manager
^^^^D. Using NodeManager
Q103
In FusionInsight HD, if dirty data is generated during the running of a Loader
job, the execution result of the Loader job must be failed. F

Q104
Flume
In FusionInsight HD, which component does not data flow of Flume pass by? D
^^^^A. source
^^^^B. channel
^^^^C. sink
^^^^D. topic

Q105
Flume data flows can be sent to different channels based on the header
information. T

Q106
Flume can monitor and transfer new files in a directory to implement quasi-
realtime data transmission. Which type of source is described above? A
^^^^A. spooling directory source
^^^^B. http source
^^^^C. exec source
^^^^D. syslog source

Q107
Which of the following is not the channel type of Flume? D
^^^^A. Memory Channel
^^^^B. File Channel
^^^^C. JDBC Channel
^^^^D. HDFS Channel

Q108
When Flume is used to transmit data, which of the following channel types is
recommended to prevent data loss caused by the restart of the Flume process? B
^^^^A. Memory Channel
^^^^B. File Channel
^^^^C. JDBC Channel
^^^^D. HDFS Channel

Q109
When the Flume process is cascaded, which of the following sink types are used
to receive data sent by the last-hop Flume? AB
^^^^A. avro sink
^^^^B. thrift sink
^^^^C. Hive sink
^^^^D. Null Sink

Q110
During data transmission, Flume deletes the events from the channel after Sink
obtains the data and writes the data to the destination. T

Q111
How many Flume Server nodes must be deployed in the same cluster when
FusionInsight HD is deployed? ............... Error! Bookmark not defined.
^^^^A .................................................................. 20
^^^^B .................................................................. 20
^^^^C .................................................................. 20
^^^^D .................................................................. 20

Q112
Multiple channels can be configured to transmit data in the
properties.properties configuration file of Flume. T

Q113
kafka
Kafka is a distributed publish-subscribe messaging system. It forwards messages
but does not store messages. F

Q114
What is the role of the Kafka server in a Kafka cluster? D
^^^^A. Producer
^^^^B. Consumer
^^^^C. ZooKeeper
^^^^D. Broker

Q115
Which of the following statements is incorrect about Kafka in
FusionInsight HD? C
^^^^A. Kafka strongly depends on ZooKeeper. t
^^^^B. At least two Kafka instances must be deployed. t
^^^^C. The Kafka server can generate messages. f
^^^^D. A Consumer functions as a Kafka client and consumes messages. t

Q116
Which of the following statements are correct about Kafka in
FusionInsight HD? BD
^^^^A. When a Kafka Producer sends a message, the Consumer that consumes the
messages can be specified. f
^^^^B. When creating a topic, ensure that the number of replicas is less than
or equal to the number of active Broker instances. Otherwise, topic creation
fails. t
^^^^C. After Kafka is installed, the data storage directory cannot be
configured. f
^^^^D. Kafka stores metadata information to ZooKeeper. t

Q117
On FusionInsight Manager, if the insufficient Kafka disk capacity alarm is
received and the alarm is not caused by the disk hardware fault, the system
administrator needs to expand the capacity to resolve this problem. T

Q118
In the FusionInsight HD system, when creating a Kafka topic, you must set the
number of partitions and replicas. Multiple replicas enhance the disaster
recovery capability of Kafka services. T

Q119
Which of the following commands is used to view partition details of a topic in
Kafka? C
^^^^A. bin/kafka-topics.sh --create
^^^^B. bin/kafka-topics.sh --list
^^^^C. bin/kafka-topics.sh --describe
^^^^D. bin/kafka-topics.sh --delete

Q120
Which of the following statements are correct about Kafka in
FusionInsight HD?
ACD
^^^^A. When deleting a topic, ensure that delete.topic.enable of the
Kafka service is set to true.
^^^^B. Kafka installation and run logs are stored in /srv/Bigdata/kafka/.
^^^^C. If the ZooKeeper service is unavailable, the Kafka service is
unavailable.
^^^^D. You must create a topic as the admin user or a user in the kafkaadmin
group.

Q121
Which of the following is not the possible cause of the insufficient
Kafka disk capacity alarm? D
^^^^A. The configuration (such as number and size) of the disks for storing
Kafka data cannot meet the requirement of the current service traffic, due to
which the disk usage reaches the upper limit.
^^^^B. Data retention time is too long, due to which the data disk usage
reaches the upper limit.
^^^^C. The service plan does not distribute data evenly, due to which the usage
of some disks reaches the upper limit.
^^^^D. The Broker node is faulty.
Q122
zookeeper
Which of the following statements about ZooKeeper are correct? AC
^^^^A. Based on open source Apache ZooKeeper, ZooKeeper is used to resolve data
management problems that occur frequently in distributed applications.
^^^^B. ZooKeeper, as an underlying component, is depended on by other
components but does not depend on other components.
^^^^C. ZooKeeper must be deployed in Huawei FusionInsight HD.
^^^^D. The more ZooKeeper nodes, the better.

Q123
In the ZooKeeper service model, the Leader nodes work in active/standby mode,
and other nodes are Follower nodes. F

Q124
Which of the following statements about ZooKeeper is incorrect? A
^^^^A. If ZooKeeper is interrupted during message synchronization, ZooKeeper
can continue to synchronize data based on the transmission status before the
fault occurred. That is, resumable data transfer is supported.
^^^^B. ZooKeeper uses the custom atomic message protocol to ensure data
consistency among nodes in the entire system.
^^^^C. The Leader role is elected when the ZooKeeper cluster is started. ^^^^D.
After receiving a data change request, the Leader node writes the data to the
disk and then to the memory.

Q125
All ZooKeeper nodes can process read requests. T

Q126
When the number of nodes in a ZooKeeper cluster is five, how many nodes provide
the disaster recovery capability? C
^^^^A. 3
^^^^B. 4
^^^^C. 6
^^^^D. None of the above

Q127
Which of the following statements about ZooKeeper is incorrect? D ^^^^A. The
updates sent by the client are applied in the sequence of update sending.
^^^^B. If a message is received by more than half of the servers, the message
can be successfully written to the disk.
^^^^C. Data transfer either succeeds or fails. There is no middle status.
^^^^D. The number of ZooKeeper nodes must be an odd.

Q128
ZooKeeper nodes use ACLs to control access policies. ACLs can be applied to any
Znode in a cluster. F
Q129
Which of the following components must depend on ZooKeeper? ABD
^^^^A. HDFS
^^^^B. HBase
^^^^C. Spark
^^^^D. YARN

Q130
Which of the following statements about ZKFC is incorrect? B
^^^^A. As the client of a ZooKeeper cluster, ZKFailoverController (ZKFC)
monitors the state information about NameNodes.
^^^^B. The ZKFC process must be deployed on NameNodes and the Leader nodes of
ZooKeeper. all the nodes
^^^^C. The standby NameNode detects the status of the active NameNode using
ZooKeeper. Once the active NameNode breaks down, the standby
NameNode becomes the active one.
^^^^D. The ZKFC process of HDFS NameNodes connects to ZooKeeper and saves
information such as the host name to ZooKeeper.

Q131
Which module is responsible for storing FusionInsight Manager user data?
D
^^^^A. CAS
^^^^B. AOS
^^^^C. Kerberos
^^^^D. LDAP

Q132
The FusionInsight HD cluster contains multiple services. Each service consists
of several roles. Which of the following are service roles? BC
^^^^A. HDFS
^^^^B. NameNode
^^^^C. DataNode
^^^^D. HBase

Q133
Which of the following interfaces can be used for FusionInsight Manager to
interconnect with external management platforms? AD
^^^^A. SNMP
^^^^B. VPN
^^^^C. BGP
^^^^D. Syslog

Q134
Which of the following operations cannot be performed on a service using
FusionInsight Manager? C
^^^^A. Start, stop, and restart a service.
^^^^B. Add and uninstall a service.
^^^^C. Hide and display a service that is not frequently used.
^^^^D. View service status

Q135
Which of the following operations cannot be recorded in FusionInsight HD audit
logs? D
^^^^A. Clear alarms manually.
^^^^B. Start and stop service instances.
^^^^C. Delete service instances.
^^^^D. Query historical monitoring information.

Q136
Which of the following statements is incorrect about the function for
configuring services on FusionInsight Manager? C
^^^^A. Service-level configuration takes effect for all instances.
^^^^B. Instance-level configuration takes effect only for this instance.
^^^^C. Instance-level configuration takes effect for other instances. ^^^^D.
The saved configuration takes effect after the services are restarted.

Q137
Which of the following configurations is not supported by FusionInsight Manager
user rights management? D
^^^^A. Assign a role to a user.
^^^^B. Assign rights to a role.
^^^^C. Assign a role to a user group.
^^^^D. Assign rights to a user group.

Q138
Which of the following can FusionInsight Manager implement a health check for?
AB
^^^^A. Host
^^^^B. Service
^^^^C. Role
^^^^D. Instance

Q139
Which data is periodically backed up by FusionInsight Manager? ABCD
^^^^A. NameNode
^^^^B. LDAP
^^^^C. OMS
^^^^D. DBService

Q140
Which of the following statements are correct about FusionInsight HD cluster
upgrade? ABCD
^^^^A. During the upgrade, a manual switchover between active and standby
OMS nodes is not allowed.
^^^^B. The password of the root account for all the hosts in the cluster must
be the same.
^^^^C. Ensure that the network is normal and avoid upgrade exceptions caused by
network problems.
^^^^D. Capacity expansion cannot be performed during the observation period.

Q141
On the FusionInsight HD platform, which of the following components support
encryption of tables and columns? BC
^^^^A. HDFS
^^^^B. HBase
^^^^C. Hive
^^^^D. Flink

Q142
On the FusionInsight HD platform, HBase does not support secondary indexes. F

Q143
Which of the following statements are correct about the storage of a large
number of small files? ABC
^^^^A. In HDFS, storing a large number of small files brings great pressure to
NameNodes.
^^^^B. If HBase stores a large number of small files, the Compaction operation
wastes I/O resources.
^^^^C. Huawei HFS is suitable for storing a large number of small files.
Files can be stored in HDFS or MOB to meet site requirements.
^^^^D. None of the above

Q144
FusionInsight Manager supports the unified management of multiple tenants. T

Q145
Huawei has extensive experience in delivering big data solutions in various
industries, such as finance, public security, railway, and government. T

Q146
Which of the following statements about the reliability of FusionInsight
HD are correct? ABCD
^^^^A. All components without SPOF
^^^^B. HA of all management nodes
^^^^C. Health status monitoring of software and hardware
^^^^D. Network plane isolation

Q147
Which of the following products are included in the FusionInsight family?
ABDE A.HD
^^^^B. LibrA
^^^^C. Manager
^^^^D. Miner
^^^^E. Farmer
^^^^F. DWs
IT Certification Guaranteed, The Easy Way!

Exam : H13-611-ENU

Title : HCIA-Storage (Huawei


Certified ICT Associate -
Storage)

Vendor : Huawei

Version : V12.35

1
IT Certification Guaranteed, The Easy Way!

NO.1 Statement 1: DAS solutions are islands of storage and that is why it is easy to make backups.
Statement 2: Most SCSI devices today use HVD technology.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: D

NO.2 Which of the following is a valid iSCSI name that can be used to set up the iSCSI connection
between the initiator and target? (Multiple Choice)
A. iqn.1998-01.com. huawei.:name1
B. iqn.1998-01.com. huawei.iscsi:name1
C. eui.12345678ABC
D. eui.0123456789ABCDEF
Answer: BD

NO.3 SAS uses a point-to-point connection design to enable a dedicated link to be established
between two devices in the communication.
A. TRUE
B. FALSE
Answer: A

NO.4 In which layer in the architecture of a typical Big Data processing system does the data mining
and business intelligence process are performed?
A. Application/Presentation Layer.
B. Data Processing Layer.
C. Data Analysis Layer.
D. Data Storage Layer.
Answer: C

NO.5 Which of the following file system is most suitable for the storage of Big Data?
A. NTFS
B. EXT4
C. HDFS
D. BTRFS
Answer: C

NO.6 Match the correct functionalities together: (1) IaaS (2) Hybrid (3) SaaS (a) Combination of
public and private (b) Applications are hosted externally (c) Hardware is outsourced.
A. 1 - a; 2 - b; 3 - c
B. 1 - b; 2 - c; 3 - a
C. 1 - c; 2 - a; 3 - b
D. 1 - b; 2 - a; 3 - c

2
IT Certification Guaranteed, The Easy Way!

Answer: C

NO.7 Match the RAID level with the characteristics. (1) RADO (2) RAID 5 (3) RAID 10 (4) RAID 6 (a)
Cost effective (b) Allows double disk failure (c) Highest performance (d) No data protection
A. 1 - a; 2 - d; 3- b; 4 - c
B. 1 - d; 2 - a; 3- c; 4 - b
C. 1 - d; 2 - a; 3- b; 4 - c
D. 1 - a; 2 - b; 3 - c;4 - d
Answer: B

NO.8 Based on the understanding of the Generation stage of the lifecycle management of
information and data, identify the 3 types of sources in which data can be generated. (Multiple
Choice)
A. External System Generation.
B. Internal System Generation.
C. External Input.
D. Internal Input.
Answer: BCD

NO.9 Select the correct statements that describes Mean Time Between Failure (MTBF). (Multiple
Choice)
A. MTBF can accurately pinpoint the time of failures of the hard disks.
B. The higher the MTBF, the hard disk will have shorter lifespan expectancy.
C. MTBF is used to measure the reliability of hard disks.
D. MTBF is the predicted elapsed time between inherent failures of hard disks.
Answer: CD

NO.10 Which of the following are the 3 layers of SCSI Initiator Model? (Multiple Choice)
A. SCSI Link Layer.
B. SCSI Network Layer.
C. SCSI Middle Layer.
D. SCSI Device Driver Layer.
Answer: ACD

NO.11 Because they are cheap and still have a large capacity we can say that cMLC Solid State Disks
are ideal for storing MP3 files and JPGs at home.
A. TRUE
B. FALSE
Answer: A

NO.12 This device acts a multiport repeater, blindly regenerating and repeating any incoming
electrical signal out all other ports, even ignoring CSMA/CD rules.
Which of the following device fits the description?

3
IT Certification Guaranteed, The Easy Way!

A. L2 Switches
B. L3 Switches
C. Router
D. Hub
Answer: D

NO.13 Government regulations can sometimes mean that when data must be destroyed it means
that the physical media must be destroyed.
A. TRUE
B. FALSE
Answer: A

NO.14 Which of the following are the 3 layers of SCSI Target Model? (Multiple Choice)
A. Network Layer.
B. Port Layer.
C. Middle Layer.
D. Device Layer.
Answer: BCD

NO.15 What is Network Functions Virtualization (NFV)?


A. Decoupling of the data plane and control plane in networks.
B. Decoupling of network functions from hardware.
C. Decoupling of services from software.
D. Decoupling of network functions from virtualization.
Answer: B

NO.16 What are the advantages of SSDs over HDDs? (Multiple Choice)
A. Larger capacity
B. Faster read/write speed for random access
C. Better environmental adaptability
D. Longer service life
Answer: BC

NO.17 The disadvantage of full backup is that it requires the last full backup and the most recent
differential backup to fully restore data.
A. TRUE
B. FALSE
Answer: B

NO.18 Why storage systems has more than one storage controllers in the Dual Storage Controller
Architecture?
A. 2 controllers can complete a single I/O operation much faster.
B. To provide redundancy in case of failure of a single controller.

4
IT Certification Guaranteed, The Easy Way!

C. To have more energy savings since the performance is doubled.


D. Single storage controller architecture is obsolete.
Answer: B

NO.19 Storage Pools cannot be created with a single tier of disks.


A. TRUE
B. FALSE
Answer: B

NO.20 You are tasked to setup a SAN storage system that has the following requirements:
(1) To minimize the workload on server resources.
(2) Optimize the capabilities on storage system for deduplication.
Select the following options that fits the scenario above. (Multiple Choice)
A. Use NIC instead of HBA cards to minimize the host resource consumption during I/O operations.
B. Offload the storage processing tasks to the server to optimize the data deduplication.
C. Usage of TCP/IP offload engine technology to do processing on HBA cards on the server to
minimize the usage of server resources.
D. Adding hardware acceleration module to the storage system to optimize the performance of data
deduplication.
Answer: CD

NO.21 Which of the following statements is incorrect?


A. A logical volume can reside on multiple physical disks. Data storage can be physically
discontinuous.
B. A volume group is built on physical volumes. A volume group can contain one physical volume
group or multiple physical volumes.
C. Physical volumes reside on the lowest layer in the logical volume manager. Logical volumes and
volume groups are dependent on physical volumes.
D. Multiple volume groups can be created on the space of a logical volume.
Answer: D

NO.22 Data and Information are the same thing.


A. TRUE
B. FALSE
Answer: B

NO.23 Statement 1: OceanStor Dorado systems are designed for high performance environments.
Statement 2: OceanStor Dorado systems are so-called All Flash Arrays.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false
Answer: A

5
IT Certification Guaranteed, The Easy Way!

NO.24 It is common practice to create an extra copy of a backup tape that holds important data.
A. TRUE
B. FALSE
Answer: A

NO.25 It provides connection between sets of nodes and allows the connected devices(nodes) to
communicate with each other but it is not a device.
Which of the following fits the above description?
A. Host.
B. Network.
C. Storage Array.
D. Switch.
Answer: B

NO.26 A SAN always uses the same technology to connect to the infrastructure as a NAS.
A. TRUE
B. FALSE
Answer: B

NO.27 Huawei V3 series storage system hardware includes controller enclosures and disk
enclosures.
Which of the following statements about controller enclosures is correct?
A. When the external power supply fails, BBU modules provide backup power for all disks.
B. When the external power supply fails, BBUs can supply power to enable data synchronization from
the cache to disks in disk enclosures.
C. If BBUs become faulty, the service system will be interrupted.
D. When the power input is normal, BBUs are in the standby state.
Answer: B

NO.28 Select the features that are commonly available in High End storage systems. (Multiple
Choice)
A. Global Cache
B. Second-level Data Copying
C. SSD Optimization
D. ATA Drive Optimization
Answer: ABC

NO.29 Which of the following statements about RAID 6 is incorrect?


