Professional Documents
Culture Documents
(O)
A. On-demand self-service
B. broad network access methods
C. Resource pooling
D. fast and scalable
E. Measurable services
All
2) Which of the following is generally used to provide application development and running
environments?
A. IaaS
B. PaaS
C. SaaS
All
All
All
7) Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)
ABC
All
All
10) How many types of login users does HUAWEI CLOUD support?
A. 1
B. 2
C. 3
D. 4
11) Which of the following service is used by an ECS to store data? (O)
A. AS
B. IMS
C. EVS
D. DeC
All
13) ECSs can be charged in yearly/monthly or metered mode (pay per use).
A. True
B. False
ABC
All
21) AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False
23) An instance added to an AS group by an AS policy cannot be manually removed from the
group.
A. True
B. False
A
25) Which of the following policies can be configured to increase the number of instances in an
AS group at a predetermined time each week?
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above
ABC
ABC
32) Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Network Inbound/Outbound Rate
C. Disk Read/Write Requests
D. Memory Usage
E. Custom monitoring metrics
F. GPU Usage/GPU Memory Usage
G. EVS Disk Usage/EVS Disk I/O Read/Write
H. Performance Status
All
All
All
35) Which operations are required to use ECS to create a Windows image?
A. Configure the Windows ECS.
B. Install Cloudbase-Init.
C. Create a Windows private image.
D. Query and cleanup network rule files.
ABC
36) What is the type of the image converted based on an existing ECS?
A. Public image
B. Private image
C. Shared image
D. EulerOS image
All
38) Before creating a data disk image from a data disk, ensure that the ECS has a system disk
and the data disk is not empty.
A. True
B. False
ABD
ABC
41) If the ECS uses a static IP address, configure DHCP for the ECS, allowing it to dynamically
obtain an IP address.
A. True
B. False
42) When creating image Cloudbase-init should be installed on OS to ensure that configuration
of newly created ECSs from the image can be customized.
A. True
B. False
43) Image creation fails if entered System disk capacity is less than System disk capacity of
external image file.
A. True
B. False
45) EVS provides the scalable, virtual block storage service, and the backend of EVS is based
on a distributed architecture.
A. True
B. False
46) VBD EVS disks support only basic SCSI read/write commands.
A. True
B. False
47) Which of the followings are EVS disk types does ECS support?
A. Ultra-high I/O
B. High I/O
C. Common I/O
D. Latency optimized ultra-high I/O
All
48) How many servers can a shared EVS disk be attached to at most?
A. 5
B. 7
C. 8
D. 16
BC
AB
52) HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup
Service (VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults
All
B
54) On which of the following services does VBS depend?
A. Elastic Cloud Server
B. Elastic Volume Service
C. Object Storage Service
D. Image Management Service
BC
55) ( ) records operations of VBS resources, facilitating query, audit, and backtracking
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.
56) VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security.
A. True
B. False
57) VBS provides the data backup function for EVS disks. The created data backups can be
used to create EVS disks.
A. True
B. False
All
59) Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs
AB
60) Access requests to OBS can be controlled by,
A. ACLs
B. Bucket policies
C. User signature authentication
D. Server-side encryption
ABC
64) If you download an object of the Standard storage class through a HUAWEI CLOUD ECS
server, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity
65) If you download an object of the Archive storage class to your local computer over the
Internet, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration
66) If a customer has some data to store and the data will be downloaded for only 10 times in a
year, which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage
67) Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.
69) Which of the following items cannot be configured when creating a bucket?
A. Region where bucket resides
B. Storage class of a bucket
C. Bucket policy
D. Static website hosting
70) Which of the following items cannot be configured when uploading an object?
A. File path
B. Storage class of the object
C. KMS encryption
D. File size
D
ACD
ACD
76) SFS can be connected to the AD domain controller for permission control.
A. True
B. False
B
77) SFS (Capacity Oriented) allows ECSs in different VPCs to access the same file system.
A. True
B. False
78) What is the maximum size of a single file supported by SFS Capacity Oriented?
A. 32 TB
B. 64 TB
C. 128 TB
D. 240 TB
79) What is the maximum size of a single file supported by SFS Turbo?
A. 16 TB
B. 32 TB
C. 64 TB
D. 128 TB
80) SFS (Turbo) allows ECSs in different VPCs to access the same file system.
A. True
B. False
AB
83) Which of the following file protocol is supported by SFS Turbo?
A. NFS v3
B. NFS v4
C. SMB 2.0/2.1/3.0
D. EXT4
89) Which of the following are mainstream storage types in the industry?
A. Block storage
B. File storage
C. Object storage
D. Backup storage
ABC
90) Which of the following are HUAWEI CLOUD file storage services?
A. SFS
B. SFS Turbo
C. SFS Plus
D. All of the above
AB
ABC
AC
93) An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False
A
94) Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category?
A. ECS
B. BMS
C. IMS
D. SFS
95) GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops,
graphics rendering and engineering drawing run in virtualization environment.
A. True
B. False
96) Which of the following are the advantages of the VPC service?
A. Secure & Reliable
B. Flexible Configuration
C. High Speed Access/Dynamic BGP
D. Interconnection between VPCs
All
98) The Virtual Private Cloud (VPC) service enables you to provision logically isolated,
configurable, and manageable virtual networks, improving the cloud resource security and
simplifying network deployment.
A. True
B. False
99) Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?
A. Customizing CIDR blocks
B. Customizing access control policies
C. Accessing the Internet using EIPs
D. Connecting a local data center using a VPN or Direct Connect connection
All
100) Which of the Following CIDR blocks care available for VPC Service?
A. 10.0.0.0/8
B. 172.16.0.0/16
C. 192.168.0.0/16
All
102) To enable RDP access to a created Windows ECS, which port must be opened by an
inbound security group rule?
A. 37
B. 53
C. 3389
D. 80
103) Which of the following must be configured to enable an ECS without a bound EIP to access
the Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing
104) How many network interface cards (NICs) does an ECS functioning as a SNAT server
require?
A. 1
B. 2
C. 3
105) Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
106) Which of the following can enable an ECS in a VPC to communicate with a host in a private
data center?
A. Internet connection
B. VPN
C. VPC peering connection
108) If you have high requirements on network stability and availability, which of the following
EIP types must you choose:
A. Static BGP
B. Dynamic BGP
109) Which of the following CIDR blocks is not supported by the VPC service?
A. 10.0.0.0 – 10.255.255.255
B. 172.16.0.0 – 172.31.255.255
C. 192.168.0.0 – 192.168.255.255
D. 255.255.0.0 – 255.255.255.255
All
115) Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm
116) Which of the following load balancing algorithms are provided by ELB?
A. Weighted round robin
B. Weighted least connections
C. Source IP hash
D. Encryption algorithm
E. Weighted
ABC
All
120) Which of the following services can be used to view real-time monitoring data of load
balancers and listeners?
A.Cloud Container Engine
B.Cloud Eye
C.Auto Scaling
D.Virtual Private Cloud
B
122) To delete direct connection, you need to delete Virtual interface and the virtual GW bound
with the virtual interface first
A. True
B. False
124) Direct Connect enables a user to set up a dedicated network connection between a local
data center and the public cloud. Currently, which of the following connection type is supported
by Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN
126) To unsubscribe an operations connection, you need to delete the hosted connection
depends on it, and then delete the virtual gateway and virtual interface associated with it.
A. True
B. False
128) Direct Connect supports only duration based (Yearly/Monthly) billing mode?
A. True
B. False
A
131) Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both
132) Which of the following policies must be consistent between the local and remote sides of a
VPN that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec
CD
All
All
AD
139) With data security as its core, HUAWEI CLOUD builds a series of security services to meet
the particular needs. Security services include:
A. Data Security
B. Host Security
C. Application Security
D. Network Security
All
140) Which of the following security services can be used to protect websites?
A. WAF
B. VSS
C. SCM
D. Anti-DDoS
All
All
142) Which of the following statements about HTTPS site protection is incorrect?
A. When an HTTPS service is released to users, the HTTPS certificate needs to be uploaded
for using WAF.
B. No matter whether the original website server provides HTTPS or HTTP services, users
can have HTTPS services when using WAF.
C. The basic edition does not support HTTPS protection.
D. A domain name can choose to use either HTTP or HTTPS protocols only.
ABC
ABD
145) Which of the following is NOT a capability of Web Application Firewall (WAF)?
A. Anti-SQL injection
B. Anti-Webshell uploading
C. Anti-leeching
D. Anti-traffic attack
146) WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False
ABC
All
All
All
All
161) Which of the following statements about Dedicated HSM are correct?
A. The key calculation of Dedicated HSM is performed on an exclusive encryption card. Services for
different tenants are isolated without affecting performance.
B. Dedicated HSM supports China-invented encryption algorithms such as SM1, SM2, SM3, and SM4.
C. Dedicated HSM is recommended for all data encryption requirements on the cloud to ensure
security.
D. Dedicated HSM is a hosting service that can automatically perform time-consuming tasks, such as
hardware presetting, software patching, high availability, and backup.
ABD
162) Which of the following problems does a website tenant not need to consider when selecting
a package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume
All
164) Which of the following domain name types does SCM support?
A. Single domain name
B. Wildcard domain name
C. Multiple domain names
All
AB
167) Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False
All
All
ABD
ABC
174) RDS does not support data backup or restoration.
A. True
B. False
175) To retrieve Alarm History for 7 days. What Service you will use? (Single Choice)
A. SMN
B. CTS
C. ECS
D. RDS
178) What are the advantages of HUAWEI CLOUD EI service ModelArts? (O)
A. Readily acquired
B. Fast training
C. Fast launch
D. One-stop
All
179) Which of the following Huawei Cloud EI APIs are vision related?
A. Face Recognition
B. Image Recognition
C. Content Moderation
D. Image search
All
180) DWS is the Enterprise - Class Data Warehouse.
A. True
B. False
181) Which EI service can implement large scale data analysis and query?
A. DLF
B. DWS
C. DIS
D. GES
All except J
184) You can enable API Gateway and create and manage APIs for free? You pay only for
the number of API calls received and the amount of data transmitted.
A. True
B. False
AD
ACD
AB
191) The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason?
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed
192) Cloud computing is a model that enables users to obtain resources (such as computing,
storage, network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers.
A. True
B. False
195) Traffic from internet will hit to the which device first?
A. Firewall
B. NGIX
C. ELB
196) If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new
disk?
A. True
B. False
B
197) Which scaling action is not performed on Bandwidth scalling policy?
A. Replicate
B. Add
C. Reduce
D. Set to
202) When creating ECS you can use File injection function to initialize it.
A. True
B. False
203) The server does not need to be stopped before restoring EVS disk data using VBS backup.
A. True
B. False
206) When compared with shared file systems what are the advantages of SFS:
A. Robust reliability
B. Seamless integration
C. File sharing
D. Easy operations, high cost- (wrong, should be low)
ABC
AB
All
A
210) Bucket A has been configured a policy not to allow any users to access it. Object B is inside
Bucket A. Object B has an ACL that allows any users to access it. Therefore, object B can be
access anonymously by any user.
A. True
B. False
All
216) After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False
B
218) Which of the following functions of NAT Gateway can be used to enable ECSs to share an
EIP to access the Internet?
A. SNAT
B. DNAT
222) Which of the following is not the component of Big Data Platform?
A. Map Reduce
B. Openstack
C. HDFS
D. Yarn
226) IMS provides comprehensive and flexible self-service image management capabilities.
Users can create a private image and use it to create an ECS or multiple ECSs?
A. True
B. False
227) All Huawei Cloud services can be viewed on the management console?
A. True
B. False
228) Which of the following component can be used to set an access control whitelist to allow
specific IP addresses to access load balancers?
A. Listener
B. Backend Server
C. Backend Server Group
D. Health Check
A
229) Which of the following is not an advantage of RDS compared with self-built databases?
A. Instant Availability
B. Easy Management
C. Elastic Scaling
D. Self-Installed Databases
231) Which of the following can isolate RDS network resources from other services?
A. ECS
B. VPC
C. CES
D. OBS
All
All
AB
248) If 10GE is used to connect using Direct Connect? What port is it?
A. Electrical
B. Optical
C. Ethernet
D. Serial
250) For Monitoring Metrics Data, the retention policy differs by roll up period. For how many
days the data is retained with one hour roll up period?
A. 10
B. 20
C. 155
D. 300
Which of the following is generally used to provide application development and running
environments? (AJ)
A. IaaS
B. PaaS
C. SaaS
Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category? (O)
A. ECS
B. BMS
C. IMS
D. SFS
An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False
GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops, graphics
rendering and engineering drawing run in virtualization environment. (S)
A. True
B. False
EVS provides the scalable, virtual block storage service, and the backend of EVS is based on a
distributed architecture. (S)
A. True
B. False
Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs
Direct Connect enables a user to set up a dedicated network connection between a local data
center and the public cloud. Currently, which of the following connection type is supported by
Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN
The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason (S)
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed
Cloud computing is a model that enables users to obtain resources (such as computing, storage,
network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers. (M)
A. True
B. False
What is the type of the image converted based on an existing ECS? (aj)
A. Public image
B. Private image
C. Shared image
D. EulerOS image
( ) records operations of VBS resources, facilitating query, audit, and backtracking) (AJ)
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.
VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security. (AJ)
A. True
B. False
VBS provides the data backup function for EVS disks. The created data backups can be used to
create EVS disks. (S)
A. True
B. False
Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm
Which of the following services can be used to view real-time monitoring data of load balancers
and listeners? (M)
A.Cloud Container Engine
B.Cloud Eye
C.Auto Scaling
D.Virtual Private Cloud
WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False
Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False
Server Monitoring includes:
A. Basic Monitoring
B. OS Monitoring
C. CPU Monitoring
D. Disk Monitoring
Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)
Before creating a data disk image from a data disk, ensure that the ECS has a system disk and
the data disk is not empty.
A. True
B. False
HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup Service
(VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults
Which of the following load balancing algorithms are provided by ELB? (AJ)
A. A. Weighted round robin
B. B. Weighted least connections
C. C. Source IP hash
D. D. Encryption algorithm
E. Weighted
If you download an object of the Standard storage class through a HUAWEI CLOUD ECS server,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity
If you download an object of the Archive storage class to your local computer over the Internet,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration
If a customer has some data to store and the data will be downloaded for only 10 times in a year,
which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage
Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.
The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable,
and manageable virtual networks, improving the cloud resource security and simplifying network
deployment. (S)
A. True
B. False
Which of the following must be configured to enable an ECS without a bound EIP to access the
Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing
How many network interface cards (NICs) does an ECS functioning as a SNAT server require?
A. 1
B. 2
C. 3
Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
Which of the following can enable an ECS in a VPC to communicate with a host in a private data
center?
A. Internet connection
B. VPN
C. VPC peering connection
To delete direct connection you need to delete Virtual GW and virtual interfaces first
True
False
Which of the following CIDR blocks is not supported by the VPC service? (S)
A. 10.0.0.0 – 10.255.255.255
B. 172.16.0.0 – 172.31.255.255
C. 192.168.0.0 – 192.168.255.255
D. 255.255.0.0 – 255.255.255.255
If you have high requirements on network stability and availability, which of the following EIP
types must you choose:
A. Static BGP
B. Dynamic BGP
Which of the following policies must be consistent between the local and remote sides of a VPN
that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec
SFS is charged in pay-per-use or monthly/yearly flat fee mode.
A. True
B. False
SFS allows ECSs in different VPCs to access the same file system.
A. True
B. False
Which of the following problems does a website tenant not need to consider when selecting a
package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume
AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False
An instance added to an AS group by an AS policy cannot be manually removed from the group.
A. True
B. False
Which of the following policies can be configured to increase the number of instances in an AS
group at a predetermined time each week? (M)
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above
Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Inband Incoming Rate
C. Disk Read Requests
D. Memory Usage
E. Custom monitoring metrics
Which operations are required for creating a Windows image using an ECS?
A. Configure the Windows ECS
B. Install Cloudbase-Init
C. Create a Windows private image
D. View and delete network rule files
After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False
Which of the following functions of NAT Gateway can be used to enable ECSs to share an EIP to
access the Internet?
A. SNAT
B. DNAT
Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both
Traffic from internet will hit to the which device first (AJ)
1. firewall
2. NGIX
3. ELB
4.
If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new disk.
True
False
Which scaling action is not performed on Bandwidth scalling policy
1. replicate
When creating ECS you can use File injection function to initialize it.
-True
-False
Server needs to be stopped before restoring EVS disk data using VBS backup.
-True
-False
When compared with shared file systems what are the advantages of SFS:
-Robust reliability
-Seamless integration
-File sharing
-Easy operations, high cost- (wrong, should be low)
Image creation fails if entered System disk capacity is less than System disk capacity of external
image file.
-True
-False
Which EI service can implement large scale data analysis and query ?
-DLF
-DWS
-DIS
-GES
ECS lifecycle?
Start-Stop-Restart-Delete
A. Data backup
B. Project Management
C. Code Check
D. Cloud buildup
Bucket A has been configured a policy not to allow any users to access it. Object B is inside Bucket A. Object B
has an ACL that allows any users to access it. Therefore, object B can be access anonymously by any users.
True
False
ECS Login
Key pair
OTP Token
Fingerprint
Password
37
53
3389
80
Retrieve Alarm History for 7 days. What Service you will use. (Single Choice)
SMN
CTS-my answer
ECS
RDS
5. Which of the following are the major defense types of Anti-DDoS? [Score: 1]
Your answer: (null) Correct answer: A. Traffic attack defense|D. Application attack defense
7. In the cloud computing environment, confidentiality, integrity, and availability are still the
fundamental security requirements of users. [Score: 1]
Your answer: (null) Correct answer: A. Correct
8. Which of the following port types is 10GE when you enable Direct Connect? [Score: 1]
Your answer: (empty) Correct answer: B. Optical port
10. Huawei provides capability openness for developers to integrate the capabilities opened
by Huawei products with upper-layer applications and build differentiated innovative
solutions. [Score: 1]
Your answer: (null) Correct answer: A. Correct
11. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer is: D. After the capacity of an EVS disk is expanded, you can use
this backup to restore data. After the data is restored, the size of the EVS disk remains unchanged.
12. Which of the following protocols is not supported when the load balancer is a private
network load balancer? [Score: 1]
Your answer: (null) Correct answer: B.UDP
14. The AS service can only dynamically add or reduce server resources based on the
specified time period. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
15. Which of the following scenarios does object storage apply to? [Score: 1]
Your answer: (null) Correct answer: A. Massive storage resource pool|B. Static website hosting|C. Big
data storage|D. Backup|E. Archiving
16. After creating an AS group by following the wizard, you need to manually enable the AS
group. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
18. Cloud Container Engine (CCE) is a high-performance and scalable container service. It
provides enterprises with Docker container lifecycle management capabilities, such as quick
application packaging and deployment and automatic O&M, helping you efficiently deploy
applications. [Score: 1]
Your answer: (null) Correct answer: A. Correct
24. Which of the following file access protocols is supported by SFS? [Score: 1]
Your answer: (null) Correct answer: D.NFS
25. If the system disk is faulty, you can use the backup of the system disk to create an EVS
disk and attach it to the ECS as the system disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
26. Unlike traditional servers, users cannot deploy service applications on ECSs. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
27. In which of the following states can an EVS disk be backed up? [Score: 1]
Your answer: (empty) The correct answer is A. Available.
28. After an application is created, the CPU, memory, and network usage of the container
cannot be monitored. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
29. What is the type of the image converted from an ECS? [Score: 1]
Your answer: (empty) Correct answer: B. Private image
30. Which of the following services can work with EVS? [Score: 1]
Your answer: (Null) Correct answer: A. Elastic Cloud Server (ECS)|C. Volume Backup Service (VBS)|D.
Cloud Eye
33. Which of the following statements about hybrid cloud is incorrect? [Score: 1]
Your answer: (Null) Correct answer: D. Applications can be deployed only in the public cloud.
34. How many buckets can be created for an OBS account at most? [Score: 1]
Your answer: (null) Correct answer: B.100
35. Which of the following methods is correct for a Workspace user to access a USB flash
drive on a terminal? [Score: 1]
Your answer: (null) Correct answer: B. USB port redirection
36.VPC. The subnet segment can be modified after being created. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
37. IAM - What are the key features of identity authentication? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Centralized control of users and security credentials |
B. Centralized control of user access | C. User group-based rights | D. Support for Huawei customer
service agent maintenance
38. Which of the following service resource metrics can be monitored by Cloud Eye? [Score:
1]
Your answer is as follows: (Null) Correct answer: A. Virtual Private Cloud (VPC)|B. Elastic Computing
Service (ECS)|C. Distributed Cache Service (DCS)|D. Elastic Load Balance
40. Which of the following services helps you monitor RDS resources in real time? [Score: 1]
Your answer: (null) Correct answer: D.CES
41. Which of the following is not the main reason why traditional IT infrastructure
architecture cannot support efficient operation of enterprises and urgently calls for
architecture transformation? [Score: 1]
Your answer is: (empty) The correct answer is: D. The network speed is too slow.
42. If no EIP is bound to a VM, you can configure a custom route for the VM to access the
Internet. [Score: 1]
Your answer: (null) Correct answer: A. Correct
43. The alarm threshold consists of the set mode (raw data, maximum value, minimum value,
average value, and variance), judgment condition (>, ≥, <, ≤, and =), and critical value. The
set mode is used to configure alarm conditions. [Score: 1]
Your answer: (null) Correct answer: A. Correct
44. What operations can the shared image provider perform? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Specifying an image to be shared | B. Deleting a
shared image | C. Adding a tenant who can share an image | D. Deleting a tenant who can share an image
45. The AS service must be used together with elastic load balancing. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
46. Compared with traditional file sharing storage, what are the advantages of SFS? [Score:
1]
Your answer: (null) The correct answer is: A. File sharing|B. Seamless integration|D. High reliability
47. VBS can create backups for EVS disks and use the backups to roll back EVS disks,
maximizing user data accuracy and security. [Score: 1]
Your answer: (null) Correct answer: A. Correct
48. To enable two sites to communicate with each other across the Internet, deploy
IPSeC.VPN on the firewalls at both sites to protect the mutual access traffic between the
intranets at the two sites. [Score: 1]
Your answer: (null) Correct answer: A. Correct
49. The cloud security service system consists of five parts: network security, data security,
application security, security evaluation, and security support. [Score: 1]
Your answer: (null) Correct answer: A. Correct
50. Which of the following are the main functions of HID? [Score: 1]
Your answer: (null) Correct answer: A. Brute force cracking detection | B. Remote login notification | C.
Weak password detection | D. Database process permission detection | E. Web page backdoor file
detection
53. Similar to traditional server disks, EVS disks allow you to format EVS disks attached to
ECSs, create file systems on the EVS disks, and store data persistently. [Score: 1]
Your answer: (null) Correct answer: A. Correct
54. Which of the following management functions are supported by ELB? [Score: 5]
Your answer is as follows: (null) Correct answer: A. Create a load balancer. |B. Delete a load balancer. |C.
Enable a load balancer. |D. Disable a load balancer.
55. What computing services does Huawei public cloud provide? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Auto Scaling|B. Elastic Cloud Server|C. Image
Management Service
56. SFS cannot be attached to an ECS running the Windows OS. [Score: 1]
Your answer: (null) Correct answer: A. Correct
58. What information needs to be configured before creating a file system? [Score: 1]
Your answer: (null) Correct answer: B.VPC
59. Which of the following statements about KMS is incorrect? [Score: 1]
Your answer: (Null) Correct answer: A. Managing the cloud platform and tenant keys
60. Identity and Access Management (IAM) refers to the identity and authentication service.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
61. Which of the following is not a Huawei computing cloud service? [Score: 1]
Your answer: (null) Correct answer: D. Scalable File Service
62. Which of the following are basic features of cloud computing? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. On-demand self-service|B. Wide network access|C.
Resource pooling|D. Fast elastic scaling|E. Measurable service
64. Which of the following are the application scenarios of SFS? [Score: 5]
Your answer: (null) The correct answer is: A. Media processing|B. Log management|C. Content
management and home directory|D. High-performance computing
65. If a user wants to query historical alarms in the last seven days, which of the following
services needs to be enabled? [Score: 1]
Your answer: (Null) The correct answer is A. Cloud Trace Service.
66. Which of the following components receives traffic from the Internet first after the traffic
enters LoaD.balancer? [Score: 1]
Your answer: (null) The correct answer is C.LVS.
67. Penetration testing service (PTS) belongs to security evaluation service products. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect
68. Which of the following image types are supported by IMS? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Public image|B. Private image|C. Shared image
69. To use Cloud Eye to monitor Huawei ECSs, you need to install the plug-in on the ECSs.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect
70. If the capacity of the data disk attached to the ECS is insufficient, you must detach the
disk and purchase a new one. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
71. Which of the following statements about Anti-DDoS traffic cleaning is incorrect? [Score:
1]
Your answer: (Null) Correct answer: A. Web vulnerability detection
72. Attach the EVS disk to an ECS. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
75. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. Multiple EVS disks can be associated with a backup policy for
batch backup.
76. Which of the following operations cannot be performed by the recipient of a shared
image? [Score: 1]
Your answer: (null) The correct answer is: A. Sharing the specified mirror.
78. RDS can meet the ever-changing requirements of the gaming industry, effectively
shortening the R&D period and reducing R&D costs. [Score: 1]
Your answer: (null) Correct answer: A. Correct
79. If the status of an alarm rule remains unchanged, the system sends an alarm notification
to the user only when the alarm rule is in the status for the first time. [Score: 1]
Your answer: (null) Correct answer: A. Correct
80. Data in the file system is stored using erasure codes. [Score: 1]
Your answer: (null) Correct answer: A. Correct
81. Which of the following user authentication modes is supported by Workspace? [Score: 1]
Your answer: (null) The correct answer is B.Active Directory.
82. WAF detects anomalies of HTTP requests to prevent malicious network intrusions, such
as web page tampering, information leakage, and Trojan horse implantation. [Score: 1]
Your answer: (null) Correct answer: A. Correct
83. All types of HUAWEI CLOUD service products can be viewed on the management
console. [Score: 1]
Your answer: (null) Correct answer: A. Correct
84. If only one AS policy is enabled in the AS group and the action in the AS policy is to add
two instances, how many instances are there in the AS group? [Score: 1]
Your answer: (empty) Correct answer: D. Uncertain
87. Which of the following images is a standard image provided by the public cloud platform
and is visible to all users? [Score: 1]
Your answer: (blank) Correct answer: A. Public image
89. What Does an ECS Use to Build a Logical Zone That Is Logically Isolated? [Score: 1]
Your answer: (null) Correct answer: B. Virtual private cloud
90. When an EVS disk is detached from an ECS, the data on the EVS disk will be lost.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect
91. Which of the following EVS disks can be directly created on the EVS console? [Score: 1]
Your answer: (null) Correct answer: B. Data disk
93. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three
times, disable versioning for the bucket, and upload object aaa for three times. After the
preceding operations are complete, how many objects are displayed in the bucket basic
information? [Score: 1]
Your answer: (null) Correct answer: B.4
94. Workspace supports user authentication using Micrlslft Active Directory. [Score: 1]
Your answer: (null) Correct answer: A. Correct
95. Which of the following cloud products is a data security type? [Score: 1]
Your answer: (null) Correct answer: C.KMS (key management service)
Elastic Load Balance automatically distributes access traffic to multiple ECSs to balance
their service load. It enables you to achieve higher levels of fault tolerance in your
applications and expand application service capabilities. [Score: 1]
Your answer: (null) Correct answer: A. Correct
97. Network security, as an important part of cloud security services, implements network
isolation, responds to network attacks, and ensures network security. [Score: 1]
Your answer: (null) Correct answer: A. Correct
98. The AS service automatically adjusts service resources based on users' service
requirements and policies. [Score: 1]
Your answer: (null) Correct answer: A. Correct
101. Which of the following is not a major application scenario of VPC? [Score: 1]
Your answer: (None) The correct answer is B. The desktop cloud accesses Huawei Vmall.