A. Frequently used RAID 6 technologies include RAID 6 P+Q and RAID 6 DP.
B. RAID 6 requires two-level parity.
C. RAID 6 requires at least three member disks.
D. RAID 6 can recover data after two member disks fail.
Answer: C

6
IT Certification Guaranteed, The Easy Way!

NO.30 Statement 1: Everytime a tape is used to restore data, some data will be lost.
Statement 2: Backup strategies that use tape as backup media typically have a high RTO.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: A

NO.31 Which of the following is correct? (Multiple Choice)


A. Only when a snapshot is activated will the system record all changes to the original LUN.
B. A snapshot needs to be removed from the LUN group to be fully unmapped.
C. SmartTier supports a High Performance, a Performance, a High Capacity and a Capacity Tier.
D. To write data to the secondary LUN of a clone pair, the pair must be split.
Answer: ABD

NO.32 A device can have one WWPN but multiple WWNN's.


A. TRUE
B. FALSE
Answer: B

NO.33 Which device allows segregation of collision domains but not broadcasting domains?
A. L2 Switches
B. L3 Switches
C. Router
D. Hub
Answer: A

NO.34 Select the correct statements that describes the properties of bus technology in ICT
architecture. (Multiple Choice)
A. Bus is a communication system that transfers data between internal components and external
components.
B. Bus can be divided into internal bus and external bus.
C. Bus technology are only available in serial form.
D. The CPU needs to go through the memory to directly access the Bus.
Answer: AB

NO.35 Statement 1: For RAID 2.0+ to work optimally multiple disk domains must be created.
Statement 2: A disk domain with 100 disks in it has better RAID 2.0+ protection and performance
charachteristics than a disk domain with 50 disks.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.

7
IT Certification Guaranteed, The Easy Way!

D. Both statements 1 and 2 are false.


Answer: C

NO.36 The only cable type that can be uses to connect disk enclosures is the mini SAS cable.
A. TRUE
B. FALSE
Answer: B

NO.37 What is the main purpose of hot swapping technology in disk enclosures?
A. To swap out the hard disks after proper shutdown of storage system
B. To swap out the hard disks without turning off the storage system.
C. To be able to swap out the disks when the temperature is too hot.
D. Maintain the temperature of the disks to prevent overheating.
Answer: B

NO.38 Which of the following statements is NOT true for a SAN solution?
A. Block based storage.
B. Long distance connections not possible.
C. Contains no Single Points Of Failure.
D. Multiple protocols possible.
Answer: B

NO.39 A backup set is a group of data that is backed up in a batch. A backup set can be used for
either full backup or incremental backup.
A. TRUE
B. FALSE
Answer: A

NO.40 Statement 1: a snapshot of a ThinLUN at creation does not occupy storage capacity. The
snapshot of a ThickLUN at creation immediately occupies storage capacity.
Statement 2: When a snapshot of a ThickLUN exists, there is always space available to store changes
to the original data.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D

NO.41 Statement 1: A company should know what the Cost Of Downtime is to determine the backup
strategy.
Statement 2: For the business continuity it is not important to determine the RTO.
A. Statement 1 and Statement 2 are both True.
B. Statement 1 is True; Statement 2 is False.

8
IT Certification Guaranteed, The Easy Way!

C. Statement 1 is False; Statement 2 is True.


D. Stament 1 and Statement 2 are both False.
Answer: B

NO.42 In order to make full use of storage resources, on which tier are SSDs usually configured in a
tiered storage system?
A. Capacity tier
B. Performance tier
C. High-performance tier
D. Offline storage
Answer: C

NO.43 In a NAS environment entire files are sent across the ethernet based network. The NAS server
however stores these files in the form as SCSI blocks mostly on multiple disks using RAID protection.
A. TRUE
B. FALSE
Answer: A

NO.44 Which is a typical application example of PaaS?


A. Webmail
B. Microsoft Office365
C. Microsoft Azure
D. Amazone Elastic Compute cloud
Answer: C

NO.45 A company that primarily has static data (like map data or JPG files) does not profit much
from the HUAWEI OceanStor V3 SmartTier functionality.
A. TRUE
B. FALSE
Answer: A

NO.46 In HUAWEI OceanStor V3, which licensed feature is best described as: periodically detects
hotspot data and promotes them from low-speed storage media to high-speed media.
A. SmartMove
B. SmartMig ration
C. SmartMotion
D. SmartTier
Answer: D

NO.47 What is the main purpose of backup battery units (BBU) in storage controllers?
A. To maintain the power for clock synchronization.
B. To power the interface modules.
C. To provide additional power to storage controller to speed up the I/O.

9
IT Certification Guaranteed, The Easy Way!

D. To ensure that the non completed I/O is not lost during power outage.
Answer: D

NO.48 What statement about the SATA and SAS technologies is true?
A. Both use serial communication.
B. SATA and SAS support the same maximum number of devices on the bus.
C. Both use full-duplex communication.
D. Both SATA and SAS are intelligent protocols with intelligent devices.
Answer: A

NO.49 Most data generated by the Internet industry is structured data, amounting to 80% of total
data.
A. TRUE
B. FALSE
Answer: B

NO.50 Which of the following is a valid protocol for a UNIX-based NAS server? (Multiple Choice)
A. CIFS
B. NFS
C. SMB
D. Novell Control Protocol
Answer: ABC

NO.51 Select the correct statements that describes the properties of Distributed Object Storage
Architecture. (Multiple Choice)
A. Metadata servers manages the access requests.
B. Does not support x86 servers.
C. Clients can pinpoint the location of targeted data without metadata servers.
D. Multi node concurrent I/O connection.
Answer: AD

NO.52 Cloud computing can be used to improve reliability.


A. TRUE
B. FALSE
Answer: A

NO.53 Storage array is a network device used to switching network signals or data. It can provide a
dedicated communication channel between any 2 nodes in the network that is connected.
A. TRUE
B. FALSE
Answer: B

NO.54 Which of the following are common RAID types. (Multiple Choice)

10
IT Certification Guaranteed, The Easy Way!

A. RAID 1
B. RAID 5
C. RAID 0+1
D. RAID 50
Answer: ABD

NO.55 To enable a Windows-based host to use the resources provided by a HUAWEI OceanStor V3
series storage device, perform the following operations:
1. Create a Disk Domain and a storage pool.
2. Create a host group and host.
3. Create a LUN group and LUN.
4. Configure an initiator on server and on storage device.
5. Connect the server to the storage device.
6. Format the logical disk.
7. Install the initiator software on server.
8. Mapping.
Place the steps in the proper order.
A. 2 -> 3 -> 1 -> 4 -> 5 -> 6 -> 7 -> 8
B. 1 -> 2 -> 3 -> 4 -> 5 -> 6 -> 7 -> 8
C. 2 -> 3 -> 1 -> 4 -> 8 -> 7 -> 5 -> 6
D. 7 -> 5 -> 1 -> 3 -> 2 ->4-> 8-> 6
Answer: D

NO.56 Which of the following items is NOT mandatory in a Fibre Channel SAN? (Multiple Choice)
A. Storage device
B. Fibre Channel switch
C. Fibre Channel HBA
D. Windows operating system
Answer: BD

NO.57 Statement 1: NAS systems must be interconnected using fiber optic cables.
Statement 2: A network protocol is the way in which an operating system accesses a file that is on a
network connected device.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: C

NO.58 Which of the following licenses requires at least two OceanStor systems that are connected
over a WAN/LAN?
A. SmartTier
B. RemoteReplication
C. HyperSnap

11
IT Certification Guaranteed, The Easy Way!

D. SmartThin
Answer: B

NO.59 In a clustered NAS architecture, which of the following allows multiple file system to be
consolidated and does not need to be managed separately?
A. Global Namespace.
B. Global Sharing.
C. Global Cache.
D. Global Concurrency.
Answer: A

NO.60 Statement 1: Deduplication reduces the amount of stored data.


Statement 2: Deduplication is performed on file level only.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.61 As the new storage administrator, you are tasked with the procurement of a new batch of
SSD drives to replace the older drives that has reached the end of life. You have the option of SLC,
MLC and TLC SSD.
Which of the following will be your choice with a limited budget and medium level of reliability
concerns? (Multiple Choice)
A. Purchasing the MLC SSD if within budget range for core applications and services for better
performance and reliability.
B. Purchasing all TLC SSD drives for the storage system for the best reliability and performance.
C. Purchasing all SLC SSD drives for maximum savings on cost regardless of reliability.
D. Purchasing SLC SSD drives that has lowest cost and reliability for storage purposes of non critical
applications.
Answer: AD

NO.62 Which of the following statements about reconstruction is incorrect?


A. RAID 0,1, 5, 6, and 10 support reconstruction.
B. Reconstruction requires hot spare disks.
C. Reconstruction affects system performance.
D. Reconstruction does not interrupt system services.
Answer: A

NO.63 Statement 1: LAN based backup strategies are preferred as they are the most cost efficient
method and offer the highest performance.
Statement 2: Any backup strategy should provide in storing production data and backup data in
different physical locations.
A. Statements 1 and 2 are both true.

12
IT Certification Guaranteed, The Easy Way!

B. Statement 1 is true and statement 2 is false.


C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: C

NO.64 ICT is a technological field that combines information technology and communication
technology.
A. TRUE
B. FALSE
Answer: A

NO.65 Which of the following statements about storage file systems is incorrect?
A. NAS file systems include CIFS and NFS.
B. NAS file systems allow multiple servers running different operating systems to share files stored
on public storage media.
C. CIFS provides a way for NAS storage devices to share files in the UNIX environment.
D. NFS provides a way for NAS storage devices to share files in the Linux environment.
Answer: C

NO.66 In HUAWEI OceanStor V3, which of the following are characteristics of virtual snapshot LUN?
(Multiple Choice)
A. Virtual snapshot is based on the pointers specified in a mapping table.
B. A snapshot LUN cannot be mapped to hosts.
C. A full data replication is unnecessary.
D. Data is located using a mapping table.
Answer: ACD

NO.67 Which statement is true about RAID 2.0+?


A. Chunks belonging to a file will never be written on the same physical disk.
B. RAID 2.0+ has a higher RAID overhead than traditional RAID types.
C. With RAID 2.0+ it is supported to select no hot spare disks.
D. RAID 2.0+ allows for a complete enclosure to fail without causing data loss.
Answer: C

NO.68 Which of the following describe DAS? (Multiple Choice)


A. A storage device connects to a host using the SCSI-based bus architecture.
B. DAS is unfavorable to storage resource sharing.
C. The host CPU has a work load when storing data.
D. Long-distance transmission is supported between a host and a storage device.
Answer: ABC

NO.69 In HUAWEI OceanStor V3, which of the following statements about mapping a snapshot is
true?

13
IT Certification Guaranteed, The Easy Way!

A. Mapped snapshots are always Read-Only.


B. Snapshots optionally can be mapped to multiple hosts.
C. Snapshots can only be mapped to a the same host the original LUN was mapped to.
D. All of the answers are true
Answer: B

NO.70 What is best described as: the time it takes for the desired data to be beneath the read head
when the head is on the correct track?
A. Rotational latency
B. Rotational speed
C. Seek time
D. Throughput
Answer: A

NO.71 Which of the following are the 3 layers of components that storage systems are made up of?
(Multiple Choice)
A. Storage Analysis
B. Storage Solution
C. Storage Software
D. Storage Hardware
Answer: BCD

NO.72 Which of the following statements about RAID 10 are correct? (Multiple Choice)
A. RAID 10 applies to scenarios with demanding requirements for speed and fault tolerance.
B. RAID 10 requires at least four member disks.
C. In RAID 10, if two member disks in the RAID 1 group fail, data read proceeds normally.
D. Data is mirrored and then striped in RAID 10.
Answer: ABD

NO.73 Statement 1: VMware and XEN are examples of server virtualization applications.
Statement 2: Amazon S3 and Microsoft Azure are examples of a PaaS implementation.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.74 Which of the following is NOT true for a tape library?


A. Should be in the same datacenter as the production data for easy restores.
B. Can be a disk based Virtual tape library.
C. Ideally allows remote connections using FC and/or iSCSI.
D. Backup software will allow multiple backup jobs to run simultaneously.
Answer: A

14
IT Certification Guaranteed, The Easy Way!

NO.75 What are components of an ICT infrastructure? (Multiple Choice)


A. Hosts and Servers
B. Software
C. Network switches
D. Backup Devices
Answer: ACD

NO.76 Which of the following operating systems supports the CIFS protocol natively?
A. Win7
B. Solaris
C. FreeBSD
D. AIX
Answer: A

NO.77 Big Data refers to the process of collecting, processing and analyzing vast amount of data and
information to gain valuable insights.
A. TRUE
B. FALSE
Answer: A

NO.78 Which of the following is not a port type defined by Fibre Channel?
A. E-Port
B. F-Port
C. G-Port
D. NL-Port
Answer: D

NO.79 In HUAWEI OceanStor V3, what statement is true about SmartThin LUNs?
A. Space will be reclaimed in all Windows operating systems when data is deleted in the OS.
B. A Thin LUN cannot be converted into a Thick LUN.
C. SmartThin must be enabled on all LUNs of a storage pool.
D. SmartThin LUNs consume just a little storage capacity at the time they are created.
Answer: D

NO.80 In a SCSI connection, it is responsible to send SCSI commands to the target.


Which of the following fits the above description?
A. Target.
B. Initiator.
C. LUN.
D. Storage.
Answer: B

15
IT Certification Guaranteed, The Easy Way!

NO.81 Which of the following statements are characteristics of pre-copy technology? (Multiple
Choice)
A. Migrates data from a suspected faulty disk to a hot spare disk immediately after the error count of
the suspected faulty disk exceeds the preset threshold.
B. Reduces the occurrence of reconstruction.
C. Improves system reliability.
D. Reduces system performance.
Answer: ABC

NO.82 Which of the following is the common physical size division of the surface of the hard disk?
(Multiple Choice)
A. Track.
B. Sector.
C. Cylinder.
D. Partition.
Answer: ABC

NO.83 The failure of an SSD is more predictable than that of other disk technologies.
A. TRUE
B. FALSE
Answer: A

NO.84 The central backup question is: How much loss can be tolerated determines how much to
invest in backup?
A. TRUE
B. FALSE
Answer: A

NO.85 Which of the following statements about block virtualization technology for Huawei storage
systems are correct? (Multiple Choice)
A. Data is distributed to all disks, fully leveraging the read/write processing capability of a storage
system.
B. A RAID group is formed in the unit of physical disks.
C. A CKG is the unit used in applying for space, releasing space, and relocating data.
D. Data reconstruction efficiency improves significantly.
Answer: AD

NO.86 It is an electronic device controlled by a motor that moves the hard drive head arm.
Which of the following component fits the above description?
A. Actuator.
B. Spindle.
C. Platter.
D. Motor.

16
IT Certification Guaranteed, The Easy Way!

Answer: A

NO.87 A zone in a FC switch determines which ports of the FC switch can be connected together.
A. TRUE
B. FALSE
Answer: A

NO.88 Select which of the following which is not a properties of Distributed Object Storage
Architecture.
A. Automatic load balancing.
B. Online expansion.
C. Global namespace.
D. Centralized nodes.
Answer: D

NO.89 Statement 1: The retention period determines how many times per day a backup must be
made.
Statement 2: Incremental backups take a lot of time to complete.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: D

NO.90 When does data become information?


A. When it has been stored in the right file format.
B. When it has been stored in a digital form.
C. When the company understands the data and learns from it.
D. All of the above.
Answer: C

NO.91 You are the storage administrator of a media company that stores a lot of media files such as
videos. You are asked to propose a proper storage architecture for a new storage system that stores
all the video and graphic files of the company. The requirement is that it could run on commodity
hardware in a distributed manner for unstructured data. Choose which one of the following
architecture would be the better option.
A. Block Storage Architecture.
B. Clustered NAS Storage Architecture.
C. Distributed Storage Architecture.
D. Distributed Object Storage Architecture.
Answer: D

NO.92 When the RTO is 10 minutes the traditional Tape Backup method cannot be used.

17
IT Certification Guaranteed, The Easy Way!

A. TRUE
B. FALSE
Answer: A

NO.93 Which of the following are correct steps in a LAN based backup job? (Multiple Choice)
A. Agent on application server sends data to the backup device.
B. Agent on application server sends data to backup media server.
C. Backup media server sends data to the backup device.
D. Backup server sends a "start-backup" command to the backup device.
Answer: BC

NO.94 Huawei OceanStor V3 series storage system hardware includes controller enclosures and disk
enclosures.
Which of the following statements about controller enclosures are correct? (Multiple Choice)
A. A controller enclosure does not have disks. Disks are installed in disk enclosures.
B. A controller enclosure consists of controller modules, fan, BBU modules, power modules and/or
interface modules.
C. A controller enclosure is the core of a storage system.
D. A controller enclosure processes storage services and manages the disk enclosures connected to
it.
Answer: BCD

NO.95 Which of the following disk interface technologies use serial interface technology? (Multiple
Choice)
A. ATA
B. SATA
C. SAS
D. IDE
Answer: BCD

NO.96 HyperReplication for HUAWEI OceanStor V3 can use FC links between the data centers. iSCSI
links are not supported.
A. TRUE
B. FALSE
Answer: B

NO.97 Which of the following is not a component of a backup system?


A. Backup software
B. Backup media
C. Backup server
D. Backup policy
Answer: D

18
IT Certification Guaranteed, The Easy Way!

NO.98 Statement 1: Virtual Tape libraries allow for a highly scaleable backup strategy as storage can
be added later.
Statement 2: Virtual Tape Libraries should be used when remote datacenters are NOT available.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.99 Which of the following storage devices are non volatile? (Multiple Choice)
A. RAM
B. Hard Disk
C. Magnetic Tape
D. DVD
Answer: BCD

NO.100 Match the operating system with the protocol.


The operating systems include:
1. Windows
2. Linux
3. Apple OSX;
The protocols incude:
A - NFS
B - CIFS
C - SMB
A. 1 - A; 2 - C; 3 - A.
B. 1 - B+C; 2 - A; 3 - A.
C. 1 - A+D; 2 - A+B; 3 - A.
D. 1 - C; 2 - A+D; 3 - A.
Answer: B

NO.101 The restore time objective (RTO) specifies the time needed to recover the data and servers
after after a disaster has occured.
A. TRUE
B. FALSE
Answer: B

NO.102 Select the correct statements about the structure and functions of the hard disk
components. (Multiple Choice)
A. Disk platter is responsible of storing data in binary form.
B. The actuator is responsible of moving the Read/Write arm.
C. The spindle is responsible for sending commands to the disk head.
D. The disk connector is responsible of connection and rotation of the platter.
Answer: AB

19
IT Certification Guaranteed, The Easy Way!

NO.103 Statement 1: Fiber optic cables must be bended with a minimum radius of 10 centimeters.
Statement 2: Bends and dirt causes the light signal to be weaker and the sensor cannot detect the
light pulse then.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: C

NO.104 Which of the following are existing Solid State Disk types? (Multiple Choice)
A. DLC
B. eMLC
C. TLC
D. SLC
Answer: BCD

NO.105 Which of the following allows direct physical access to end users?
A. Network Switch.
B. Storage Array.
C. Backup System.
D. Clients.
Answer: D

NO.106 What is not a deciding parameter for Information LifeCycle Management?


A. How long data should be kept.
B. The amount of data.
C. The format in which the data must be kept.
D. What to do with data that is no longer required.
Answer: B

NO.107 Which of the following are attached to the storage system serially? (Multiple Choice)
A. ATA Drive.
B. SAS Drive.
C. NL-SAS Drive.
D. IDE Drive.
Answer: BC

NO.108 Which are characteristics of the HUAWEI OceanStor V3 hardware? (Multiple Choice)
A. SAN and NAS convergence
B. SSD and HDD convergence
C. No need for heterogeneous convergence anymore
D. Primary and Backup convergence

20
IT Certification Guaranteed, The Easy Way!

Answer: ABD

NO.109 The recovery point objective (RPO) is used to identify how much time lies between two
backups.
A. TRUE
B. FALSE
Answer: A

NO.110 Storage cache can optimize the speed of the storage system.
A. TRUE
B. FALSE
Answer: A

NO.111 Connecting an OceanStor 5300 V3 to three disk enclosures requires....... SAS cables.
A. 3
B. 6
C. 9
D. 12
Answer: B

NO.112 Statement 1: We have a a RAIDS protected group of disks. The protection level increases if
we add more disks to the group.
Statement 2: With a RAID 10 set the number of disks must be greater than 8 to always survive a dual
disk failure.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D

NO.113 For all operating systems there is a specific version of Huawei Ultra Path multipathing
software.
A. TRUE
B. FALSE
Answer: B

NO.114 What is the main difference between mechanical drives such as SAS with solid state drives
(SSD)?
A. The presence of mechanical parts.
B. The performance of the hard drive.
C. The capacity of hard drive.
D. The lifespan of hard drive.
Answer: A

21
IT Certification Guaranteed, The Easy Way!

NO.115 In an ICT infrastructure the servers can run different operating systems like Windows, Linux,
AIX.
A. TRUE
B. FALSE
Answer: A

NO.116 A user is having intermittent problems connecting to their shared network storage. A
network technician is able to determine that there is a problem within the network cabling in
between the workstation and the switch. All other users are able to connect successfully to the
network.
Which of the following is the MOST likely cause?
A. Patch cable is a crossover cable instead of straight-through.
B. Cable has been cut somewhere within the wall.
C. Crosstalk and interference are occurring.
D. Cable is not connected at the patch panel.
Answer: C

NO.117 Statement 1: FCoE is preferred over iSCSI because it uses fiber optic cables that can be much
longer than Ethernet cables.
Statement 2: FCoE is preferred over iSCSI because we do not need any Ethernet switches anymore.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D

NO.118 Statement 1: Creating an incremental backup is faster than creating a differential backup.
Statement 2: Restoring from an incremental backup is faster than from a differential backup.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.119 Grid storage employs the combination of large scale serial distributed storage to provide
even distribution of storage across all nodes.
A. TRUE
B. FALSE
Answer: B

NO.120 After the Ultra Path is installed on an application server, its operating system can
automatically identify the disks mapped from a storage device without being restarted.
A. TRUE
B. FALSE

22
IT Certification Guaranteed, The Easy Way!

Answer: B

NO.121 Because of the addition of the Data Center Bridging technology, today iSCSI is, just as FC, a
lossless protocol.
A. TRUE
B. FALSE
Answer: A

NO.122 A traditional RAID 10 set always has an even number of disks.


A. TRUE
B. FALSE
Answer: A

NO.123 Which of the following is true about NAS? (Multiple Choice)


A. Offers a uniform way to access files over an network.
B. Traffic between the NAS device and the workstation should be separated from traffic from the
workstation and the internet.
C. NAS storage capacity is dedicated to the NAS device.
D. NAS storage capacity can be block based storage.
Answer: ABC

NO.124 Storage controllers are only connected to disk enclosures within the SAN network.
A. TRUE
B. FALSE
Answer: B

NO.125 Select the correct statements that describes the properties of Distributed Storage
Architecture. (Multiple Choice)
A. The storage nodes are centralized.
B. The storage nodes are non centralized.
C. Concurrent I/O access.
D. Non concurrent I/O access.
Answer: BC

NO.126 Which of the following would best describe a virus?


A. When an employee goes against the company's ICT code of practice e.g. leaving workstation
logged on.
B. A piece of malicious code that is written by programmers and is used to corrupt data and systems.
C. When individuals or organizations break the law through using computers illegally access a
computer system.
D. Misuse of information provided by ICT systems for personal or malicious intentions.
Answer: B

NO.127 Which of the following statements is incorrect?

23
IT Certification Guaranteed, The Easy Way!

A. A RAID group is like a physical volume that consists of multiple disks.


B. One logical volume can be created on a physical volume.
C. Multiple logical volumes can be created on a physical volume.
D. A LUN can reside on multiple RAID groups.
Answer: D

NO.128 Which of the following statements about HUAWEI OceanStor V3 SmartTier dynamic storage
tiering technology is NOT true?
A. The SmartTier calculates and analyzes the activity level of data.
B. The SmartTier automatically and dynamically matches data from different activity levels with
storage media of different characteristics.
C. The SmartTier data relocation activities are based on configured policies.
D. Data statistics, analysis, and relocation activities of the SmartTier affect service continuity and
data availability.
Answer: D

NO.129 Which of the following is not involved in the SCSI Protocol Addressing?
A. Host ID.
B. BUS ID.
C. Device ID.
D. LUN ID.
Answer: A

NO.130 The maintenance network port is used, by the DeviceManager, for daily management.
A. TRUE
B. FALSE
Answer: B

NO.131 Given this scenario. A company wants replication of data between two data centers that are
2000 km apart.
Which replication method is most recommended?
A. Asynchronous
B. Synchronous
C. Both Asynchronous and Synchronous will work.
D. Synchronous but ONLY if the link is a high speed 8 Gb/s fiber optical connection.
Answer: A

NO.132 When a RAID configuration is in a degraded state it means that no data has been lost yet.
A. TRUE
B. FALSE
Answer: A

NO.133 Select the statements that are correct about the functions of network devices. (Multiple

24
IT Certification Guaranteed, The Easy Way!

Choice)
A. Routers do not separate the network into different broadcast domains.
B. Routers do not forward the broadcast frames in the network.
C. LAN switches place each port into a separate collision domain.
D. Hubs allow the separation of collision domains.
Answer: BC

NO.134 Cloud technology refers to the process of migrating all the local servers to an external online
datacenter for data protection purposes.
A. TRUE
B. FALSE
Answer: B

NO.135 Situation: Disk Domain A has 40 disks, Disk Domain B has 20 disks. True or False: the rebuild
time for a failed disk in Disk Domain B is longer than for a failed disk in Disk Domain A.
A. TRUE
B. FALSE
Answer: A

NO.136 Which of the following statements about the differences between DAS and SAN is incorrect
?
A. SAN uses the Fibre Channel or iSCSI protocol and therefore offers better scalability.
B. DAS and SAN are both external storage and can achieve storage resource sharing easily.
C. DAS applies to small and medium LANs that have general storage capacity requirements and only a
small number of servers.
D. SAN applies to mid-range and high-end storage application environments such as key databases,
centralized storage, mass storage, backup, and disaster recovery.
Answer: B

NO.137 Statement 1: Synchronous replication is often possible over distances of more than 100 km.
Statement 2: Asynchronous replication must be used when the host has a file system that is Linux
based.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: D

NO.138 What is effect of having foreign dust particles within the disk drives?
A. No effect as the disk has automatic surface cleaning.
B. It reduces the magnetic effect of the platter causing the disk to slow down.
C. Data may not be able to be written onto the platter.
D. The dust particle will change the content of data stored on the platter.

25
IT Certification Guaranteed, The Easy Way!

Answer: C

NO.139 What is a storage array?


A. A system that handles the communication of data from end users to its storage location and
provide confirmation on successful storage.
B. A system that manages the network functions and carries the data traffic from host to storage.
C. A system that has the management software that can provide access to its sets of hard drives or
tape libraries for the purpose of data access and storage.
D. A system that handles the interconnection of hosts to disks drives and allows hosts to directly
access the disks and use it as local drives.
Answer: C

NO.140 Statement 1: The higher the number used to indicate the RAID level, the higher the
overhead Statement 2: RAID 10 stripes the data, then mirrors the stripe set.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D

NO.141 What is NOT a parameter used to identify a hard disk?


A. Block size
B. Bandwidth
C. Rotations per minute
D. Latency
Answer: B

NO.142 Which of the following statements about SAS is false?


A. SAS is a point-to-point, full-duplex, and dual-port interface.
B. SAS drivers are incompatible with SATA controllers.
C. SAS features high performance and high reliability compared with SCSI.
D. SAS offers powerful scalability compared to SATA.
Answer: B

NO.143 An intelligent backup strategy involves multiple backup policies on the same production
data i.e. with different retention periods and different schedules.
A. TRUE
B. FALSE
Answer: A

NO.144 Which of the following is the end that receives and processes the SCSI commands?
A. LUN.
B. Storage.

26
IT Certification Guaranteed, The Easy Way!

C. Target.
D. Initiator.
Answer: C

NO.145 Which command is used to query the version of a Red Hat Linux 5 operating system?
A. show version
B. find version
C. cat version
D. uname -a
Answer: D

NO.146 When the RPO is minutes instead of hours the best backup method is traditional Tape
backup.
A. TRUE
B. FALSE
Answer: B

NO.147 Application program interface (API) is a set of routines, protocols, and tools for building
software applications.
A. TRUE
B. FALSE
Answer: A

NO.148 What is included in every backup job? (Multiple Choice)


A. Cost of Downtime.
B. Retention period.
C. Application that uses the data.
D. Backup type (full, incremental, differential).
Answer: BD

NO.149 What applies to unstructured data? (Multiple Choice)


A. After being written, the data is not often modified.
B. Uncertain value.
C. Large capacity, rapid growth.
D. Long-term storage required.
Answer: ABCD

NO.150 Which of the following statements about switched fabric topology in Fibre Channel SANs is
NOT true?
A. It is the most widely used topology that supports a maximum of 127 devices.
B. Multiple pairs of nodes connecting to switches can communicate simultaneously.
C. The fault of one node in a zone does not affect services on nodes in other zones.
D. The switches leverage zoning to manage network structure and provide the best interconnection

27
IT Certification Guaranteed, The Easy Way!

form.
Answer: A

NO.151 The mount command is used in Linux-based clients to connect the client to the NFS share.
A. TRUE
B. FALSE
Answer: A

NO.152 Statement 1: NAS solutions are always file based.


Statement 2: NAS solutions are mostly limited in distance because Ethernet cables are used.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: A

NO.153 If a disk domain has multiple disk types then the storage pools in that disk domain also
MUST have multiple disk types in them.
A. TRUE
B. FALSE
Answer: B

NO.154 Which of the following statements about LAN-based backup is incorrect?


A. Instruction flows are transmitted over the LAN whereas data flows are not.
B. The backup agent affects the performance of application servers.
C. Backup data is based on LANs, affecting network performance.
D. Backup jobs must be separately maintained, complicating management and maintenance.
Answer: A

NO.155 Which of the following are deployment modes of cloud computing? (Multiple Choice)
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. E-Government cloud
Answer: ABC

NO.156 SAN is a storage architecture that connects storage device and application servers through
network.
A. TRUE
B. FALSE
Answer: A

NO.157 Currently all OceanStor V3 devices support SAS at 12 Gb/s.


A. TRUE

28
IT Certification Guaranteed, The Easy Way!

B. FALSE
Answer: A

NO.158 Which of the following is an example of unstructured data? (Multiple Choice)


A. Images
B. SQL Databases
C. NoSQL Databases
D. Video
Answer: AD

NO.159 Statement 1: An ICT infrastructure should be built with high end equipment and be located
in one site.
Statement 2: A server is a rackmounted enterprise version of a desktop computer and typically has
more than one hard disk installed.
A. Statement 1 and Statement 2 are both True.
B. Statement 1 is True; Statement 2 is False.
C. Statement 1 is False; Statement 2 is True.
D. Stament 1 and Statement 2 are both False.
Answer: C

NO.160 Which of the following methods provides the best RTO?


A. Disk-To-Tape
B. Disk-To-Disk-To-Tape
C. Replication
D. Virtual Tape Library
Answer: C

NO.161 Which of the following is NOT the characteristics of the active-active mode of a storage
controller?
A. Two controllers process the I/O requests from application servers concurrently.
B. If a controller becomes faulty, the other takes over the work of the faulty controller without
disrupting ongoing services.
C. The primary controller processes the I/O requests from application servers and the secondary
controller is in the idle state.
D. The active-active mode achieves load balancing, full utilization of resources, and system
performance improvement.
Answer: C

NO.162 Depending on the amount of data to be backed up, which of the types are actual backup
methods? (Multiple Choice)
A. Real-time backup
B. Full backup
C. Incremental backup

29
IT Certification Guaranteed, The Easy Way!

D. Differential backup
Answer: BCD

NO.163 A hybrid cloud is an environment where a public and private cloud solution is used
simultaneously
A. TRUE
B. FALSE
Answer: A

NO.164 Incremental backup requires the last full backup and each incremental backup to fully
restore data. Data reconstruction is therefore slower compared with full backups.
A. TRUE
B. FALSE
Answer: A

NO.165 In a good Disaster Recovery Plan there are no single points of failure, not even with any
single person.
A. TRUE
B. FALSE
Answer: A

NO.166 Statement 1: Multimode optic cables are usually longer than single mode cables.
Statement 2: Sharp cable bends lead to weaker signal at the end of the cable.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: C

NO.167 Which of the following statements about the coffer disks of the HUAWEI V3 series storage
systems are correct? (Multiple Choice)
A. Coffer disks store cache data to prevent data loss after a power failure.
B. BBUs supply power to cache and coffer disks in the event of unexpected power failure.
C. Coffer disks cannot be used to save service data.
D. The first 2 disks in a controller enclosure are coffer disks.
Answer: AB

NO.168 You need to manually set free disks as hot spare disks in a Huawei OceanStor V3 storage
system when you use RAID 2.0+.
A. TRUE
B. FALSE
Answer: B

NO.169 In a RAID 5 group comprised of three disks, if 10110110 and 11010011 are written to the

30
IT Certification Guaranteed, The Easy Way!

same stripe on the two data disks, respectively, 01100101 is calculated using the XOR function and
then written to the parity disk.
A. TRUE
B. FALSE
Answer: A

NO.170 SmartThin provided by HUAWEI OceanStor V3 storage systems is a technology that manages
storage space by allocating storage resources on demand. Based on virtualization, SmartThin reduces
physical storage resources to be deployed, maximizing storage space use efficiency.
A. TRUE
B. FALSE
Answer: A

NO.171 Which is NOT the limitation of DAS, compared with SAN?


A. Poor scalability
B. Large investment
C. Difficult resource sharing
D. Decentralized management
Answer: B

NO.172 Which of the following best describes SDN?


A. Using a software program to manage your network.
B. The virtualization of network services to achieve better efficiency and scalability.
C. Decoupling of the data plane and control plane in networks.
D. Using hardware to manage the network.
Answer: C

NO.173 HUAWEI OceanStor V3 SmartTier can be used to position files to be on specific disk drive
types.
A. TRUE
B. FALSE
Answer: A

NO.174 Based on the new industrial revolution, what are the changes in the trend of ICT? (Multiple
Choice)
A. ICT trend is changing slowly with little significant changes.
B. The initial phases of ICT focuses on office automation but slowly changed towards changing
business flows.
C. ICT is slowly being replaced by other new technologies such as IT and CT.
D. ICT has become the core in the production systems in the recent yeans.
Answer: BD

NO.175 Which of the following statements about LAN-free backup is incorrect?