103. If you use an ECS to create an image, the ECS must be stopped. [Score: 1]
Your answer: (null) Correct answer: A. Correct
108. Which of the following shared file systems can be directly deleted? [Score: 1]
Your answer: (null) Correct answer: B. Unavailable
109. GPU desktops can be used for CAD auxiliary design. [Score: 1]
Your answer: (null) Correct answer: A. Correct
110. Cloud Eye is a multi-dimensional monitoring platform for resources such as Elastic
Cloud Servers (ECSs) and bandwidth. You can monitor alarms, notifications, and
personalized report views in real time to accurately learn about the product resource status.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
112. After an ECS is created, you can change the ECS specifications if they do not meet your
requirements. [Score: 1]
Your answer: (null) Correct answer: A. Correct
Which of the following key technologies are used by situational awareness? [Score: 1]
Your answer: (null) The correct answer is: A. Big data technology | B. Crawler technology
114. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. After an EVS disk is deleted, you can use a backup to create an
EVS disk. |D. After an EVS disk is deleted, the backup data will not be deleted.
115. What applications and services are provided by HUAWEI CLOUD Marketplace?
[Score: 1]
Your answer: (null) Correct answer: A. Basic software|B. Business software|C. Developer tools|D.
Professional services
117. CCE allows you to view application logs and events. [Score: 1]
Your answer: (null) Correct answer: A. Correct
119. Which of the following belong to the life cycle management of database instances?
[Score: 1]
Your answer is as follows: (Null) Correct answer: A. Adding a read replica|B. Viewing DB instance
information|C. Expanding the storage space of the database|D. Deleting the database cluster|E. Rebooting
the database instance
120. The encrypted mirror cannot be changed to an unencrypted mirror. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
121. CCE allows you to directly use official Docker Hub images. [Score: 1]
Your answer: (null) Correct answer: A. Correct
122. Users can use OBS on OBS Console or OBS Browser. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
123. What Are the Steps for Creating a Windows Image Using an ECS? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Configure the Windows server. |B. Install Cloudbase-
Init. |C. Create a Windows private image.
125. Which of the following are the objectives of cloud computing security services? [Score:
1]
Your answer is as follows: (null) Correct answer: A. Data protection|B. Operation environment
protection|C. Service independence and linkage|D. Security evaluation
126. Relational Database Service (RDS) users can modify database configurations to achieve
optimal performance. [Score: 1]
Your answer: (null) Correct answer: A. Correct
127. How many common services can be added to My Favorites at most? [Score: 1]
Your answer: (empty) Correct answer: C.7
129. When creating a monitoring panel, you can add a maximum of () monitoring indicators
to a view. [Score: 1]
Your answer: (null) Correct answer: B.5
130. The time required for backing up an EVS disk depends only on the volume of data in the
EVS disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
132. What do I need to create for two VPCs to communicate with each other? [Score: 1]
Your answer: (null) Correct answer: B. Peering connection
134. The GPU is applicable to graphics rendering, engineering drawing, and desktop cloud
scenarios. [Score: 1]
Your answer: (null) Correct answer: A. Correct
135. Data security ensures confidentiality and integrity of user data applications and storage
in the cloud computing environment. [Score: 1]
Your answer: (null) Correct answer: A. Correct
138. Which of the following load balancing modes is not supported by listeners? [Score: 1]
Your answer: (null) Correct answer: A. Maximum connection|C. Set weight
139. What are the scenarios of user replication chain compensation? [Score: 1]
Your answer: (null) Correct answer: B. Replicate the unencrypted image as an encrypted image. |C.
Replicate the encrypted image as an encrypted image. |D. Replicate the encrypted image as an unencrypted
image.
140. Which of the following is not the application scenario of Cloud Eye? [Score: 1]
Your answer: (null) Correct answer: D. Operation audit
141. Which of the following components is not included in the big data platform? [Score: 1]
Your answer: (null) Correct answer: B. OpenStack
142. Which of the following is not a main application scenario of KMS? [Score: 1]
Your answer: (Null) The correct answer is: A. Network transmission encryption
144. To implement dynamic resource expansion, which of the following policies is selected
when you create an AS policy? [Score: 1]
Your answer: (blank) Correct answer: C. Alarm policy
145. Which of the following is not a major function of HVD? [Score: 1]
Your answer: (Null) Correct answer: B. ECS brute-force cracking prevention
146. Alarm notification is the action taken when an alarm is triggered. You can set or disable
alarm notification when creating or modifying an alarm. [Score: 1]
Your answer: (null) Correct answer: A. Correct
148. Data outsourcing and service outsourcing are the main security challenges faced by
users in cloud computing. [Score: 1]
Your answer: (null) Correct answer: A. Correct
149. What Are the ECS Login Authentication Modes? .c\'\ [Score: 1]
Your answer: (empty) Correct answer: A. Password|D. Key pair
150. Which of the following is NOT true of the LEADS philosophy? [Score: 1]
Your answer: (null) Correct answer: E.S: Service
151. A policy is configured for bucket A to prevent any user from accessing objects in bucket
A. Bucket A contains object B, which is configured with an ACL to allow anonymous users
to access object B. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
152. Which of the following methods can be used to directly access a container from the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Elastic IP address
155. Which of the following statements about the ELB product functions is incorrect? [Score:
1]
Your answer is: (empty) The correct answer is: A. Provide a private line connection.
156. Which of the following services does VBS depend on? (Multiple-choice question)
[Score: 1]
Your answer: (Null) Correct answer: B. Cloud hard disk|C. Object storage
161. The next decade of IT infrastructure evolution in the cloud computing era is from
separation to convergence. No matter how spirally the IT architecture evolves, which of the
following statements about customer values and driving forces is incorrect? [Score: 1]
Your answer: (Null) Correct answer: B. Higher efficiency in service deployment and lifecycle
management
162. When IPSec VPN is used for communication, the encryption and decryption check is
performed on the firewalls at both ends. [Score: 1]
Your answer: (null) Correct answer: A. Correct
164. To enable the log management function of an OBS bucket, which permissions on the
target OBS bucket must be granted to the log delivery user group? [Score: 1]
Your answer: (null) Correct answer: B. Write permission|C. View ACL permission
165. Users can use terminals such as iPad to access Workspace. [Score: 1]
Your answer: (null) Correct answer: A. Correct
166. Which of the following methods can be used to set the access permission for anonymous
OBS object users? [Score: 1]
Your answer: (null) Correct answer: B. Setting the ACL for OBS objects|C. Setting the policy for OBS
objects
168. What are the types of VPNs based on service usage? [Score: 1]
Your answer: (null) Correct answer: A. Access VPN|B.lntranet VPN|C.Extranet VPN
172. After an ECS is created, the bandwidth used by the ECS cannot be changed. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
From which perspectives does situational awareness analyze security posture? [Score: 1]
Your answer: (null) Correct answer: A. Global perspective|B. User perspective|D. Attacker perspective
175. Which of the following is the procedure for using the CCE? [Score: 1]
Your answer is as follows: (Null) Correct answer: C.1. Create a cluster. 2. Upload an image. 3. Create an
application.
176. Which of the following is not an advantage of RDS compared with self-built databases?
[Score: 1]
Your answer: (null) Correct answer: D. Users install the database by themselves.
177. As an important part of the cloud security service, application security ensures the
security of elastic cloud computing servers and cloud computing applications running on
them from the perspective of operating system and application security protection. [Score: 1]
Your answer: (null) Correct answer: A. Correct
178. Which of the following devices needs to be configured for Workspace to support 3D
applications? [Score: 1]
Your answer: (null) Correct answer: B.GPU card
179. During VPC creation, which of the following parameters can be used to automatically
obtain an IP address? [Score: 1]
Your answer: (null) The correct answer is A.DHCP.
181. Which of the following functions are supported by the 0BS Console? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Static website hosting | B. Versioning | C. Cross-
domain resource sharing | D. Adding external buckets
184. Which of the following constitute the Huawei public cloud ecosystem? [Score: 1]
Your answer: (Null) Correct answer: A. Marketplace|B. Developer Community|C. Partner|D. Huawei
cloud service certification engineer
185. Containers and virtual machines have similar resource isolation and allocation
advantages, but have different functions because containers are more portable and efficient
due to the fact that containers are virtualized operating systems rather than hardware. [Score:
1]
Your answer: (null) Correct answer: A. Correct
186. Direct Connect is a private network service that connects your local data center to the
public cloud. Currently, which of the following private lines is supported by Direct Connect?
[Score: 1]
Your answer: (null) Correct answer: A.MPLS VPN
187. IPSec VPN is an encrypted tunneling technology. It uses encrypted security services to
establish secure and comprehensive communication tunnels between different networks.
Which of the following is not the feature that ensures the transmission of data packets on the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Timeliness
188. On the Dashboard page, you can add or delete monitoring graphs of key monitored
objects. The graphs can be used to compare multiple monitored objects. You can view the
graphs in a timely manner each time you log in to the Cloud Eye console. [Score: 1]
Your answer: (null) Correct answer: A. Correct
189. IMS provides flexible self-service and comprehensive image management capabilities.
Users can create private images and use images to create ECSs or replicate ECSs in batches.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
190. Which of the following management operations is not supported by EVS disks? [Score:
1]
Your answer: (null) The correct answer is C. Reduce the capacity.
191. What is the return value when a user-defined monitoring indicator is successfully
uploaded using the Open API? [Score: 1]
Your answer: (null) The correct answer is B.201.
193. VPCs can be connected to traditional data centers through private lines or VRNs to
flexibly integrate resources. [Score: 1]
Your answer: (null) Correct answer: A. Correct
194. Which of the following statements about the positioning of Huawei cloud services are
correct? [Score: 1]
Your answer: (null) The correct answer is: A. Focus on the IaaS layer, use the PaaS layer, and aggregate
the SaaS layer.
196. After an ECS is bound to a (), the ECS can be accessed through a fixed public IP
address. [Score: 1]
Your answer: (blank) Correct answer: D. Elastic IP address
198. When multiple VMs are created, you can bind multiple EIPs to enable multiple VMs to
access the Internet at the same time. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
199. When creating an ECS, you can use the file injection function provided by the system to
initialize the ECS. [Score: 1]
Your answer: (null) Correct answer: A. Correct
200. Which of the following layer is the cloud service that provides the application running
and development environment? [Score: 1]
Your answer: (null) Correct answer: B.PaaS
201. Certificates of the SCS can be used for trusted authentication of enterprise websites.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
205. An availability zone (AZ) is a collection of one or more physical data centers with
independent cooling, fire extinguishing, moisture-proof, and electricity facilities. Within an
AZ, computing, network, and storage resources are logically divided into multiple clusters.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
206. Which of the following cloud services is not a computing cloud service? [Score: 1]
Your answer: (null) Correct answer: C. Virtual private cloud
207. How Many RDS DB Instances Can Each User Create by Default? [Score: 1]
Your answer: (null) Correct answer: B.20
208. Which of the following is not the target of cloud computing security services? [Score: 1]
Your answer: (null) Correct answer: B. Cloud platform security
209. Cloud Eye is an open resource monitoring platform that provides resource monitoring,
alarm reporting, and notification services. [Score: 1]
Your answer: (null) Correct answer: A. Correct
211. When the average value is selected as the collection mode, the peak values may be
different when users switch the data range. [Score: 1]
Your answer: (null) Correct answer: A. Correct
213. Which of the following containerized application management functions are provided by
CCE? [Score: 1]
Your answer: (null) Correct answer: A. Rolling upgrade|B. Elastic scaling|C. Application monitoring|D.
Viewing events
214. Compared with self-built databases, RDS has more costs and O&M workloads. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect
215. Cloud computing is a model that enables the required resources (e.g., computing,
storage, network, applications, and services) to be obtained from the shared pool of
configurable resources anytime, anywhere, conveniently, and on demand. Resources can be
quickly provisioned and released, and the workload of managing resources and interaction
with service providers can be minimized. [Score: 1]
Your answer: (null) Correct answer: A. Correct
216. What operations do I need to perform to enable the created application to be accessed
from the outside? [Score: 1]
Your answer is: (Null) The correct answer is: C. When creating an application, publish the application as a
service.
217. Which of the following statements about the ELB function cannot be implemented?
[Score: 1]
Your answer: (null) Correct answer: D. Layer 2 and Layer 3 data forwarding
219. Which of the following cloud services can be used together with RDS to ensure network
security isolation between RDS instances and other services?
Your answer: (null) Correct answer: B.VPC
220. The retention period of monitoring data in different aggregation periods is different.
How long is the retention period of metric data in an aggregation period of 1 hour? [Score: 1]
Your answer: (null) The correct answer is C.155.
222. Which of the following commands is used to upload images from the Docker client to
the image repository? [Score: 1]
Your answer: (null) Correct answer: B.docker push
1, ELB provides three types of load balancing algorithms.
@ True
O False
© Tre
@ false
© Tre
© False
O Tne
@ False
5, IMS provides comprehensive and flexible self-service image management capabilities. Users can create a
private image and use it to create an ECS or multiple ECSs.
@ Twe
O False
© Tne
© False
@ Te
O False
© True
@ False
10, Currently, only IPsec VPNs are supported.
© Tne
© False
@ A. Capacity reduction
© B. Capacity expansion
© C.Backup
© D.Attaching/Detaching
12, To enable remote RDP access to a created Windows ECS, which ofthe following ports must be opened |
an inboundsecurity group rule?
A5S3
0
B. 33
0
C. 3389
®
D.80
o
13, Which ofthe following is not an advantage of RDS compared withself-built databases?
© Elastic scaling
@ 68.Self-installed databases
‘© D. Instantavailability
14, Which of the following can isolate RDS network resources from other services?
O AECS
© B.0BS
@ c.vec
© b.cES
15, Which SDKlanguage is NOT supported on API Gateway?
@ A Delphi
O BJava
© C.PHP
oO Dc
O A.Reduce
O BSetto
© C.Add
@ D.Double
@ Cloud Eye
O B. Auto Scaling
© C.CloudContainer Engine
© OD.VirtualPrivate Cloud
© A. Image ManagementService
O D.AutoSealing
19, Which ofthe following is NOT a componentofthe big data platform?
O A.Map Reduce
© 8.Yam
O C.HDFS
® D.Openstack
© A. Image
© ©. AutoScaling
@ D.EVS disk
21, Which of the following policies can be configured to increase the numberofinstances in an AS groupat
predetermined time each week?
O AAllofthe above
® B.Periodic policy
© C.Scheduled policy
© D.Alarm policy
© A. Image recognition
@ 8. Character recggnition
© C.Speech recognition
© A. Backendserver
@ C.Listener
R
O D.Health check
O A.Cloud Eye
© C.Cloud Tracefgrvice
@A nugps
O B.UDP
© c.TcP
O D.HTTP
© . To create a direct connection, users need to create a connection,a virtual gateway, and a virtual interface.
fo} D. Direct Connectis a high-speed, low-latency,stable, and secure dedicated network connection that connectsuser's
local data center to a VPC on a cloud.
27, Which ofthe following key technologies does SA use?
@ A.Bigdata
OB.Identity authentication
© .£ncryption
28, Which ofthe following CIDR blocks does the VPC service support?
G A.100.0.5/24
@ 8B. 10.0.25.0/24
@ Cc. 192.168.0.0/23
@ 0. 172.16.0.1/24
@ B. Visualized monitoring
@ A Public image
@ 8B.Private image
O C.Secret image
@ D.Shared image
@ C.alinux—cs
(@ Security control
(@ C. Agency management
@ D. Permission management
@ C.ImageSearch
34, Which of the following EVS disk types does ECS support?
@ A.Common /0
@ 8B.Ultra-high 1/0
@ C.High Oo
C. High TCO
8
D. 1/0 Bottleneck
1.Cloud Computing Characteristics include(multiple choices):
A. On-demand self-service
B. Broad networkaccess
8
C. Rapid scalability
8
D. Resource pooling
A.Private cloud
B. Industry cloud
a
C. Rapid cloud
oa
D, Public cloud
O true
@ falseeW
@ truev
© false
1
-Huawei Cloud Network Services includes:
A. VPC
O B.OBS
Cc. ELB
© D.SFS
. Which of the Following Compute Services Does HUAWEI CLOUD Provide?(multiple choices)
=
B. AutoScaling (AS)
AHCIA
B.HICP
CHCIE
OO D.HICM
Which belongs to HUAWEI CLOUD Developer Center Ecosystem Catalog? (multiple choices)
A, Developer Contest
B. Cloud Expert
C, Sign-up Platform
D. MVP
1, The ITUAWEI CLOUD Partner Network (I ICPN) is a global partner program for | IUAWCI CLOUD.
© truev
O false
1. You can view, purchase, use, and operate various HUAWEI CLOUD service products after you have logged in to
the management console.
@ truv
O false
2, The management console manages various services such as computing, storage, network, security, management
and deployment, application services, databases,data analysis, enterprise applications, and DevCloud.
@ truev
O false
© A.Auto Scaling
© D.Cloud Eye
1, High-performance computing ECSsprovide a large number of CPU cores, large memory size, and high
throughput.
@ truev
© false
@ truev
© false
1, Which of the following methods does AS use to expand resources?(multiple choice)
Quiz-2
1.AZ Specifies a physical region where resources use independent power supplies and networks. AZs are physically
isolated but interconnected throughan internal network.
@ truev
O false
1.AS supportsthe following instance removal policies:(multiple choices)
C.Oldestinstances
D.Newestinstances
AAlarm policies
B.Scheduledpolicies
C.Periodic policies
O D.Monitoringpolicies
1.Private images can heclassified into: (multiple choices)
C.Full-ECS image
a
© D.Snapshot
1.If the ECS uses a static IP address, configure DHCPforthe ECS,allowingit to dynamically obtain an IP address.
@ truev
O false
A. Public image
B. Private image
© C. Encrypted image
D. Shared image
@ truev
© false
© A.OBS
B.ECS
C.BMS
f) DPC
1.How many servers can a shared EVS disk be attached to at most?(single choice)
OAS
O B7
Oo C8
© D164
A.Ultra-high |/O
B.High /O
C.Common I/O
O D.Optimized I/O
1.HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume BackupService (VBS) to protect your
data against:(multiple choices)
A.viruses
B.unintentional deletions
Csoftwarefaults
D. hardwarefaults
@® truev
O false
1.VBS provides the data backup function for EVS disks. The created data backupscan beusedto create EVS disks.
@ truev
O false
1.Object Storage Service (OBS) is a stable, secure,efficient, and easy-to-use cloud storageservice.
@ truev
© false
A. Stable
B. Efficient
C. Secure
D. Easy to use
1.0BS supportsfine-grained permission control for buckets and objects through bucketpolicies.
© truev
© false
1.Users can collect OBS resource operation records through CTSservice to facilitate future query, audit and
backtracking.
@ ATrueY
O B. False
1.Advantagesof SFS include:(multiple choices)
A. File sharing
B, Elastic scalability
D. Durable
@® truev
© false
2. A file system provides users with shared file storage service through NFSor CIFS.
© truev
O false
A.Media processing
B.Log management
8
B, Flexible Configuration
C. High-Speed Access
D. Interconnection
@® truv
O false
1. Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?(multiple choices)
A. ECS
B. ELB
C. Cloud Eye
A, High availability
B, High flexibility
C. High performance
1,Which ofthe following load balancing algorithms are provided by ELB? (multiple chaices)
C, Source IP hash
A. TCP
B. UDP
Cc HTTP
D. HTTPS
© true
® falsew
© truev
© false
1.Cloud Eyeis a monitoringservice that can help you capturethe status of your Direct Connect connections.
® truev
© false
@ truev
© false
1.VPN is used to establish a secure and encrypted public network communication tunnel between the remote user
and the VPC.
@ truev
O false
1.Whatbilling modes does VPN support?(multiple choices)
A. pay by bandwidth
B. pay by networktraffic
@® truev
© false
1. With data security as its core, HUAWEI CLOUD builds a series of security services to meet the particular
needs.security services include:(multiple choices)
A. Data Security
B. Host Security
C. Application Security
D. Network Security
A. DEW
OB. HSS
O ccGs
D. DBSS
1.You can use Cloud Eye to:(multiple choices)
. Which of the following security services can be usedto protect websites? (Multiple choices)
A.WAF
B.VSS
C.SCM
D.Anti-DDoS
8
A. Automatic provisioning
C.Visualized monitoring
3
A. Basic Monitoring
B. OS Monitoring
A,InstantAvailability
B. High Reliability
C, High Security
D, Elastic Scaling
A. Max
B. Min
C. Avg
D. Sum
A, High Availability
C. DB Instance Monitoring
D. High security
1. You can reboota DB instance only whenits status is Available.
@® truev
© false
1.Among HUAWEI CLOUD EI services, ModelArtsusesthe self-developed Moxing deep learning framework to
accelerate algorithm developmentandtraining.
@ truev
O false
A. Face Recognition
B. Image Recognition
C. Content Moderation
D. ImageSearch
© truev
© false
© truevd
O false
1, Opening APIs greatly promotes service innovation and standardization of existing services.
@ truv
O false
2. API Gateway doesn't supportall API integration and opening on HUAWEI CLOUD.
O true
@ falseW
1.You can enable API Gateway and create and manageAPIs for free.
@® truevd
O false
1. The minimum managementunit of RDSis an instance.
Yeah. Wrong
2. ECS refers to the Auto Scaling (AS) service.
Yeah. Wrong
3. Whatare the key features of IAM?
A. Centralized control of users and security credentials
B. Centralized user access control
C. User group-basedrights
D. Huawei customer service agent maintenance
4. The VPC subnet segment can be modified after being created.
Yeah. Wrong
5. VBS can create backups for EVS disks and use the backupstoroll back EVS
disks, ensuring user data accuracy and security to the maximum extent.
\Yeah. Wrong
6. Which of the following statements about KMS is incorrect?
A. Management cloud platform and tenant key
B. HSM (hardware security module)
C. Multi-layer key protection technology
D. Support for application combination
7. Which of the following doesnot exist in the listener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode
8. On the Dashboard page, you can add or delete monitoring icons of concerned
instances. Supports multi-indicator comparison so that users can view the
Yeah. Wrong
9. Relational Database Service (RDS) users can modify database configurations to achieve optimal performance.
Yeah. Wrong
10. The size of the exported imageis not limited.
Yeah. Wrong
11. The ASservice can only dynamically add or reduce server resources based on the specified time period.
Yeah. Wrong
12. Which of the following statements aboutSFSis correct?
A. A file system can be mountedto an ECS and canbelongtodifferent VPCs.
B. Parameters cannot be modified forthe file system that is successfully created.
C. The file system can access different AZs in the same VPC.
D. The performanceofthe SFS file system improveswith the increase of capacity.
13. Which of the following imagesis a standard image provided by the public cloud platform andisvisible to all users?
A. Public image
B. Private images
C. Shared image
D. Market image
14. The GPUis applicable to graphics rendering and engineering drawingin virtualization environments and desktop cloud scenarios.
Yeah. Wrong
15. Whatare the typesof AS policies?
A. Scheduled policy
B. Periodic policy
C. Alarm policy
|p. Randompolicy
16. Which of the following scenarios are involved in image replication?
A. Copying an unencrypted image to another unencrypted image
B. Replicating an unencrypted image as an encrypted image
C. Replicating an encrypted image as an encrypted image
D. Replicate an encrypted image to an unencrypted one.
17. Allowsusers to set read-only permissions for SFS.
Yeah. Wrong
18. Which of the following load balancing modesare not supportedbylisteners?
A. Maximum number oflinks
B. Polling
C. Set weights.
D. Minimum connection
19. Which of the following methods can be usedto set the access permission for anonymous users of OBS objects?
A. Set an ACL for the OBS bucket.
B. Set the ACL for OBS objects.
C. Set a policy for OBS objects.
D. Set a policy for the OBS bucket.
20. OBS supports batch upload.
Yeah. Wrong
21. WhatAre the Steps for Creating a Windows Image Using an ECS?
A. Configure the Windowsserver.
B. Install Cloudbase-Init.
C. Creating a Windowsprivate image
D. View and clear networkrule files.
A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy
25. Which of the following parameters is used to automatically obtain an IP address during VPC creation?
A.DHCP
B. Network segment
C. Partitioning
D. Gateway
26. Which of the following is not the application scenario of Cloud Eye?
A. Daily resource management
B. Issue notification
C. Capacity adjustment
D. Operation audit
27. Which of the following is not a capability of DevCloud?
A. Project management
B. Code check
C. Compile and build
D. Data backup
28. Cross-VPCaccessto file system is supported.
Yeah. Wrong
29. WhatAre the ECS Login Authentication Modes?
A. PasswordB. PasswiC.Fingerprint D. Key pair
30. Huawei provides developers with functional development, which will help
developers integrate the functions developed by Huaweiwith their upper-layer
applications to build differentiated and innovative solutions.
Yeah. Wrong
31. Which of the following are RDS functions?
A. Create a databasecluster.
B. Expand the disk capacity.
C. Adding a read replica
D. Creating or restoring a snapshot
E. Restore the backup to a specified time point.
32. Whichof the following functions are provided by OBS Console?
A. Static website hosting
B. Multi-version control
C. Cross-domain resource sharing
D. Mounting external buckets
33. Attach the EVS disk to an ECS so thatthe disk can be used directly.
Yeah. Wrong
34. Which of the following statements about VBS are correct?
A. After an EVS disk is deleted, its backup datais also deleted.
B. After an EVS disk is deleted, you can use the backup to restore the EVS disk.
C. After an EVSdisk is deleted, you can still use the backup to create the EVSdisk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
35. How Can | Add Instances to an AS Group?
A.Scaling action
B. Manually add instances.
C. Change the number of expected instances.
D. AS configuration
36. Alarm ni ication is the action taken whenan alarmis triggered. Users can
set or disable alarm notification when creating or modifying an alarm.
Yeah. Wrong
From which aspects doessituational awarenessanalyze security posture?
A. Global perspective
B. User perspective
C. Managementperspective
D. Attacker perspective
38. After an application is created, you can change the application by replacing the image of the application.
Yeah. Wrong
39. ECSsare billed in yearly/monthly or pay-per-use mode.
Yeah. Wrong
40.A policy is configured for OBS bucketA to prevent any user from accessing
objects in the bucket. Bucket A contains object B, which is configured with the
ACL permission to allow anonymous usersto access object B. In this way, users
can access object B anonymously.
Yeah. Wrong
41. Which of the following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and home directory
D. High-performance computing
Yeah. Wrong
43. WhenIPSec VPNis used for communication, the encryption and decryption
check is performed onthe firewalls at both ends.
Yeah. Wrong
44. VBS doesnot support batch backup of EVS disks.
\Yeah. Wrong
A. Read permission
B. Write permission
C. ACL permission
D. Modify the ACL permission.
47. Which of the following is the image type converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
48. What are the concepts of VPC?
A. Subnet B.EIP C. Security group D. VPN
1. After an ECSis created, the bandwidth used bythe ECS cannotbe changed.
Yeah. Wrong
2. Which ofthe following operations is charged?
A. Create an EIP.
B. Create a subnet.
C. Create a VPC.
D. Create a security group.
3. Which of the following doesnotexistin thelistener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode
4. Whichof the followingis not the target of the cloud computing security service?
A.Usersecurity
B. Cloud platform security
C. Data security
D. Service security
5. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and homedirectory
D. High-performance computing
6. Which of the following EVSdisks can be directly created on the EVS console?
A. System disk B. Data disk C. Delta disk D. Mirror disk
The ASservice must be used with Elastic Load Balance.
Yeah. Wrong
8. Which ofthe following statements about VBSare correct?
A. VBS has no quota limit.
B. If the capacity of an EVS disk is expandedafter the disk is backed up, the disk capacity remains unchangedafter the disk is restored using the backup data.
C. If you back up an EVS disk and then expandits capacity, you cannot use the backupto restore the disk
data. This is because the disk spacewill be restored to theoriginal size after the restoration.
D. After the capacity of an EVS disk is expanded,the disk space remains unchangedif the EVS disk is backed up and the backup is usedto restore data.
9. Whatis the full name of ECS?
Elastic Cloud Server
42. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three times, disable
versioning for the bucket, and upload object aaa for three times. After the preceding operations are
complete, how manyobjectsare displayed in the bucket basic information?