31
IT Certification Guaranteed, The Easy Way!

A. Backup data flows do not consume LAN resources.


B. The backup agent does not affect the performance of application servers.
C. Backup performance is improved compared to LAN- based backups.
D. Network performance is not affected.
Answer: B

NO.176 Which of the following statements about Disaster Recovery is NOT true?
A. Some data loss must be accepted.
B. After a disaster access to the data, on the remote site, can be immediate.
C. Applications to work with the recovered data is in place.
D. There are still traditional backup strategies in place.
Answer: A

NO.177 Statement 1: Port zoning is preferred for zoning a FC switch when there are a lot of changes
to the patch points.
Statement 2: Alias zoning is a user friendly version of soft zoning.
A. Statement 1 and 2 are true
B. Statement 1 is true; Statement 2 is false
C. Statement 1 is false; Statement 2 is true
D. Statement 1 and 2 are false
Answer: C

NO.178 Which of the following disks has the best performance in terms of speed?
A. NL-SAS
B. SAS
C. SSD
D. SATA
Answer: C

NO.179 It is the interconnection via the Internet of computing devices embedded in everyday
objects, which enables them to send and receive data.
Which of the following fits the statement above?
A. Cloud.
B. Big Data.
C. Social Media.
D. Internet Of Things.
Answer: D

NO.180 The storage controller can only provide processing and caching functions.
A. TRUE
B. FALSE
Answer: B

32
IT Certification Guaranteed, The Easy Way!

NO.181 Dual-switch networking is widely applied in Fibre Channel SANs.


Which of the following are its characteristics? (Multiple Choice)
A. Two Fibre Channel switches are deployed in a SAN for connecting to the two controllers of a
storage device.
B. Per host two fibre channel ports should be available. The two Fibre Channel ports connect to two
Fibre Channel switches.
C. The ports on the two Fibre Channel switches connecting to the hosts and storage device must
reside in the same zone.
D. As multiple paths exist, the dual switch networking mode supports link redundancy but does not
support load balancing.
Answer: ABC

NO.182 In HUAWEI OceanStor V3, for synchronous replication to be successful, all host applications
must be pauzed during the replication update process.
A. TRUE
B. FALSE
Answer: B

NO.183 It is a hard-disk failure that occurs when a read-write head of a hard disk drive comes in
contact with its rotating platter, resulting in permanent and usually irreparable damage to the
magnetic media on the platter surface.
Which of the following fits the above description?
A. Electrical Failure.
B. Bad Platter Area.
C. Bad Sector.
D. Head Crash.
Answer: D

NO.184 If no data migration plan is set, with SmartTier enabled, there will be no data movement at
all between tiers.
A.TRUE
B.FALSE
Answer: A

NO.185 Which of the following is not a characteristic of the Cloud?


A. Ubiquitous Access.
B. Shared pool of configurable resources.
C. On Demand Self Service.
D. Quick analysis of vast amount of data.
Answer: D

NO.186 Which is the correct formation order of the following elements in RAID 2.0+?
A. LUN -> CK -> CKG -> Extent -> LD

33
IT Certification Guaranteed, The Easy Way!

B. LD -> CKG -> CK -> Extent -> LUN


C. LD -> CK -> CKG -> Extent -> LUN
D. LD -> Extent -> CKG -> CK -> LUN
Answer: C

NO.187 The HyperSnap functionality can be used to improve or optimize a company's backup
strategy.
A. TRUE
B. FALSE
Answer: A

NO.188 It is a device which manages the physical disk drives and presents them to the users as
logical units.
Which of the following device fits the above description?
A. Host.
B. Storage NIC.
C. Storage Controller.
D. Storage Cache.
Answer: C

NO.189 In a Red Hat Linux 5 operating system, which command is used to mount the sdb5 in the dev
directory to the sdb5 in the mnt directory?
A. cat /dev/sdb5 /mnt/sdb5
B. In /dev/sdb5 /mnt/sdb5
C. mount /dev/sdb5 /mnt/sdb5
D. df /dev/sdb5/mnt/sdb5
Answer: C

NO.190 In HUAWEI OceanStor V3, HyperSnap of a LUN uses the Copy On Write method to keep
track of changes blocks
A. TRUE
B. FALSE
Answer: A

NO.191 In Windows 2012 deleting data from a volume, based on a Thin LUN, means that NO storage
space will be reclaimed by the HUAWEI OceanStor V3.
A. TRUE
B. FALSE
Answer: B

NO.192 Which one of the following component is responsible for rotating the disk platter in the disk
drive?
A. Spindle.

34
IT Certification Guaranteed, The Easy Way!

B. Actuator.
C. Control Circuit Board.
D. Read/Write Arm.
Answer: A

NO.193 Multipathing software is only needed in SAN solutions with just a single switch.
A. TRUE
B. FALSE
Answer: B

NO.194 When determining hard disk performance, which of the following are relevant. (Multiple
Choice)
A. Rotational speed.
B. Seek time.
C. Transfer time.
D. Transfer rate.
Answer: ABD

NO.195 Many companies gather so much data that they cannot extract the right information from
the data.
A. TRUE
B. FALSE
Answer: A

NO.196 Which of the following statements are true for a NAS solution? (Multiple Choice)
A. Cable length is around 10 m.
B. Block size is configurable.
C. CIFS and NFS are both commonly used protocols.
D. NAS clients are connected to the NAS server using Ethernet switches.
Answer: CD

NO.197 Storage controllers can be separated from the chassis of disk enclosures. It does not need to
be integrated in design with the disk enclosures.
A. TRUE
B. FALSE
Answer: A

NO.198 Which of the following are the supported data storage architecture of modern storage
array? (Multiple Choice)
A. File Storage.
B. Object Storage.
C. Block Storage.
D. Fusion Storage.

35
IT Certification Guaranteed, The Easy Way!

Answer: ABC

NO.199 Data is the record that reflects the attributes of objective things and is the physical
manifestation of information.
A. TRUE
B. FALSE
Answer: A

NO.200 What are the main considerations when you are buying HDDs? (Multiple Choice)
A. Capacity
B. Rotational speed
C. Average access time
D. Sector size
Answer: ABC

NO.201 Statement 1: RAID 2.0+ offers better protection against data loss than traditional RAID and
it performs much better.
Statement 2: To rebuild a RAID 2.0+ protected failed drive takes a lot of time as all drives are involved
in the rebuild of the spare disk.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: B

NO.202 Which of the following occurs after muItipathing software is installed on a host?
(Multiple Choice)
A. Maps a LUN to the host.
B. Avoids logical errors from occurring in the operating system as a result of multiple reachable paths
to the same LUN.
C. Improves link reliability and prevents the failure of a single link from causing a system failure.
D. Sets up connection between a storage device and the host.
Answer: BC

NO.203 The components of a storage device are redundant, including controller modules,
management modules, BBU modules, interface modules, power modules, and fan modules.
Component redundancy ensures system reliability.
A. TRUE
B. FALSE
Answer: A

NO.204 Using SmartThin gives extra responsibility for the SAN administrator because there is a risk
of over-provisioning storage capacity.
A. TRUE

36
IT Certification Guaranteed, The Easy Way!

B. FALSE
Answer: A

NO.205 A customer needs zoning configured in a Fibre Channel switch. The customer frequently
changes the patch points in the infrastructure.
What zoning method is preferred then?
A. Port zoning because it is more flexible when it comes to changing patch points.
B. Soft zoning because it is more flexible when it comes to changing patch points
C. Port zoning and Soft zoning should always be used together.
D. Zoning is not required in a FC SAN.
Answer: B

NO.206 What is required to add additional controllers to an existing HUAWEI OceanStor V3 system?
A. SAS cabling
B. Smart I/O card
C. 56 Gb Infiniband module
D. FC or iSCSI Host Bus Adapter
Answer: B

NO.207 Which module is not in the disk enclosure of a storage device?


A. Fan module
B. Power module
C. Expansion module
D. BBU module
Answer: D

NO.208 Which of the following is NOT a benefit of cloud datacenters?


A. Mainframe servers improve performance.
B. Virtualization technology improves resource utilization.
C. Distributed computing and storage improve reliability.
D. Unified resource management improves efficiency.
Answer: A

NO.209 Statement 1: Disaster Recovery plans eliminate the need for backups on tape or disk.
Statement 2: With the design of the DR plan one should always assume the worst possible scenario.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: C

NO.210 Which of the following statements about pre-copy is incorrect?


A. Pre-copy is the process of copying data from a failing member disk to a hot spare disk.

37
IT Certification Guaranteed, The Easy Way!

B. Data to be pre-copied must be reconstructed and calculated.


C. Pre-copy greatly reduces the risk of data loss.
D. Pre-copy requires hot spare disks.
Answer: B

NO.211 Which of the following system model is a direct representation of the SCSI connection
between the SCSI Initiator and Target?
A. Serverless Architecture.
B. Peer to Peer Architecture.
C. Browser/Client Architecture.
D. Client/Server Architecture.
Answer: D

NO.212 A differential backup holds all changes that were made since the last successful full backup.
A. TRUE
B. FALSE
Answer: A

NO.213 Which of the following dimensions are often used to express the data used in Big Data
scenarios? (Multiple Choice)
A. Variety
B. Volume
C. Velocity
D. Verticality
Answer: ABC

NO.214 Which of the following statements about RAID 5 are correct? (Multiple Choice)
A. RAID 5 has fixed parity disks.
B. RAID 5 uses the XOR algorithm for parity.
C. RAID 5 writes data by stripes.
D. RAID 5 tolerates the failure of a maximum of two member disks without losing data.
Answer: BC

NO.215 Which of the following statements is true? (Multiple Choice)


A. A SAS disk generally has more IOPS than a SATA disk.
B. only SLC SSD are used in Enterprise level systems.
C. the realized transfer speed of SSD is higher than that of SAS.
D. SSD are cheaper than HDD because they are physically much smaller.
Answer: AC

NO.216 What is the purpose of context for data?


A. Context gives meaning to the data collected. Without context the data is meaningless.
B. Context gives comparison between data and information.

38
IT Certification Guaranteed, The Easy Way!

C. Context is only found in data and not in information.


D. Context is optional when collecting and analyzing data.
Answer: A

NO.217 CIF5 can be run on UDP as well as on TCP


A. TRUE
B. FALSE
Answer: B

NO.218 Lifecycle Management Of Information and Data consists of 5 different stages.


Which of the following is the second stage?
A. Maintenance.
B. Transmission.
C. Generation.
D. Usage.
Answer: B

NO.219 Statement 1: If possible it is always advised to make only Full Backups Statement 2: LAN free
backups typically run slower than LAN based backups.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B

NO.220 Synchronous replication in OceanStor V3 devices is based on the snapshot technology.


A. TRUE
B. FALSE
Answer: B

NO.221 Which of the following technologies are able to quickly obtain valuable information from a
variety of data types in a short period of time from a collection of vast amounts of data?
A. Cloud.
B. Big Data.
C. Social Media.
D. Internet Of Things.
Answer: B

NO.222 Host is a computing system consisting of hard drives or file system that can provide data
access and storage.
A. TRUE
B. FALSE
Answer: A

39
IT Certification Guaranteed, The Easy Way!

NO.223 What is the main difference between desktop grade hard drives with enterprise grade hard
drives which is the deciding factor in hard drive usage?
A. The presence of mechanical parts.
B. The performance of the hard drive.
C. The capacity of hard drive.
D. The lifespan of hard drive.
Answer: B

NO.224 Which of the following statements is NOT true? (Multiple Choice)


A. CIFS is a network-based sharing protocol. It has high demands on network transmission reliability,
so it usually uses TCP/IP.
B. One disadvantage of CIFS is that Windows clients must be equipped with dedicated software.
C. NFS is a stateless protocol while CIFS is a stateful protocol. NF5 can be automatically recovered
from a fault while CIFS cannot
D. Both the CIF5 as well as the NFS protocol requires file format conversion.
Answer: BD

NO.225 Which of the following statements about RAID technology are correct? (Multiple Choice)
A. Disks are striped for storing data blocks, shortening the mechanical seek time and accelerating
data access.
B. Several disks in an array are accessed simultaneously (parallel access), shortening the mechanical
seek time and accelerating data access.
C. Current RAID technology only uses the parity check mechanism to protect data.
D. Performance of all RAID levels increases with the number of member disks.
Answer: AB

NO.226 What does the term RPO mean?


A. Return Purchase Order
B. Recover Plan Objective
C. Restore Point Objective
D. Recovery Point Objective
Answer: D

NO.227 Which of the following is NOT a port name in Fibre Channel.


A. FL_Port
B. E_Port
C. TX_Port
D. U_Port
Answer: C

NO.228 In high end storage systems, what is the main function of the service processor?
A. To manage the I/O commands and complete disk operations.
B. To process the network service.

40
IT Certification Guaranteed, The Easy Way!

C. To maintain the interconnection of disk drives within the enclosures.


D. To optimize the speed of I/O operations.
Answer: A

NO.229 HyperSnap for Block is based on Redirect-On-Write.


A. TRUE
B. FALSE
Answer: B

NO.230 Statement 1: A Solid State Disk drive can withstand strong vibrations.
Statement 2: A Solid State Disk drive has only a few mechanical parts.
A. Statement 1 and 2 are true
B. Statement 1 is true; Statement 2 is false
C. Statement 1 is false; Statement 2 is true
D. Statement 1 and 2 are false
Answer: B

NO.231 Which of the following is the correct procedure for configuring a HUAWEI OceanStor V3
storage system?
A. Creating a Storage pool -> Creating a LUN -> Adding a mapping.
B. Creating a Storage pool -> Adding a mapping -> Creating a LUN.
C. Creating a LUN -> Creating a Storage pool -> Adding a mapping.
D. Creating a LUN -> Adding a mapping -> Creating a Storage pool.
Answer: A

NO.232 Each organization independently determines which data should be stored and for how long.
A. TRUE
B. FALSE
Answer: B

NO.233 Statement 1: Multipathing is caused by adding redundant hardware.


Statement 2: Huawei offers a different version of Ultra Path for different operating systems.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: A

NO.234 Statement 1: A disk drive with a high latency performs better than a disk drive with a low
latency.
Statement 2: A smaller seek time means that the disk performs better.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.

41
IT Certification Guaranteed, The Easy Way!

C. Statement 1 is false; Statement 2 is true.


D. Statement 1 and 2 are false.
Answer: C

NO.235 When using LAN-based backups it is best to create a dedicated backup network.
A. TRUE
B. FALSE
Answer: A

NO.236 In which stage of the lifecycle management of information and data, does the data
management operation such as copying and backup occurs?
A. Generation.
B. Transmission.
C. Maintenance.
D. Usage.
Answer: C

NO.237 In storage systems, what does throughput refers to?


A. Amount of data that can be received and written to the storage medium in a period of time.
B. Amount of data that can be transmitted and received over network in a period of time.
C. Amount of signals that can be sent or received by processors in a period of time.
D. Amount of calculations that can be processed in a period of time.
Answer: A

NO.238 Clustered NAS can provide concurrent multi-node access of data to hosts.
A. TRUE
B. FALSE
Answer: A

NO.239 IP SAN uses underlying optical networks to connect servers and storage systems.
A. TRUE
B. FALSE
Answer: B

NO.240 What is typical for a DAS solution? (Multiple Choice)


A. More scaleable in capacity than a SAN solution
B. Consists of a server/host with its locally connected disk drives
C. Sharing of files between DAS solutions is possible via the network.
D. Backups are centrally made on a special backup server.
Answer: BD

NO.241 About HUAWEI OceanStor V3, the following 2 statements:


Statement 1: With the SmartTier feature the SSD disks are in the Performance Tier.

42
IT Certification Guaranteed, The Easy Way!

Statement 2: No more than 3 tiers can exist in the OceanStor V3 storage arrays.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: C

43
iTB - TTT training HCIA – Cloud Question Bank

======================

Q1) Which of the following does not reflect the self- service feature of cloud computing? (Single answer)

a) Engineer A purchases an ECS from HUAWEI CLOUD to meet his/her own requirements
b) Engineer B changes the operating system of the ECS purchased by himself/herself from Linux to
Windows
c) Engineer C increases the number of CPUs of the ECS purchased by himself/herself from 2 to 4.
d) Engineer D receives an SMS notification from the ECS provider one week before the ECS expires.

Q2) Which of the following is about the on-demand self-service feature of cloud computing? (Single
answer)

a) Users do not need to communicate the service providers at all when using cloud computing
resources.
b) After determining the required cloud computing service, users can apply for cloud computing
resources by themselves.
c) The cloud computing service providers only need to prepare the cloud services and users will
complete remaining process all by themselves.
d) When using cloud computing resources, the users need to solve all by problems by themselves.

Q3) Which of the following are true about the ubiquitous network access feature of cloud computing?
(Multiple answers)

a) With network connections, users can use purchased cloud computing resources from different
terminals.
b) With network connections, users can use purchased cloud computing resources at different
places.
c) With network connections, users can connections, users can use purchased cloud computing
resources anytime.
d) With network connections, users can view the status of purchased cloud computing resources
anytime.

Q4) Which of the following is true about the resource pooling feature of cloud computing? (single answer)

a) The resource pooling feature of cloud computing shields the difference between resources of the
same type.
b) The resource pooling feature of cloud computing allows CPUs and disks to be added to the same
resource pool.
c) The resource pooling feature of cloud computing is the prerequisite for the ubiquitous network
access feature.
d) The resource pool feature of cloud computing depends on the virtualization technology

1|Page
Q5) Which of the following are true about the fast and elastic scaling feature of cloud computing?
(Multiple answers)

a) Engineer A purchases an ECS on HUAWEI CLOUD.


b) Engineer B increases the number of CPUs of an ECS purchased on HUAWEI CLOUD from 2 to 4.
c) Engineer C increases the number of ECSs in a cluster to 10 during the Double 11 (November 11)
shopping festival and restores the number of ECSs to 4 one week later.
d) An ECS purchased by engineer D is reclaimed after it expires due to no renewal.