Quantity: 4
43. Whichofthe following statements about Anti-DDoS traffic awarenessis incorrect?
A. Web vulnerability security detection
B. Configures and modifies anti-DDoS parameters for public IP addresses.
C. Provides protection for public IP addresses of ECSs and load balancing devices.
D. Monitors a single public IP addressin the obstetrics department, including the current defense status,
current defense configuration parameters,traffic since 24 hours ago, and one event within 24 hours.
1. If two sites communicate with each otheracross the Internet, IPSec VPN can be deployed on
the firewalls at both sites to protect the mutual accesstraffic betweenthe intranets at the two
sites.
Yeah. Wrong
2. Which ofthefollowing statements about hybrid cloudis incorrect?
‘A. Unified management ofpublic and private cloud resources
B. Service resourcesare migrated betweenthe public cloud and private cloud.
C. Optimal resourceallocationthrough hybrid cloud
D. Applications can only be deployedonthe public cloud.
3. Cloud computing is a modelthatenables users to obtain required resources from the shared
pool of configurable resources anytime, anywhere, and on demand.
Yeah. Wrong
4. All types of HUAWEI CLOUDproducts can be viewed on the managementconsole.
Yeah. Wrong
5. Whichofthefollowing doesnotexist in the configuration for creatinga listener?
A. Load balancer protocol/port
B. VPC
C. HTTPScertificate
D. Load mode
6. Whichofthefollowingis not a major function of WTP?
A. Websitefile protection
B. Alarm information recording
C. Protection details stati S
D. SQLinjection prevention
7. Which of the followingare the main functions of HID?
A.Bruteforce cracking detection
B. Remotelogin notification
C. Weak password detection
D. Checkthe database processpermission.
E. Webpage file detection
8. Whentheaveragevalueis selected as the aggregation mode, the peak values may be inconsistent when users switch the data range.
Yeah. Wrong
9. Which of the following statementsis incorrect?
A. Create a folder named br..ra/1 in the OBS bucket.
B. OBS Console supportsbatch deletion of buckets.
C. OBS Console supports batch deletion of objects.
D. A user has created 101 buckets using OBS Console.
10. Whichofthefollowing functionsare provided by the ECS service?
‘A. Users can create and delete VMs, modify VM specifications, andstart and shut down VMs.
B. Users can add and uninstall extension NICs, add EIPs, and attach and detach disks.
C. Users can view information about their ECSs on the management console.
D. Users can set ECS alarm rules.
11. RDS meets the ever-changing requirementsof the gaming industry, shortens the R&D period, and reduces R&D costs.
Yeah. Wrong
12. Which of the following services can work with EVS?
A. Elastic Cloud Server
B. Image ManagementService (IMS)
C. Volume Backup Service (VBS)
D. Cloud monitoring service
13. Application security is an importantpart of the cloud security service. It ensures the
security of elastic cloud computing servers and cloud computing applications running on them
from the perspective of operating system and application security protection.
Yeah. Wrong
14. Which of the following statements about VBS is incorrect?
A. VBS is based on the snapshot technology and supports online backup.
B. VBS supportsfull backup and incremental backup.
C. You do not needto stop the server whenusing a backup to restore an EVSdisk.
D. When backing up EVS disks, you do not need to stop the server.
15. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content managementand home directory
D. High-performance computing
16. Whatare the application scenarios of VBS?
A. Hackerattacks orvirus attacks
B. Data is deleted by mistake.
C. Dataarchiving andretention
D. The application program is faulty.
21. An availability zone (AZ) is a collection of one or more physical data centers with
independentcooling, fire extinguishing, moisture-proof, andelectricity facilities. Within an AZ,
computing, network, storage, and other resourcesare logically divided into multiple clusters.
Yeah. Wrong
22. Which type of image is converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
23. Which of the following operations can be performed by a shared image provider?
A. Sharing a specified image
B. Delete the shared image.
C. Add a tenant to whom an image is shared.
D. Delete the tenant who shares the image.
24. Which of the following statements about the ELB function cannot be implemented?
A. Eliminate single points offailure.
B. Sharing service node pressure
C. Check the health status of service nodes.
D. Layer 2 and Layer 3 data forwarding
25. When enabling Direct Connect, whatis the port type if the port type is 10GE?
Optical port
26. How long doesit take to apply for an ECS?
A few minutes.
27. OBS supports batch upload.
Yeah. Wrong
28. What are the types of EVS disks?
A. More than I/O B. High I/O C. Common |/C D. Optimized 1/0
29. The VPC subnet segment can be modified after being created.
Yeah. Wrong
30. Data security ensures confidentiality and integrity of user data applications and storagein the cloud computing environment.
Yeah. Wrong
31. Before creating an imageusing an ECS, ensurethat the ECS has been stopped.
Yeah. Wrong
32. Users cannotdeployservice applications on ECSsasif they wereusingtraditional servers.
Yeah. Wrong
33. Whichofthefollowingis not a basic concept of ELB?
A.Firewall
B. Load balancer
C. Listener
D.Instance (VM orapplication container)
34. Whichofthefollowingis not the main application scenario of KMS?
A.Data transmission encryption
B. Personal data encryption
C. Coreservice data encryption
D. Key information asset encryption
35. Which of the following statements aboutVBS are correct?
A. After an EVSdisk is deleted, its backup data is also deleted.
B. After an EVSdiskis deleted, it can be restored using a backup.
C. After an EVSdisk is deleted, you can still use the backup to create the EVS disk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
36. Which of the following componentsis not included in the big data platform?
A.MapReduce
B.OpenStack
C.HDFS.
D.Yarn
41. VPCs can be connected totraditional data centers through private lines or VPNstoflexibly integrate resources.
Yeah. Wrong
42. After an ECSis created,its bandwidth cannot be modified onceit is determined.
Yeah. Wrong
43. The webapplicationfirewall performs anomaly detection on HTTPrequeststo effectively
prevent malicious network intrusion behaviors such as web page tampering, information
leakage, and Trojan horse implantation.
Yeah. Wrong
44, Whatare the advantagesof SFS over traditional file sharing storage?
A.File sharing
B. Seamlessintegration
C. The operationis simple butthe cost is high.
D. High reliability
45. When multiple VMsare created, you can bind an EIP to multiple VMsto enable the VMsto accessthe Internetat the sametime.
Yeah. Wrong
46. IMSprovidesflexible self-service and comprehensive image managementcapabilities.
Users can create private images and use the imagesto create ECSsor load ECSsin batches.
Yeah. Wrong
47. RDSusers can modify database configurationsto achieve optimal performance.
Yeah. Wrong
48. A policyis configured for OBS bucketA to prevent any userfrom accessingobjectsin the
bucket. Bucket A contains object B, which has an ACLthat allows anonymoususers to access.
Then,users can access object B anonymously.
Yeah. Wrong
49. Alarm notificationis the action taken whenan alarm is triggered. Users can setor disable
alarm notification when creating or modifying an alarm.
Yeah. Wrong
b. False
2. In the initial phase of 5G network construction, operator predominantly provide data service
for customers. (T/F)
a. True. _Ok
b. False.
3. Open trail specification alliance (OTSA) predominately promots the release and application of
28 GHz spectrums. –TF
a. True ..Ok
b. False
b. False
5. 5G technology uses licensed frequency bands. Therefore mobile operators can provide identity
authentication and core signaling security. ..TF
a. True ..Ok
b. False
b. False .. Ok
7. In the 5G era, services will shioft from 2C to emerging vertical industries, including 2B2C, @B,
2H. ..TF
a. True ..Ok
b. False
b. False .. Ok
b. False
10. Standards formulated by Open trial specification alliance (OTSA) also belong to 5G
specifications of 3GPP.
a. True
b. False _Ok
11. Device-to-Device (D2D) allows devices to communicate with each other without
requiring a network?
a. True. _Ok
b. False
b. false
13. Open Trial specification Alliance (OTSA) predominantly promotes the release and
application of 28 GHz spectrum.
a. True. _Ok
b. False
14. 3GPP Release 15 protocols are divided into three stage : non standalone (NSA)
networking, late drop
a. True._ Ok
b. False.
15. Cloud pc is one of the three important eMBB services defined by Huawei in cloud X
a. True. ._Ok
b. False.
16. Sub-3 GHz spectrum resources can be dynamically shared with 5G spectrums by
using the cloud AIR technology
a. true ….ok
b. false
b. False
b. false ……ok
19. Using a 5G-based transmission line inspection drone can extend the inspection range to
several kilometers away.
a. True ..Ok
b. False
20. In the initial phase of 5G network construction, vertical industry applications should
have low requirements for continuous coverage.
a. True …. ok
b. false
21. With the network slicing technology, operators can increase revnue and reduce
expenditure, opening up more service scenarios.
a. True ..Ok
b. False
SINGLE CHOICE
22. Which of the following is the main advantage of the using massive MIMO over
traditional MIMO? SC
a. Multiplexing gain
c. 3d beamforming gain .. Ok
d. Diversity gain
23. Which of the following key technologies is used to improve data transmission reliability and
reduce retransmission caused by data transmission errors, Thereby indirectly improving
spectral efficiency? _SC
a. F-OFDMA _Ok //
b. High-order modulation
d. Massive MIMO
24. Which of the following Terms refers to the base station in the radio access network in 5G?
a. NodeB
b. eNodeB
c. gNodeB .. Ok
d. BTS
25. In 5G, what is the maximum number of RBs when the subscriber spacing is 30KHz and
bandwidth is 100 MHs? – SC
a. 273 _Ok
b. 106
c. 200
d. 100
26. In the IMT2020 vision, which of the following is correct ratio of 5G service delay to the 4G
service delay?
a. 1/50 ..Ok
b. 1/10
c. 1/100
d. 1/20
27. WHICH OF THE FOLOLOWING ARE THE KEY FACTORY FOR OPERATORS TO SELECT NSA OR SA
NETWORKING? -MC
a. Inventory network devices ..Ok
b. Return on Investment .. OK
c. Terminals .. Ok
28. Which of the following frequency bands is used by the Verizon 5F home?
a. 3.5G Hz
b. 28 Ghz ..oK
c. 40 GHz
d. 2.6 GHz
29. Which of the following is disadvantage of wired (power Line) AMI Technology?
a. Low Capacity
b. Immature Technology
c. Difficult deployment .. Ok
b. Subscribe
c. Proprietor
d. User
31. Which of the following is the key 5G capability required by monitoring applications such as
connected intelligent infusion in smart healthcare?
a. Low-power small-packet transmission. _ok
d. Contiguous coverage
32. Which of the following is the user plane function module on the core network in 5G SA
networking? SC
a. AMF
b. UDM //HSS
c. SMF
34. What is minimal air interface latency required in the 5G URLLC application scenario in
IMT-2020 vision? -SC
a. 1 ms .. Ok
b. 10 ms
c. 5 ms
d. 100 ms
b. False
36. Which of the Following Standards could potentially undermine global 5G unification
and cause the industry ch ain to break? –SC
a. IEEE
b. 3GPP
c. OTSA .. OK
d. 3GPPs
37. Which one of the following must be cloudified first to implement the could -based
network structure? –SC
a. Core network ..Ok
b. Terminal
c. RAN
d. Bearer Network
38. In which 3GPP release were the 5G standards first introduced? -SC
- Release 15 .. Ok
- Release 16
- Release 10
- Release 8
- Phase 2.1
- Phase 2.2
- Phase 1.1
40. Which of the following statements is incorrect about uploading AR/VR teaching content
to the cloud? -SC
- AR/VR images and audios are efficiently encoded into audio and video streams in the client.
_Ok
- The cloud computing capability is used to run, render display, and control AP Applications.
- Rendering with high requirements on latency is deployed close to user that service data does
not need to be transmitted to the core network.
- The edge cloud deployment architecture is recommended to meet the low latency requirements
of services.
41. Which one of the following servi ces belongs to URLLS application scenario? -SC
- Automated driving ..Ok
- Intelligent parking
- AR/VR
42. Which of the following 5G chipsets does not support 5G mode? –SC
- Balong 5000
- Exynos 5110
- X55
- X50 .. OK
43. What diversity of connections can 5G deliver in the mMTC application scenario in IMT -
2020 Vision? –SC
- 100,000 Connections per square kilometer
44. Which of the following is not advantage of a thin client in the cloud X service?
a. Easy deployment and management
c. Mobile
d. Low cost
45. Which ogf the following is the ideal rate of reliability for cooperative
automated drinving?
a. 0.999%
b. 0.999999%
c. 0.9999%
d. 0.99999% .. Ok
c. Patient Locating
d. Infusion monitoring
47. In an industrial internet sensors are used to monitor the status. Which one of the
following requirement in this case?
a. Low delay
b. Large bandwidth
c. High reliability.
d. Massive connections ..Ok
b. Phase 1.1
c. Phase 2.1
49. Which of the following services is the most suitable for terminals to implement
DRX?_ SC
a. VR gaming
b. Automated driving
c. Video on-live
50. Which of the following is the low -altitude ra2nge where drones can work? _SC
a. 2000 m
b. 100 m
c. 1000 m .. Maybe
d. 60 m
51. Which of the following is the terms refers to the base station in the radio network
access in 5G? _SC
a. NodeB
b. eNodeB
c. BTS
d. gNodeB ..Ok
52. Which of the following coding schemes is predominately used for traffic channel in 5G?
_SC
a. LDPC ..Ok
b. Convolutional code
c. Polar code
d. Turbo coding
53. Which of the following TV definitions is equivalent to the definition of the pre -VR full
view 4K 2D content? -SC
a. 240p ..Ok
b. 1080p
c. 480p
d. 720p
54. Which following service scenario of the smart grid does a separate 5G E@E need to be
used? -SC
a. Power distribution network protection and control ..Ok
b. Mobile operations
55. Which one of the following technologies enables 5G to better support drone services? -
SC
a. AAU vertical coverage. _Ok
56. Which one of the following serves as the mail application service for 5G deployment
phase in the Europe and the United states? -SC
a. Internet of Vehicles (IoV)
b. Cloud VR
c. Smart manufacturing
b. 480p ..Ok
c. 720p
d. 1080p
58. Which of the following has the highest requirement for the network bandwidth in B -
Scan?
a. Ultrasonic imaging ..Ok
b. Operation control
c. Real-time call
59. Which of the following is the highest modulation order as defined by 3GPP release 15?
_SC
a. 16QAM
b. 1024QAM
c. 64QAM
d. 256QAM ..Ok
60. Which of the following security feature of the 5G can identify illegal attacks and reduce
the impact of attacks? -SC
a. Availability ._Ok
b. Integrity
c. Confidentiality
d. Traceability.
61. Which of the fowling is a solution for 5G to switch uplink transmission to the sub -3 GHz
low frequency band. Effectively compensating for insufficient uplink coverage of the C -
Band? _SC
a. UL and DL decoupling ..Ok
b. Carrier aggregation
c. Duplex technology
62. Which of the following is the mail requirement for 5G network performance for
services such as smart building and smear lamp? -SC
a. Latency
b. Rate
c. Connections ..Ok
d. Mobility
63. Which of the following is the most advanced aspect of the development phase of IoV?
_SC
a. Fully Automated parking
b. 220 KV
c. 800 KV ... Ok
d. 35 KV
65. Which one of the following 5G service application does the V2X apply to? _SC
a. IoV _Ok
b. smart grid
c. Drone
d. IoT
66. Which of the following 5G security features, which one can be used to record
operations for security audit? _SC
a. Availability
b. integrity
c. Traceability ….ok
d. confidentiality
67. Which of the following service scenarios is the most suitable for terminal to implement
DRX? _SC
a. Intelligent meter reading ..ok
b. video on-live
c. VR gaming
d. Automated driving
68. Which one of the following is the standard configuration for antennas on 5G mobile
phones for commercial use ?_SC
a. 2T2R
b. 4T4R
c. 2T4R _Ok
d. 4T4R
69. Which of the following statements is correct about the 5G service -oriented
architecture? _SC
a. Service-based interface
70. which of the following chips is the world’s first commercial single -chip multi-mode
(2g/3g/4g/5g)5g modem? _SC
a. Balog 5000 ..Ok
b. 5X50/X55
c. CXMM-8160
d. D.Exynos 5510
71. 3G significantly promotes the development of smart healthcare .which of the following
application scenarios is the most demanding? _SC
a. A.remote consultation. …. ok
b. patient locating
d. wireless monitoring
72. Which of the following companies the claimed that it will no longer develop 5G
terminal baseband chipsets?_SC
a. QUALCOMM
b. Huawei
c. intel …… ok
d. Samsung
73. Which of the following statements is correct about data splitting with Option 3x? _SC
a. Bearer-bases data splitting
74. Which of the following medical applications does not need to be supported by 5G? _SC
a. Remote B-scan
c. Remote surgery
75. Which of the following is the recommended position for deploying the user data
processing module for automated driving? _SC
a. Edge cloud _Ok
b. Regional Cloud
c. Core cloud
d. Access network
76. Which one the following 5G terminals converts 5G signals into Wi -Fi signals
for WTTx services? _SC
a. Router
b. CPE _Ok
c. Smartphone
d. Mifi.
b. X.lab
c. 5GAA ….ok
d. 3GPP
78. Which of the following companies has claimed that it will no longer develop 5G
terminal baseband chipsets?
a. Intel .. Ok
b. Samsung
c. Huawei
d. Qualcomm
79. Which of the following medical applications does not need to be supported by 5G?
a. Patient Locating .. Ok
b. Remote surgery
d. Remote B-scan
80. In the IMT2020 vision, which of following is correct ratio of 5G servic e delay to the 4G
service delay?
a. 1/100
b. 1/20
c. 1/10
d. 1/50 ….ok
81. Which of the following is the maximum bandwidth of 5G mmWave defined by 3GPP
release 15 ?
a. 400 MHz ….ok
b. 8.50 MHz
c. 200 MHz
d. 100 MHz
b. 3GPP2
c. OTSA
d. JEE
c. Mobile internet
d. N8-LoT
84. Which of following coding schemes is predominantly used for traffic channel in 5G?
a. palor code
b. turbo coding
c. convolutional code
d. LDPC ……ok
85. Which one of the following serves the main application service for 5G in early
deployment phase in European union and the united states?
a. internet of vehicle (IoV)
b. cloud VR
d. smart manufacturing
87. Which one of the following levels of precision are possible with the 3G+RTK
function?
a. to the centimeter
b. to the meter
d. to the millimeter
88. Which of the followin g is the maximum round trip time (RTT) of 5G -V2X?
a. 10ms
b. 5ms
c. 20ms ._Ok
d. 50ms
89. Significantly promotes the development of smart care. Which of the following
application scenarios in the most demanding?
a. Wireless monitoring
c. patient locating
d. Remote construction
90. Which of the following is the rate of reliability for cooperative automated driving
a. 0.99999% ._Ok
b. 0.9999%
c. 0.9999999%
d. 0.999%
91. Which of the following is the maximum round trip time (RTT) of 5G -V2X?
a. 10ms
b. 5ms
c. 20ms ._Ok
d. 50ms
92. Which of the following is minimum latency requirement of 1080p cloud games?
a. 100 ms …ok
b. 1s
c. 1ms
d. 10ms
93. Which one of the following serves the main application service for 5G in early
deployment phase in european union and the united states?
a. internet of vehicle (IoV)
b. cloud VR
d. smart manufacturing
94. Which of the following 5G service application does unmanned aerial vehicle (UAV) refer
to?
a. SMART grid
b. AUTOMATED DRIVING
c. IoT
d. Drone ._Ok
b. uRLLC
c. eMBB ._Ok
d. MBB
96. What is the maximum throughput provide by 5G in the eMBB application scenario in
IMT-2020 vision?
a. 10Gbps ._Ok
b. 100Mbps
c. 1Gbps
d. 100Gbps
97. Which of the following is the key technology to enhance high -altitude coverage 5G
network?
a. UL and decoupling
b. f-OFDMA
c. 256QAM
98. Which of the following architectures can be used with the multi -stream aggregation
(MSA) technology to implement coordination between LTE and 5G?
a. option2
b. option3x ._Ok
c. option 3 ._Ok
d. option 3a ._Ok
99. internet of vehicles (IOV), requires coordination of network intelligence from
vehicle-mounted information service to intelligent transportation
a. true ._Ok
b. false
100. Which of the following is the main advantage of using massive MIMO over
traditional MIMO
a. diversity gain
d. multiplexing gain
101. Which of the following operation in remote s urgery require network support?
a. operational control ._Ok
c. control desktop
d. surgery footage
102. Which one of the following can be achieved with level 3 of automated driving?
a. occasional automatic intervention driving
d. autonomous driving
103. Which one of the subcarriers spa cing yield the highest spectral efficient for 5G
cells on 50MHz bandwidth?
a. 15kHz ….ok
b. 60kHz
c. 30KHz
104. Which one of the following solutions cannot reduce end -to-end delay?
a. RTT optimization over the air interface
105. Which of the following is not an advantage of a thin client in the cloud x se rvice?
a. low cost
b. mobile
b. face time
c. 1080 video
d. 8k VR
107. Which one of the following solution cannot reduce end -to-end delay ?
a. large-capacity spectrum bandwidth ….. ok
108. In an industrial internet, sensors are used to monitor the status. which one of the
following is the network requirement case?
a. massive connections ….ok
b. high reliability
c. low delay
d. large bandwidth
MULTIPLE CHOICE
109. Which of the following are major challenges in the 5G era? -MC
a. Explosive increase of connected devices ..Ok
110. Which of the following items are included in the 5G phase 3 test led by IMT -
2020 (5G) promotion Group? –MC
a. Field test of the NSA architecture.
111. Which of the following is the pain points relating to PC gaming Experience? -MC
a. Low Hardware investment
b. Anyhow .. Ok
c. Any device .. Ok
d. Anything.. Ok
113. Which of the following are members of the 5G Open Trial Specification Alliance
(OTSA)? -MC
a. SKT .. Ok
b. Vodafone
c. Verizon .. Ok
d. DCM .. Ok
114. Which of the following are the key requirements of power distribution
automation on communication networks? -MC
a. Millisecond-level Ultra-low latency .. Ok
b. High isolation .. Ok
c. High reliability .. Ok
d. Ultra-high bandwidth
b. Option 3x .. Ok (CP will eNodeB, UP will be by gNodeB which is directly connect to EPC)
// Option 4 -> (CP will be NGC, UP will be shared eNodeB and gNodeB)
116. Which of the following benefits does 5G bring to automated driving? –MC
a. Removing single-vehicle intelligence and achieving intellegetn coordination. ..Ok
d. Making up for the constraints on sensors due to distance and environment. ..Ok
117. In the following terminal m oving speeds are supported for 5G? -MC
a. 300 Km/h .. Ok
b. 500 Km/h .. Ok
c. 600 Km/h
d. 400 km/h .. Ok
118. Which of the following massive MIMO statements are correct? -MC
a. Massive MIMO uses Large-scale antenna arrays ..Ok
d. Legacy wide beams are replaced with narrow beams by adjusting then beam weight. ..Ok
b. The signal strength is dtrong when lower the 120 from the ground but the connection
is easly lost when the height exceeds 120m. ..Ok
d. The drone height is not within the mail lobe of the ground station antenna. The air signals are
in disarray. There is no primary coverage cell. Frequent handovers caus significant downlink
interference for terminals. ..OK
120. Which of the following security technologies are used on a 5G network? -MC
a. End-to-end security protection between PLMNs . _Ok
c. Integrity protection on the user plane over the air interface. ..Ok
121. Which of the following are 5G technologies defined in 3GPP release 15? _MC
a. Massive MIMO _OK
b. The typical application scenarios of URLLS include automated driving, drones, and
telemedicine. _Ok
123. Which of the following technical solutions reduce the 5G delay? _MC
a. Shortening the resource allocation interval _Ok
c. F-FDMA
124. Which of the following are pain points relating to PC gaming experience? _MC
a. High software price _OK
b. Piracy ..Ok
125. Which of the following NSA networking statements are correct? _MC
a. Capable of provisioning new services such as URLLC
c. The typical application scenario of URLLS include automated driving. ,drones ,and
telemedicine. _Ok
d. In mid-2018, 3GPP release 15 completed the URLLS basic version by the end of 2019, the
completed version of 3GPP release 16 was provided _Ok
128. Compared with traditional plat preservation which of the following advantages
does drone-based plant preservation have? _MC
b. higher efficiency than manual operations ….ok
c. 30% less medicine is used, saving water and protecting the environment. …ok
b. LTE-V2X….ok
c. 5G=V2X…..ok
d. UMTS-V2X
130. Which or the following are members of the 5G open trail specification Alliance
(OTSA) ?
a. SKT…..ok
b. Vodafone
c. Verizon….ok
d. DCM…ok
131. Which of following are the key of intelligent distributed power distribution
automation on commination network?
a. Millisecond-level ultra-low latency …..ok
c. high reliability….ok
b. IOT
d. Iov
134. Which of the following NSA networking statement are correct?
a. deployment based on legacy 4G networks
135. which of the following loV application scenarios con be impl ement by 5G-V2X?
a. in vehicle infotainment (IVI)….ok
136. which of the following options are supported by 3GPP release lateDrope?
a. option2
b. option2. _Ok
c. Option3
d. option7. _Ok
137. which of the following are service seniors where VR is predominately used?
a. industrial manufacturing
b. Gaming ._Ok
c. Video ._Ok
d. Education ._Ok
138. Which of the following benefits are bought by 5G to doctors and patients?
a. more efficient and timely ._Ok
b. more secure
139. Which of the following are commercial product in the 5G terminal industry
a. vehicle-mounted mobile module ._Ok
140. Which of the following are commercial products in the 5G terminal industry?
a. vehicle-mounted mobile module ._Ok
c. low security and reliability of electric power services carried on public network ._Ok
142. Which of the following advantages are experienced by cloud game user?
a. no need to buy expensive hardware
143. Which of the following statement is correct about data splitting with option 3x?
a. data splitting on the eNodeB side
Answer: A
47. Which of the following products is related to artificial intelligence? (Multiple Choice)
Answer: ABCD
Answer: ABCD
50. Which of the following about the description of the number of rows and columns for the
determinant is correct'?
Answer: B
43. Machine Learning Service is a data mining and analytics platform service that helps users
quickly discover data patterns and build predictive models through machine learning techniques
and deploy them as predictive analytics solutions
Answer: D
45. The Python dictionary is widely identified by " {} and the internal data consists of the key
and its corresponding value
Answer: A
A. Name (Logo)
B. Shape (Dimensionality)
C. Type (Type)
D. Node (Node) (Right Answers)
Answer: D
40. Which of the following conditions is not a condition that n-fold Bernoulli trials need to meet?
Answer: C
41. The Python language can use multiple statements on the same line, separated by commas
A. True
B. False (Right Answers)
Answer: B
42. Which of the following files is the graph structure of TensorFlow saved in?
A. checkpoint file
B. index file
C. cpkt file
D. metafile (RightAnswers)
Answer: D
37. Which of the following about the dictionary in Python is correct? (Multiple Choice)
A. Each key and its corresponding value need to be separated by (Right Answers)
B. Separate the different key-value with (Right Answers)
C. The entire dictionary is included in the "{} " (Right Answers)
D. The keys of the dictionary are unique and the data type is uniform (Right Answers)
Answer: ABCD
Answer: A
Answer: C
34. Which of the following conditions do the randomized trials need to meet? (Multiple Choice)
Answer: ABD
35. In a neural network, knowing the weight and deviations of each neuron is the most important
step if you know the exact weights and deviations of neurons in some way. you can approximate
any function. What is the best way to achieve this?
Answer: C
Answer: ABCD
29. Which of the following data types does Tensor Flow not support?
A. int8
B. float32
C. double64 (Right Answers)
D. bool
Answer: C
30. In TensorFlow. data is represented in the form of tensors and calculation charts
A. True
B. False (Right Answers)
Answer: B
31 Python is a fully object-oriented language Which of the following options belong to the
Python object? (Multiple Choice)
Answer: ABCD
32. Which of the following options belong to Tensor Flow concept? (Multiple Choice)
Answer: ABCDE
26. Deep learning algorithms can be divided into supervised learning and unsupervised learning
Answer: A
27. The matrix produced by the exchange of matrix A rows and columns is called the transpose
of A What are the correct properties of matrix transposition? (Multiple Choice)
A. (A T) T = A (Right Answers)
B. (A + B) T = AT +BT (Right Answers)
C. (!EA) T = JEAT (Right Answers)
D. (AB) T = A T +BT
Answer: ABC
28. What quotation marks can the Python language use? (Multiple Choice)
Answer: ABC
21. The Python list can be identified by " [] ", and the default index of the first element from left
to right is 1
A. True
B. False (Right Answers)
Answer: B
22. What are the core concepts in TensorFlow? (Multiple Choice)
A. Gridding
B. Calculation Chart (Right Answers)
C. Dot Product
D. Tensor (Right Answers)
Answer: BD
23. Which of the following is not included in the recurrent neural network usage scenario?
A. Machine translation
B. Speech recognition
C. Image style migration (Right Answers)
D. Text generation
Answer: C
24. Numerical calculations refer to the method and process of effectively using the digital
computer to solve the approximate problem of mathematical problems, and the discipline
consisting of related Theories. Which of the following processes are involved in solving actual
problems with a computer? (Multiple Choice)
Answer: ABCDE
25. Which of the following is not the difference between Python 2 and Python 3?
A. print
B. Unicode
C. import (Right Answers)
D. xrange
Answer: C
16. What of the following does belong to convolutional neural network (CNN)? (Multiple
Choice)
Answer: C
18. Which of the following options is not a reason for traditional machine learning algorithms to
promote the development of deep learning?
A. Dimensional disaster
B. Local invanance and smooth regulanzation
C. Manifold learning
D. Feature Engineering (Right Answers)
Answer: D
19. The commonly used functions for mathematical operations in Python are basically in the
math module and the cmath module
Answer: A
A. Logistic regression
B. Support vector machine
C. Decision tree
D. Principal component analysis (Right Answers)
Answer: D
12. There are many commercial applications for machine learning services What are the main
business scenarios covered? (Multiple Choice)
Answer: ABCD
A. The Python module is a Python file that ends with py and contains Python object
definitions and Python statements
B. The Python module allows you to logically organize your Python code snippets
C. Python modules can define functions, classes, and variables, but the module does not
contain executable code (Right Answers)
D. Assigning relevant code to a module can make your code better and easier to understand
Answer: C
14. Which of the following options is not the session mode used by TensorFlow?
Answer: D
15. Principal Component Analysis (PCA) is a statistical method A set of variables that may be
related to each other is transformed into a set of linearly related variables by orthogonal
transformation The converted set of variables is called the principal component
A. True
B. False (Right Answers)
Answer: B
9. Python tuples are identified by "0" and internal elements are separated by
A. True
B. False (Right Answers)
Answer: B
10. What are the numeric types of Python? (Multiple Choice)
Answer: ABCD
A. Automatic Intelligence
B. Artrfical Intelligence (Right Answers)
C. Automatic Information
D. Artrfical Information
Answer: B
8. There are a lot of data generated during the training of the neural network What mechanism
does TensorFlow use to avoid excessive input data?
A. Client
B. feed
C. placeholder (Right Answers)
D. fetch
Answer: C
7. The history of robots is not long In 1959, the United States. Engelberg and Devol made the
world’s first generation of industrial robots, and the history of robots really began
According to the development process of the robot, it is usually divided into three generations,
respectively are (Multiple Choice)
Answer: ABD
2. Functions are well-organized, non-reusable code segments used to implement a single, or
associated function
A. True
B. False (Right Answers)
Answer: B
A. The learning process of the back propagation algorithm consists of a forward propagation
process and a back-propagation process
B. The back propagation algorithm is a learning algonthm suitable for multi-layer neural
networks, which is based on the gradient descent method
C. The back propagation phase sends training inputs to the network to obtain an
stimuli response (Right Answers)
D. The back propagation algorithm is mainly repeated by two loops (excitation propagation,
weight update) until the response of the network to the input reaches the predetermined
target range
Answer: C
4. In May 1997. the famous "Human-Machine Wars" final computer defeated Kasparov, the
world chess king, with a total score of 3 5 to 2 5 Is this computer called?
Answer: A
5. What are the service categories included in Huawei Cloud El Enterprise Intelligence?
(Multiple Choice)
Answer: ACD
6. As the following, what are the Python language design philosophy? (Multiple Choice)
Answer: ACD
Answer: D
33. The following are the description of the distribution function, distribution law. and density
function of random variables, which is incorrect?
A. Distribution law can only describe the value rule of discrete random variables
B. The density function can only describes the value rule of continuous random vanables
C. Discrete random variables have no distribution function (Right Answers)
D. Distribution function describes the value rule of random variables
Answer: C
A. The verification set can coincide with the test set. (Right Answers)
B. The test set can coincide with the training set
C. The subset used to pick hyperparameters is called a validation set
D. Typically 80% of the training data is used for training and 20% is used for verification.
Answer: A
99. Which of the following can optimization problem be classified according to the constraints?
(Multiple choice)
Answer: ABC
100. Which of the following are the characteristics of the Python language? (Multiple choice)
Answer: ACD
95. The timestamps in the Python language are represented by how long fin seconds) elapsed
from midnight (epoch) on January 1. 1970
Answer: A
96. Convolutional neural networks are more suitable for dealing with speech recognition
problems
A. True
B. False (Right Answers)
Answer: B
97. What are the results returned by the if conditional statements in the Python language*?
(Multiple choice)
90. TensorFlow is the second generation of artificial intelligence learning system developed by
Google based on ().
Answer: A
92. According to the definition of information entropy, what is the bit entropy of throwing a
uniform coin?
A. 0
B. 05
C. 1 (Right Answers)
D. . -1
Answer: C
93. Artificial intelligence is currently suitable for scenarios with {’known environment, clear
objectives, and predictable actionsji Deep learning in the fields of image recognition, speech
recognition, translation, etc . artificial intelligence basically has human recognition ability even
surpassing human beings Based on these capabilities it has been applied to many scenes, such as
medical care and public safety However, there is still a lack of reasoning and cognition
Answer: A
94. Python authors deliberately design very restrictive grammars that make bad programming
habits (such as the next line of if statement not indented to the right) cannot be compiled
Answer: A
A. RNN
B. LSTM
C. GBDT (Right Answers)
D. GRU
Answer: C
87. Under the large-scale relationship analysis scenario, which of the following options does not
belong to the three high demands of massive relationship processing?
Answer: B
88. What are the commonly used loss functions7 (Multiple choice)
Answer: ABCDE
89 What are the steps that are not part of the operation of a Python file object?
A. open
B. delete (RightAnswers)
C. read
D. write
E. close
Answer: B
81. The for loop statement in the Python language can iterate through the items in any sequence
Answer: A
82. Convolutional neural networks are more suitable for image recognition problems than cyclic
neural networks
Answer: A
83 Huawei Cloud El builds enterprise intelligence services based on three-tier services Which of
the following options does not belong to Layer 3 services?
Answer: D
A. Unsupervised algorithm only processes "features" and does not process "tags"
(Right Answers)
B. Dimensionality reduction algonthm is not unsupervised learning
C. K-means algorithm and SVM algorithm belong to unsupervised learning
D. None of the above
Answer: A
85. Which of the following options is not the TensorFlow build process9
Answer: D
77. TensorFlow Operations and Computation Graph are not - run in the Session
A. True
B. False (Right Answers)
Answer: B
Answer: ABC
79. The Python language does not allow embedding another loop body in a loop body
A. True
B. False (Right Answers)
Answer: B
80. What are the mainstream deep learning open source tools? (Multiple choice)
Answer: ABCD
73. X. Y are random variables. C is a constant, the nature of the difference in the following
options, which is wrong? (Multiple choice)
A. D(C)=0
B. D(X+Y)=D(X)+D(Y) (RightAnswers)
C. D(CX)=C*C*D(X)
D. D(XY)=D(X)D(Y) (RightAnswers)
Answer: BD
A. True
B. False (Right Answers)
Answer: B
Answer: B
76. Cyclic neural networks are more suitable for dealing with image recognition problems
A. True
B. False (Right Answers)
Answer: B
69. As shown below, which is the following matrix A characteristic value? (Multiple choice)
A. 2 (Right Answers)
B. -2
C. -4
D. 4 (Right Answers)
Answer: AD
70.Only matrix A and matrix B have the same number of rows and columns. A and B can be
added
Answer: A
72. which of the following are the cloud services provided by Huawei Cloud El Visual
Cognition'? (Multiple choice)
Answer: ABCDE
64. Which of the following are the characteristics of TensorFlow? (Multiple choice)
Answer: ABCD
65. Which is the correct description of the Python creation function? (Multiple choice)
A. The function created starts with the def keyword followed by the function name and
parentheses. (Right Answers)
B. The parameters need to be placed in parentheses (Right Answers)
C. The function content starts with a colon and needs to be indented (Right Answers)
D. Return the result with return and the function ends (Right Answers)
Answer: ABCD
66. About Python correct tuple which is correct description1? (Multiple choice)
A. The difference between a list and a tuple is that the elements of the tuple cannot be
modified (Right Answers)
B. The list uses square brackets, and the tuple uses parentheses (Right Answers)
C. Tuple creation is very simple, just add elements in parentheses and separate them
with commas (Right Answers)
D. When a tuple contains only one element, you need to add a comma after the
element. j£ (Right Answers)
Answer: ABCD
67. What research areas does artificial intelligence have? (Multiple choice)
Answer: ABCD
Answer: A
59. The trace operation returns the sum of the diagonal elements of the matrix Therefore, the
trace of matrix A and its transposed matrix are equal
Answer: A
60. GAN is a deep learning model and one of the most promising methods for unsupervised
learning in complex distribution in recent years
Answer: A
Answer: A
62. A scalar k is multiplied by matrix A equal to k and each of the numbers in A is multiplied
Answer: A
63. What are the conditions for m row n column matrix A and p row q column matrix B to be
multiplied9
A. m=p. n=q
B. n=p (Right Answers)
C. m=n
D. p=q
Answer: B
54. What are the commonly used activation functions? (Multiple Choice)
Answer: ABC
54. What are the commonly used activation functions? (Multiple Choice)
Answer: ABC
56. What is the incorrect relationship between neural networks and deep learning?
A. The concept of deep learning stems from the study of artificial neural networks.
B. A neural network algorithm with multiple hidden layers is a deep learning algorithm
C. Single layer neural networks are also a type of deep learning (Right Answers)
D. Convolutional neural networks are a type of deep learning
Answer: C
57. Which of the following environments does not support to install the TensorFlow?
A. Linux
B. Mac OS
C. Docker
D. OpenStack (RightAnswers)
Answer: D
Answer: A
51. Deep learning makes it easy to derive simple mathematical functions from a large amount of
high-dimensional data to describe complex decision interfaces
A. True
B. False (Right Answers)
Answer: B
52. Which of the following does not belong to automatic hyper parameter optimization
algorithm?
A. Grid search
B. Random gradient descent (Right Answers)
C. Random search
D. Model-based hyper parameter optimization
Answer: B
A. legibility (RightAnswers)
B. Simplicity (Right Answers)
C. Rapidity
D. Scalability (RightAnswers)
Answer: ABD
149. How many spaces does PEP 8 stipulate that Python's first line indentation needs to indent?
A. 1
B. 2
C. 4 (Right Answers)
D. 8
Answer: C
150. What are the Python language data types'? (Multiple Choice)
Answer: ABCDE
144. The number of rows and columns of the three matrices A. B. and C is 3 rows and 2
columns. 2 rows. 3 columns. 3 rows and 3 columns, which of the following operations is
meaningful?
A. AC
B. BC (RightAnswers)
C. A+B Answer: B
145. The constituent elements of the Python identifier include numbers, letters, and underscores
Answer: A
A. Hyper parameters are parameters that set values before the algorithm begins learning
B. Most machine learning algorithms have hyper parameters
C. Hyper parameters cannot be modified (Right Answers)
D. The value of the hyper parameter is not learned by the algorithm itself
Answer: C
147 Which of the following is not a module in the Tensor Flow library?
A. tf.nn
B. tf layers
C. tf boost (Right Answers)
D. tf.contrib
Answer: C
148. As shown in the figure below, what is the value of the determinant A?
124578369A=
A. 24
B. 18
C. -24
D. 0(RightAnswers)
Answer: D
140. Which is wrong with the Python module time introduction method 9
0 import time
1 from time import *
2 import time as t
3 from time (Right Answers)
Answer: D
141. In what year did Huawei officially provide services in the form of cloud services and
combined with more partners to provide richer artificial intelligence practices?
A. 2002
B. 2013
C. 2015
D. 2017 (Right Answers)
Answer: D
142. Which description is wrong about the lambda function of the Python language?
A. lambda is just an expression, and the function body is much simpler than def
B. The body of a lambda can be an expression or a block of code
C. The lambda function can access the parameters in the global namespace
D. The lambda function accepts only one parameter value (Right Answers)
Answer: D
143. The meaning of artificial intelligence was first proposed by a scientist in 1950. and at the
same time a test model of machine intelligence was proposed Who is this scientist?
A. Minsky
B. Zade
C. Turing (Right Answers)
D. Von Neumann
Answer: C
A. The arbitrary matrix is multiplied by the unit matrix and will not change
B. The transpose of the symmetric matrix A is also A itself
C. The transpose of the orthogonal matrix A is equal to the inverse of A
D. There is no inverse matrix for the diagonal matrix. (Right Answers)
Answer: D
A. Self-encoder
B. Convolutional neural networks
C. Recurrent neural networks
D. Support vector machine (Right Answers)
Answer: D
137. TensorFlow is Google's first generation of proprietary machine learning systems
A. True
B. False (Right Answers)
Answer: B
138. Which of the following schools does the neural network study belong to?
A. Symbolism
B. Connectionism (Right Answers)
C. Behaviorism
D. None of the above
Answer: B
139. Reducing the gap between the training error and the test error will result in over-fitting How
to prevent over-fitting? (Multiple Choice)
Answer: ABCD
134. X. Y are random variables. C is a constant, which of the following description about the
nature of the mathematical expectation is incorrect?
Answer: D
133. The correlation coefficient, also known as the linear correlation coefficient, is used to
measure the linear relationship between two variables, which is a real number greater than zero
A. True
B. False (Right Answers)
Answer: B
132. Which of the following neural network structures will share weights? (Multiple choice)
Answer: AB
A. True
B. False (Right Answers)
Answer: B
128. Which of the following descriptions of the depth feedforward network is correct?
Answer: A
129. The time interval in the Python language is a floating-point fraction in seconds
Answer: A
130. Which of the following is not part of the deep learning development framework'?
A. CNTK
B. Keras
C. BAFA (Right Answers)
D. MXNet
Answer: C
131. Which of the following are included in the application scenarios of TensorFlow? (Multiple
choice)
Answer: ABCD
Answer: A
A. True
B. False (Right Answers)
Answer: B
125. Which of the following descriptions about the Recurrent Neural Network (RNN) is correct?
Answer: A
126. Artificial intelligence is a new technical science that studies and develops theories, methods
and application systems for simulating, extending and extending human intelligence It is one of
the core research areas of machine learning
A. True
B. False (Right Answers)
Answer: B
118. In order for a machine to be intelligent, it must be knowledgeable Therefore there is a
research field in artificial intelligence, which mainly studies how computers automatically
acquire knowledge and skills to achieve self-improvement. What is the branch of this research
called*?
A. Expert system
B. Machine learning (Right Answers)
C. Neural Network
D. Natural language processing
Answer: B
119. Which of the following descriptions about Python program are correct? (Multiple choice)
Answer: ABCD
120. Huawei Machine Learning Service MLS is a one-stop platform that supports the entire
process of data analysis Which of the following is not a feature of MLS7
Support for the R language, but does not support the Python language (Right Answers)
Answer: D
121. Training error will reduce the accuracy of the model and produce under-fitting How to
improve the model fit? (Multiple choice)
Answer: ABD
122. Which of the following is not a way for the Tensor Flow program to read data4?
A. Preload data
B. Feeding data
C. Read from the file
D. Write a file format reader (Right Answers)
Answer: D
113. Which of the following description of the number of rows and columns of the matrix is
correct?
Answer: D
115. Which of the following can improve the computational efficiency of the neural network
model? (Multiple choice)
Answer: ABCD
116. Which of the following statements about Python are correct? (Multiple choice)
A. Invented in 1989 by the Dutch Guido van Rossum. the first public release was issued
in 1991. (Right Answers)
B. Python is purely free software and the source code follows the GPL (GNU General
Public License) protocol (Right Answers)
C. Python syntax is simple and clean One of the features is to force blank characters to
be used as statement indentation (Right Answers)
D. Python is often nicknamed glue language, which can easily connect various modules
made in other languages (Right Answers)
Answer: ABCD
117. Which of the following does not belong to long-term memory LSTM (Long Short-Term
Memory) network architecture'?
Answer: A
Answer: ABCD
111. Python script execution mode includes interactive mode and script mode
112. Which of the following features does Python support'? (Multiple choice)
A. Inheritance (RightAnswers)
B. Heavy load (Right Answers)
C. Derived (Right Answers)
D. Multiple mhentance (Right Answers)
Answer: ABCD
105. In which year was the first introduction of "artificial intelligence"?
A. 1946
B. 1960
C. 1916
D. 1956 (RightAnswers)
Answer: D
106. Which of the following description about the relationship between the Poisson distribution
and the binomial distribution is correct?
A. The mathematical model of the Poisson distribution and the binomial distribution are
both Lagrangian models
B. Poisson distnbution is an approximation of the binomial distnbution when n is very
large and p is small (Right Answers)
C. Poisson distnbution has no relationship with binomial distribution
D. Poisson distribution can replace binomial distnbution
Answer: B
A. Symbolism
B. Statisticahsm (RightAnswers)
C. Behaviorism
D. Connectionism
Answer: B
108. Which of the following does the convolutional neural network structure not include'?
A. Convolutional layer
B. Pooling layer
C. Loop layer (Right Answers)
D. Fully connected layer
Answer: C
109. Which of the following functions can numerically stabilize overflow and underflow*?
A. Softminus function
B. Softplus function
C. Soft max function (Right Answers)
D. Softmin function Answer: C
101. Which of the following are the elements of artificial intelligence9 (Multiple choice)
Answer: ABCD
A. Knowledge map
B. Machine translation
C. Riemann geometry (Right Answers)
D. Semantic understanding
Answer: C
103. Which of the following statements about overflow and underflow in numerical calculations
is correct? (Multiple choice)
A. Underflow occurs when the number close to zero is rounded to zero (Right Answers)
B. Overflow occurs when the number close to zero is rounded to zero
C. Overflow occurs when a large number of levels are approximated as jt> or - jP
(Right Answers)
D. Underflow occurs when a large number of levels are approximated as or - jb
Answer: AC
104. Which of the following description about Python regular expression is not correct?
A. Python has added the re regular expression module since version 1.5.
B. re regular expression module gives the Python language all the regular expression
functionality
C. re regular expressions are powerful tools for working with strings
D. re regular expressions can only process stnng data, not numeric data. (Right
Answers)
Answer: D
171. Which of the following description is wrong about the image recognition cloud service?
A. The service identifies specific objects such as skyscrapers, buildings, and ships.
B. The service can also identify the sea. city, port and other scenes
C. The service can perform semantic analysis on the content in the image to extract labels
with specific abstract meanings
D. The service can provide object and scene labels, and can also provide more
conceptual labels (Right Answers)
Answer: D
Answer: C
170. Information theory is a branch of applied mathematics The main research is to quantify how
much information a signal contains. Who is the first to propose information theory?
A. Minsky
B. Tunng
C. Simon
D. Shannon (RightAnswers)
Answer: D
164. Deep learning is different from machine learning and there are no unsupervised algorithms
A. True
B. False (Right Answers)
Answer: B
Answer: AB
166. What are the application scenarios for the break statement in the Python language7
(Multiple Choice)
Answer: BCD
A. True
B. False (Right Answers)
Answer: B
168. What are the commonly used gradient descent optimization functions? (Multiple Choice)
Answer: ABCDE
159. Huawei firmly believes that the value of Al is ultimately reflected in solving the actual
business problems of the enterprise Therefore. Huawei is firmly committed to the development
of Al technology, focusing on domain solutions, focusing on basic technologies and enabling
platforms, and working with industry practice leaders to develop industry solutions
Answer: A
160. The Python dictionary is identified by and the internal data consists of the key and its
corresponding value
Answer: A
161. In Huawei Cloud El Enterprise Intelligence, which basic platform services are included9
(Multiple Choice)
Answer: ABCD
162. Linear algebra is a branch of algebra that deals with linear problems. The linear relationship
is that the relationship between exponential objects is expressed in ( ) times form*?
A. 1 (Right Answers)
B. 2
C. 3
D. 4
Answer: A
Answer: A
155. Which of the following are solutions for the Huawei Cloud El industry scenario9 (Multiple
Choice)
Answer: ABCDE
156. Vector group a1=(1.1.1). a2=(0.2.5). a3=(1.3.6). which of the following options is correct?
Answer: A
157. What are the scenarios or industries that are suitable for using Python? (Multiple Choice)
Answer: ABC
158. Which descriptions are correct about Python's index'? (Multiple Choice)
Answer: AC
Answer: AC
A. arithmetic operator
B. Reasoning operator (Right Answers)
C. Logical operator
D. Comparison operator
Answer: B
A. Random number
B. Constant
C. Calculated from the initial values of other variables
D. null (RightAnswers)
Answer: D
154. What does factors that promote the development of artificial intelligence not include?
A. Big data
B. Computing ability
C. Algorithm theory
D. Blockchain (RightAnswers)
Answer: D
HCIA BIGDATA H13-711 V2.0 EXAM DUMPS
HDFS
Q1
Which of the following are distributed storage components in the Hadoop
platform? CD
A. MapReduce
B. Spark
C. HDFS
D. HBase
Q2
In HDFS, data blocks are stored with multiple replicas. If a data block on a
node is lost, you need to manually copy a data replica to the node.
F
128MB -OneBlock
Q3
Which of the following HDFS component is responsible for storing user data?
B
A. NameNode
B. DataNode
C. ZooKeeper
D. JobTracker
Q4
NameNodes of HDFS store metadata of file systems T
Q5
Which statements about HDFS are correct? ACD
A. HDFS consists of NameNodes, DataNodes, and Clients.
B. Metadata on the standby NameNode of HDFS is directly synchronized from the
active NameNode. F
C. HDFS stores the first replica on the nearest node.
D. HDFS is ideal for Write Once Read Many (WORM) tasks.
Q6
Which statements are correct about the functions of the standby NameNode in
HDFS? AC
^^^^A. Hot spare for the active NameNode
^^^^B. The standby NameNode does not have specific memory requirements. ^^^^C.
The standby NameNode helps the active NameNode merge edit logs, reducing the
startup time of the active NameNode.
^^^^D. The active and standby NameNodes must be deployed on the same node.
Q7
Which statement is correct about uploading files from a client to HDFS?
B
^^^^A. The file data of the client is transmitted to DataNodes via NameNodes.
^^^^B. The client divides files into multiple blocks and writes data blocks
to each DataNode based on the DataNode address sequence. ^^^^C. The client
writes files to each DataNode based on the DataNode address sequence, and
then the DataNodes divide files into multiple blocks.
^^^^D. The client only uploads data to one DataNode, and the NameNode copies
blocks.
1.
block1 = 0 192.168.0.1=ip1 block2 = 2
192.168.0.2=ip2 block3 = 2
192.168.0.3=ip3
2. array
address_list = [ip1,ip2,ip3]
Q8
In HDFS, the NameNode manages metadata, and the client reads metadata from the
metadata disk of the NameNode every time when the client sends a read request
to obtain the location information about the file that is being read in the
DataNode.
NameNode memory
Q9
Which of the following statements are correct about HDFS Federation? ACD
^^^^A. A namespace uses a block pool to manage data blocks.
^^^^B. A namespace uses multiple block pools to manage data blocks. ^^^^C. The
disk space of each block pool is physically shared, but the logical space is
isolated.
^^^^D. The NameNode and namespace can be scaled-out.
Q10
When the Client writes files to HDFS, the NameNode determines the location
where the first replica is written to, and the DataNode determines the location
where other replicas are written to. F
Q11
Which of the following statements is correct about the HDFS DataNode in
FusionInsight HD? B
^^^^A. Data validity is not checked.
^^^^B. The DataNode periodically sends its block information to the
NameNode.
^^^^C. Blocks stored on different DataNodes must be different.
^^^^D. Blocks on a DataNode can be the same.
Q12
which of the following commands is used to check the integrity of data
blocks in HDFS. A
^^^^A. hdfs fsck /
^^^^B. hdfs fsck / -delete
^^^^C. hdfs dfsadmin -report
^^^^D. hdfs balancer -threshold 1
Q13
Which is the default block size of HDFS in FusionInsight HD? C
^^^^A. 32 MB
^^^^B. 64 MB
^^^^C. 128 MB
^^^^D. 256 MB
Q14
How many copies of a block are stored in HDFS of FusionInsight HD by default?
A
^^^^A. Three copies
^^^^B. Two copies
^^^^C. One copy
^^^^D. Uncertain
Q15
MapReduce
Which one is not a feature of MapReduce in Hadoop? C
^^^^A. Easy to program
^^^^B. Outstanding scalability
^^^^C. Real-time computing
^^^D. High fault tolerance
Q16
Which of the following computing tasks is MapReduce good at dealing with?
B
^^^^A. Iterative computing
^^^^B. Offline computing
^^^^C. Real-time interactive computing
^^^^D. Stream computing
Q17
YARN manages cluster resources based on Resource Manager. Which of the
following are main functions of YARN? AB
^^^^A. Cluster resource scheduling
^^^^B. Application program management
^^^^C. Log management -- node manager
^^^^D. None of the above
Q18
Which is the encapsulation of the YARN resources in Hadoop? C
^^^^A. Memory
^^^^B. CPU
^^^^C. Container
^^^^D. Disk space
Q19
Which resources can be managed by YARN in Hadoop? AB
^^^^A. Memory
^^^^B. CPU
^^^^C. Network
^^^^D. Disk space
Q20
In Hadoop, you can set the yarn.app.mapreduce.am.resource.mb parameter to
configure the memory size allocated to a container by YARN. F - AM'S
Memory
Q21
Which of the following is the correct sequence of the resource allocation
initiated by the YARN scheduler? C
^^^^A. Any host > Same rack > Local resources
^^^^B. Any host > Local resources > Same rack
^^^^C. Local resources > Same rack > Any host
^^^^D. Same rack > Any host > Local resources
Q22
If the number of replicas in HDFS is set as 3, file segments to be processed
must be transferred from hosts with three replicas every time when a task is
running. F
Q23
Which are the main features of the YARN scheduler? ABCD
^^^^A. Capacity assurance
^^^^B. Flexibility
^^^^C. Multi-leasing
^^^^D. Dynamic update of configuration files -- FusionInsight Manager
Q24
Which parameter should you configure to set the capacity of QueueA in
YARN to 30%? C
^^^^A. yarn.scheduler.capacity.root.QueueA.user-limit-factor
^^^^B. yarn.scheduler.capacity.root.QueueA.minimum-user-limit-percent
^^^^C. yarn.scheduler.capacity.root.QueueA.capacity
^^^^D. yarn.scheduler.capacity.root.QueueA.state
Q25
If a YARN cluster has sub-queues Default, QueueA, and QueueB, the capacity of
the sub-queues can be set to 60%, 25%, and 22%, respectively. F sub-queues +
QA+QB = 100%
60%+25%+22% = 97%
Q26
Which statement is incorrect if you set
yarn.scheduler.capacity.root.QueueA.minimum-user-limit-percent to 50 in
YARN? B
^^^^A. When a user submits a task, the user can use 100% of QueueA resources.
^^^^B. Each user of QueueA can obtain a maximum of 50% of QueueA resources.
^^^^C. If tasks of two users of QueueA are running, tasks of the third user
can be executed only after the resources are released. ^^^^D. Each user of
QueueA obtains 50% of resources at least.