Q6) The measurable service feature of cloud computing refers to charging based on time and usage.

a) True
b) False

Q7) Cloud computing is a product of Internet and computing technologies development. Therefore, cloud
computing is indispensable of network connections.

a) True
b) False

Q8) There are many milestone events in milestone events in the development of the Internet. Which of
the following is true about the time sequence of the milestone events? (Single answer)

a) the Establishment of TCP/IP protocol --> Birth of ARPANET -> "www officially open to the public -
-> Birth of DNS
b) Birth of DNS --> Establishment of the TCP/IP protocol Birth of ARPANET -> "www officially open
to the public
c) "www officially open to the public →Birth of DNS --> Establishment of the TCP/IP protocol →Birth
of ARPANET
d) Birth of ARPANET --> Establishment of the TCP/IP protocol --> Birth of DNS → "www officially
open to the public

Q9) Which of the following is true about cloud computing? (single answers)

a) Cloud computing is a technology that enables users to obtain IT resources anytime and anywhere.
b) Various IT resources of cloud computing can be used only after being paid.
c) The IT resources of cloud computing can be used only through network connections.
d) During the process of obtaining IT resources, users need to repeatedly negotiate with cloud
computing service provider.

Q10) which of the following can implement computing virtualization and improve resource utilization in
the era of cloud computing 1.0? (Multiple answers)

2|Page
a) KVM.
b) Open Stack.
c) Hyper-V
d) Xen

Q11) When a cloud computing service provider offers cloud services to a customer, the customer needs
only to inform the provider of the required resources or applications. Then the provider will provide the
resources or applications immediately. When the customer needs to expand or reduce the capacity, the
service provider can change the resources or applications accordingly. Which feature of cloud computing
is reflected by the preceding description? (single answer)

a) Ubiquitous network access.


b) Resource pooling
c) Measurable service
d) Fast and elastic scaling
e) On-demand self-services

Q12) Hybrid cloud is a deployment mode that integrates features of the public cloud and private cloud.
he industry cloud is a form of hybrid cloud.

a) True
b) False

Q13) Which of the following is the difference between the public cloud and the private cloud? (single
answer)

a) The public cloud has industry attributes, but the private cloud does not.
b) The private cloud has industry attributes, but the public cloud does not.
c) The public cloud is open to the public, while the private cloud is only open to specific users.
d) Public cloud services the need to be paid, while private cloud services are free of charge.

Q14) The cloud services purchased by a user include an application running environment, but do not
contain any application or related data. This mode is ( ). (Single answer)

a) laaS.
b) PaaS.
c) SaaS.
d) Naas

Q15) Which of the following belongs to the SaaS mode of HUAWEI CLOUD? (Single answer)

a) Elastic cloud server (ECS)


b) Facial recognition
c) Elastic Volume Service (EVS)
d) Object Storage Service (OBS)

3|Page
Q16) laaS in cloud computing refers to ( ). (Single answer)

a) Information as a Service
b) Infrastructure as a Service
c) Industry as a Service
d) Instruction as a Service

Q17) On HUAWEI CLOUD, a user has applied for an ECS that has only the operating system installed. This
servicer. mode is ( ). (Single answer)

a) laaS
b) PaaS
c) SaaS
d) NaaS

Q18) Which of the following are true about the cloud computing deployment modes? (Multiple answers)

a) The private cloud is deployed on the premises of enterprises and used by internal employees.
b) The public cloud is generally constructed by carriers or cloud service providers. It sells or leases
services to the public.
c) The hybrid cloud is generally constructed by carriers or cloud service providers. It integrates the
features of the public cloud and private cloud. It sells or leases services to the public.
d) The industry cloud generally has attributes of a certain industry, which is a large private cloud" or
"small public cloud".

Q19) A user applies for an ECS on HUAWEI CLOUD. Which of the following about ECS are true? (Multiple
answers)

a) The operating system of the ECS can be provided by HUAWEI CLOUD or created by the user.
b) If an IP address is configured for the ECS, the service mode is PaaS. Otherwise, the service mode
is laaS.
c) You can log in to the ECS through a PC or a mobile phone.
d) Running of the ECS requires the local
e) hardware resources of the user.

Q20) If an enterprise deploys a hybrid cloud, which of the following devices cannot be used to set the
boundary between the public cloud and private cloud? (Multiple answers)

a) Virtual switch
b) Core switch
c) Firewall
d) Traffic cleaning device

Q21) Which of the following is true about virtualization? (single answer)

a) Applications that can run on physical machines can also run on VMs.
b) VMs with different virtualization technologies can be mutually converted.
c) virtualization improves the unification of hardware resources.
d) virtualization and non-virtualization resources cannot coexist in one data center.

4|Page
Q22) Generally, a VM has a configuration file that records the specifications and name of the VM.

a) True
b) False

Q23) Which of the following is an open-source virtualization technology? (single answer)

a) Hyper-V
b) KVM
c) vSphere
d) Fusion Compute

Q24) Which of the following are false about virtualization? (Multiple answers)

a) In cloud computing, virtualization at the laaS layer consists of computing virtualization, storage
virtualization and network virtualization.
b) Computing virtualization includes CPU virtualization, memory virtualization, and I/O
virtualization.
c) Storage virtualization refers to distributed storage.
d) Network virtualization refers to distributed virtual switches.

Q25) Which of the following belong to computing virtualization? (Multiple answers)

a) CPU virtualization
b) Memory virtualization
c) Disk virtualization
d) Network virtualization
e) I/O virtualization

Q26) The main reason for the rapid development of virtualization is that the VM outperforms the physical
machine and has a wider application scope.

a) True
b) False

Q27) Cloud computing is a product of parallel computing, grid computing, and distributed computing.
Which of the following is true about their relationship? (single answer)

a) Distributed computing completely replaces grid computing.


b) Grid computing completely replaces parallel computing.
c) Cloud computing is a type of distributed computing.
d) Parallel computing, grid computing, and distributed computing all belong to cloud computing

Q28) The main driving force behind the emergence and development of virtualization technologies is ( ).
(single answer)

a) Make full use of hardware resources.


b) Emergence of the Internet
c) Enhance the identification of hardware resources.
d) Reduce the failure rate of hardware resources.

5|Page
Q29) Which of the following belongs to the host machine role in Huawei FusionCompute architecture?
(single answer)

a) UVP
b) KVM
c) VRM
d) CNA

Q30) In Huawei FusionCompute, a VM running Linux is created. In this scenario, the host OS runs in ( ).
(single answer)

a) VRM
b) Linux VM
c) CNA
d) VNA

Q31) In computing virtualization, the operating system running in a VM is referred to as the host OS.

a) True
b) False

Q32) In computing virtualization, the hypervisor is an intermediate software layer running between the
physical server and the OS. It monitors the status of the host OS

a) True
b) False

Q33) Which of the following is false about the hypervisor? (single answer)

a) In virtualization, only the hypervisor can directly access physical resources.


b) In virtualization, the hypervisor can monitor the status of the guest machine.
c) In virtualization, the hypervisor can directly run on the host machine.
d) In virtualization, the hypervisor and VMM are the same concept.

Q34) Which of the following are true about the relationship between the host machine and guest
machine? (Multiple answers)

a) With the virtualization technology, one host machine can run multiple guest machines.
b) With the virtualization technology, one guest machine can use resources of multiple host
machines.
c) With the virtualization technology, one host machine can run only one hypervisor.
d) With the virtualization technology, one guest machine can run only on the host machine where it
is created.

6|Page
Q35) Which of the following are true about the type I (bare metal) computing virtualization? (Multiple
answers)

a) Applications can directly run on VMM.


b) Applications and VMs can directly run on the host OS.
c) The hypervisor directly runs on physical hardware.
d) Application cannot directly run on the host machine.

Q36) Which of the following is true about the type II (hosted) virtualization? (single answer)

a) VMM runs on the host OS.


b) VMM directly runs on the host machine.
c) VMM runs on the guest OS.
d) VMM runs on the guest machine

Q37) Open-source virtualization technologies are all type I virtualization. Closed source virtualization
technologies are all type II virtualization.? (single answer)

a) True
b) False

Q38) If a VM on a physical host is faulty, other VMs on the physical host are not affected. Which of the
following feature of the virtualization technology is reflected by the preceding description? (single
answer)

a) Partition
b) Isolation
c) Encapsulation
d) Independence

Q39) Which of the following are used to allocate CPU and memory resources to VMs in computing
virtualization? (Multiple answers)

a) Host OS
b) Guest OS
c) VMM
d) Hypervisor

Q40) Computing virtualization technologies can be classified into type I and type II virtualization or full
virtualization and paravirtualization from different perspectives.

a) True
b) False

Q41) A VM consists of the VM configuration file and disk file. Users can move the two files to run the VM
on different physical hosts. Which features of cloud computing are reflected by the preceding description?
(Multiple answers)

7|Page
a) Encapsulation
b) Isolation
c) Independence
d) Partition

Q42) Which of the following are true about the encapsulation feature of virtualization? (Multiple answers)

a) Multiple VMs can concurrently run on a physical host.


b) If a VM has multiple disks, each disk generates a corresponding disk file.
c) The VM configuration file contains information such as the CPU type and quantity.
d) VMs can be migrated from one physical host to another.

Q43) Which of the following best demonstrate the advantages of virtualization? (Multiple answers)

a) With the virtualization technology, multiple applications can concurrently run on the
b) operating system of a physical host.
c) With the virtualization technology, the CPU usage of a physical host keeps around 65%.
d) With the virtualization technology, VMs can be migrated between hosts.
e) With the virtualization technology, multiple VMs can concurrently run on a physical host.

Q44) Virtualization is applicable to which of the following scenarios? (Multiple answers)

a) A company has 10 service systems. The resource usage rate of the hosts running the service
systems is less than 20%.
b) All employees in a company almost use the same office desktop applications.
c) A scientific research institute uses a customized operating system to ensure the confidentiality of
scientific research results.
d) An enterprise requires a high-load and compute-intensive environment.

Q45) The reasons why the computing virtualization technology can improve application reliability are ( ).
(Multiple answers)

a) VMs that run applications are decoupled from hardware, enabling VMs to migrate between
physical hosts.
b) The computing virtualization technology enables multiple applications to concurrently run on the
same physical host.
c) The computing virtualization technology can automatically adjust VM specifications.
d) The computing virtualization technology can automatically allocate VMs that run applications to
physical hosts with sufficient resources.

Q46) Which of the following are true about the relationship between virtualization and cloud computing?
(Multiple answers)

a) Virtualization is one of the technologies to implement cloud computing.


b) Virtualization is a technology. Cloud computing is a service mode. Virtualization promotes the
development of cloud computing.

8|Page
c) Without cloud computing, virtualization has no value.
d) Without virtualization, cloud computing has no value.

Q47) The virtualization technology can improve hardware resource utilization and reduce O&M costs.
Cloud computing also has these advantages. Therefore, cloud computing and virtualization technologies
are inseparable from each other.

a) True
b) False

Q48) Some virtualization technologies are opensource and some are closed-source. So does the cloud
computing management platform. The open-source cloud computing management platform needs to be
implemented by opensource virtualization technologies.

a) True
b) False

Q49) The CPU virtualization technologies can be classified into full virtualization, paravirtualization,
software virtualization, and hardware-assisted virtualization.

a) True
b) False

Q50) Which of the following are true about KVM virtualization? (Multiple answers)

a) The host OS can be Linux.


b) The host OS can be Windows.
c) The guest OS can be Linux.
d) The guest OS can be Windows.

Q51) Which of the following are true about Kernel-based Virtual Machine (KYM)? (Multiple answers)

a) KVM is an open-source virtualization technology


b) KVM belongs to type I virtualization
c) KVM belongs to type II virtualization
d) KVM is a module in the Linux kernel.

Q52) Which of the following are true about KVM and Xen? (Multiple answers)

a) KYM and Xen are open-source hypervisors.


b) Domain 0 and Domain U are concepts in KVM.
c) KVM and Xen can run in the same host OS.
d) Xen VMs can be converted to KVM VMs.

Q53) Kernel-based Virtual Machine (KVM) is an open-source full virtualization solution.

9|Page
a) True
b) False

Q54) Which of the following belong to the Kernel-based Virtual Machine (KVM) architecture? (Multiple
answers)

a) Libvirt.
b) Domain 0.
c) QEMU.
d) ESXi.

Q55) Kernel-based Virtual Machine (KVM) VMs can run on other virtualization platforms after being
converted.

a) True
b) False

Q56) Which of the following is not a Kernel-based Virtual Machine (KVM) management tool?

a) Libvirt.
b) Virsh command set.
c) Virt-Manager.
d) QEMU.

Q57) QEMU functions as a hardware Simulator in KVM. It is a unique technology of the Linux operating
system.

a) True
b) False

Q58) Which of the following operations can be performed in Huawei FusionCompute? (Multiple answers)

a) Create VMs.
b) Delete VMs.
c) Convert VMs on other virtualization platforms to VMs that can be used by FusionCompute
d) Clone VMs

Q59) In Huawei FusionCompute, users can manage VMs in which of the following modes? (Multiple
answers)

a) Log in to the CNA and run commands for management


b) Log in to the VM for management
c) Log in to the VRM and use the GUI for management.
d) Log in to the CNA and use the GUI for management.

Q60) You can create a KVM VM on the GUI or by running commands.

a) True
b) False

10 | P a g e
Q61) Which of the following are true about the function of Libvirt in Kernel-based Virtual Machine (KVM)?
(Multiple answers)

a) Libvirt is one of the KVM management tools.


b) The Libvirt APls can be called to operate KVM VMs in multiple programming languages.
c) Libvirt is customized for KVM.
d) Libvirt is an indispensable part of the KVM architecture.

Q62) Which of the following are true about Virtio? (Multiple answers)

a) Virtio is an I/O paravirtualization solution.


b) Virtio is an I/O full virtualization solution.
c) Virtio improves I/O forwarding efficiency.
d) After Virtio is used, OEMU is not required.

Q63) If KVM uses Virtio, which of the following are true about the I/O forwarding process? (Multiple
answers)

a) The I/O requests need to be forwarded by the KVM module.


b) The I/O requests are directly sent by the frontend driver to the backend driver.
c) The forwarding efficiency of I/O requests increases.
d) The I/O requests are not forwarded through OEMU.

Q64) With Virtio, the NIC transmission rate of a Windows VM is 10 Gbit/s.

a) True
b) False

Q65) A user applies for an EVS disk on HUAWEI CLOUD. This service mode is ( ).

a) laaS
b) PaaS
c) Saas
d) DaaS

Q66) Which of the following is true about distributed storage? Like: VSAN

a) Disks of distributed storage are from x86 disk arrays.


b) Disks of distributed storage are from x86 VMs.
c) Disks of distributed storage are from x86 servers.
d) Disks of distributed storage are from PCs.

Q67) In Huawei FusionCompute, FusionStorage can be used as a virtualized storage device.

a) True
b) False

Q68) In Huawei FusionCompute, which of the following is false about the uplink links?

a) The uplink is between the DVS and physical NIC of the host. One host has only one uplink.

11 | P a g e
b) An uplink can correspond to one physical network port or the logical port that binds multiple
physical network ports.
c) Multiple DVSs cannot share an uplink.
d) A host can have multiple uplinks connected to different DVSs.

Q69) In Huawei FusionCompute, which of the following is false about port groups and security groups?

a) One DVS can have multiple port groups. One VM can be protected by multiple security groups
b) Security groups protect VMs based on port groups.
c) A port group is an aggregation of virtual ports on a DVS. A security group is a set of rules.
d) A VM NIC is connected to a virtual port in a port group. A VM NIC is associated with a security
group.

Q70) Which of the following is false about iSCSI and Fiber Channel?

a) At the transmission layer, fiber channel transmission uses the Fiber Channel (FC) protocol and
iSCSI uses the TCP/IP protocol.
b) iSCSI runs on the Ethernet based on the TCP/IP protocol and can be seamlessly integrated with
the existing Ethernet.
c) The Fiber Channel (FC) protocol is completely heterogeneous with the existing Ethernet and the
compatibility is poor.
d) The transmission distance of FC is longer than that of the TCP/IP.

Q71) The service mode shown in this picture is ( ).?

a) laaS
b) PaaS
c) SaaS
d) DaaS

Q72) In Huawei FusionCompute, which of the following storage virtualization features are supported?

a) Thin provisioning
b) Storage live migration
c) Snapshot
d) Disk capacity expansion

12 | P a g e
Q73) Which of the following VM disk file formats is not supported by Huawei FusionCompute?

a) VMDK
b) QCOW2
c) RAW
d) VHD

Q74) SATA disks use parallel Single ports and SAS disks use serial ports

a) True
b) False

Q75) Which of the following is recommended for the archive room where a large amount of data needs
to be stored for a long time and does not need to be read frequently?

a) SSD disk
b) SAS disk
c) SATA disk
d) NL-SAS disk

Q76) SSDs are mechanical hard disks, featuring fast read/write speed, low power consumption, and light
weight. However, SSDs have limited service life.

a) True
b) False

Q77) Which of the following are true about RAID?

a) A RAID group can be regarded as storage space consisting of two or more disks. The available
capacity of a RAID group is the sum of the capacity of disks in the group.
b) RAID improves the I/O. The performance of a storage system by concurrently reading and writing
data on multiple disks.
c) When a disk is damaged, other disks in RAID 5 can still work properly, and the disk I/O
performance is not affected.
d) Compared with RAID 5, RAID 6 has stronger data recovery capability, but weaker read/write
capability of disks.