Q27
Which command is used to view information about an application of YARN in
Hadoop? D
^^^^A. container
^^^^B. application -attempt
^^^^C. jar
^^^^D. application
Q28
Which parameter should you configure to enable the YARN log aggregation
function in Hadoop? D
^^^^A. yarn.nodemanager.local-dirs
^^^^B. yarn.nodemanager.log-dirs
^^^^C. yarn.acl.enable
^^^^D. yarn.log-aggregation-enable
Q29
Spark
Both Spark and Hadoop are not applicable to iterative computing. F
Q30
In which programming language is Spark developed? D
^^^^A. C
^^^^B. C++
^^^^C. JAVA
^^^^D. Scala - 30000 lines
Q31
Which functions are provided by Spark? AD
^^^^A. Distributed memory computing engine
^^^^B. Distributed file system -hdfs
^^^^C. Distributed data warehouse -hive
^^^^D. Stream data processing
Q32
Resilient Distributed Datasets (RDDs) are generated in file systems compatible
with Hadoop, and then the generated RDDs can be partially upgraded by invoking
RDD operators. F -- read only
Q34
Which is used to divide stages when Spark applications are running? D
^^^^A. task
^^^^B. taskset
^^^^C. action
^^^^D. shuffle
Q35
When a Spark application is running, the failure of a task can result in
application running failures. F
Q36
In Spark on YARN mode, executors cannot be initiated for tasks on nodes without
Node Manager. T
Q37
Shuffle divides the Spark job into multiple stages. F
Q38
Spark is a memory-based computing engine; therefore, data generated when
Spark applications are running is stored in memory. T
memory is not enough -> disk
Q31
An executor of Spark can run multiple tasks at the same time. T
Q32
In a Fusion Insight HD cluster, from which services can Spark read
data?
BCD
^^^^A. YARN
^^^^B. HDFS -FS
^^^^C. Hive -DW
^^^^D. HBase -DB
Q33
Spark Streaming performs better than Storm in real-time capability. F
Q34
Which of the following are permanent processes of Spark? AB
^^^^A. JobHistory
^^^^B. JDBCServer
^^^^C. SparkResource
^^^^D. NodeManager
Q35
HBase
HBase in FusionInsight HD supports dynamic extension of columns. T
Q36
Which of the following is the default underlying file storage system for
HBase in FusionInsight HD? A
^^^^A. HDFS
^^^^B. Hadoop
^^^^C. Memory
^^^^D. MapReduce
Q37
Which of the following scenario is HBase inapplicable to? A
^^^^A. The ACID feature is required - region
^^^^B. Massive sets of data ^^^^C. High
throughput
^^^^D. Semi-structured data
Q38
Which processes are contained in the HBase component of FusionInsight HD?
AC
^^^^A. HMaster
^^^^B. Slave
^^^^C. HRegionServer
^^^^D. DataNode
Hmaster - HRegionServer
Master - Slaves
Q39
HBase in FusionInsight HD needs to connect to HMaster during data read. F
0.96Version -Hbase -need use HMaster to read data after -
Hbase -nedd use Zookeeper to read data
Q40
How is the active HMaster of HBase selected? C
^^^^A. Selected randomly
^^^^B. Determined by RegionServer
^^^^C. Determined by ZooKeeper
^^^^D. HMasters are in active-active mode.
Q41
Which service process manages regions in Hadoop HBase? C
^^^^A. HMaster
^^^^B. DataNode
^^^^C. HRegionServer
^^^^D. ZooKeeper
Q42
The minimum processing unit of HBase in Fusion Insight HD is region. Where is
the routing information between the user region and Region Server stored? D
^^^^A. Zookeeper
^^^^B. HDFS
^^^^C. Master
^^^^D. Meta table
Meta table(zookeeper) -> user region(HRegionServer)
Q43
When HBase is deployed in a FusionInsight HD cluster with N nodes, how many (
) HMaster processes and ( ) RegionServer processes are recommended? C
^^^^A. 2, 2
^^^^B. 3, N
^^^^C. 2, N
^^^^D. N, N
active hmaster
standby hmaster
HA
50-60
Q44
Which of the following is not semi-structured data? C
A. HTML
B. XML
C. Bidimensional table
D. JSON
storage in hbase
Q45
For HBase in FusionInsight HD, a table is divided by SplitKey 9, E, a, z.
Thus, how many regions does the table have? C
^^^^A. 3
^^^^B. 4
^^^^C. 5
^^^^D. 6
Q46
Which of the following is the physical storage unit of regions in HBase?
B
^^^^A. Region
^^^^B. Column family
^^^^C. Column
^^^^D. Row
Q47
What is the storage format of HBase data? A
^^^^A. HFile
^^^^B. SequenceFile
^^^^C. HLog
^^^^D. TxtFile
Q48
Which statement about HFiles in HBase is incorrect? B
^^^^A. An HFile belongs to a region.
^^^^B. An HFile contains data of multiple column families.
^^^^C. An HFile contains data of multiple columns.
^^^^D. An HFile contains data of multiple rows.
Q49
What information does the KeyValue of HFiles in HBase contain?
^^^^A. Key
^^^^B. Value
^^^^C. TimeStamp
^^^^D. KeyType
ABCD
Q50
In FusionInsight HD, which component or service is not involved in HBase data
read process? C
^^^^A. ZooKeeper
^^^^B. HDFS
^^^^C. HMaster >0.96 Version
^^^^D. HRegionServer
Q51
In FusionInsight HD, where is the routing information about regions of
HBase metadata stored? B
^^^^A. Root table
^^^^B. ZooKeeper
^^^^C. HMaster
^^^^D. Meta table
Q52
In HBase, data is written to MemStores, HLogs, and HDFS, where will a data
writing success message be returned after the data is successfully written? B
^^^^A. MemStore
^^^^B. HLog
^^^^C. HDFS
^^^^D. Memory
Q53
An HBase table meg_table with RowKey for user ID and one column for user name.
KeyValues 001:Li, 001:Mary, and 001:LiLy are written to meg_table in sequence.
Then which is returned by the command 'scan
'meg_table',{VERSIONS=>2}'? D
^^^^A. 001:Li
^^^^B. 001:Lily
^^^^C. 001:Li,001:Mary,001:LiLy
^^^^D. 001:Mary, 001:LiLy
version number
001:Li timestamp xxx-xxx-01 version1
001:Mary timestamp xxx-xxx-02 version2
001:Lily timestamp xxx-xxx-03 version3
Q54
Which of the following is the purpose of periodically executing compaction for
HBase clusters? AB
^^^^A. To reduce the number of files in the same region and the same column
family.
^^^^B. To improve data read performance.
^^^^C. To reduce data of files in the same column family.
^^^^D. To reduce the number of files in the same region.
Q55
Which of the following statements is incorrect about region splitting in HBase?
C
^^^^A. Splitting does not essentially split files, but creates reference files.
^^^^B. Splitting is to reduce the size of data in a region so that a region is
split into two regions.
^^^^C. The table suspends services during the splitting.
^^^^D. The split region suspends services during the splitting
Q56
If a region in HBase is being split, when will one HFile be split to two
regions? C
^^^^A. During the splitting
^^^^B. During the flush
^^^^C. During the compaction
^^^^D. During the HFile splitting
Q57
During HBase data read, what data needs to be read? AC
^^^^A. HFile
^^^^B. HLog
^^^^C. MemStore
^^^^D. HMaster
Q58
Which of the following statements is incorrect about BloomFilter of HBase in
FusionInsight HD? A
^^^^A. BloomFilter is used to filter data.
^^^^B. BloomFilter is used to optimize random data read.
^^^^C. BloomFilter consumes more storage resources.
^^^^D. BloomFilter can be used to precisely determine which data does not
exist.
Q59
If you need to view the current user and his/her permission group of
HBase, which command should you run in the HBase shell? B
^^^^A. user_permission
^^^^B. whoami
^^^^C. who
^^^^D. get_user
Q60
Hive
Which of the following scenarios is Hive inapplicable to? A
^^^^A. Online data analysis in real-time
^^^^B. Data mining, such as user behavior analysis, interest zoning, and
regional display
^^^^C. Data summary, such as daily and weekly user clicks and click ranking
^^^^D. Non-real-time analysis, such as log analysis and statistics analysis
Q61
Which of the following storage formats are supported by Hive in
FusionInsight HD? BCD
^^^^A. HFile
^^^^B. TextFile
^^^^C. SequenceFile
^^^^D. RCFile
Q62
Which statement is incorrect about comparisons between Hive and conventional
data warehouses? B
^^^^A. Hive is HDFS-based; therefore, Hive can store as much data as possible
theoretically. However, conventional data warehouses can only store a limited
amount of data.
^^^^B. Hive is based on the big data platform; therefore, Hive delivers a
faster query speed than conventional data warehouses.
^^^^C. Hive metadata storage is independent of data storage, so metadata is
decoupled from data, thus the flexibility is improved. However, the
conventional data warehouse is in the opposite against Hive. ^^^^D. Hive
data is stored in HDFS, providing high fault tolerance and reliability.
Q63
Which statement is incorrect about the relationship between Hive and other
Hadoop components? D
^^^^A. Hive stores data in HDFS.
^^^^B. HQL can use MapReduce to execute tasks.
^^^^C. Hive functions as a data warehouse tool in Hadoop. ^^^^D. Hive
is strongly dependent on HBase.
Q64
Which statement is incorrect about Hive in FusionInsight HD? A
^^^^A. The Hive cluster is unavailable when one HiveServer fails.
^^^^B. The HiveServer receives requests from the client, parses and runs
HQL commands, and returns the query result.
^^^^C. MetaStore provides metadata services and depends on DBService.
^^^^D. At the same time, one HiveSever is in the active state, and the other is
in the standby state.
Q65
Which of the following is not the flow control feature of Hive in
FusionInsight HD? C
^^^^A. Controls the total number of established connections.
^^^^B. Controls the number of connections established by each user.
^^^^C. Controls the number of connections established by a specific user.
^^^^D. Controls the number of established connections during a specific period.
Q66
Which of the following statements is incorrect about common tables and external
tables in Hive? D
^^^^A. Common tables are created by default.
^^^^B. External tables associate the file paths on HDFS with tables. ^^^^C.
When a common table is deleted, the metadata and data in the table are deleted.
^^^^D. When an external table is deleted, only the data in the external table
is deleted but the metadata is not deleted.
Q67
Which of the following statements about Hive table creation is correct? A
^^^^A. The external keyword must be specified when an external table is
created.
^^^^B. Once a table is created, the table name cannot be changed.
^^^^C. Once a table is created, the column name cannot be changed.
^^^^D. Once a table is created, new columns cannot be added.
Q68
Which of the following methods cannot be used to load data to the Hive table? C
^^^^A. Load the files in the local path to the Hive table.
^^^^B. Load the files in HDFS to the Hive table.
^^^^C. Hive supports the insertion of a single record using insert into.
Therefore, you can insert a single record directly using the command line.
^^^^D. Insert the result sets of other tables into the Hive table.
Q69
What are the possible causes if the Hive service status is Bad on the
FusionInsight Manager portal? ABC
^^^^A. The DBService service is unavailable. HQL->SQL
^^^^B. The HDFS service is unavailable.
^^^^C. The MetaStore instance is unavailable. Metadata in hive ^^^^D. The
HBase service is unavailable.
Q70
Which of the following statements is incorrect about Hive log collection on
FusionInsight Manager? D
^^^^A. You can specify an instance to collect logs, for example, collecting
MetaStore logs.
^^^^B. You can specify a time period to collect logs, for example, collecting
logs from 2016-01-01 to 2016-01-10.
^^^^C. You can specify a node IP address to collect logs, for example,
downloading the logs of an IP address only.
^^^^D. You can specify a user to collect logs. For example, downloading the
logs generated by user A only.
Q71
Streaming
Which of the following statements is correct about the Supervisor of
FusionInsight HD Streaming? B
^^^^A. The Supervisor is responsible for resource allocation and task
scheduling. NIMBUS
^^^^B. The Supervisor receives tasks allocated by Nimbus, and starts or stops
Workers based on actual situation.
^^^^C. The Supervisor is a process running a specific service logic. ^^^^D.
The Supervisor is a component that receives and processes data in a topology.
Zookeeper
Q72
When the Streaming component of FusionInsight HD is being installed, how many
nodes must be equipped with the Nimbus role? B
^^^^A. 1
^^^^B. 2
^^^^C. 3
^^^^D. 4
Q73
The Streaming component of FusionInsight HD has a weak dependency on ZooKeeper
and can normally provide services even if ZooKeeper becomes faulty. F
Q74
In FusionInsight HD, which of the following methods can be used for
troubleshooting if you fail to use the Shell command of the Streaming client to
view or submit a topology? AB
^^^^A. View the abnormal stack on the client to check whether the client is
faulty.
^^^^B. View the run logs of the active Nimbus to check whether the Nimbus
server is abnormal.
^^^^C. View the Supervisor run logs to check whether the Supervisor is
abnormal.
^^^^D. View the Worker run logs.
Q75
After a topology is submitted using the Shell command of the Streaming client
in the FusionInsight HD system, the Storm UI shows that the topology does not
process data for a long time. What are the possible causes? ABC
^^^^A. The topology is too complex or the concurrency is too large. As a
result, the Worker startup takes a longer time than the waiting time of the
Supervisor.
^^^^B. The slot resource of the Supervisor is exhausted. After the topology is
submitted, no slot can be allocated to start the Worker process.
^^^^C. The topology service has a logic error and cannot run properly after
being submitted.
^^^^D. When the data volume is large, the topology processing speed is slow.
Q76
Flink
Flink is a unified computing framework that supports both batch processing and
stream processing. It provides a stream data processing engine that supports
data distribution and parallel computing. T
Q77
Which of the following scenarios is Flink inapplicable to? BD
^^^^A. Batch processing
^^^^B. Iterative computing spark
^^^^C. Stream processing
^^^^D. Data storage hdfs,hbase,hive
Q78
Flink applies to applications that require high-concurrency data processing and
a millisecond-level latency. T
Q79
Similar to Spark Streaming, Flink is a time-driven real-time streaming system.
F
Spark -> time driven
Flink,Streaming -> event driven
Q80
Flink can be deployed in local or cluster mode. Other deployment modes are not
supported. F ->Cloud AWS s3/DLI service
Q81
In Flink, the ( ) interface is used for stream data processing, and the
( ) interface is used for batch processing. B
^^^^A. Stream API, Batch API
^^^^B. DataStream API, DataBatch API
^^^C. DataBatch API, DataStream API
^^^^D. Batch API, Stream API
Q80
In the technical architecture of Flink, what is the computing engine for stream
processing and batch processing? B
^^^^A. Standalone
^^^^B. Runtime
^^^^C. DataStream
^^^^D. FlinkCore
Spark - Sparkcore
Flink - Runtime
Q81
The Flink program consists of Stream data and Transformation operators. T
Q82
Which of the following statements are incorrect about Flink windows? BD
^^^^A. The scrolling windows do not overlap in time.
^^^^B. The scrolling windows overlap in time.
^^^^C. The time points of the sliding windows overlap.
^^^^D. The time points of the sliding windows do not overlap.
Q83
Flink uses the checkpoint mechanism to ensure fault tolerance during
application running. T
Q84
The checkpoint mechanism of Flink continuously draws snapshots of streaming
applications, and the status snapshots of the streaming applications can only
be stored in the HDFS file system. F
Q85
Which of the following statements is incorrect about a Flink barrier? D ^^^^A.
A barrier is periodically inserted into the data flow and flows as part of the
data flow.
^^^^B. A barrier is the core of Flink snapshots.
^^^^C. A barrier separates the data of the current periodic snapshot from that
of the next periodic snapshot.
^^^^D. When a barrier is inserted, the data flow is temporarily blocked.
Q86
In Huawei FusionInsight HD, which of the following components does Flink
strongly depend on? ABC
^^^^A. YARN Flink in yarn
^^^^B. HDFS
^^^^C. ZooKeeper
^^^^D. Kafka
Q87
Loader
Loader supports only data import and export between relational databases and
HBase. F
Q88
Which of the following methods or interfaces are provided by Loader to
implement task management? ABCD
^^^^A. Web UI
^^^^B. Linux CLI
^^^^C. REST API
^^^^D. Java API
Q89
If a Loader job fails to be executed, the data imported during the job
execution will not be automatically deleted and must be manually deleted.
F
Q90
In the FusionInsight HD system, the Loader service functions properly if only
one Loader node in a cluster is faulty. T
Q91
Which of the following nodes need to communicate with external data sources
before and after a FusionInsight HD Loader job is running? C
^^^^A. Active Loader node
^^^^B. Node that runs the YARN service job
^^^^C. All of the above
^^^^D. None of the above
Q92
When Loader is used to import and export data, data processing must be
performed during Reduce. F
Q93
Which of the following statements is correct about Loader jobs in
FusionInsight HD? B
^^^^A. If the Loader service malfunctions after submitting a job to YARN, the
job fails to be executed.
^^^^B. If a Mapper task fails after Loader submits a job to YARN for execution,
the task can be automatically retried.
^^^^C. If a Loader job fails to be executed, junk data is generated and needs
to be manually cleared.
^^^^D. After Loader submits a job to YARN for execution, Loader cannot submit
other jobs before the job is executed.
Q94
Which of the following instances must be deployed together with the
Loader instance in FusionInsight HD? D
^^^^A. DataNode
^^^^B. RegionServer
^^^^C. ResourceManager
^^^^D. NodeManager
Q95
Which of the following operations cannot be performed on Loader on
FusionInsight Manager? D
^^^^A. Start the Loader instance.
^^^^B. View the Loader service status.
^^^^C. Configure Loader parameters.
^^^^D. Switch between active and standby Loader nodes.
Q96
After a Loader job in FusionInsight HD is submitted to YARN, the job cannot be
stopped manually. F
Q97
In FusionInsight HD, when Loader imports files from the SFTP server, which of
the following file types does not require code and data conversion and delivers
the most rapid speed? C
^^^^A. text_file
^^^^B. sequence_file
^^^^C. binary_file
^^^^D. graph_file
Q98
Which of the following target ends can FusionInsight HD Loader export
HDFS data to? ABCD
^^^^A. SFTP server
^^^^B. FTP server
^^^^C. Oracle database
^^^^D. DB2 database
Q99
Which of the following is the function of the connector when FusionInsight HD
Loader creates a job? C
^^^^A. Determine the conversion steps.
^^^^B. Provide optimization parameters to improve data import and export
performance.
^^^^C. Configure how jobs are connected to external data sources.
^^^^D. Configure how jobs are connected to internal data sources.
Q100
For Loader in FusionInsight HD, a connector can be allocated to only one job.
F
Q101
In FusionInsight HD, Loader jobs are input, converted, and output in sequence.
T
Q102
In FusionInsight HD, which of the following methods cannot be used to view the
execution result of a Loader job? D
^^^^A. Using the YARN task management page
^^^^B. Using the Loader UI
^^^^C. Using alarms on Manager
^^^^D. Using NodeManager
Q103
In FusionInsight HD, if dirty data is generated during the running of a Loader
job, the execution result of the Loader job must be failed. F
Q104
Flume
In FusionInsight HD, which component does not data flow of Flume pass by? D
^^^^A. source
^^^^B. channel
^^^^C. sink
^^^^D. topic
Q105
Flume data flows can be sent to different channels based on the header
information. T
Q106
Flume can monitor and transfer new files in a directory to implement quasi-
realtime data transmission. Which type of source is described above? A
^^^^A. spooling directory source
^^^^B. http source
^^^^C. exec source
^^^^D. syslog source
Q107
Which of the following is not the channel type of Flume? D
^^^^A. Memory Channel
^^^^B. File Channel
^^^^C. JDBC Channel
^^^^D. HDFS Channel
Q108
When Flume is used to transmit data, which of the following channel types is
recommended to prevent data loss caused by the restart of the Flume process? B
^^^^A. Memory Channel
^^^^B. File Channel
^^^^C. JDBC Channel
^^^^D. HDFS Channel
Q109
When the Flume process is cascaded, which of the following sink types are used
to receive data sent by the last-hop Flume? AB
^^^^A. avro sink
^^^^B. thrift sink
^^^^C. Hive sink
^^^^D. Null Sink
Q110
During data transmission, Flume deletes the events from the channel after Sink
obtains the data and writes the data to the destination. T
Q111
How many Flume Server nodes must be deployed in the same cluster when
FusionInsight HD is deployed? ............... Error! Bookmark not defined.
^^^^A .................................................................. 20
^^^^B .................................................................. 20
^^^^C .................................................................. 20
^^^^D .................................................................. 20
Q112
Multiple channels can be configured to transmit data in the
properties.properties configuration file of Flume. T
Q113
kafka
Kafka is a distributed publish-subscribe messaging system. It forwards messages
but does not store messages. F
Q114
What is the role of the Kafka server in a Kafka cluster? D
^^^^A. Producer
^^^^B. Consumer
^^^^C. ZooKeeper
^^^^D. Broker
Q115
Which of the following statements is incorrect about Kafka in
FusionInsight HD? C
^^^^A. Kafka strongly depends on ZooKeeper. t
^^^^B. At least two Kafka instances must be deployed. t
^^^^C. The Kafka server can generate messages. f
^^^^D. A Consumer functions as a Kafka client and consumes messages. t
Q116
Which of the following statements are correct about Kafka in
FusionInsight HD? BD
^^^^A. When a Kafka Producer sends a message, the Consumer that consumes the
messages can be specified. f
^^^^B. When creating a topic, ensure that the number of replicas is less than
or equal to the number of active Broker instances. Otherwise, topic creation
fails. t
^^^^C. After Kafka is installed, the data storage directory cannot be
configured. f
^^^^D. Kafka stores metadata information to ZooKeeper. t
Q117
On FusionInsight Manager, if the insufficient Kafka disk capacity alarm is
received and the alarm is not caused by the disk hardware fault, the system
administrator needs to expand the capacity to resolve this problem. T
Q118
In the FusionInsight HD system, when creating a Kafka topic, you must set the
number of partitions and replicas. Multiple replicas enhance the disaster
recovery capability of Kafka services. T
Q119
Which of the following commands is used to view partition details of a topic in
Kafka? C
^^^^A. bin/kafka-topics.sh --create
^^^^B. bin/kafka-topics.sh --list
^^^^C. bin/kafka-topics.sh --describe
^^^^D. bin/kafka-topics.sh --delete
Q120
Which of the following statements are correct about Kafka in
FusionInsight HD?
ACD
^^^^A. When deleting a topic, ensure that delete.topic.enable of the
Kafka service is set to true.
^^^^B. Kafka installation and run logs are stored in /srv/Bigdata/kafka/.
^^^^C. If the ZooKeeper service is unavailable, the Kafka service is
unavailable.
^^^^D. You must create a topic as the admin user or a user in the kafkaadmin
group.
Q121
Which of the following is not the possible cause of the insufficient
Kafka disk capacity alarm? D
^^^^A. The configuration (such as number and size) of the disks for storing
Kafka data cannot meet the requirement of the current service traffic, due to
which the disk usage reaches the upper limit.
^^^^B. Data retention time is too long, due to which the data disk usage
reaches the upper limit.
^^^^C. The service plan does not distribute data evenly, due to which the usage
of some disks reaches the upper limit.
^^^^D. The Broker node is faulty.
Q122
zookeeper
Which of the following statements about ZooKeeper are correct? AC
^^^^A. Based on open source Apache ZooKeeper, ZooKeeper is used to resolve data
management problems that occur frequently in distributed applications.
^^^^B. ZooKeeper, as an underlying component, is depended on by other
components but does not depend on other components.
^^^^C. ZooKeeper must be deployed in Huawei FusionInsight HD.
^^^^D. The more ZooKeeper nodes, the better.
Q123
In the ZooKeeper service model, the Leader nodes work in active/standby mode,
and other nodes are Follower nodes. F
Q124
Which of the following statements about ZooKeeper is incorrect? A
^^^^A. If ZooKeeper is interrupted during message synchronization, ZooKeeper
can continue to synchronize data based on the transmission status before the
fault occurred. That is, resumable data transfer is supported.
^^^^B. ZooKeeper uses the custom atomic message protocol to ensure data
consistency among nodes in the entire system.
^^^^C. The Leader role is elected when the ZooKeeper cluster is started. ^^^^D.
After receiving a data change request, the Leader node writes the data to the
disk and then to the memory.
Q125
All ZooKeeper nodes can process read requests. T
Q126
When the number of nodes in a ZooKeeper cluster is five, how many nodes provide
the disaster recovery capability? C
^^^^A. 3
^^^^B. 4
^^^^C. 6
^^^^D. None of the above
Q127
Which of the following statements about ZooKeeper is incorrect? D ^^^^A. The
updates sent by the client are applied in the sequence of update sending.
^^^^B. If a message is received by more than half of the servers, the message
can be successfully written to the disk.
^^^^C. Data transfer either succeeds or fails. There is no middle status.
^^^^D. The number of ZooKeeper nodes must be an odd.
Q128
ZooKeeper nodes use ACLs to control access policies. ACLs can be applied to any
Znode in a cluster. F
Q129
Which of the following components must depend on ZooKeeper? ABD
^^^^A. HDFS
^^^^B. HBase
^^^^C. Spark
^^^^D. YARN
Q130
Which of the following statements about ZKFC is incorrect? B
^^^^A. As the client of a ZooKeeper cluster, ZKFailoverController (ZKFC)
monitors the state information about NameNodes.
^^^^B. The ZKFC process must be deployed on NameNodes and the Leader nodes of
ZooKeeper. all the nodes
^^^^C. The standby NameNode detects the status of the active NameNode using
ZooKeeper. Once the active NameNode breaks down, the standby
NameNode becomes the active one.
^^^^D. The ZKFC process of HDFS NameNodes connects to ZooKeeper and saves
information such as the host name to ZooKeeper.
Q131
Which module is responsible for storing FusionInsight Manager user data?
D
^^^^A. CAS
^^^^B. AOS
^^^^C. Kerberos
^^^^D. LDAP
Q132
The FusionInsight HD cluster contains multiple services. Each service consists
of several roles. Which of the following are service roles? BC
^^^^A. HDFS
^^^^B. NameNode
^^^^C. DataNode
^^^^D. HBase
Q133
Which of the following interfaces can be used for FusionInsight Manager to
interconnect with external management platforms? AD
^^^^A. SNMP
^^^^B. VPN
^^^^C. BGP
^^^^D. Syslog
Q134
Which of the following operations cannot be performed on a service using
FusionInsight Manager? C
^^^^A. Start, stop, and restart a service.
^^^^B. Add and uninstall a service.
^^^^C. Hide and display a service that is not frequently used.
^^^^D. View service status
Q135
Which of the following operations cannot be recorded in FusionInsight HD audit
logs? D
^^^^A. Clear alarms manually.
^^^^B. Start and stop service instances.
^^^^C. Delete service instances.
^^^^D. Query historical monitoring information.
Q136
Which of the following statements is incorrect about the function for
configuring services on FusionInsight Manager? C
^^^^A. Service-level configuration takes effect for all instances.
^^^^B. Instance-level configuration takes effect only for this instance.
^^^^C. Instance-level configuration takes effect for other instances. ^^^^D.
The saved configuration takes effect after the services are restarted.
Q137
Which of the following configurations is not supported by FusionInsight Manager
user rights management? D
^^^^A. Assign a role to a user.
^^^^B. Assign rights to a role.
^^^^C. Assign a role to a user group.
^^^^D. Assign rights to a user group.
Q138
Which of the following can FusionInsight Manager implement a health check for?
AB
^^^^A. Host
^^^^B. Service
^^^^C. Role
^^^^D. Instance
Q139
Which data is periodically backed up by FusionInsight Manager? ABCD
^^^^A. NameNode
^^^^B. LDAP
^^^^C. OMS
^^^^D. DBService
Q140
Which of the following statements are correct about FusionInsight HD cluster
upgrade? ABCD
^^^^A. During the upgrade, a manual switchover between active and standby
OMS nodes is not allowed.
^^^^B. The password of the root account for all the hosts in the cluster must
be the same.
^^^^C. Ensure that the network is normal and avoid upgrade exceptions caused by
network problems.
^^^^D. Capacity expansion cannot be performed during the observation period.
Q141
On the FusionInsight HD platform, which of the following components support
encryption of tables and columns? BC
^^^^A. HDFS
^^^^B. HBase
^^^^C. Hive
^^^^D. Flink
Q142
On the FusionInsight HD platform, HBase does not support secondary indexes. F
Q143
Which of the following statements are correct about the storage of a large
number of small files? ABC
^^^^A. In HDFS, storing a large number of small files brings great pressure to
NameNodes.