Q78) In RAID 5 and RAID 6, the number of faulty disks that can be tolerated is ( ), respectively.

a) 1, 2
b) 2, 3
c) 2, 1
d) 3, 2

13 | P a g e
Q79) After the disks in an array form a RAID group, the server connected to the disk array cannot directly
access the RAID group. Therefore, you need to divide the disk array into logical LUNs before allocating
them to the server.

a) True
b) False

Q80) Based on RAID 5, RAID 6 enhances the fault tolerance capability of disks and allows two disks to be
faulty at the same time. The minimum number of disks in a RAID 6 group is 4.

a) True
b) False

Q81) The universal storage space unit mapped to the host in the disk array is ( ), which is the logical space
created based on RAID.

a) Storage pool
b) Volume
c) LUN
d) Partition

Q82) RAID 1 can replace data backup. Data mirroring is used to improve the fault tolerance of disk arrays.
The data recovery cost is the smallest among all.

a) True
b) False

Q83) Which of the following RAID levels has the highest disk space usage?

a) RAID 0
b) RAID 1
c) RAID 5
d) RAID 6

Q84) Which of the following RAID levels has the weakest data redundancy capability?

a) RAID 0
b) RAID 1
c) RAID 5
d) RAID 6

Q85) Common categories of disk arrays include ( ).

a) RAID
b) JBOD (Just a Bunch of Disks)
c) SBOD (Switched Bunches of Disks)
d) MAID (Massive Arrays of Idle Disks)

Q86) The common external storage solutions include ( ).

a) DAS

14 | P a g e
b) SAN
c) NAS
d) NFS

Q87) Compared with SAN, which of the following is not an advantage of NAS?

a) The file system of NAS supports a single file with higher specifications.
b) NAS supports more files.
c) Block data transmission is optimized.
d) File sharing is optimized.

Q88) NAS has its own file system. After accessing NAS through the network sharing protocol, the
application server can read and write the files in the file system.

a) True
b) False

Q89) When configuring IP SAN for a host, you need to configure ( ) for the host on the storage device to
map the host to the IP SAN.

a) iSCSI Server
b) iSCSI Client
c) iSCSI Initiator
d) iSCSI Target

Q90) Compared with FC SAN, which of the following is not an advantage of IP SAN?

a) Low construction cost


b) Long transmission distance
c) High transmission efficiency
d) Convenient bandwidth expansion

Q91) Which of the following is not included in the NAS architecture?

a) Status verification module


b) File system
c) Volume management module
d) Network port

Q92) In a NAS environment, data inconsistency may occur when multiple hosts write data to one file at
the same time.

a) True
b) False

15 | P a g e
Q93) Which of the following network file sharing protocols are supported by NAS?

a) NTFS
b) NFS
c) CIFS
d) FTP

Q94) iSCSI is a standard protocol based on the ( ) protocol and SCSI instruction set. It is widely used in
many storage networks of the ( ) architecture.

a) FC, FC SAN
b) TCP/IP, FC SAN
c) TCP/IP, IP SAN
d) FC, IP SAN

Q95) Which of the following is false about differences between SAN and NAS?

a) NAS has its own file system, but SAN does not.
b) SAN provides block-level data transmission and storage services, while NAS provides file- level
transmission and storage services.
c) SAN is a network architecture, while NAS is a network file storage device.
d) SAN can expand storage space, but NAS devices cannot be expanded.

Q96) SAN provides a host with a raw disk where no file system is created. The file system to be created
depends on the operating system of the host.

a) True
b) False

Q97) Storage virtualization can be classified into ( ).

a) Block-level virtualization
b) Page-level virtualization
c) File-level virtualization
d) Application-level virtualization

Q98) In Huawei FusionCompute, if only one physical network port is in a bound port, the physical network
port cannot be removed directly.

a) True
b) False

Q99) In Huawei FusionCompute, ( ) can only be used as nonvirtualized storage.

a) SAN
b) NAS
c) Local disk

16 | P a g e
d) FusionStorage

Q100) In Huawei FusionCompute, you can perform which of the following operations on the VRM?

a) Divide RAID groups for disk arrays.


b) Manually add a storage device to a VM.
c) Add SAN storage as non-virtualized storage.
d) Convert virtualized storage to non-virtualized storage.

Q101) In Huawei FusionCompute, common NICs can be bound in ( ) modes.

a) Active/Standby.
b) Load sharing based on round-robin.
c) Load sharing based on source and destination MAC addresses.
d) Load sharing based on source and destination port groups.

Q102) In Huawei FusionCompute, VMs using non-virtualized storage do not support the snapshot
function.

a) True
b) False

Q103) Which of the following is false about the figure?

a) Files are stored in the file system and mapped to the file system block by the file system.
b) The file system block corresponds to the logical extent of LVM.
c) The logical extent is mapped to the physical extent of the disk through LVM.
d) Each file system block corresponds to discontinuous extents on the physical disk

Q104) Which of the following is true about virtualized storage and nonvirtualized storage?

a) Virtualized storage is more secure than non-virtualized storage


b) The read and write performance of non-virtualized storage is better than that of virtualized
storage.
c) The scalability of non- virtualized storage is better than that of virtualized storage.
d) The compatibility of virtualized storage is better than that of non-virtualized storage.

Q105) In a Linux VM, ( ) is used to manage logical volumes.

a) DVM
b) LVM
c) PVM
d) OVM

Q106) The virtualization technology can virtualize a physical server into multiple VMs, improving the
hardware performance of the physical server.

a) True
b) False

17 | P a g e
Q107) Which of the following is true about NFS?

a) No special software needs to be installed on the NFS client.


b) NFS is a stateful protocol.
c) NFS supports multi-user access.
d) The user permission cannot be set for NFS

Q108) The process of creating a file system on a disk is usually called ( ).

a) RAID
b) Partition
c) Formatting
d) Encapsulation

Q109) In Huawei FusionCompute, Tools installed for VMs are irrelevant to the operating system types and
versions of the VMs.

a) True
b) False

Q110) In Huawei FusionCompute, which of the following is false about the host storage ports?

a) You can manually add storage ports or add storage ports in batches.
b) Multiple storage ports can be added to implement multi-path transmission.
c) Local disks and FC SAN devices can be interconnected with storage devices without adding storage
ports.
d) The IP addresses of the storage ports can be on the same network segment as that of the
management plane.

Q111) In Huawei FusionCompute, the correct procedure for deleting storage resources is ( ).

1. Delete or migrate the VM disk.


2. Disassociate the host.
3. Delete the storage resources.
4. Destruct the datastore.

a) 1->2->3->4
b) 1->4->2->3
c) 2->4->1->3
d) 3->2->4->1

Q112) In Huawei FusionCompute, the default alarm levels do not include ( ).

a) Critical

18 | P a g e
b) Moderate
c) Major
d) Minor
e) Warning

Q113) Disk partitions are divided by the operating system on physical disks.

a) True
b) False

Q114) In Huawei FusionCompute, the management VLAN ID used by VRM cannot be changed.

a) True
b) False

Q115) Which of the following is false about the VIMS file system?

a) VIMS is a high-performance cluster file system.


b) VIMS is the technical basis of advanced features such as thin provisioning disk, snapshot, and
storage migration.
c) VIMS is compatible with FC SAN, IP SAN, and local disks.
d) VIMS is a universal storage virtualization file system in the industry

Q116) In Huawei FusionCompute, system disks of VMs cannot be detached.

a) True
b) False

In Huawei

Q117) FusionCompute, which of the following deployment modes is recommended to improve VRM
reliability?

a) Single-node deployment
b) Active/Standby deployment
c) Active-active deployment
d) Hybrid deployment

Q118) In Huawei FusionCompute, which of the following are true about the relationship about quantities
of VMs and DVSs?

a) If a VM has multiple NICs, each NIC can be associated with a DVS.


b) If a VM has multiple NICs, multiple NICs can be associated with the associated with same DVS.
c) If a VM has one NIC, the NIC can be associated with only one DVS.
d) If a VM has one NIC, the NIC can be associated with multiple DVSs.

19 | P a g e
Q119) The prerequisites for communication between a VM and other VMs are ( ).

a) Configure a fixed IP address for the VM.


b) Configure the gateway address for the VM.
c) Configure a correct IP address for the VM.
d) Configure a correct MAC address for the VM.

Q120) In Huawei FusionCompute, the VLAN ID (except 0) configured for a distributed virtual switch (DVS)
must exist on the physical switch. Otherwise, VM communications will be abnormal.

a) True
b) False

Q121) In Huawei FusionCompute, a DVS can be configured with static routes and multiple types of
dynamic routes.

a) True
b) False

Q122) In Huawei FusionCompute, a management IP address must be configured for each DVS to facilitate
unified management of DVSs.

a) True
b) False

Q123) In Huawei FusionCompute, the IP address of a Windows VM is 0.0.0.0. The possible cause is ( ).

a) The IP address of the VM is allocated using DHCP.


b) The IP address of the VM is manually set.
c) Tools is installed on the VM.
d) The IP address of the VM is manually set to 0.0.0.0.

Q124) Which of the following traffic types belong to southbound and northbound traffic?

a) Traffic generated by mutual access between VMs in a data center.


b) Traffic generated when customers access services in a data center through the Internet.
c) Traffic generated during VM live migration.
d) Traffic generated by mutual access between VMs across data centers.

Q125) Which of the following statements about VLAN functions is false?

a) Isolates broadcast domains.


b) Enhances network security.
c) Increases the interface bandwidth of physical switches.
d) Improves network robustness.

20 | P a g e
Q126) Which of the following remote management methods are supported by physical switches?

a) Telnet.
b) SSL.
c) SSH.
d) Web.

Q127) Data packets in a cloud computing virtual network must be routed and forwarded by routers in a
physical network.

a) True
b) False

Q128) In practice, which of the following functions is supported by VLANs?

a) If VMs in two departments use different VLANs, the VMs cannot communicate with each other.
b) VMs in different VLANs can use the same IP address. No IP address conflict occurs.
c) VMs in the same VLAN can use IP addresses in different IP address segments and can discover
each other through broadcast.
d) VMs in the same VLAN must use IP addresses in the same IP address segment. Otherwise,
communications between the VMs will fail.

Q129) If VM A and VM B run on different physical servers, which of the following physical devices is used
during communications?

a) Virtual switch
b) Virtual NIC
c) Physical NIC
d) Physical switch

Q130) A VM can have multiple virtual NICs, which correspond to different virtual switches.

a) True
b) False

Q131) The port configuration of a Huawei switch is as follows: interface XGigabitEthemet0/0/4 port link-
type trunk port trunk allow-pass vlan 16 17 Which of the following statements is true based on the
preceding configuration?

a) Data frames with the VLAN 16 tag will be untagged and forwarded when passing through this
port.
b) Data frames with the VLAN 17 tag will be forwarded with the tag retained when passing through
this port.
c) Data frames without any tags will be discarded when passing through this port.
d) Data frames without any tags will be tagged with VLAN 16 or VLAN 17 when passing through this
port and then forwarded.

21 | P a g e
Q132) Which of the following technologies can increase the link rate on a switch?

a) VLAN
b) VxLAN
c) LACP
d) LDAP

Q133) On a physical network, which of the following devices supports route forwarding requests?

a) Physical server NIC


b) Hub
c) layer 2 switch
d) Router

Q134) The port configuration of a Huawei switch is as follows: interface GigabitEthernet0/0/1 port link-
type access port default vlan 16 Which of the following statements is true based on the preceding
configuration?

a) This port does not perform any operation on the data frames that pass through it.
b) This port removes the VLAN 16 tag from the data frames and forwards the data frames.
c) This port adds the VLAN 16 tag to the data frames that pass through it.
d) This port allows only the data frames with the VLAN 16 tag to pass through.

Q135) In KVM, there are two methods for connecting VM NICs to a physical network: ( ).

a) Bridge connection and direct connection.


b) Bridge connection and address translation.
c) Address translation and passthrough.
d) Passthrough and bridge connection.

Q136) If a VM needs to communicate with other VMs, which of the following operations is mandatory?

a) Add at least one NIC for the VM.


b) Connect the physical server where the VM is located to the Internet.
c) Configure port binding on the physical server.
d) Configure port binding on the physical switch.

Q137) If two VMs can ping each other, which of the following network devices will certainly be used during
communications?

a) Distributed virtual switch (DVS)


b) Virtual NIC
c) Physical switch
d) Physical NIC

22 | P a g e
Q138) If VM A can ping VM B, which of the following inferences is true?

a) VM A and VM B run on the same physical host.


b) VM A and VM B use the same network segment.
c) VM A and VM B are configured with correct IP addresses.
d) VM A and VM B use different network segments.

Q139) Virtual switches are indispensable to successful communications between VMs.

a) True
b) False

Q140) Which of the following technologies or devices cannot isolate broadcast domains?

a) VLAN
b) Hub
c) Router
d) Firewall.

Q141) Switches are classified as access switches, aggregation switches, and core switches. Virtual switches
belong to aggregation switches.

a) True
b) False

Q142) Core services of an enterprise are deployed on multiple VMs in cluster mode. High availability (HA)
policies can be configured for the VMs to improve service reliability.

a) True
b) False

Q143) VM live migration is a prerequisite for implementing VM HA.

a) True
b) False

Q144) In Huawei FusionCompute, which of the following statements about VM HA are true?

a) After the HA function is enabled in a cluster, if a host in the cluster becomes faulty, VMs on the
host can be rebuilt on other hosts in the cluster.
b) When the system detects a BSOD on a VM and the handling policy configured for this error is HA,
the system creates the VM on a normal compute node.
c) VM HA can quickly recover services if a fault occurs.
d) If a fault occurs, HA-enabled VMs can be successfully rebuilt on other compute nodes as long as
there are reserved resources in the cluster.

Q145) In practice, resources must be reserved for hosts in a cluster to ensure that VM HA can be
performed properly

23 | P a g e
a) True
b) False

Q146) In Huawei FusionCompute, which of the following are trigger conditions for VM HA?

a) The host where the VM is located is faulty.


b) Applications on the VM break down.
c) A BSOD occurs on Windows VMs.
d) The datastore where the VM is located is faulty.

Q147) In Huawei FusionCompute, which of the following operations can be performed by the system if a
Blue Screen of Death (BSOD) occurs on a Windows VM?

a) No processing is performed.
b) Restarting the VM
c) Restoring the VM using a snapshot.
d) Performing VM HA

Q148) In Huawei FusionCompute, after the automatic computing resource scheduling function is enabled,
which of the following are possible causes for VM migration?

a) The system automatically migrates VM according to the scheduling policy.


b) a A BSOD occurs on a Windows VM and the handling policy is HA.
c) The administrator manually migrates a VM.
d) Applications on a VM break down

Q149) In Huawei FusionCompute, the Data Replication Service (ORS) migrates VMs based on the following
factors: ( )

a) CPU
b) Memory
c) I/O
d) Network traffic

Q150) In Huawei FusionCompute. Database Performance Monitor (DPM) depends on DRS.

a) True
b) False

Q151) In Huawei FusionCompute, which of the following statements are true about adding shared storage
for multiple hosts?

a) When the shared storage is IP SAN, make sure that the storage network of the host is connected
to the service ports of storage.
b) Select the corresponding host when adding a datastore.
c) Select all hosts when associating storage devices.
d) Select all hosts when initializing storage resources.

Q152) In Huawei FusionCompute, which of the following statements is true about adding storage ports to
hosts?

24 | P a g e
a) Select a host and add a storage port on the host configuration page.
b) Storage ports can be added to hosts in batches.
c) The VLAN ID can be set to 0.
d) If FC SAN is used, users do not need to add storage ports.

Q153) In Huawei FusionSphere, which of the following functions are supported by thin provisioning?

a) Virtual storage thin-provisioning is irrelevant to the OS and hardware. Disk thin-provisioning can
be provided as long as the virtual image management system is used.
b) This function enables alarms over datastore usage. If the data usage exceeds the preset threshold,
an alarm will be reported.
c) This function enables disk space monitoring and reclaiming.
d) NTFS VMs do not support this function.

Q154) In Huawei FusionCompute, where can the memory overcommitment function be enabled?

a) OS
b) VM
c) Host
d) Cluster

Q155) Which of the following statements about memory overcommitment is false?

a) Memory overcommitment technologies include memory ballooning, memory swapping, and


memory sharing.
b) Memory overcommitment technologies allow the total memory size of VMs to be greater than
the total memory size of the physical server.
c) After memory overcommitment is enabled, the memory overcommitment ratio is inversely
proportional to the actual memory usage of each VM.
d) Memory overcommitment technologies allow the used memory size of VMs to be greater than
the total memory size of the physical server.

Q156) Any of intelligent memory overcommitment functions (memory ballooning, memory swapping, and
memory sharing) can be enabled or disabled based on customer requirements.

a) True
b) False

Q157) Memory overcommitment is a resource allocation solution. It reduces costs and improves VM
density on a single host at the cost of performance.

a) True
b) False

25 | P a g e
Q158) Which of the following statements about memory overcommitment is false?

a) After memory overcommitment is enabled, the total memory size of all VMs created by users can
exceed the physical memory.
b) Enabling memory overcommitment improves VM deployment density on physical hosts.
c) When memory overcommitment is enabled, a higher overcommitment ratio indicates higher VM
performance.
d) If the memory usage of a user VM is high, the memory overcommitment ratio can be adjusted to
optimize the memory usage.

Q159) In which scenario should the memory overcommitment ratio not be increased?

a) The VM memory usage is low.


b) The memory overcommitment ratio reaches 150% in commercial scenarios
c) The customer requires that the maximum allowed number of VMs be deployed on a single host
while ensuring performance.
d) Customers' hardware procurement costs need to be reduced.

Q160) In which scenario is the memory overcommitment function recommended to be disabled?

a) Common office VMs


b) Telecom customer service center
c) Bank counters
d) Graphics-capable workstations

Q161) Which of the following is not a method for creating a VM template?

a) Converting a VM to a VM template
b) Cloning a VM to a VM template
c) Cloning a VM template to a VM template
d) Converting a snapshot to a VM template

Q162) When users use a Windows template to quickly deploy VMs, the generated SIDs may be the same.
As a result, some special software may fail to be installed.

a) True
b) False

Q163) Which of the following statements about templates is false?

a) After a template is converted to a VM, the template will no longer exist.


b) Parameters can be customized when a VM is deployed using a template.
c) A template can be used across virtualization platforms.
d) After a VM is cloned as a template, the VM still exists.