^^^^B. If HBase stores a large number of small files, the Compaction operation
wastes I/O resources.
^^^^C. Huawei HFS is suitable for storing a large number of small files.
Files can be stored in HDFS or MOB to meet site requirements.
^^^^D. None of the above
Q144
FusionInsight Manager supports the unified management of multiple tenants. T
Q145
Huawei has extensive experience in delivering big data solutions in various
industries, such as finance, public security, railway, and government. T
Q146
Which of the following statements about the reliability of FusionInsight
HD are correct? ABCD
^^^^A. All components without SPOF
^^^^B. HA of all management nodes
^^^^C. Health status monitoring of software and hardware
^^^^D. Network plane isolation
Q147
Which of the following products are included in the FusionInsight family?
ABDE A.HD
^^^^B. LibrA
^^^^C. Manager
^^^^D. Miner
^^^^E. Farmer
^^^^F. DWs
IT Certification Guaranteed, The Easy Way!
Exam : H13-611-ENU
Vendor : Huawei
Version : V12.35
1
IT Certification Guaranteed, The Easy Way!
NO.1 Statement 1: DAS solutions are islands of storage and that is why it is easy to make backups.
Statement 2: Most SCSI devices today use HVD technology.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: D
NO.2 Which of the following is a valid iSCSI name that can be used to set up the iSCSI connection
between the initiator and target? (Multiple Choice)
A. iqn.1998-01.com. huawei.:name1
B. iqn.1998-01.com. huawei.iscsi:name1
C. eui.12345678ABC
D. eui.0123456789ABCDEF
Answer: BD
NO.3 SAS uses a point-to-point connection design to enable a dedicated link to be established
between two devices in the communication.
A. TRUE
B. FALSE
Answer: A
NO.4 In which layer in the architecture of a typical Big Data processing system does the data mining
and business intelligence process are performed?
A. Application/Presentation Layer.
B. Data Processing Layer.
C. Data Analysis Layer.
D. Data Storage Layer.
Answer: C
NO.5 Which of the following file system is most suitable for the storage of Big Data?
A. NTFS
B. EXT4
C. HDFS
D. BTRFS
Answer: C
NO.6 Match the correct functionalities together: (1) IaaS (2) Hybrid (3) SaaS (a) Combination of
public and private (b) Applications are hosted externally (c) Hardware is outsourced.
A. 1 - a; 2 - b; 3 - c
B. 1 - b; 2 - c; 3 - a
C. 1 - c; 2 - a; 3 - b
D. 1 - b; 2 - a; 3 - c
2
IT Certification Guaranteed, The Easy Way!
Answer: C
NO.7 Match the RAID level with the characteristics. (1) RADO (2) RAID 5 (3) RAID 10 (4) RAID 6 (a)
Cost effective (b) Allows double disk failure (c) Highest performance (d) No data protection
A. 1 - a; 2 - d; 3- b; 4 - c
B. 1 - d; 2 - a; 3- c; 4 - b
C. 1 - d; 2 - a; 3- b; 4 - c
D. 1 - a; 2 - b; 3 - c;4 - d
Answer: B
NO.8 Based on the understanding of the Generation stage of the lifecycle management of
information and data, identify the 3 types of sources in which data can be generated. (Multiple
Choice)
A. External System Generation.
B. Internal System Generation.
C. External Input.
D. Internal Input.
Answer: BCD
NO.9 Select the correct statements that describes Mean Time Between Failure (MTBF). (Multiple
Choice)
A. MTBF can accurately pinpoint the time of failures of the hard disks.
B. The higher the MTBF, the hard disk will have shorter lifespan expectancy.
C. MTBF is used to measure the reliability of hard disks.
D. MTBF is the predicted elapsed time between inherent failures of hard disks.
Answer: CD
NO.10 Which of the following are the 3 layers of SCSI Initiator Model? (Multiple Choice)
A. SCSI Link Layer.
B. SCSI Network Layer.
C. SCSI Middle Layer.
D. SCSI Device Driver Layer.
Answer: ACD
NO.11 Because they are cheap and still have a large capacity we can say that cMLC Solid State Disks
are ideal for storing MP3 files and JPGs at home.
A. TRUE
B. FALSE
Answer: A
NO.12 This device acts a multiport repeater, blindly regenerating and repeating any incoming
electrical signal out all other ports, even ignoring CSMA/CD rules.
Which of the following device fits the description?
3
IT Certification Guaranteed, The Easy Way!
A. L2 Switches
B. L3 Switches
C. Router
D. Hub
Answer: D
NO.13 Government regulations can sometimes mean that when data must be destroyed it means
that the physical media must be destroyed.
A. TRUE
B. FALSE
Answer: A
NO.14 Which of the following are the 3 layers of SCSI Target Model? (Multiple Choice)
A. Network Layer.
B. Port Layer.
C. Middle Layer.
D. Device Layer.
Answer: BCD
NO.16 What are the advantages of SSDs over HDDs? (Multiple Choice)
A. Larger capacity
B. Faster read/write speed for random access
C. Better environmental adaptability
D. Longer service life
Answer: BC
NO.17 The disadvantage of full backup is that it requires the last full backup and the most recent
differential backup to fully restore data.
A. TRUE
B. FALSE
Answer: B
NO.18 Why storage systems has more than one storage controllers in the Dual Storage Controller
Architecture?
A. 2 controllers can complete a single I/O operation much faster.
B. To provide redundancy in case of failure of a single controller.
4
IT Certification Guaranteed, The Easy Way!
NO.20 You are tasked to setup a SAN storage system that has the following requirements:
(1) To minimize the workload on server resources.
(2) Optimize the capabilities on storage system for deduplication.
Select the following options that fits the scenario above. (Multiple Choice)
A. Use NIC instead of HBA cards to minimize the host resource consumption during I/O operations.
B. Offload the storage processing tasks to the server to optimize the data deduplication.
C. Usage of TCP/IP offload engine technology to do processing on HBA cards on the server to
minimize the usage of server resources.
D. Adding hardware acceleration module to the storage system to optimize the performance of data
deduplication.
Answer: CD
NO.23 Statement 1: OceanStor Dorado systems are designed for high performance environments.
Statement 2: OceanStor Dorado systems are so-called All Flash Arrays.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false
Answer: A
5
IT Certification Guaranteed, The Easy Way!
NO.24 It is common practice to create an extra copy of a backup tape that holds important data.
A. TRUE
B. FALSE
Answer: A
NO.25 It provides connection between sets of nodes and allows the connected devices(nodes) to
communicate with each other but it is not a device.
Which of the following fits the above description?
A. Host.
B. Network.
C. Storage Array.
D. Switch.
Answer: B
NO.26 A SAN always uses the same technology to connect to the infrastructure as a NAS.
A. TRUE
B. FALSE
Answer: B
NO.27 Huawei V3 series storage system hardware includes controller enclosures and disk
enclosures.
Which of the following statements about controller enclosures is correct?
A. When the external power supply fails, BBU modules provide backup power for all disks.
B. When the external power supply fails, BBUs can supply power to enable data synchronization from
the cache to disks in disk enclosures.
C. If BBUs become faulty, the service system will be interrupted.
D. When the power input is normal, BBUs are in the standby state.
Answer: B
NO.28 Select the features that are commonly available in High End storage systems. (Multiple
Choice)
A. Global Cache
B. Second-level Data Copying
C. SSD Optimization
D. ATA Drive Optimization
Answer: ABC
6
IT Certification Guaranteed, The Easy Way!
NO.30 Statement 1: Everytime a tape is used to restore data, some data will be lost.
Statement 2: Backup strategies that use tape as backup media typically have a high RTO.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: A
NO.33 Which device allows segregation of collision domains but not broadcasting domains?
A. L2 Switches
B. L3 Switches
C. Router
D. Hub
Answer: A
NO.34 Select the correct statements that describes the properties of bus technology in ICT
architecture. (Multiple Choice)
A. Bus is a communication system that transfers data between internal components and external
components.
B. Bus can be divided into internal bus and external bus.
C. Bus technology are only available in serial form.
D. The CPU needs to go through the memory to directly access the Bus.
Answer: AB
NO.35 Statement 1: For RAID 2.0+ to work optimally multiple disk domains must be created.
Statement 2: A disk domain with 100 disks in it has better RAID 2.0+ protection and performance
charachteristics than a disk domain with 50 disks.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
7
IT Certification Guaranteed, The Easy Way!
NO.36 The only cable type that can be uses to connect disk enclosures is the mini SAS cable.
A. TRUE
B. FALSE
Answer: B
NO.37 What is the main purpose of hot swapping technology in disk enclosures?
A. To swap out the hard disks after proper shutdown of storage system
B. To swap out the hard disks without turning off the storage system.
C. To be able to swap out the disks when the temperature is too hot.
D. Maintain the temperature of the disks to prevent overheating.
Answer: B
NO.38 Which of the following statements is NOT true for a SAN solution?
A. Block based storage.
B. Long distance connections not possible.
C. Contains no Single Points Of Failure.
D. Multiple protocols possible.
Answer: B
NO.39 A backup set is a group of data that is backed up in a batch. A backup set can be used for
either full backup or incremental backup.
A. TRUE
B. FALSE
Answer: A
NO.40 Statement 1: a snapshot of a ThinLUN at creation does not occupy storage capacity. The
snapshot of a ThickLUN at creation immediately occupies storage capacity.
Statement 2: When a snapshot of a ThickLUN exists, there is always space available to store changes
to the original data.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D
NO.41 Statement 1: A company should know what the Cost Of Downtime is to determine the backup
strategy.
Statement 2: For the business continuity it is not important to determine the RTO.
A. Statement 1 and Statement 2 are both True.
B. Statement 1 is True; Statement 2 is False.
8
IT Certification Guaranteed, The Easy Way!
NO.42 In order to make full use of storage resources, on which tier are SSDs usually configured in a
tiered storage system?
A. Capacity tier
B. Performance tier
C. High-performance tier
D. Offline storage
Answer: C
NO.43 In a NAS environment entire files are sent across the ethernet based network. The NAS server
however stores these files in the form as SCSI blocks mostly on multiple disks using RAID protection.
A. TRUE
B. FALSE
Answer: A
NO.45 A company that primarily has static data (like map data or JPG files) does not profit much
from the HUAWEI OceanStor V3 SmartTier functionality.
A. TRUE
B. FALSE
Answer: A
NO.46 In HUAWEI OceanStor V3, which licensed feature is best described as: periodically detects
hotspot data and promotes them from low-speed storage media to high-speed media.
A. SmartMove
B. SmartMig ration
C. SmartMotion
D. SmartTier
Answer: D
NO.47 What is the main purpose of backup battery units (BBU) in storage controllers?
A. To maintain the power for clock synchronization.
B. To power the interface modules.
C. To provide additional power to storage controller to speed up the I/O.
9
IT Certification Guaranteed, The Easy Way!
D. To ensure that the non completed I/O is not lost during power outage.
Answer: D
NO.48 What statement about the SATA and SAS technologies is true?
A. Both use serial communication.
B. SATA and SAS support the same maximum number of devices on the bus.
C. Both use full-duplex communication.
D. Both SATA and SAS are intelligent protocols with intelligent devices.
Answer: A
NO.49 Most data generated by the Internet industry is structured data, amounting to 80% of total
data.
A. TRUE
B. FALSE
Answer: B
NO.50 Which of the following is a valid protocol for a UNIX-based NAS server? (Multiple Choice)
A. CIFS
B. NFS
C. SMB
D. Novell Control Protocol
Answer: ABC
NO.51 Select the correct statements that describes the properties of Distributed Object Storage
Architecture. (Multiple Choice)
A. Metadata servers manages the access requests.
B. Does not support x86 servers.
C. Clients can pinpoint the location of targeted data without metadata servers.
D. Multi node concurrent I/O connection.
Answer: AD
NO.53 Storage array is a network device used to switching network signals or data. It can provide a
dedicated communication channel between any 2 nodes in the network that is connected.
A. TRUE
B. FALSE
Answer: B
NO.54 Which of the following are common RAID types. (Multiple Choice)
10
IT Certification Guaranteed, The Easy Way!
A. RAID 1
B. RAID 5
C. RAID 0+1
D. RAID 50
Answer: ABD
NO.55 To enable a Windows-based host to use the resources provided by a HUAWEI OceanStor V3
series storage device, perform the following operations:
1. Create a Disk Domain and a storage pool.
2. Create a host group and host.
3. Create a LUN group and LUN.
4. Configure an initiator on server and on storage device.
5. Connect the server to the storage device.
6. Format the logical disk.
7. Install the initiator software on server.
8. Mapping.
Place the steps in the proper order.
A. 2 -> 3 -> 1 -> 4 -> 5 -> 6 -> 7 -> 8
B. 1 -> 2 -> 3 -> 4 -> 5 -> 6 -> 7 -> 8
C. 2 -> 3 -> 1 -> 4 -> 8 -> 7 -> 5 -> 6
D. 7 -> 5 -> 1 -> 3 -> 2 ->4-> 8-> 6
Answer: D
NO.56 Which of the following items is NOT mandatory in a Fibre Channel SAN? (Multiple Choice)
A. Storage device
B. Fibre Channel switch
C. Fibre Channel HBA
D. Windows operating system
Answer: BD
NO.57 Statement 1: NAS systems must be interconnected using fiber optic cables.
Statement 2: A network protocol is the way in which an operating system accesses a file that is on a
network connected device.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: C
NO.58 Which of the following licenses requires at least two OceanStor systems that are connected
over a WAN/LAN?
A. SmartTier
B. RemoteReplication
C. HyperSnap
11
IT Certification Guaranteed, The Easy Way!
D. SmartThin
Answer: B
NO.59 In a clustered NAS architecture, which of the following allows multiple file system to be
consolidated and does not need to be managed separately?
A. Global Namespace.
B. Global Sharing.
C. Global Cache.
D. Global Concurrency.
Answer: A
NO.61 As the new storage administrator, you are tasked with the procurement of a new batch of
SSD drives to replace the older drives that has reached the end of life. You have the option of SLC,
MLC and TLC SSD.
Which of the following will be your choice with a limited budget and medium level of reliability
concerns? (Multiple Choice)
A. Purchasing the MLC SSD if within budget range for core applications and services for better
performance and reliability.
B. Purchasing all TLC SSD drives for the storage system for the best reliability and performance.
C. Purchasing all SLC SSD drives for maximum savings on cost regardless of reliability.
D. Purchasing SLC SSD drives that has lowest cost and reliability for storage purposes of non critical
applications.
Answer: AD
NO.63 Statement 1: LAN based backup strategies are preferred as they are the most cost efficient
method and offer the highest performance.
Statement 2: Any backup strategy should provide in storing production data and backup data in
different physical locations.
A. Statements 1 and 2 are both true.
12
IT Certification Guaranteed, The Easy Way!
NO.64 ICT is a technological field that combines information technology and communication
technology.
A. TRUE
B. FALSE
Answer: A
NO.65 Which of the following statements about storage file systems is incorrect?
A. NAS file systems include CIFS and NFS.
B. NAS file systems allow multiple servers running different operating systems to share files stored
on public storage media.
C. CIFS provides a way for NAS storage devices to share files in the UNIX environment.
D. NFS provides a way for NAS storage devices to share files in the Linux environment.
Answer: C
NO.66 In HUAWEI OceanStor V3, which of the following are characteristics of virtual snapshot LUN?
(Multiple Choice)
A. Virtual snapshot is based on the pointers specified in a mapping table.
B. A snapshot LUN cannot be mapped to hosts.
C. A full data replication is unnecessary.
D. Data is located using a mapping table.
Answer: ACD
NO.69 In HUAWEI OceanStor V3, which of the following statements about mapping a snapshot is
true?
13
IT Certification Guaranteed, The Easy Way!
NO.70 What is best described as: the time it takes for the desired data to be beneath the read head
when the head is on the correct track?
A. Rotational latency
B. Rotational speed
C. Seek time
D. Throughput
Answer: A
NO.71 Which of the following are the 3 layers of components that storage systems are made up of?
(Multiple Choice)
A. Storage Analysis
B. Storage Solution
C. Storage Software
D. Storage Hardware
Answer: BCD
NO.72 Which of the following statements about RAID 10 are correct? (Multiple Choice)
A. RAID 10 applies to scenarios with demanding requirements for speed and fault tolerance.
B. RAID 10 requires at least four member disks.
C. In RAID 10, if two member disks in the RAID 1 group fail, data read proceeds normally.
D. Data is mirrored and then striped in RAID 10.
Answer: ABD
NO.73 Statement 1: VMware and XEN are examples of server virtualization applications.
Statement 2: Amazon S3 and Microsoft Azure are examples of a PaaS implementation.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B
14
IT Certification Guaranteed, The Easy Way!
NO.76 Which of the following operating systems supports the CIFS protocol natively?
A. Win7
B. Solaris
C. FreeBSD
D. AIX
Answer: A
NO.77 Big Data refers to the process of collecting, processing and analyzing vast amount of data and
information to gain valuable insights.
A. TRUE
B. FALSE
Answer: A
NO.78 Which of the following is not a port type defined by Fibre Channel?
A. E-Port
B. F-Port
C. G-Port
D. NL-Port
Answer: D
NO.79 In HUAWEI OceanStor V3, what statement is true about SmartThin LUNs?
A. Space will be reclaimed in all Windows operating systems when data is deleted in the OS.
B. A Thin LUN cannot be converted into a Thick LUN.
C. SmartThin must be enabled on all LUNs of a storage pool.
D. SmartThin LUNs consume just a little storage capacity at the time they are created.
Answer: D
15
IT Certification Guaranteed, The Easy Way!
NO.81 Which of the following statements are characteristics of pre-copy technology? (Multiple
Choice)
A. Migrates data from a suspected faulty disk to a hot spare disk immediately after the error count of
the suspected faulty disk exceeds the preset threshold.
B. Reduces the occurrence of reconstruction.
C. Improves system reliability.
D. Reduces system performance.
Answer: ABC
NO.82 Which of the following is the common physical size division of the surface of the hard disk?
(Multiple Choice)
A. Track.
B. Sector.
C. Cylinder.
D. Partition.
Answer: ABC
NO.83 The failure of an SSD is more predictable than that of other disk technologies.
A. TRUE
B. FALSE
Answer: A
NO.84 The central backup question is: How much loss can be tolerated determines how much to
invest in backup?
A. TRUE
B. FALSE
Answer: A
NO.85 Which of the following statements about block virtualization technology for Huawei storage
systems are correct? (Multiple Choice)
A. Data is distributed to all disks, fully leveraging the read/write processing capability of a storage
system.
B. A RAID group is formed in the unit of physical disks.
C. A CKG is the unit used in applying for space, releasing space, and relocating data.
D. Data reconstruction efficiency improves significantly.
Answer: AD
NO.86 It is an electronic device controlled by a motor that moves the hard drive head arm.
Which of the following component fits the above description?
A. Actuator.
B. Spindle.
C. Platter.
D. Motor.
16
IT Certification Guaranteed, The Easy Way!
Answer: A
NO.87 A zone in a FC switch determines which ports of the FC switch can be connected together.
A. TRUE
B. FALSE
Answer: A
NO.88 Select which of the following which is not a properties of Distributed Object Storage
Architecture.
A. Automatic load balancing.
B. Online expansion.
C. Global namespace.
D. Centralized nodes.
Answer: D
NO.89 Statement 1: The retention period determines how many times per day a backup must be
made.
Statement 2: Incremental backups take a lot of time to complete.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: D
NO.91 You are the storage administrator of a media company that stores a lot of media files such as
videos. You are asked to propose a proper storage architecture for a new storage system that stores
all the video and graphic files of the company. The requirement is that it could run on commodity
hardware in a distributed manner for unstructured data. Choose which one of the following
architecture would be the better option.
A. Block Storage Architecture.
B. Clustered NAS Storage Architecture.
C. Distributed Storage Architecture.
D. Distributed Object Storage Architecture.
Answer: D
NO.92 When the RTO is 10 minutes the traditional Tape Backup method cannot be used.
17
IT Certification Guaranteed, The Easy Way!
A. TRUE
B. FALSE
Answer: A
NO.93 Which of the following are correct steps in a LAN based backup job? (Multiple Choice)
A. Agent on application server sends data to the backup device.
B. Agent on application server sends data to backup media server.
C. Backup media server sends data to the backup device.
D. Backup server sends a "start-backup" command to the backup device.
Answer: BC
NO.94 Huawei OceanStor V3 series storage system hardware includes controller enclosures and disk
enclosures.
Which of the following statements about controller enclosures are correct? (Multiple Choice)
A. A controller enclosure does not have disks. Disks are installed in disk enclosures.
B. A controller enclosure consists of controller modules, fan, BBU modules, power modules and/or
interface modules.
C. A controller enclosure is the core of a storage system.
D. A controller enclosure processes storage services and manages the disk enclosures connected to
it.
Answer: BCD
NO.95 Which of the following disk interface technologies use serial interface technology? (Multiple
Choice)
A. ATA
B. SATA
C. SAS
D. IDE
Answer: BCD
NO.96 HyperReplication for HUAWEI OceanStor V3 can use FC links between the data centers. iSCSI
links are not supported.
A. TRUE
B. FALSE
Answer: B
18
IT Certification Guaranteed, The Easy Way!
NO.98 Statement 1: Virtual Tape libraries allow for a highly scaleable backup strategy as storage can
be added later.
Statement 2: Virtual Tape Libraries should be used when remote datacenters are NOT available.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B
NO.99 Which of the following storage devices are non volatile? (Multiple Choice)
A. RAM
B. Hard Disk
C. Magnetic Tape
D. DVD
Answer: BCD
NO.101 The restore time objective (RTO) specifies the time needed to recover the data and servers
after after a disaster has occured.
A. TRUE
B. FALSE
Answer: B
NO.102 Select the correct statements about the structure and functions of the hard disk
components. (Multiple Choice)
A. Disk platter is responsible of storing data in binary form.
B. The actuator is responsible of moving the Read/Write arm.
C. The spindle is responsible for sending commands to the disk head.
D. The disk connector is responsible of connection and rotation of the platter.
Answer: AB
19
IT Certification Guaranteed, The Easy Way!
NO.103 Statement 1: Fiber optic cables must be bended with a minimum radius of 10 centimeters.
Statement 2: Bends and dirt causes the light signal to be weaker and the sensor cannot detect the
light pulse then.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: C
NO.104 Which of the following are existing Solid State Disk types? (Multiple Choice)
A. DLC
B. eMLC
C. TLC
D. SLC
Answer: BCD
NO.105 Which of the following allows direct physical access to end users?
A. Network Switch.
B. Storage Array.
C. Backup System.
D. Clients.
Answer: D
NO.107 Which of the following are attached to the storage system serially? (Multiple Choice)
A. ATA Drive.
B. SAS Drive.
C. NL-SAS Drive.
D. IDE Drive.
Answer: BC
NO.108 Which are characteristics of the HUAWEI OceanStor V3 hardware? (Multiple Choice)
A. SAN and NAS convergence
B. SSD and HDD convergence
C. No need for heterogeneous convergence anymore
D. Primary and Backup convergence
20
IT Certification Guaranteed, The Easy Way!
Answer: ABD
NO.109 The recovery point objective (RPO) is used to identify how much time lies between two
backups.
A. TRUE
B. FALSE
Answer: A
NO.110 Storage cache can optimize the speed of the storage system.
A. TRUE
B. FALSE
Answer: A
NO.111 Connecting an OceanStor 5300 V3 to three disk enclosures requires....... SAS cables.
A. 3
B. 6
C. 9
D. 12
Answer: B
NO.112 Statement 1: We have a a RAIDS protected group of disks. The protection level increases if
we add more disks to the group.
Statement 2: With a RAID 10 set the number of disks must be greater than 8 to always survive a dual
disk failure.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D
NO.113 For all operating systems there is a specific version of Huawei Ultra Path multipathing
software.
A. TRUE
B. FALSE
Answer: B
NO.114 What is the main difference between mechanical drives such as SAS with solid state drives
(SSD)?
A. The presence of mechanical parts.
B. The performance of the hard drive.
C. The capacity of hard drive.
D. The lifespan of hard drive.
Answer: A
21
IT Certification Guaranteed, The Easy Way!
NO.115 In an ICT infrastructure the servers can run different operating systems like Windows, Linux,
AIX.
A. TRUE
B. FALSE
Answer: A
NO.116 A user is having intermittent problems connecting to their shared network storage. A
network technician is able to determine that there is a problem within the network cabling in
between the workstation and the switch. All other users are able to connect successfully to the
network.
Which of the following is the MOST likely cause?
A. Patch cable is a crossover cable instead of straight-through.
B. Cable has been cut somewhere within the wall.
C. Crosstalk and interference are occurring.
D. Cable is not connected at the patch panel.
Answer: C
NO.117 Statement 1: FCoE is preferred over iSCSI because it uses fiber optic cables that can be much
longer than Ethernet cables.
Statement 2: FCoE is preferred over iSCSI because we do not need any Ethernet switches anymore.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D
NO.118 Statement 1: Creating an incremental backup is faster than creating a differential backup.
Statement 2: Restoring from an incremental backup is faster than from a differential backup.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B
NO.119 Grid storage employs the combination of large scale serial distributed storage to provide
even distribution of storage across all nodes.
A. TRUE
B. FALSE
Answer: B
NO.120 After the Ultra Path is installed on an application server, its operating system can
automatically identify the disks mapped from a storage device without being restarted.
A. TRUE
B. FALSE
22
IT Certification Guaranteed, The Easy Way!
Answer: B
NO.121 Because of the addition of the Data Center Bridging technology, today iSCSI is, just as FC, a
lossless protocol.
A. TRUE
B. FALSE
Answer: A
NO.124 Storage controllers are only connected to disk enclosures within the SAN network.
A. TRUE
B. FALSE
Answer: B
NO.125 Select the correct statements that describes the properties of Distributed Storage
Architecture. (Multiple Choice)
A. The storage nodes are centralized.
B. The storage nodes are non centralized.
C. Concurrent I/O access.
D. Non concurrent I/O access.
Answer: BC
23
IT Certification Guaranteed, The Easy Way!
NO.128 Which of the following statements about HUAWEI OceanStor V3 SmartTier dynamic storage
tiering technology is NOT true?
A. The SmartTier calculates and analyzes the activity level of data.
B. The SmartTier automatically and dynamically matches data from different activity levels with
storage media of different characteristics.
C. The SmartTier data relocation activities are based on configured policies.
D. Data statistics, analysis, and relocation activities of the SmartTier affect service continuity and
data availability.
Answer: D
NO.129 Which of the following is not involved in the SCSI Protocol Addressing?
A. Host ID.
B. BUS ID.
C. Device ID.
D. LUN ID.
Answer: A
NO.130 The maintenance network port is used, by the DeviceManager, for daily management.
A. TRUE
B. FALSE
Answer: B
NO.131 Given this scenario. A company wants replication of data between two data centers that are
2000 km apart.
Which replication method is most recommended?
A. Asynchronous
B. Synchronous
C. Both Asynchronous and Synchronous will work.
D. Synchronous but ONLY if the link is a high speed 8 Gb/s fiber optical connection.
Answer: A
NO.132 When a RAID configuration is in a degraded state it means that no data has been lost yet.
A. TRUE
B. FALSE
Answer: A
NO.133 Select the statements that are correct about the functions of network devices. (Multiple
24
IT Certification Guaranteed, The Easy Way!
Choice)
A. Routers do not separate the network into different broadcast domains.
B. Routers do not forward the broadcast frames in the network.
C. LAN switches place each port into a separate collision domain.
D. Hubs allow the separation of collision domains.
Answer: BC
NO.134 Cloud technology refers to the process of migrating all the local servers to an external online
datacenter for data protection purposes.
A. TRUE
B. FALSE
Answer: B
NO.135 Situation: Disk Domain A has 40 disks, Disk Domain B has 20 disks. True or False: the rebuild
time for a failed disk in Disk Domain B is longer than for a failed disk in Disk Domain A.
A. TRUE
B. FALSE
Answer: A
NO.136 Which of the following statements about the differences between DAS and SAN is incorrect
?
A. SAN uses the Fibre Channel or iSCSI protocol and therefore offers better scalability.
B. DAS and SAN are both external storage and can achieve storage resource sharing easily.
C. DAS applies to small and medium LANs that have general storage capacity requirements and only a
small number of servers.