Q164) In Huawei FusionCompute, which of the following statements about the template format is false?

a) The VM template formats include .ova and .ovf


b) After a template in .ova format is exported, the template contains only one file.
c) The .ovf file is the VM description file, and the .vhd file is the VM disk file.

26 | P a g e
d) An .ovf template only contains one .ovf file and one .vhd file.

Q165) In Huawei FusionCompute, which of the following operations is supported when users modify a
disk of a VM?

a) Change the disk mode from Dependent to Independent & persistent.


b) Change the disk capacity from 80 GB to 8 GB.
c) Change the disk status from Available to Unavailable.
d) Change the disk configuration mode from Thin provisioning to Ordinary.

Q166) When users use a template to quickly deploy a VM, the generated VM configuration information is
the same as that in the template.

a) True
b) False

Q167) When users use a template to quickly deploy a VM, they do not need to install the operating system
or perform related configurations.

a) True
b) False

Q168) Templates can be used to quickly deploy VMs. Currently, users can create templates only by
converting or cloning VMS.

a) True
b) False

Q169) In Huawei FusionCompute, which of the following is not a QoS parameter of CPU resources?

a) CPU quota
b) CPU limitation
c) CPU reservation
d) CPU overcommitment

Q170) In Huawei FusionCompute, which of the following statements about CPU resource QoS is false?

a) CPU quota defines the proportion based on which CPU resources to be allocated to each VM when
multiple VMs compete for physical CPU resources.
b) CPU limitation defines the priority based on which CPU resources to be allocated to each VM
when multiple VMs compete for physical CPU resources.
c) CPU reservation takes effect only when VMs compete for resources. If the CPU resources are
sufficient, a VM can exclusively use physical CPU resources on the host if required.
d) CPU reservation defines the minimum CPU resources to be allocated to each VM when multiple
VMs compete for physical CPU resources.

27 | P a g e
Q171) If a VM of a customer requires a CPU clock speed of at least 2 GHz, which of the following methods
should be used?

a) CPU limitation
b) CPU reservation
c) CPU quota
d) CPU overcommitment

Q172) CPU resource QoS and memory overcommitment technologies are used to allocate resources
appropriately based on different policies.

a) True
b) False

Q173) Which of the following statements about CPU resource QoS and memory resource QoS is false?

a) CPU QoS of a VM is used to ensure that the computing resources of the VM are properly allocated.
b) CPU quota and CPU reservation take effect only when VMs compete for computing resources.
c) Memory QoS is used to ensure that key service VMs can obtain sufficient memory resources.
d) Memory QoS can be used only when memory overcommitment is enabled.

Q174) Memory overcommitment is the prerequisite for implementation of memory resource QoS.

a) True
b) False

Q175) An e-commerce service VM requires memory of at least 8 GB to cope with service traffic bursts
during holidays. Which of the following technologies can be used to meet this requirement?

a) Memory overcommitment
b) Memory QoS
c) VM live migration
d) Rapid VM deployment

Q176) Which of the following statements about creating a new disk on Huawei FusionCompute is false?

a) Set the disk type to Common and set the disk mode to Independent & nonpersistent.
b) Set the disk mode to Independent & nonpersistent and change the value of Raw Device Mapping
to Supported.
c) Set the disk configuration mode to Thin provisioning and set the disk mode to Independent &
persistent.
d) Set the disk configuration mode to Thin provisioning and set the disk mode to Independent &
nonpersistent.

Q177) Huawei FusionCompute DRS rules do not take effect for VMs with USB devices attached.

a) True
b) False

28 | P a g e
Q178) Which of the following operations can be performed under the VLAN Pool menu on Huawei
FusionCompute?

a) Add ten VLAN pools with the same VLAN ID to the same OVS.
b) Add one VLAN pool to the DVS and set the start VLAN ID of the VLAN pool to 100.
c) Add one VLAN pool to the DVS and set the start VLAN ID of the VLAN pool to 0.
d) Add one VLAN pool to the DVS and set the end VLAN ID of the VLAN pool to 4096.

Q179) Which of the following requirements can be met by using Huawei FusionCompute ORS rules?

a) A VM runs on a specified host.


b) If a host in the cluster is unavailable, VMs running on the host are automatically migrated to other
hosts.
c) If a BSOD occurs on a Windows VM, the system automatically restarts the VM.
d) If the VM configuration does not meet service requirements, the management system
automatically allocates more CPU resources to the VM.

Q180) Which of the following statements about creating a template on FusionCompute is false?

a) Convert a VM to a VM template: All parameters of the template are from the VM. The VM does
not exist after the conversion.
b) Clone a VM to a VM template: All parameters of the template are from the VM, but some
parameters can be modified during the cloning process. The VM is still available after the cloning
is compete.
c) Clone a VM template to a VM template: ALL parameters of the new template are from the original
VM template, but some parameters can be modified during the cloning process. The original VM
template is still available after the cloning is compete.
d) The VM used for creating a template can be in the Running state.

Q181) Which of the following is not a prerequisite for installing Tools for a VM on FusionCompute?

a) The OS has been installed on the VM.


b) Tools of a different version has not been installed on the VM.
c) The available free space of the system disk is greater than 32 MB.
d) You have obtained the password of user Administrator if the VM runs the Windows Server 2008
or Windows 7 OS.
e) The VM is in the Stopped state.

Q182) In Huawei FusionCompute, if a VM is in the Running or Stopped state, users can increase or
decrease the number of vCPUs of the VM as required.

a) True

29 | P a g e
b) False

Q183) Which of the following is not included in the snapshot management functions?

a) Creating a snapshot
b) Modifying a snapshot
c) Deleting a snapshot
d) Copying a snapshot

Q184) Which of the following statements about snapshots is false?

a) Snapshots can be used to store VM settings and VM disk data.


b) Snapshots can be used to store the VM memory status.
c) Multiple snapshots can be created for a VM. If a VM is restored using a snapshot, the later
snapshots become invalid.
d) Only one memory snapshot can be created for all VMs on a host at a time.

Q185) During the creation of a snapshot, users can perform other operations on the VM.

a) True
b) False

Q186) Which of the following scenarios are snapshots inapplicable to?

a) Critical service change


b) Service patch installation
c) Destructive testing of services
d) Long-term storage of service data

Q187) In Huawei FusionCompute, which of the following statements about memory overcommitment is
false?

a) The VM performance deteriorates on a host that has the memory overcommitment function
enabled.
b) The memory overcommitment function can be disabled only when the memory overcommitment
ratio of all hosts in the cluster is less than or equal to 100%.
c) After memory overcommitment is disabled, the total memory size of all VMs is less than or equal
to the total available physical memory size.
d) Administrators can enable or disable the memory overcommitment function anytime.

Q188) Which of the following statements about live migration and cold migration is false?

a) Cold migration is to migrate a stopped VM from one host to another. During the migration,
services are interrupted.

30 | P a g e
b) Live migration is to migrate a running VM from one host to another. During the migration, services
are not interrupted.
c) The reliability test in performance tests includes the tests on the VM migration, such as live
migration, cold migration, migration duration, and service interruption duration.
d) Memory data and disk data are migrated during live migration and cold migration.

Q189) Which of the fallowing QoS parameters can be set for VMs on FusionCompute?

a) Memory
b) CPU
c) GPU
d) Disk IOPS
e) Network

Q190) In Huawei FusionCompute, which of the following statements about snapshot-based VM


restoration is false?

a) A VM can have multiple snapshots.


b) If the port group where VM NICs belong is deleted after a snapshot is created for the VM, the
deleted port group will be restored when the VM is restored using the snapshot.
c) If the disk mode of a VM is Independent & persistent or Independent & nonpersistent, the data
on the disk will not be restored when the VM is restored using a snapshot.
d) A created snapshot of a VM can be used to restore the VM data to the state when the snapshot
was created.

Q191) Which of the following statements about snapshots is false?

a) A consistency snapshot will be to be created if disk I/O pressure is high. You are advised to create
a consistency snapshot when the disk I/O pressure is low.
b) After a snapshot is generated, incremental disks take space of the datastore where the disks are
located. To prevent storage resource insufficiency, control the number of snapshots.
c) Another snapshot can be created for a VM when a snapshot is being created for the VM.
d) Snapshots do not store information about passthrough devices such as USB/GPU/SSD or GPU
virtualization devices.

Q192) VM live migration is to migrate VMs from one physical server to another physical server in the same
cluster when the VM is powered off.

a) True
b) False

Q193) In Huawei FusionCompute, which of the following statements is false about the conditions for VM
live migration?

a) The source host and the destination host communicate with each other properly.
b) The destination host has sufficient resources.

31 | P a g e
c) The VM is running.
d) The type of the destination storage device is different from that of the source storage device.

Q194) Which of the following statements about the live migration application scenario is false?

a) If a host is faulty or overloaded, the VMs running on it can be migrated to another host to prevent
service interruption.
b) If the service load is too light on multiple hosts, the VMs can be migrated to a smaller number of
hosts to consolidate the host resources used. This decreases the number of hosts that need to be
running and reduces power consumption.
c) VMs at a graphics- capable workstation can be live migrated after being bound to an image
processor.
d) During host maintenance, VMs running on the host can be migrated to other hosts to ensure
normal service running.

Q195) In Huawei FusionCompute, which of the following statements about live migration is false?

a) Live migration includes VM live migration and disk live migration.


b) During VM live migration, the host can be changed, the datastore can be changed, or both the
host and datastore can be changed.
c) Storage live migration can be performed only in the same storage device under storage
virtualization management
d) Rapid memory data replication and shared storage are used during VM live migration to ensure
data consistency before and after the migration.

Q196) O&M engineers can migrate VMs on a physical server to be upgraded to other servers to prevent
service interruption during system maintenance performed by a carrier.

a) True
b) False

Q197) Which of the following statements about Non-Uniform Memory Access (NUMA) is false?

a) Guest NUMA presents the NUMA topology to VMs to enable the guest OS to allocate resources
to applications running on it based on logical NUMA nodes, thereby improving application
performance.
b) Host NUMA provides the CPU load balancing mechanism to eliminate the VM performance
bottleneck due to unbalanced CPU resource allocation.
c) Host NUMA ensures that VMs access only the local physical memory, which reduces memory
access latency and improves VM performance.
d) With NUMA, the speed of CPU access to memory on the same node is basically the same as that
of access to memory on another node.

Q198) Which of the following are included in virtual NUMA?

32 | P a g e
a) Topology presentation: NUMA is identified in the VM to make NUMA optimization of the guest
OS and applications effective.
b) Initial placement: Based on the VM NUMA topology, select a physical node to place the vCPU and
memory, so that the relationship
c) Load balancing: During the scheduling, the association between nodes and the mapping between
vNodes and physical nodes are considered to maximize the speed of vCPU access to local memory.
d) Dynamic migration: When the affinity relationship between the vCPU and physical node changes,
memory on the corresponding vNode will be migrated.

Q199) Which of the following statements about the purpose of enabling the NUMA function is true?

a) Optimize the memory access performance of VMs.


b) Maximize the CPU computing capability of the physical host.
c) Maximize the vCPU computing capability of VMs.
d) Maximize the memory overcommitment ratio of the physical host.

Q200) NUMA is a multiprocessor-based computer memory design. The memory access time depends on
the relative location of memory to the processor. In NUMA, the speed of a processor to access its own
local memory is faster than that to access a non-local memory (memory located on another processor or
memory shared by processors).

a) True
b) False

Q201) Which of the following statements about the NUMA Topology Adjustment switch is false?

a) If the optimal NUMA topology cannot be calculated, the VM behavior is consistent with the switch
status.
b) After the switch is set to OFF, interleaving access occurs on NUMA nodes during VM memory
access, resulting in performance loss.
c) After this switch is set to ON, the system sets VM NUMA affinity and physical NUMA affinity during
automatic adjustment to maximize VM memory access performance.
d) After this switch is set to ON, VMs may not be scheduled to the specified nodes, and CPUs and
memory are evenly allocated to bound nodes during manual adjustment.

Q202) Which of the following statements about security groups are true?

a) A security group, similar to a firewall, is used to set network access control for a single or multiple
VMs. It is an important security isolation method.
b) A security group is a logical group.
c) Security groups are used to protect VM security.
d) When a VM is created, a security group is generated at the same time.

Q203) In Huawei FusionCompute, which of the following statements about security groups and rules is
false?

a) A security group must be created before rules can be added.

33 | P a g e
b) Only a security group that contains no VMs can be deleted.
c) The changes to security group rules can only be manually applied to VMs in the security group.
d) By default, a security group rejects all access requests before rules are added to it.

Q204) Which of the following statements about the application scenarios of security groups is false?

a) Security group rules can be configured to prohibit VMs from accessing the FTP server.
b) be configured to allow only the specified IP addresses to remotely log in to VMs.
c) Security group rules can be configured to disallow access to VMs.
d) Security group rules can be configured to control the permissions on folders in a VM.

Q205) In Huawei FusionCompute, all VM NICs added to the same security group are filtered by the rules
of this security group. To

Q206) If a security group is deleted, the rules in the security group will be deleted as well.

a) True
b) False

Q207) In Huawei FusionCompute, which of the following statements about security group rules is false?

a) A security group is essentially a set of rules.


b) All VM NICs in the same security group use this security group rule for access control.
c) VMs can communicate with external networks only after a security group is created for the VMs
and rules are added to the security group.
d) If a VM has multiple NICs, a security group can be configured for each NIC.

Q208) In Huawei FusionCompute, which of the following statements about deleting a security group is
false?

a) A security group can be deleted properly even if it is authorized to access other security groups.
b) The security group to be deleted cannot contain any VMs. If a VM exists in the security group, the
VM must be removed from the security group before the security group can be deleted.
c) After a security group is deleted, all security group rules in the group will be deleted as well.
d) When a security group to which a VM belongs is deleted, the effects of other security groups on
this VM are not changed.

Q209) Which of the following is not included in the 4V features of big data?

a) Volume
b) Value
c) Variety
d) Valid

Q210) Fog computing is a distributed computing model that extends cloud computing concepts to
network edges to support low latency and distributed applications in mobile and internet of Things (loT)
fields. Which of the following statements about fog computing is false?

34 | P a g e
a) Fog computing can quickly generate big data at the edge of a network to reduce the latency.
b) Fog computing can reduce the bandwidth consumed by the core Internet and restrict the
movement of data to the local network.
c) Fog computing delivers higher network reliability and physical device security than cloud
computing.
d) Fog computing can temporarily cache data to reduce network pressure.

Q211) The function of loT is only to collect the data generated by everything.

a) True
b) False

Q212) Artificial intelligence (Al) is a new science of researching and developing theories, methods,
technologies, and application systems to imitate and enhance human intelligence. Which of the following
statements about Al is false?

a) Al does not have initiative and creativity peculiar to human consciousness.


b) Al is not social.
c) Al is an unconscious, mechanical, and physical process.
d) Al is a technology in which objects are interconnected through the network to exchange
information.

Q213) The 3GPP plenary meeting held in 2018 officially approved the standalone (SA) variant of the fifth
generation of mobile communications (5G) new radio (NR) specifications. Since then, the independent
deployment of 5G networks is supported. The uRLLC and mMTC technologies in 5G are mainly applied to
loT.

a) True
b) False

Q214) The nature of IoT is the Internet. As long as hardware or products are connected to the Internet
and data interactions exist, it can be called an IoT.

a) True
b) False

Q215) Which of the following does not belong to the elements of AI?

a) Big data
b) Perceptual analysis capability
c) Computing capability
d) Scenario

Q216) Which of the following statements about big data and cloud computing is true?

a) Cloud computing is a broad term for data sets so large or complex that traditional data processing
applications are inadequate.
b) Big data uses the pay-per-use mode, which supports available, convenient, and on demand
network access.
c) Big data can be used as a type of cloud computing service for users to choose.

35 | P a g e
d) Cloud computing cannot provide the underlying computing resources used for big data
processing.

Q217) Sound recognition, image recognition, and companion robots are all Al applications.

a) True
b) False

Q218) As Internet+ gains more and more attention and big data and cloud services become popular, more
and more advanced technologies are on the rise. Docker is one of the most widely used and important
technologies. Which of the following statements about Docker is false?

a) Before installing Docker, a virtualization layer and virtual operating system must be created on
the host machine or the host machine operating system.
b) Docker can be used to package the underlying environment of applications to ensure that
applications can still run properly after migration.
c) Docker is booted faster than other VM technologies.
d) Docker uses containers to run applications. Containers are running instances created from images.

Q219) Which of the following statements about the relationship between cloud computing and IoT is
false?

a) Cloud computing is the cornerstone of IoT development, and IoT promotes the development of
cloud computing.
b) Data transmission in IoT depends on cloud computing.
c) The IoT operating efficiency will be greatly reduced if there is no support from cloud computing
technologies.
d) Cloud computing provides sufficient storage space for massive da a in the IoT.

Q220) Which of the following statements about Virtual Network Computing (VNC)are true?

a) VNC must support the Linux operating system.


b) VNC is a lightweight remote control computer software.
c) A controlled computer can function as a VNC server only when the corresponding software is
installed on it.
d) The host that initiates a control request can function as a VNC server only when the corresponding
software is installed on it.