D. SAN applies to mid-range and high-end storage application environments such as key databases,
centralized storage, mass storage, backup, and disaster recovery.
Answer: B
NO.137 Statement 1: Synchronous replication is often possible over distances of more than 100 km.
Statement 2: Asynchronous replication must be used when the host has a file system that is Linux
based.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: D
NO.138 What is effect of having foreign dust particles within the disk drives?
A. No effect as the disk has automatic surface cleaning.
B. It reduces the magnetic effect of the platter causing the disk to slow down.
C. Data may not be able to be written onto the platter.
D. The dust particle will change the content of data stored on the platter.
25
IT Certification Guaranteed, The Easy Way!
Answer: C
NO.140 Statement 1: The higher the number used to indicate the RAID level, the higher the
overhead Statement 2: RAID 10 stripes the data, then mirrors the stripe set.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: D
NO.143 An intelligent backup strategy involves multiple backup policies on the same production
data i.e. with different retention periods and different schedules.
A. TRUE
B. FALSE
Answer: A
NO.144 Which of the following is the end that receives and processes the SCSI commands?
A. LUN.
B. Storage.
26
IT Certification Guaranteed, The Easy Way!
C. Target.
D. Initiator.
Answer: C
NO.145 Which command is used to query the version of a Red Hat Linux 5 operating system?
A. show version
B. find version
C. cat version
D. uname -a
Answer: D
NO.146 When the RPO is minutes instead of hours the best backup method is traditional Tape
backup.
A. TRUE
B. FALSE
Answer: B
NO.147 Application program interface (API) is a set of routines, protocols, and tools for building
software applications.
A. TRUE
B. FALSE
Answer: A
NO.150 Which of the following statements about switched fabric topology in Fibre Channel SANs is
NOT true?
A. It is the most widely used topology that supports a maximum of 127 devices.
B. Multiple pairs of nodes connecting to switches can communicate simultaneously.
C. The fault of one node in a zone does not affect services on nodes in other zones.
D. The switches leverage zoning to manage network structure and provide the best interconnection
27
IT Certification Guaranteed, The Easy Way!
form.
Answer: A
NO.151 The mount command is used in Linux-based clients to connect the client to the NFS share.
A. TRUE
B. FALSE
Answer: A
NO.153 If a disk domain has multiple disk types then the storage pools in that disk domain also
MUST have multiple disk types in them.
A. TRUE
B. FALSE
Answer: B
NO.155 Which of the following are deployment modes of cloud computing? (Multiple Choice)
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. E-Government cloud
Answer: ABC
NO.156 SAN is a storage architecture that connects storage device and application servers through
network.
A. TRUE
B. FALSE
Answer: A
28
IT Certification Guaranteed, The Easy Way!
B. FALSE
Answer: A
NO.159 Statement 1: An ICT infrastructure should be built with high end equipment and be located
in one site.
Statement 2: A server is a rackmounted enterprise version of a desktop computer and typically has
more than one hard disk installed.
A. Statement 1 and Statement 2 are both True.
B. Statement 1 is True; Statement 2 is False.
C. Statement 1 is False; Statement 2 is True.
D. Stament 1 and Statement 2 are both False.
Answer: C
NO.161 Which of the following is NOT the characteristics of the active-active mode of a storage
controller?
A. Two controllers process the I/O requests from application servers concurrently.
B. If a controller becomes faulty, the other takes over the work of the faulty controller without
disrupting ongoing services.
C. The primary controller processes the I/O requests from application servers and the secondary
controller is in the idle state.
D. The active-active mode achieves load balancing, full utilization of resources, and system
performance improvement.
Answer: C
NO.162 Depending on the amount of data to be backed up, which of the types are actual backup
methods? (Multiple Choice)
A. Real-time backup
B. Full backup
C. Incremental backup
29
IT Certification Guaranteed, The Easy Way!
D. Differential backup
Answer: BCD
NO.163 A hybrid cloud is an environment where a public and private cloud solution is used
simultaneously
A. TRUE
B. FALSE
Answer: A
NO.164 Incremental backup requires the last full backup and each incremental backup to fully
restore data. Data reconstruction is therefore slower compared with full backups.
A. TRUE
B. FALSE
Answer: A
NO.165 In a good Disaster Recovery Plan there are no single points of failure, not even with any
single person.
A. TRUE
B. FALSE
Answer: A
NO.166 Statement 1: Multimode optic cables are usually longer than single mode cables.
Statement 2: Sharp cable bends lead to weaker signal at the end of the cable.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: C
NO.167 Which of the following statements about the coffer disks of the HUAWEI V3 series storage
systems are correct? (Multiple Choice)
A. Coffer disks store cache data to prevent data loss after a power failure.
B. BBUs supply power to cache and coffer disks in the event of unexpected power failure.
C. Coffer disks cannot be used to save service data.
D. The first 2 disks in a controller enclosure are coffer disks.
Answer: AB
NO.168 You need to manually set free disks as hot spare disks in a Huawei OceanStor V3 storage
system when you use RAID 2.0+.
A. TRUE
B. FALSE
Answer: B
NO.169 In a RAID 5 group comprised of three disks, if 10110110 and 11010011 are written to the
30
IT Certification Guaranteed, The Easy Way!
same stripe on the two data disks, respectively, 01100101 is calculated using the XOR function and
then written to the parity disk.
A. TRUE
B. FALSE
Answer: A
NO.170 SmartThin provided by HUAWEI OceanStor V3 storage systems is a technology that manages
storage space by allocating storage resources on demand. Based on virtualization, SmartThin reduces
physical storage resources to be deployed, maximizing storage space use efficiency.
A. TRUE
B. FALSE
Answer: A
NO.173 HUAWEI OceanStor V3 SmartTier can be used to position files to be on specific disk drive
types.
A. TRUE
B. FALSE
Answer: A
NO.174 Based on the new industrial revolution, what are the changes in the trend of ICT? (Multiple
Choice)
A. ICT trend is changing slowly with little significant changes.
B. The initial phases of ICT focuses on office automation but slowly changed towards changing
business flows.
C. ICT is slowly being replaced by other new technologies such as IT and CT.
D. ICT has become the core in the production systems in the recent yeans.
Answer: BD
31
IT Certification Guaranteed, The Easy Way!
NO.176 Which of the following statements about Disaster Recovery is NOT true?
A. Some data loss must be accepted.
B. After a disaster access to the data, on the remote site, can be immediate.
C. Applications to work with the recovered data is in place.
D. There are still traditional backup strategies in place.
Answer: A
NO.177 Statement 1: Port zoning is preferred for zoning a FC switch when there are a lot of changes
to the patch points.
Statement 2: Alias zoning is a user friendly version of soft zoning.
A. Statement 1 and 2 are true
B. Statement 1 is true; Statement 2 is false
C. Statement 1 is false; Statement 2 is true
D. Statement 1 and 2 are false
Answer: C
NO.178 Which of the following disks has the best performance in terms of speed?
A. NL-SAS
B. SAS
C. SSD
D. SATA
Answer: C
NO.179 It is the interconnection via the Internet of computing devices embedded in everyday
objects, which enables them to send and receive data.
Which of the following fits the statement above?
A. Cloud.
B. Big Data.
C. Social Media.
D. Internet Of Things.
Answer: D
NO.180 The storage controller can only provide processing and caching functions.
A. TRUE
B. FALSE
Answer: B
32
IT Certification Guaranteed, The Easy Way!
NO.182 In HUAWEI OceanStor V3, for synchronous replication to be successful, all host applications
must be pauzed during the replication update process.
A. TRUE
B. FALSE
Answer: B
NO.183 It is a hard-disk failure that occurs when a read-write head of a hard disk drive comes in
contact with its rotating platter, resulting in permanent and usually irreparable damage to the
magnetic media on the platter surface.
Which of the following fits the above description?
A. Electrical Failure.
B. Bad Platter Area.
C. Bad Sector.
D. Head Crash.
Answer: D
NO.184 If no data migration plan is set, with SmartTier enabled, there will be no data movement at
all between tiers.
A.TRUE
B.FALSE
Answer: A
NO.186 Which is the correct formation order of the following elements in RAID 2.0+?
A. LUN -> CK -> CKG -> Extent -> LD
33
IT Certification Guaranteed, The Easy Way!
NO.187 The HyperSnap functionality can be used to improve or optimize a company's backup
strategy.
A. TRUE
B. FALSE
Answer: A
NO.188 It is a device which manages the physical disk drives and presents them to the users as
logical units.
Which of the following device fits the above description?
A. Host.
B. Storage NIC.
C. Storage Controller.
D. Storage Cache.
Answer: C
NO.189 In a Red Hat Linux 5 operating system, which command is used to mount the sdb5 in the dev
directory to the sdb5 in the mnt directory?
A. cat /dev/sdb5 /mnt/sdb5
B. In /dev/sdb5 /mnt/sdb5
C. mount /dev/sdb5 /mnt/sdb5
D. df /dev/sdb5/mnt/sdb5
Answer: C
NO.190 In HUAWEI OceanStor V3, HyperSnap of a LUN uses the Copy On Write method to keep
track of changes blocks
A. TRUE
B. FALSE
Answer: A
NO.191 In Windows 2012 deleting data from a volume, based on a Thin LUN, means that NO storage
space will be reclaimed by the HUAWEI OceanStor V3.
A. TRUE
B. FALSE
Answer: B
NO.192 Which one of the following component is responsible for rotating the disk platter in the disk
drive?
A. Spindle.
34
IT Certification Guaranteed, The Easy Way!
B. Actuator.
C. Control Circuit Board.
D. Read/Write Arm.
Answer: A
NO.193 Multipathing software is only needed in SAN solutions with just a single switch.
A. TRUE
B. FALSE
Answer: B
NO.194 When determining hard disk performance, which of the following are relevant. (Multiple
Choice)
A. Rotational speed.
B. Seek time.
C. Transfer time.
D. Transfer rate.
Answer: ABD
NO.195 Many companies gather so much data that they cannot extract the right information from
the data.
A. TRUE
B. FALSE
Answer: A
NO.196 Which of the following statements are true for a NAS solution? (Multiple Choice)
A. Cable length is around 10 m.
B. Block size is configurable.
C. CIFS and NFS are both commonly used protocols.
D. NAS clients are connected to the NAS server using Ethernet switches.
Answer: CD
NO.197 Storage controllers can be separated from the chassis of disk enclosures. It does not need to
be integrated in design with the disk enclosures.
A. TRUE
B. FALSE
Answer: A
NO.198 Which of the following are the supported data storage architecture of modern storage
array? (Multiple Choice)
A. File Storage.
B. Object Storage.
C. Block Storage.
D. Fusion Storage.
35
IT Certification Guaranteed, The Easy Way!
Answer: ABC
NO.199 Data is the record that reflects the attributes of objective things and is the physical
manifestation of information.
A. TRUE
B. FALSE
Answer: A
NO.200 What are the main considerations when you are buying HDDs? (Multiple Choice)
A. Capacity
B. Rotational speed
C. Average access time
D. Sector size
Answer: ABC
NO.201 Statement 1: RAID 2.0+ offers better protection against data loss than traditional RAID and
it performs much better.
Statement 2: To rebuild a RAID 2.0+ protected failed drive takes a lot of time as all drives are involved
in the rebuild of the spare disk.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: B
NO.202 Which of the following occurs after muItipathing software is installed on a host?
(Multiple Choice)
A. Maps a LUN to the host.
B. Avoids logical errors from occurring in the operating system as a result of multiple reachable paths
to the same LUN.
C. Improves link reliability and prevents the failure of a single link from causing a system failure.
D. Sets up connection between a storage device and the host.
Answer: BC
NO.203 The components of a storage device are redundant, including controller modules,
management modules, BBU modules, interface modules, power modules, and fan modules.
Component redundancy ensures system reliability.
A. TRUE
B. FALSE
Answer: A
NO.204 Using SmartThin gives extra responsibility for the SAN administrator because there is a risk
of over-provisioning storage capacity.
A. TRUE
36
IT Certification Guaranteed, The Easy Way!
B. FALSE
Answer: A
NO.205 A customer needs zoning configured in a Fibre Channel switch. The customer frequently
changes the patch points in the infrastructure.
What zoning method is preferred then?
A. Port zoning because it is more flexible when it comes to changing patch points.
B. Soft zoning because it is more flexible when it comes to changing patch points
C. Port zoning and Soft zoning should always be used together.
D. Zoning is not required in a FC SAN.
Answer: B
NO.206 What is required to add additional controllers to an existing HUAWEI OceanStor V3 system?
A. SAS cabling
B. Smart I/O card
C. 56 Gb Infiniband module
D. FC or iSCSI Host Bus Adapter
Answer: B
NO.209 Statement 1: Disaster Recovery plans eliminate the need for backups on tape or disk.
Statement 2: With the design of the DR plan one should always assume the worst possible scenario.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: C
37
IT Certification Guaranteed, The Easy Way!
NO.211 Which of the following system model is a direct representation of the SCSI connection
between the SCSI Initiator and Target?
A. Serverless Architecture.
B. Peer to Peer Architecture.
C. Browser/Client Architecture.
D. Client/Server Architecture.
Answer: D
NO.212 A differential backup holds all changes that were made since the last successful full backup.
A. TRUE
B. FALSE
Answer: A
NO.213 Which of the following dimensions are often used to express the data used in Big Data
scenarios? (Multiple Choice)
A. Variety
B. Volume
C. Velocity
D. Verticality
Answer: ABC
NO.214 Which of the following statements about RAID 5 are correct? (Multiple Choice)
A. RAID 5 has fixed parity disks.
B. RAID 5 uses the XOR algorithm for parity.
C. RAID 5 writes data by stripes.
D. RAID 5 tolerates the failure of a maximum of two member disks without losing data.
Answer: BC
38
IT Certification Guaranteed, The Easy Way!
NO.219 Statement 1: If possible it is always advised to make only Full Backups Statement 2: LAN free
backups typically run slower than LAN based backups.
A. Statements 1 and 2 are both true.
B. Statement 1 is true and statement 2 is false.
C. Statement 1 is false and statement 2 is true.
D. Both statements 1 and 2 are false.
Answer: B
NO.221 Which of the following technologies are able to quickly obtain valuable information from a
variety of data types in a short period of time from a collection of vast amounts of data?
A. Cloud.
B. Big Data.
C. Social Media.
D. Internet Of Things.
Answer: B
NO.222 Host is a computing system consisting of hard drives or file system that can provide data
access and storage.
A. TRUE
B. FALSE
Answer: A
39
IT Certification Guaranteed, The Easy Way!
NO.223 What is the main difference between desktop grade hard drives with enterprise grade hard
drives which is the deciding factor in hard drive usage?
A. The presence of mechanical parts.
B. The performance of the hard drive.
C. The capacity of hard drive.
D. The lifespan of hard drive.
Answer: B
NO.225 Which of the following statements about RAID technology are correct? (Multiple Choice)
A. Disks are striped for storing data blocks, shortening the mechanical seek time and accelerating
data access.
B. Several disks in an array are accessed simultaneously (parallel access), shortening the mechanical
seek time and accelerating data access.
C. Current RAID technology only uses the parity check mechanism to protect data.
D. Performance of all RAID levels increases with the number of member disks.
Answer: AB
NO.228 In high end storage systems, what is the main function of the service processor?
A. To manage the I/O commands and complete disk operations.
B. To process the network service.
40
IT Certification Guaranteed, The Easy Way!
NO.230 Statement 1: A Solid State Disk drive can withstand strong vibrations.
Statement 2: A Solid State Disk drive has only a few mechanical parts.
A. Statement 1 and 2 are true
B. Statement 1 is true; Statement 2 is false
C. Statement 1 is false; Statement 2 is true
D. Statement 1 and 2 are false
Answer: B
NO.231 Which of the following is the correct procedure for configuring a HUAWEI OceanStor V3
storage system?
A. Creating a Storage pool -> Creating a LUN -> Adding a mapping.
B. Creating a Storage pool -> Adding a mapping -> Creating a LUN.
C. Creating a LUN -> Creating a Storage pool -> Adding a mapping.
D. Creating a LUN -> Adding a mapping -> Creating a Storage pool.
Answer: A
NO.232 Each organization independently determines which data should be stored and for how long.
A. TRUE
B. FALSE
Answer: B
NO.234 Statement 1: A disk drive with a high latency performs better than a disk drive with a low
latency.
Statement 2: A smaller seek time means that the disk performs better.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
41
IT Certification Guaranteed, The Easy Way!
NO.235 When using LAN-based backups it is best to create a dedicated backup network.
A. TRUE
B. FALSE
Answer: A
NO.236 In which stage of the lifecycle management of information and data, does the data
management operation such as copying and backup occurs?
A. Generation.
B. Transmission.
C. Maintenance.
D. Usage.
Answer: C
NO.238 Clustered NAS can provide concurrent multi-node access of data to hosts.
A. TRUE
B. FALSE
Answer: A
NO.239 IP SAN uses underlying optical networks to connect servers and storage systems.
A. TRUE
B. FALSE
Answer: B
42
IT Certification Guaranteed, The Easy Way!
Statement 2: No more than 3 tiers can exist in the OceanStor V3 storage arrays.
A. Statement 1 and 2 are true.
B. Statement 1 is true; Statement 2 is false.
C. Statement 1 is false; Statement 2 is true.
D. Statement 1 and 2 are false.
Answer: C
43
iTB - TTT training HCIA – Cloud Question Bank
======================
Q1) Which of the following does not reflect the self- service feature of cloud computing? (Single answer)
a) Engineer A purchases an ECS from HUAWEI CLOUD to meet his/her own requirements
b) Engineer B changes the operating system of the ECS purchased by himself/herself from Linux to
Windows
c) Engineer C increases the number of CPUs of the ECS purchased by himself/herself from 2 to 4.
d) Engineer D receives an SMS notification from the ECS provider one week before the ECS expires.
Q2) Which of the following is about the on-demand self-service feature of cloud computing? (Single
answer)
a) Users do not need to communicate the service providers at all when using cloud computing
resources.
b) After determining the required cloud computing service, users can apply for cloud computing
resources by themselves.
c) The cloud computing service providers only need to prepare the cloud services and users will
complete remaining process all by themselves.
d) When using cloud computing resources, the users need to solve all by problems by themselves.
Q3) Which of the following are true about the ubiquitous network access feature of cloud computing?
(Multiple answers)
a) With network connections, users can use purchased cloud computing resources from different
terminals.
b) With network connections, users can use purchased cloud computing resources at different
places.
c) With network connections, users can connections, users can use purchased cloud computing
resources anytime.
d) With network connections, users can view the status of purchased cloud computing resources
anytime.
Q4) Which of the following is true about the resource pooling feature of cloud computing? (single answer)
a) The resource pooling feature of cloud computing shields the difference between resources of the
same type.
b) The resource pooling feature of cloud computing allows CPUs and disks to be added to the same
resource pool.
c) The resource pooling feature of cloud computing is the prerequisite for the ubiquitous network
access feature.
d) The resource pool feature of cloud computing depends on the virtualization technology
1|Page
Q5) Which of the following are true about the fast and elastic scaling feature of cloud computing?
(Multiple answers)
Q6) The measurable service feature of cloud computing refers to charging based on time and usage.
a) True
b) False
Q7) Cloud computing is a product of Internet and computing technologies development. Therefore, cloud
computing is indispensable of network connections.
a) True
b) False
Q8) There are many milestone events in milestone events in the development of the Internet. Which of
the following is true about the time sequence of the milestone events? (Single answer)
a) the Establishment of TCP/IP protocol --> Birth of ARPANET -> "www officially open to the public -
-> Birth of DNS
b) Birth of DNS --> Establishment of the TCP/IP protocol Birth of ARPANET -> "www officially open
to the public
c) "www officially open to the public →Birth of DNS --> Establishment of the TCP/IP protocol →Birth
of ARPANET
d) Birth of ARPANET --> Establishment of the TCP/IP protocol --> Birth of DNS → "www officially
open to the public
Q9) Which of the following is true about cloud computing? (single answers)
a) Cloud computing is a technology that enables users to obtain IT resources anytime and anywhere.
b) Various IT resources of cloud computing can be used only after being paid.
c) The IT resources of cloud computing can be used only through network connections.
d) During the process of obtaining IT resources, users need to repeatedly negotiate with cloud
computing service provider.
Q10) which of the following can implement computing virtualization and improve resource utilization in
the era of cloud computing 1.0? (Multiple answers)
2|Page
a) KVM.
b) Open Stack.
c) Hyper-V
d) Xen
Q11) When a cloud computing service provider offers cloud services to a customer, the customer needs
only to inform the provider of the required resources or applications. Then the provider will provide the
resources or applications immediately. When the customer needs to expand or reduce the capacity, the
service provider can change the resources or applications accordingly. Which feature of cloud computing
is reflected by the preceding description? (single answer)
Q12) Hybrid cloud is a deployment mode that integrates features of the public cloud and private cloud.
he industry cloud is a form of hybrid cloud.
a) True
b) False
Q13) Which of the following is the difference between the public cloud and the private cloud? (single
answer)
a) The public cloud has industry attributes, but the private cloud does not.
b) The private cloud has industry attributes, but the public cloud does not.
c) The public cloud is open to the public, while the private cloud is only open to specific users.
d) Public cloud services the need to be paid, while private cloud services are free of charge.
Q14) The cloud services purchased by a user include an application running environment, but do not
contain any application or related data. This mode is ( ). (Single answer)
a) laaS.
b) PaaS.
c) SaaS.
d) Naas
Q15) Which of the following belongs to the SaaS mode of HUAWEI CLOUD? (Single answer)
3|Page
Q16) laaS in cloud computing refers to ( ). (Single answer)
a) Information as a Service
b) Infrastructure as a Service
c) Industry as a Service
d) Instruction as a Service
Q17) On HUAWEI CLOUD, a user has applied for an ECS that has only the operating system installed. This
servicer. mode is ( ). (Single answer)
a) laaS
b) PaaS
c) SaaS
d) NaaS
Q18) Which of the following are true about the cloud computing deployment modes? (Multiple answers)
a) The private cloud is deployed on the premises of enterprises and used by internal employees.
b) The public cloud is generally constructed by carriers or cloud service providers. It sells or leases
services to the public.
c) The hybrid cloud is generally constructed by carriers or cloud service providers. It integrates the
features of the public cloud and private cloud. It sells or leases services to the public.
d) The industry cloud generally has attributes of a certain industry, which is a large private cloud" or
"small public cloud".
Q19) A user applies for an ECS on HUAWEI CLOUD. Which of the following about ECS are true? (Multiple
answers)
a) The operating system of the ECS can be provided by HUAWEI CLOUD or created by the user.
b) If an IP address is configured for the ECS, the service mode is PaaS. Otherwise, the service mode
is laaS.
c) You can log in to the ECS through a PC or a mobile phone.
d) Running of the ECS requires the local
e) hardware resources of the user.
Q20) If an enterprise deploys a hybrid cloud, which of the following devices cannot be used to set the
boundary between the public cloud and private cloud? (Multiple answers)
a) Virtual switch
b) Core switch
c) Firewall
d) Traffic cleaning device
a) Applications that can run on physical machines can also run on VMs.
b) VMs with different virtualization technologies can be mutually converted.
c) virtualization improves the unification of hardware resources.
d) virtualization and non-virtualization resources cannot coexist in one data center.
4|Page
Q22) Generally, a VM has a configuration file that records the specifications and name of the VM.
a) True
b) False
a) Hyper-V
b) KVM
c) vSphere
d) Fusion Compute
Q24) Which of the following are false about virtualization? (Multiple answers)
a) In cloud computing, virtualization at the laaS layer consists of computing virtualization, storage
virtualization and network virtualization.
b) Computing virtualization includes CPU virtualization, memory virtualization, and I/O
virtualization.
c) Storage virtualization refers to distributed storage.
d) Network virtualization refers to distributed virtual switches.
a) CPU virtualization
b) Memory virtualization
c) Disk virtualization
d) Network virtualization
e) I/O virtualization
Q26) The main reason for the rapid development of virtualization is that the VM outperforms the physical
machine and has a wider application scope.
a) True
b) False
Q27) Cloud computing is a product of parallel computing, grid computing, and distributed computing.
Which of the following is true about their relationship? (single answer)
Q28) The main driving force behind the emergence and development of virtualization technologies is ( ).
(single answer)
5|Page
Q29) Which of the following belongs to the host machine role in Huawei FusionCompute architecture?
(single answer)
a) UVP
b) KVM
c) VRM
d) CNA
Q30) In Huawei FusionCompute, a VM running Linux is created. In this scenario, the host OS runs in ( ).
(single answer)
a) VRM
b) Linux VM
c) CNA
d) VNA
Q31) In computing virtualization, the operating system running in a VM is referred to as the host OS.
a) True
b) False
Q32) In computing virtualization, the hypervisor is an intermediate software layer running between the
physical server and the OS. It monitors the status of the host OS
a) True
b) False
Q33) Which of the following is false about the hypervisor? (single answer)
Q34) Which of the following are true about the relationship between the host machine and guest
machine? (Multiple answers)
a) With the virtualization technology, one host machine can run multiple guest machines.
b) With the virtualization technology, one guest machine can use resources of multiple host
machines.
c) With the virtualization technology, one host machine can run only one hypervisor.
d) With the virtualization technology, one guest machine can run only on the host machine where it
is created.
6|Page
Q35) Which of the following are true about the type I (bare metal) computing virtualization? (Multiple
answers)
Q36) Which of the following is true about the type II (hosted) virtualization? (single answer)
Q37) Open-source virtualization technologies are all type I virtualization. Closed source virtualization
technologies are all type II virtualization.? (single answer)
a) True
b) False
Q38) If a VM on a physical host is faulty, other VMs on the physical host are not affected. Which of the
following feature of the virtualization technology is reflected by the preceding description? (single
answer)
a) Partition
b) Isolation
c) Encapsulation
d) Independence
Q39) Which of the following are used to allocate CPU and memory resources to VMs in computing
virtualization? (Multiple answers)
a) Host OS
b) Guest OS
c) VMM
d) Hypervisor
Q40) Computing virtualization technologies can be classified into type I and type II virtualization or full
virtualization and paravirtualization from different perspectives.
a) True
b) False
Q41) A VM consists of the VM configuration file and disk file. Users can move the two files to run the VM
on different physical hosts. Which features of cloud computing are reflected by the preceding description?
(Multiple answers)
7|Page
a) Encapsulation
b) Isolation
c) Independence
d) Partition
Q42) Which of the following are true about the encapsulation feature of virtualization? (Multiple answers)
Q43) Which of the following best demonstrate the advantages of virtualization? (Multiple answers)
a) With the virtualization technology, multiple applications can concurrently run on the
b) operating system of a physical host.
c) With the virtualization technology, the CPU usage of a physical host keeps around 65%.
d) With the virtualization technology, VMs can be migrated between hosts.
e) With the virtualization technology, multiple VMs can concurrently run on a physical host.
a) A company has 10 service systems. The resource usage rate of the hosts running the service
systems is less than 20%.
b) All employees in a company almost use the same office desktop applications.
c) A scientific research institute uses a customized operating system to ensure the confidentiality of
scientific research results.
d) An enterprise requires a high-load and compute-intensive environment.
Q45) The reasons why the computing virtualization technology can improve application reliability are ( ).
(Multiple answers)
a) VMs that run applications are decoupled from hardware, enabling VMs to migrate between
physical hosts.
b) The computing virtualization technology enables multiple applications to concurrently run on the
same physical host.
c) The computing virtualization technology can automatically adjust VM specifications.
d) The computing virtualization technology can automatically allocate VMs that run applications to
physical hosts with sufficient resources.
Q46) Which of the following are true about the relationship between virtualization and cloud computing?
(Multiple answers)
8|Page
c) Without cloud computing, virtualization has no value.
d) Without virtualization, cloud computing has no value.
Q47) The virtualization technology can improve hardware resource utilization and reduce O&M costs.