Q221) In FusionCompute, virtual switches connect to a physical network ().

a) Uplink
b) Port group
c) Virtual NIC
d) iNIC

36 | P a g e
Q222) In FusionCompute, which of the following operations can take effect immediately?

a) Deleting a NIC
b) Installing Tools
c) Reducing disk capacity
d) Directly reading and writing data on a newly attached disk

Q223) The storage virtualization technology improves storage utilization and provides storage resources
for multiple VMs

a) True
b) False

Q224) In Huawei FusionCompute, which of the following statements about the CPU QoS technology is
false?

a) Adjust the CPU reservation, quota, and limitation to control the CPU usage of VMs.
b) CPU reservation is used to ensure the minimum VM computing capability that is the minimum
number of resources that can be used.
c) CPU quota is used to balance and adjust resources based on the relative CPU quotas of multiples
VMs when computing resources are insufficient.
d) CPU limitation is used to specify the maximum number of VMs that can run on a host.

Q225) In Huawei FusionCompute, the gateway address of a VM is set on which of the following network
devices?

a) Layer 3 switch
b) Layer 2 switch
c) Virtual switch
d) Layer 1 physical device

Q226) In Huawei FusionCompute, the uplink is used to ( ).

a) Assign IP addresses to VMs.


b) Manage MAC address of VMs.
c) Connect a virtual network to a physical network
d) Check the status of vNICs.

Q227) In Huawei FusionCompute, snapshots can be created for Computing Node Agent (CNA) hosts.

a) True
b) False

Q228) In Huawei FusionCompute, which of the following functions will be affected after a USB device is
attached to a VM?

a) Restarting a VM

37 | P a g e
b) VM live migration
c) Cluster scheduling
d) VM resource capacity expansion

Q229) In FusionCompute, the administrator binds the two NICs of the CNA host through active/standby
mode. The data transmission rate is equal to the sum of the transmission rates of the two network ports

a) True
b) False

Q230) In Huawei FusionCompute, after a user logs in to a VM using VNC, operations on the VM fail. For
example, files cannot be opened. Which of the following is the most possible cause of this problem?

a) The management link is unstable.


b) The service link is unstable
c) The storage link is unstable
d) The VM is damaged.

Q231) In Huawei FusionCompute, when a compute node is powered off, the system can start HA-enabled
VMs on the compute node from other compute nodes. Which of the following is not a prerequisite for
using this function?

a) HA-enabled VMs on a compute node use IP addresses on the same network segment.
b) The VM is not bound to the host.
c) HA is enabled for the cluster to which the compute node belongs.
d) The source and destination compute nodes share the same datastore.

Q232) In Huawei FusionCompute, VM flavors cannot be modified during VM cloning.

a) True
b) False

Q233) During the installation of Huawei FusionCompute, which of the following storage is VRM
recommended to be deployed on?

a) Local disk
b) FC SAN
c) IPSAN
d) NAS

Q234) In Huawei FusionCompute, multiple VMs can be deployed in batches using a template.

a) True
b) False

Q235) Which of the following statements about the cluster, host, and VM in Huawei FusionCompute is
false?

a) Hosts can move between different clusters.


b) VMs can be migrated across clusters.

38 | P a g e
c) Whether multiple hosts belong to the same cluster depends on whether they use the same shared
storage.
d) A cluster consists of multiple hosts and their associated storage and network resources.

Q236) In Huawei FusionCompute, which of the following are the methods for creating VM?

a) Importing a VM from other virtualization platforms


b) Deploying a VM using a template
c) Cloning a VM from an existing VM
d) Creating a new VM

Q237) In Huawei FusionCompute, if a host in a cluster becomes faulty, VMs on the host are automatically
migrated to other hosts in the cluster.

a) True
b) False

Q238) Which of the following methods is used for installing VRM VMs using FusionCompute Installer?

a) Automatic installation of an ISO file.


b) Importing a template file to a VM
c) Automatic installation using PXE
d) Automatic VM creation and ISO file mounting

Q239) In FusionCompute, which of the following is not a method for creating a template?

a) Converting a VM to a VM template
b) Converting a snapshot to a VM template
c) Cloning a VM to a VM template
d) Cloning a VM template to a VM template

Q240) In Huawei FusionCompute, administrators can scan

Q241) In Huawei FusionCompute, which of the following data storage types does not support disk capacity
expansion?

a) Non-virtualized local disk


b) Virtual SAN
c) NAS
d) FusionStorage

Q242) In Huawei FusionCompute, which of the following statements about storage is false?

a) A physical storage device can serve as storage resources.


b) A storage device corresponds to a logical unit in physical storage, for example, a LUN.
c) A datastore can be IP SAN, FC SAN, or NAS.
d) A VM disk file is in VHD format.

39 | P a g e
Q243) In Huawei FusionCompute, when multiple VMs write data to the shared disk at the same time, the
application software must control access to the disk to prevent data loss.

a) True
b) False

Q244) In Huawei FusionCompute, the resources in a cluster consist of hosts and associated storage and

Q245) When FusionCompute uses Internet Protocol storage area network (IP SAN) storage, the steps for
creating disks include:

1. Create storage resources.

2. Add storage ports on the host.

3. Add datastores.

4. Create disks.

The operation sequence should be: ()

a) 1-2-3-4
b) 1-3-4-2
c) 2-1-3-4
d) 4-2-1-3

Q246) In Huawei FusionCompute, when viewing the disk status, the administrator finds that the value of
Used Capacity (GB) is less than that of Capacity (GB). The possible cause is: ( )

a) The disk type is Shared.


b) The disk mode is Thin provisioning.
c) The disk status is Unavailable.
d) The disk mode is Dependent.

Q247) In Huawei FusionCompute, which of the following statements about VM storage live migration is
false?

a) Storage live migration can be performed between different datastores.


b) Storage live migration can be performed between different storage resources.
c) Storage live migration can be performed between different storage devices.
d) Storage live migration can be performed between different virtual disks.

Q248) In Huawei FusionCompute, after data in a VM is deleted, the disk size will not be automatically
reduced. When users write data to the VM next time, the space released by the VM will be used.

a) True
b) False

Q249) The VM disk file format on FusionCompute is ( ).

40 | P a g e
a) OVF
b) VMDK
c) VHD
d) DHT

Q250) In Huawei FusionCompute, when mounting a local image file to a VM to install the OS, the
administrator can close the VNC window anytime without

Q251) In Huawei FusionCompute, which of the following VM disk configuration modes requires the least
physical storage space?

a) Independent & persistent


b) Independent & nonpersistent
c) Thin provisioning
d) Ordinary

Q252) In Huawei FusionCompute, which of the following statements about shared disks are true?

a) A disk of this type can be attached to only one VM.


b) A disk of this type can be attached to multiple VMs.
c) The VM does not support datastore change for this type of disks.
d) The VM with a disk of this type attached does not support the snapshot function.

Q253) Which of the following storage resource types are supported by Huawei FusionCompute?

a) FC SAN
b) IP SAN
c) NAS
d) Advanced SAN
e) FusionStorage

Q254) In Huawei FusionCompute, memory and CPU resources used by VMs can only be provided by the
same cluster. Therefore, the maximum number of available

Q255) After Huawei FusionCompute is deployed using the unified installation and deployment tool, the
system automatically creates a cluster. What operations can administrators perform on the cluster?

a) Changing the cluster name.


b) Exporting the cluster to a local directory
c) Adding cluster description
d) Moving the cluster to a specified folder

Q256) In Huawei FusionCompute the VLAN ID of a port group is set to 10, which indicates ( ).

a) The system will untag the data frames with the VLAN 10 tag that pass through the port group and
then forward the data frames.
b) The system will add the VLAN 1 O tag to the data frames without a VLAN tag that pass through
the port group and then forward the data frames.
c) The system will discard the data frames with a tag other than VLAN 10 that pass through the port
group.

41 | P a g e
d) The system will change the tag of data frames with a non-VlAN-10 tag that pass through the port
group to VLAN 10 and then forward the data frames.

Q257) In Huawei FusionCompute, administrators can view the DVS ports connected to VMs.

a) True
b) False

Q258) In Huawei FusionCompute, users can create VMs by importing a VM template file. Which of the
following file format is not supported?

a) ova
b) qwcow2
c) vmdk
d) ovf

Q259) Which of the following operating systems allows users to format disks in New Technology File
System (NTFS) format?

a) Linux
b) UVP
c) Windows
d) Unix

Q260) In Huawei FusionCompute, which of the following is not a restriction for VM live migration?

a) The shared disk cannot be attached


b) The VM cannot use raw device mapping (RDM) datastores.
c) The VM must be in the Running state.
d) The destination host is not in maintenance mode.

Q261) ???????????????????

Q262) When attaching a disk to a VM on Huawei FusionCompute, users have the following requirements:
When a snapshot is created for the VM, no snapshot is created for the disk. When a VM is restored using
the snapshot, the disk is not restored and all data is written to the disk permanently. Which of the
following modes of disks should be selected?

a) Dependent
b) Independent
c) Independent & persistent
d) Independent & persistent

Q263) Huawei FusionCompute allows users to add hosts in batches. The administrator fills in host
information based on the template provided by the system and imports the host information at a time.

a) True
b) False

42 | P a g e
Q264) Which of the following statements about Huawei FusionCompute HA is false?

a) This function enables a VM to reboot whenever the VM encounters with a failure.


b) If VM data is stored in the shared storage, the unsaved data will not be lost if a fault occurs.
c) With HA enabled, the system periodically detects the VM status If detecting a VM fault caused by
a physical server fault, the system automatically migrates the VM to another physical server and
restarts the VM to allow rapid restoration of the VM services.
d) Administrators can set different HA policies based on importance of VMs.

Q265) In Huawei FusionCompute, port groups are classified as common port groups, trunk groups, and
hybrid port groups.

a) True
b) False

Q266) Which of the following operations for creating port groups in Huawei FusionCompute is false?

a) Set the name of the port group to test.


b) Set the port type to Common.
c) Set the VLAN ID to 5000.
d) Enter "This is a test port." in the description

Q267) In Huawei FusionCompute, the VLAN ID of a port group is set to 0, which indicates ( ).

a) The VLAN tag of the data frames that pass through the port group will be set to 0.
b) Only data frames with the VLAN 0 tag can pass through the port group
c) Data frames with a VLAN tag are not allowed to pass through the port group.
d) The data frames that pass through the port group Will not be modified.

Q268) In Huawei FusionCompute, the virtual NICs of each VM are connected to the ports of the virtual
switch. To facilitate simultaneous configuration and management of multiple ports, the ports with the
same network attributes are added to the same port group.

a) True
b) False

Q269) Which of the following statements about port groups in Huawei FusionCompute are true?

a) One port group can be configured with multiple IP addresses.


b) A Port group functions as a distributed virtual Switch.
c) All virtual ports in a port group have the same attributes
d) There are two types of port groups: common port groups and trunk port groups.

Q270) In Huawei FusionCompute, if there are just a few physical NICs on the server, multiple planes can
be co-deployed and logically isolated by using VLANs.

a) True
b) False

43 | P a g e
Q271) In Huawei FusionCompute, which of the following are not supported by the VMs that use raw
device mapping (ROM) storage?

a) Snapshot
b) Thin provisioning
c) Storage live migration
d) CPU hot-add

Q272) Which of the following statements about hypervisors is true?

a) Hypervisor is virtualization.
b) A hypervisor is an operating system.
c) A hypervisor is a key technology in computing virtualization.
d) A hypervisor contains a large number of drivers Therefore, drivers and patches do not need to be
installed for the hypervisor.

Q273) In Huawei FusionCompute, which

a) If the VM runs the Windows operating system, the


b) If the VM runs the Linux operating system, the
c) The administrator can
d) If a VM does not have an IP address, The administrator can log in to the VM using VNC.

Q274) In Huawei FusionCompute, what network device does a DVS correspond to?

a) Router
b) Layer 3 switch
c) Layer 2 switch
d) Hub

Q275) Memory swapping in memory overcommitment means that external storage is virtualized into
memory for VMs to use, Data that is not used temporarily is stored in external storage. If the system needs
such data, the system exchanges the data with the data reserved in memory.

a) True
b) False

Q275) Which of the following statements about the Huawei FusionCompute architecture is false?

a) CNAs can manage the network, storage, and computing resources of a cluster.
b) VRM provides a management portal for administrators.
c) CNAs provide computing resources for VMs.
d) VRM can be deployed on a CNA or a dedicated server.

44 | P a g e
Q277) In Huawei FusionCompute, users can configure DRS rules

Q278) In Huawei FusionCompute, which of the following operations can be performed on a VM even if
Tools is not installed on the VM?

a) Restarting the VM
b) Forcibly stopping the VM
c) Stopping the VM
d) Converting the VM to a VM template when the VM is powered on

Q279) In Huawei FusionCompute, if a VM is bound to a host, which of the following functions will be
affected?

a) Snapshot
b) DRS
c) Hot migration
d) Memory hot-add

Q280) Huawei FusionCompute is able to check the usage of global physical resources during VM running,
calculate the optimal host for the VM based on the intelligent scheduling algorithm, and enable the VM
to run on the optimal host by means of live migration, thereby improving the overall service experience.

a) True
b) False

Q281) In Huawei FusionCompute, which of the following statements about VM NICs is true?

a) Virtual NIC and physical NIC are two different NIC types. A virtual NIC does not require a MAC
address.
b) The MAC address and IP address of a virtual NIC can be manually configured.
c) The MAC address and IP address of a virtual NIC are automatically allocated by VRM.
d) The IP address of a Virtual NIC must be manually configured

Q282) In Huawei FusionCompute, if VMs need to be migrated between CNA hosts with different CPU
models, which of the following functions must be enabled?

a) Cluster I/O ring adaptation


b) Cluster HANA optimization
c) Cluster GuestNUMA policy
d) Cluster IMC policy

Q283) In Huawei FusionCompute, which of the following statements about the IMC function is false?

a) You are advised to enable the IMC function when the CPU models of CNA hosts in the cluster are
inconsistent.

45 | P a g e
b) If the IMC function is enabled, VMs cannot be migrated between hosts with different CPU models.
Determine whether to enable the IMC function based on the site requirements.
c) IMC only supports the VM migration from an earlier CPU generation to a later CPU generation.
d) You are advised to enable the IMC function when the memory sizes of CNA hosts in the cluster
are inconsistent

Q284) In Huawei FusionCompute, which of the following statements about roles is true?

a) A role can have one or more operation permissions.


b) A user can be attached to only one role.
c) If a user is attached to multiple roles. The operation permissions of the user depend on the role
with the highest priority.
d) The operation permissions of a role cannot be modified.

Q285) In Huawei FusionCompute, which of the following statements about raw device mapping is false?

a) ROM disks deliver the best performance among all disk types.
b) An ROM datastore corresponds to only one disk.
c) It is recommended that the operating system be installed on an ROM disk.
d) An ROM datastore can only correspond to a LUN on SAN storage.

Q286) In Huawei FusionCompute, VMs can have multiple virtual NICs.

a) True
b) False

Q287) In Huawei FusionCompute, which of the following statements about the fac tors affecting
computing resource scheduling is false?

a) When both CPU and memory are configured as the factors. The scheduling policy is triggered only
when the CPU and memory conditions are met.
b) When CPU is configured as the only factor, the scheduling policy is triggered when the CPU
conditions are met.
c) When memory is configured as the only factor, the scheduling policy is triggered when the
memory conditions are met.
d) When both CPU and memory are configured as the factors, the scheduling policy is triggered
when either the CPU conditions or the memory conditions are met.

Q288) ??????????????????????

Q289) Assume that three VMs (A, B, and C) run on the host that uses a single-core physical CPU whose
clock speed is 2.8 GHz, their respective quotas are set to 100, 200, and 400, and their respective CPU
reservation values are set to 700 MHz, 0 MHz, and o MHz. What is the computing capability of VM C when
the three VMs are running at full CPU load?

a) 700 MHz
b) 300 MHz
c) 1400 MHz

46 | P a g e
d) 600 MHz

Q290) Virtualization features include partitioning, isolation, encapsulation, and independence.

a) True
b) False

Q291) The KVM virtualization architecture includes the KVM module, QEMU, and Libvirt. Which of the
following statements about these modules is false?

a) The KVM module is responsible for creating vCPUs and allocating virtual memory.
b) The QEMU module is responsible for simulating I/O operations.
c) Libvirt and OEMU can form a virtualization solution.
d) KVM and OEMU can form a Virtualization solution.

Q292) Which of the following statements about Virt-manager are true?

a) Virt-manager is a graphical management tool for KVM VMs.


b) Virt-manager is a KVM VM management command set.
c) Virt-manager is an open-source KVM VM management tool.
d) Virt-manager is a commercial KVM VM management tool.

Q293) In cloud computing, there are virtual networks and physical networks.

a) True
b) False

Q294) With the development of Al, almost all technologies involve Al. Which of the following scenarios
is Al applicable to?

a) NLP (Neuro-Linguistic Programming)


b) Voice recognition
c) Companion robot
d) Image recognition

Q295) loT devices may be connected to the Internet and can be controlled through the Internet.

a) True
b) False

Q296) In the OpenStack solution, which of the following modules provides persistent block storage?

a) Cinder
b) Swift
c) Nova
d) Glance

Q297) Which of the fallowing statements about the common Internet file System (CIFS) is true?

a) CIFS has low requirements on network transmission reliability. The TCP/IP or UDP protocol can be
used.

47 | P a g e
b) CIFS requires the client to have dedicated software installed.
c) CIFS supports multi-user access.
d) CIFS retains the file format characteristics.

Q298) Which of the fallowing are the features of the cloud computing 1.0 era?

a) Focuses on virtualization products.


b) Standardizes and automates resource services.
c) Supports agile application development and lifecycle management.
d) Adopts virtualization technologies to improve resource utilization.

Q299) In the cloud computing, hardware of the same type of different models can form a resource pool.

a) True
b) False

Q300) Virtualization includes computing virtualization, storage virtualization, and network virtualization,
which correspond to elastic cloud servers (ECSs), Elastic Volume Service (EVS) disks, and cloud networks
in cloud computing respectively.

a) True
b) False

48 | P a g e

You might also like