Cloud computing also has these advantages. Therefore, cloud computing and virtualization technologies
are inseparable from each other.
a) True
b) False
Q48) Some virtualization technologies are opensource and some are closed-source. So does the cloud
computing management platform. The open-source cloud computing management platform needs to be
implemented by opensource virtualization technologies.
a) True
b) False
Q49) The CPU virtualization technologies can be classified into full virtualization, paravirtualization,
software virtualization, and hardware-assisted virtualization.
a) True
b) False
Q50) Which of the following are true about KVM virtualization? (Multiple answers)
Q51) Which of the following are true about Kernel-based Virtual Machine (KYM)? (Multiple answers)
Q52) Which of the following are true about KVM and Xen? (Multiple answers)
9|Page
a) True
b) False
Q54) Which of the following belong to the Kernel-based Virtual Machine (KVM) architecture? (Multiple
answers)
a) Libvirt.
b) Domain 0.
c) QEMU.
d) ESXi.
Q55) Kernel-based Virtual Machine (KVM) VMs can run on other virtualization platforms after being
converted.
a) True
b) False
Q56) Which of the following is not a Kernel-based Virtual Machine (KVM) management tool?
a) Libvirt.
b) Virsh command set.
c) Virt-Manager.
d) QEMU.
Q57) QEMU functions as a hardware Simulator in KVM. It is a unique technology of the Linux operating
system.
a) True
b) False
Q58) Which of the following operations can be performed in Huawei FusionCompute? (Multiple answers)
a) Create VMs.
b) Delete VMs.
c) Convert VMs on other virtualization platforms to VMs that can be used by FusionCompute
d) Clone VMs
Q59) In Huawei FusionCompute, users can manage VMs in which of the following modes? (Multiple
answers)
a) True
b) False
10 | P a g e
Q61) Which of the following are true about the function of Libvirt in Kernel-based Virtual Machine (KVM)?
(Multiple answers)
Q62) Which of the following are true about Virtio? (Multiple answers)
Q63) If KVM uses Virtio, which of the following are true about the I/O forwarding process? (Multiple
answers)
a) True
b) False
Q65) A user applies for an EVS disk on HUAWEI CLOUD. This service mode is ( ).
a) laaS
b) PaaS
c) Saas
d) DaaS
Q66) Which of the following is true about distributed storage? Like: VSAN
a) True
b) False
Q68) In Huawei FusionCompute, which of the following is false about the uplink links?
a) The uplink is between the DVS and physical NIC of the host. One host has only one uplink.
11 | P a g e
b) An uplink can correspond to one physical network port or the logical port that binds multiple
physical network ports.
c) Multiple DVSs cannot share an uplink.
d) A host can have multiple uplinks connected to different DVSs.
Q69) In Huawei FusionCompute, which of the following is false about port groups and security groups?
a) One DVS can have multiple port groups. One VM can be protected by multiple security groups
b) Security groups protect VMs based on port groups.
c) A port group is an aggregation of virtual ports on a DVS. A security group is a set of rules.
d) A VM NIC is connected to a virtual port in a port group. A VM NIC is associated with a security
group.
Q70) Which of the following is false about iSCSI and Fiber Channel?
a) At the transmission layer, fiber channel transmission uses the Fiber Channel (FC) protocol and
iSCSI uses the TCP/IP protocol.
b) iSCSI runs on the Ethernet based on the TCP/IP protocol and can be seamlessly integrated with
the existing Ethernet.
c) The Fiber Channel (FC) protocol is completely heterogeneous with the existing Ethernet and the
compatibility is poor.
d) The transmission distance of FC is longer than that of the TCP/IP.
a) laaS
b) PaaS
c) SaaS
d) DaaS
Q72) In Huawei FusionCompute, which of the following storage virtualization features are supported?
a) Thin provisioning
b) Storage live migration
c) Snapshot
d) Disk capacity expansion
12 | P a g e
Q73) Which of the following VM disk file formats is not supported by Huawei FusionCompute?
a) VMDK
b) QCOW2
c) RAW
d) VHD
Q74) SATA disks use parallel Single ports and SAS disks use serial ports
a) True
b) False
Q75) Which of the following is recommended for the archive room where a large amount of data needs
to be stored for a long time and does not need to be read frequently?
a) SSD disk
b) SAS disk
c) SATA disk
d) NL-SAS disk
Q76) SSDs are mechanical hard disks, featuring fast read/write speed, low power consumption, and light
weight. However, SSDs have limited service life.
a) True
b) False
a) A RAID group can be regarded as storage space consisting of two or more disks. The available
capacity of a RAID group is the sum of the capacity of disks in the group.
b) RAID improves the I/O. The performance of a storage system by concurrently reading and writing
data on multiple disks.
c) When a disk is damaged, other disks in RAID 5 can still work properly, and the disk I/O
performance is not affected.
d) Compared with RAID 5, RAID 6 has stronger data recovery capability, but weaker read/write
capability of disks.
Q78) In RAID 5 and RAID 6, the number of faulty disks that can be tolerated is ( ), respectively.
a) 1, 2
b) 2, 3
c) 2, 1
d) 3, 2
13 | P a g e
Q79) After the disks in an array form a RAID group, the server connected to the disk array cannot directly
access the RAID group. Therefore, you need to divide the disk array into logical LUNs before allocating
them to the server.
a) True
b) False
Q80) Based on RAID 5, RAID 6 enhances the fault tolerance capability of disks and allows two disks to be
faulty at the same time. The minimum number of disks in a RAID 6 group is 4.
a) True
b) False
Q81) The universal storage space unit mapped to the host in the disk array is ( ), which is the logical space
created based on RAID.
a) Storage pool
b) Volume
c) LUN
d) Partition
Q82) RAID 1 can replace data backup. Data mirroring is used to improve the fault tolerance of disk arrays.
The data recovery cost is the smallest among all.
a) True
b) False
Q83) Which of the following RAID levels has the highest disk space usage?
a) RAID 0
b) RAID 1
c) RAID 5
d) RAID 6
Q84) Which of the following RAID levels has the weakest data redundancy capability?
a) RAID 0
b) RAID 1
c) RAID 5
d) RAID 6
a) RAID
b) JBOD (Just a Bunch of Disks)
c) SBOD (Switched Bunches of Disks)
d) MAID (Massive Arrays of Idle Disks)
a) DAS
14 | P a g e
b) SAN
c) NAS
d) NFS
Q87) Compared with SAN, which of the following is not an advantage of NAS?
a) The file system of NAS supports a single file with higher specifications.
b) NAS supports more files.
c) Block data transmission is optimized.
d) File sharing is optimized.
Q88) NAS has its own file system. After accessing NAS through the network sharing protocol, the
application server can read and write the files in the file system.
a) True
b) False
Q89) When configuring IP SAN for a host, you need to configure ( ) for the host on the storage device to
map the host to the IP SAN.
a) iSCSI Server
b) iSCSI Client
c) iSCSI Initiator
d) iSCSI Target
Q90) Compared with FC SAN, which of the following is not an advantage of IP SAN?
Q92) In a NAS environment, data inconsistency may occur when multiple hosts write data to one file at
the same time.
a) True
b) False
15 | P a g e
Q93) Which of the following network file sharing protocols are supported by NAS?
a) NTFS
b) NFS
c) CIFS
d) FTP
Q94) iSCSI is a standard protocol based on the ( ) protocol and SCSI instruction set. It is widely used in
many storage networks of the ( ) architecture.
a) FC, FC SAN
b) TCP/IP, FC SAN
c) TCP/IP, IP SAN
d) FC, IP SAN
Q95) Which of the following is false about differences between SAN and NAS?
a) NAS has its own file system, but SAN does not.
b) SAN provides block-level data transmission and storage services, while NAS provides file- level
transmission and storage services.
c) SAN is a network architecture, while NAS is a network file storage device.
d) SAN can expand storage space, but NAS devices cannot be expanded.
Q96) SAN provides a host with a raw disk where no file system is created. The file system to be created
depends on the operating system of the host.
a) True
b) False
a) Block-level virtualization
b) Page-level virtualization
c) File-level virtualization
d) Application-level virtualization
Q98) In Huawei FusionCompute, if only one physical network port is in a bound port, the physical network
port cannot be removed directly.
a) True
b) False
a) SAN
b) NAS
c) Local disk
16 | P a g e
d) FusionStorage
Q100) In Huawei FusionCompute, you can perform which of the following operations on the VRM?
a) Active/Standby.
b) Load sharing based on round-robin.
c) Load sharing based on source and destination MAC addresses.
d) Load sharing based on source and destination port groups.
Q102) In Huawei FusionCompute, VMs using non-virtualized storage do not support the snapshot
function.
a) True
b) False
a) Files are stored in the file system and mapped to the file system block by the file system.
b) The file system block corresponds to the logical extent of LVM.
c) The logical extent is mapped to the physical extent of the disk through LVM.
d) Each file system block corresponds to discontinuous extents on the physical disk
Q104) Which of the following is true about virtualized storage and nonvirtualized storage?
a) DVM
b) LVM
c) PVM
d) OVM
Q106) The virtualization technology can virtualize a physical server into multiple VMs, improving the
hardware performance of the physical server.
a) True
b) False
17 | P a g e
Q107) Which of the following is true about NFS?
a) RAID
b) Partition
c) Formatting
d) Encapsulation
Q109) In Huawei FusionCompute, Tools installed for VMs are irrelevant to the operating system types and
versions of the VMs.
a) True
b) False
Q110) In Huawei FusionCompute, which of the following is false about the host storage ports?
a) You can manually add storage ports or add storage ports in batches.
b) Multiple storage ports can be added to implement multi-path transmission.
c) Local disks and FC SAN devices can be interconnected with storage devices without adding storage
ports.
d) The IP addresses of the storage ports can be on the same network segment as that of the
management plane.
Q111) In Huawei FusionCompute, the correct procedure for deleting storage resources is ( ).
a) 1->2->3->4
b) 1->4->2->3
c) 2->4->1->3
d) 3->2->4->1
a) Critical
18 | P a g e
b) Moderate
c) Major
d) Minor
e) Warning
Q113) Disk partitions are divided by the operating system on physical disks.
a) True
b) False
Q114) In Huawei FusionCompute, the management VLAN ID used by VRM cannot be changed.
a) True
b) False
Q115) Which of the following is false about the VIMS file system?
a) True
b) False
In Huawei
Q117) FusionCompute, which of the following deployment modes is recommended to improve VRM
reliability?
a) Single-node deployment
b) Active/Standby deployment
c) Active-active deployment
d) Hybrid deployment
Q118) In Huawei FusionCompute, which of the following are true about the relationship about quantities
of VMs and DVSs?
19 | P a g e
Q119) The prerequisites for communication between a VM and other VMs are ( ).
Q120) In Huawei FusionCompute, the VLAN ID (except 0) configured for a distributed virtual switch (DVS)
must exist on the physical switch. Otherwise, VM communications will be abnormal.
a) True
b) False
Q121) In Huawei FusionCompute, a DVS can be configured with static routes and multiple types of
dynamic routes.
a) True
b) False
Q122) In Huawei FusionCompute, a management IP address must be configured for each DVS to facilitate
unified management of DVSs.
a) True
b) False
Q123) In Huawei FusionCompute, the IP address of a Windows VM is 0.0.0.0. The possible cause is ( ).
Q124) Which of the following traffic types belong to southbound and northbound traffic?
20 | P a g e
Q126) Which of the following remote management methods are supported by physical switches?
a) Telnet.
b) SSL.
c) SSH.
d) Web.
Q127) Data packets in a cloud computing virtual network must be routed and forwarded by routers in a
physical network.
a) True
b) False
a) If VMs in two departments use different VLANs, the VMs cannot communicate with each other.
b) VMs in different VLANs can use the same IP address. No IP address conflict occurs.
c) VMs in the same VLAN can use IP addresses in different IP address segments and can discover
each other through broadcast.
d) VMs in the same VLAN must use IP addresses in the same IP address segment. Otherwise,
communications between the VMs will fail.
Q129) If VM A and VM B run on different physical servers, which of the following physical devices is used
during communications?
a) Virtual switch
b) Virtual NIC
c) Physical NIC
d) Physical switch
Q130) A VM can have multiple virtual NICs, which correspond to different virtual switches.
a) True
b) False
Q131) The port configuration of a Huawei switch is as follows: interface XGigabitEthemet0/0/4 port link-
type trunk port trunk allow-pass vlan 16 17 Which of the following statements is true based on the
preceding configuration?
a) Data frames with the VLAN 16 tag will be untagged and forwarded when passing through this
port.
b) Data frames with the VLAN 17 tag will be forwarded with the tag retained when passing through
this port.
c) Data frames without any tags will be discarded when passing through this port.
d) Data frames without any tags will be tagged with VLAN 16 or VLAN 17 when passing through this
port and then forwarded.
21 | P a g e
Q132) Which of the following technologies can increase the link rate on a switch?
a) VLAN
b) VxLAN
c) LACP
d) LDAP
Q133) On a physical network, which of the following devices supports route forwarding requests?
Q134) The port configuration of a Huawei switch is as follows: interface GigabitEthernet0/0/1 port link-
type access port default vlan 16 Which of the following statements is true based on the preceding
configuration?
a) This port does not perform any operation on the data frames that pass through it.
b) This port removes the VLAN 16 tag from the data frames and forwards the data frames.
c) This port adds the VLAN 16 tag to the data frames that pass through it.
d) This port allows only the data frames with the VLAN 16 tag to pass through.
Q135) In KVM, there are two methods for connecting VM NICs to a physical network: ( ).
Q136) If a VM needs to communicate with other VMs, which of the following operations is mandatory?
Q137) If two VMs can ping each other, which of the following network devices will certainly be used during
communications?
22 | P a g e
Q138) If VM A can ping VM B, which of the following inferences is true?
a) True
b) False
Q140) Which of the following technologies or devices cannot isolate broadcast domains?
a) VLAN
b) Hub
c) Router
d) Firewall.
Q141) Switches are classified as access switches, aggregation switches, and core switches. Virtual switches
belong to aggregation switches.
a) True
b) False
Q142) Core services of an enterprise are deployed on multiple VMs in cluster mode. High availability (HA)
policies can be configured for the VMs to improve service reliability.
a) True
b) False
a) True
b) False
Q144) In Huawei FusionCompute, which of the following statements about VM HA are true?
a) After the HA function is enabled in a cluster, if a host in the cluster becomes faulty, VMs on the
host can be rebuilt on other hosts in the cluster.
b) When the system detects a BSOD on a VM and the handling policy configured for this error is HA,
the system creates the VM on a normal compute node.
c) VM HA can quickly recover services if a fault occurs.
d) If a fault occurs, HA-enabled VMs can be successfully rebuilt on other compute nodes as long as
there are reserved resources in the cluster.
Q145) In practice, resources must be reserved for hosts in a cluster to ensure that VM HA can be
performed properly
23 | P a g e
a) True
b) False
Q146) In Huawei FusionCompute, which of the following are trigger conditions for VM HA?
Q147) In Huawei FusionCompute, which of the following operations can be performed by the system if a
Blue Screen of Death (BSOD) occurs on a Windows VM?
a) No processing is performed.
b) Restarting the VM
c) Restoring the VM using a snapshot.
d) Performing VM HA
Q148) In Huawei FusionCompute, after the automatic computing resource scheduling function is enabled,
which of the following are possible causes for VM migration?
Q149) In Huawei FusionCompute, the Data Replication Service (ORS) migrates VMs based on the following
factors: ( )
a) CPU
b) Memory
c) I/O
d) Network traffic
a) True
b) False
Q151) In Huawei FusionCompute, which of the following statements are true about adding shared storage
for multiple hosts?
a) When the shared storage is IP SAN, make sure that the storage network of the host is connected
to the service ports of storage.
b) Select the corresponding host when adding a datastore.
c) Select all hosts when associating storage devices.
d) Select all hosts when initializing storage resources.
Q152) In Huawei FusionCompute, which of the following statements is true about adding storage ports to
hosts?
24 | P a g e
a) Select a host and add a storage port on the host configuration page.
b) Storage ports can be added to hosts in batches.
c) The VLAN ID can be set to 0.
d) If FC SAN is used, users do not need to add storage ports.
Q153) In Huawei FusionSphere, which of the following functions are supported by thin provisioning?
a) Virtual storage thin-provisioning is irrelevant to the OS and hardware. Disk thin-provisioning can
be provided as long as the virtual image management system is used.
b) This function enables alarms over datastore usage. If the data usage exceeds the preset threshold,
an alarm will be reported.
c) This function enables disk space monitoring and reclaiming.
d) NTFS VMs do not support this function.
Q154) In Huawei FusionCompute, where can the memory overcommitment function be enabled?
a) OS
b) VM
c) Host
d) Cluster
Q156) Any of intelligent memory overcommitment functions (memory ballooning, memory swapping, and
memory sharing) can be enabled or disabled based on customer requirements.
a) True
b) False
Q157) Memory overcommitment is a resource allocation solution. It reduces costs and improves VM
density on a single host at the cost of performance.
a) True
b) False
25 | P a g e
Q158) Which of the following statements about memory overcommitment is false?
a) After memory overcommitment is enabled, the total memory size of all VMs created by users can
exceed the physical memory.
b) Enabling memory overcommitment improves VM deployment density on physical hosts.
c) When memory overcommitment is enabled, a higher overcommitment ratio indicates higher VM
performance.
d) If the memory usage of a user VM is high, the memory overcommitment ratio can be adjusted to
optimize the memory usage.
Q159) In which scenario should the memory overcommitment ratio not be increased?
a) Converting a VM to a VM template
b) Cloning a VM to a VM template
c) Cloning a VM template to a VM template
d) Converting a snapshot to a VM template
Q162) When users use a Windows template to quickly deploy VMs, the generated SIDs may be the same.
As a result, some special software may fail to be installed.
a) True
b) False
Q164) In Huawei FusionCompute, which of the following statements about the template format is false?
26 | P a g e
d) An .ovf template only contains one .ovf file and one .vhd file.
Q165) In Huawei FusionCompute, which of the following operations is supported when users modify a
disk of a VM?
Q166) When users use a template to quickly deploy a VM, the generated VM configuration information is
the same as that in the template.
a) True
b) False
Q167) When users use a template to quickly deploy a VM, they do not need to install the operating system
or perform related configurations.
a) True
b) False
Q168) Templates can be used to quickly deploy VMs. Currently, users can create templates only by
converting or cloning VMS.
a) True
b) False
Q169) In Huawei FusionCompute, which of the following is not a QoS parameter of CPU resources?
a) CPU quota
b) CPU limitation
c) CPU reservation
d) CPU overcommitment
Q170) In Huawei FusionCompute, which of the following statements about CPU resource QoS is false?
a) CPU quota defines the proportion based on which CPU resources to be allocated to each VM when
multiple VMs compete for physical CPU resources.
b) CPU limitation defines the priority based on which CPU resources to be allocated to each VM
when multiple VMs compete for physical CPU resources.
c) CPU reservation takes effect only when VMs compete for resources. If the CPU resources are
sufficient, a VM can exclusively use physical CPU resources on the host if required.
d) CPU reservation defines the minimum CPU resources to be allocated to each VM when multiple
VMs compete for physical CPU resources.
27 | P a g e
Q171) If a VM of a customer requires a CPU clock speed of at least 2 GHz, which of the following methods
should be used?
a) CPU limitation
b) CPU reservation
c) CPU quota
d) CPU overcommitment
Q172) CPU resource QoS and memory overcommitment technologies are used to allocate resources
appropriately based on different policies.
a) True
b) False
Q173) Which of the following statements about CPU resource QoS and memory resource QoS is false?
a) CPU QoS of a VM is used to ensure that the computing resources of the VM are properly allocated.
b) CPU quota and CPU reservation take effect only when VMs compete for computing resources.
c) Memory QoS is used to ensure that key service VMs can obtain sufficient memory resources.
d) Memory QoS can be used only when memory overcommitment is enabled.
Q174) Memory overcommitment is the prerequisite for implementation of memory resource QoS.
a) True
b) False
Q175) An e-commerce service VM requires memory of at least 8 GB to cope with service traffic bursts
during holidays. Which of the following technologies can be used to meet this requirement?
a) Memory overcommitment
b) Memory QoS
c) VM live migration
d) Rapid VM deployment
Q176) Which of the following statements about creating a new disk on Huawei FusionCompute is false?
a) Set the disk type to Common and set the disk mode to Independent & nonpersistent.
b) Set the disk mode to Independent & nonpersistent and change the value of Raw Device Mapping
to Supported.
c) Set the disk configuration mode to Thin provisioning and set the disk mode to Independent &
persistent.
d) Set the disk configuration mode to Thin provisioning and set the disk mode to Independent &
nonpersistent.
Q177) Huawei FusionCompute DRS rules do not take effect for VMs with USB devices attached.
a) True
b) False
28 | P a g e
Q178) Which of the following operations can be performed under the VLAN Pool menu on Huawei
FusionCompute?
a) Add ten VLAN pools with the same VLAN ID to the same OVS.
b) Add one VLAN pool to the DVS and set the start VLAN ID of the VLAN pool to 100.
c) Add one VLAN pool to the DVS and set the start VLAN ID of the VLAN pool to 0.
d) Add one VLAN pool to the DVS and set the end VLAN ID of the VLAN pool to 4096.
Q179) Which of the following requirements can be met by using Huawei FusionCompute ORS rules?
Q180) Which of the following statements about creating a template on FusionCompute is false?
a) Convert a VM to a VM template: All parameters of the template are from the VM. The VM does
not exist after the conversion.
b) Clone a VM to a VM template: All parameters of the template are from the VM, but some
parameters can be modified during the cloning process. The VM is still available after the cloning
is compete.
c) Clone a VM template to a VM template: ALL parameters of the new template are from the original
VM template, but some parameters can be modified during the cloning process. The original VM
template is still available after the cloning is compete.
d) The VM used for creating a template can be in the Running state.
Q181) Which of the following is not a prerequisite for installing Tools for a VM on FusionCompute?
Q182) In Huawei FusionCompute, if a VM is in the Running or Stopped state, users can increase or
decrease the number of vCPUs of the VM as required.
a) True
29 | P a g e
b) False
Q183) Which of the following is not included in the snapshot management functions?
a) Creating a snapshot
b) Modifying a snapshot
c) Deleting a snapshot
d) Copying a snapshot
Q185) During the creation of a snapshot, users can perform other operations on the VM.
a) True
b) False
Q187) In Huawei FusionCompute, which of the following statements about memory overcommitment is
false?
a) The VM performance deteriorates on a host that has the memory overcommitment function
enabled.
b) The memory overcommitment function can be disabled only when the memory overcommitment
ratio of all hosts in the cluster is less than or equal to 100%.
c) After memory overcommitment is disabled, the total memory size of all VMs is less than or equal
to the total available physical memory size.
d) Administrators can enable or disable the memory overcommitment function anytime.
Q188) Which of the following statements about live migration and cold migration is false?
a) Cold migration is to migrate a stopped VM from one host to another. During the migration,
services are interrupted.
30 | P a g e
b) Live migration is to migrate a running VM from one host to another. During the migration, services
are not interrupted.
c) The reliability test in performance tests includes the tests on the VM migration, such as live
migration, cold migration, migration duration, and service interruption duration.
d) Memory data and disk data are migrated during live migration and cold migration.
Q189) Which of the fallowing QoS parameters can be set for VMs on FusionCompute?
a) Memory
b) CPU
c) GPU
d) Disk IOPS
e) Network
a) A consistency snapshot will be to be created if disk I/O pressure is high. You are advised to create
a consistency snapshot when the disk I/O pressure is low.
b) After a snapshot is generated, incremental disks take space of the datastore where the disks are
located. To prevent storage resource insufficiency, control the number of snapshots.
c) Another snapshot can be created for a VM when a snapshot is being created for the VM.
d) Snapshots do not store information about passthrough devices such as USB/GPU/SSD or GPU
virtualization devices.
Q192) VM live migration is to migrate VMs from one physical server to another physical server in the same
cluster when the VM is powered off.
a) True
b) False
Q193) In Huawei FusionCompute, which of the following statements is false about the conditions for VM
live migration?
a) The source host and the destination host communicate with each other properly.
b) The destination host has sufficient resources.
31 | P a g e
c) The VM is running.
d) The type of the destination storage device is different from that of the source storage device.
Q194) Which of the following statements about the live migration application scenario is false?
a) If a host is faulty or overloaded, the VMs running on it can be migrated to another host to prevent
service interruption.
b) If the service load is too light on multiple hosts, the VMs can be migrated to a smaller number of
hosts to consolidate the host resources used. This decreases the number of hosts that need to be
running and reduces power consumption.
c) VMs at a graphics- capable workstation can be live migrated after being bound to an image
processor.
d) During host maintenance, VMs running on the host can be migrated to other hosts to ensure
normal service running.
Q195) In Huawei FusionCompute, which of the following statements about live migration is false?
Q196) O&M engineers can migrate VMs on a physical server to be upgraded to other servers to prevent
service interruption during system maintenance performed by a carrier.
a) True
b) False
Q197) Which of the following statements about Non-Uniform Memory Access (NUMA) is false?
a) Guest NUMA presents the NUMA topology to VMs to enable the guest OS to allocate resources
to applications running on it based on logical NUMA nodes, thereby improving application
performance.
b) Host NUMA provides the CPU load balancing mechanism to eliminate the VM performance
bottleneck due to unbalanced CPU resource allocation.
c) Host NUMA ensures that VMs access only the local physical memory, which reduces memory
access latency and improves VM performance.
d) With NUMA, the speed of CPU access to memory on the same node is basically the same as that
of access to memory on another node.
32 | P a g e
a) Topology presentation: NUMA is identified in the VM to make NUMA optimization of the guest
OS and applications effective.
b) Initial placement: Based on the VM NUMA topology, select a physical node to place the vCPU and
memory, so that the relationship
c) Load balancing: During the scheduling, the association between nodes and the mapping between
vNodes and physical nodes are considered to maximize the speed of vCPU access to local memory.
d) Dynamic migration: When the affinity relationship between the vCPU and physical node changes,
memory on the corresponding vNode will be migrated.
Q199) Which of the following statements about the purpose of enabling the NUMA function is true?
Q200) NUMA is a multiprocessor-based computer memory design. The memory access time depends on
the relative location of memory to the processor. In NUMA, the speed of a processor to access its own
local memory is faster than that to access a non-local memory (memory located on another processor or
memory shared by processors).
a) True
b) False
Q201) Which of the following statements about the NUMA Topology Adjustment switch is false?
a) If the optimal NUMA topology cannot be calculated, the VM behavior is consistent with the switch
status.
b) After the switch is set to OFF, interleaving access occurs on NUMA nodes during VM memory
access, resulting in performance loss.
c) After this switch is set to ON, the system sets VM NUMA affinity and physical NUMA affinity during
automatic adjustment to maximize VM memory access performance.
d) After this switch is set to ON, VMs may not be scheduled to the specified nodes, and CPUs and
memory are evenly allocated to bound nodes during manual adjustment.
Q202) Which of the following statements about security groups are true?
a) A security group, similar to a firewall, is used to set network access control for a single or multiple
VMs. It is an important security isolation method.
b) A security group is a logical group.
c) Security groups are used to protect VM security.
d) When a VM is created, a security group is generated at the same time.
Q203) In Huawei FusionCompute, which of the following statements about security groups and rules is
false?
33 | P a g e
b) Only a security group that contains no VMs can be deleted.
c) The changes to security group rules can only be manually applied to VMs in the security group.
d) By default, a security group rejects all access requests before rules are added to it.
Q204) Which of the following statements about the application scenarios of security groups is false?
a) Security group rules can be configured to prohibit VMs from accessing the FTP server.
b) be configured to allow only the specified IP addresses to remotely log in to VMs.
c) Security group rules can be configured to disallow access to VMs.
d) Security group rules can be configured to control the permissions on folders in a VM.
Q205) In Huawei FusionCompute, all VM NICs added to the same security group are filtered by the rules
of this security group. To
Q206) If a security group is deleted, the rules in the security group will be deleted as well.
a) True
b) False
Q207) In Huawei FusionCompute, which of the following statements about security group rules is false?
Q208) In Huawei FusionCompute, which of the following statements about deleting a security group is
false?
a) A security group can be deleted properly even if it is authorized to access other security groups.
b) The security group to be deleted cannot contain any VMs. If a VM exists in the security group, the
VM must be removed from the security group before the security group can be deleted.
c) After a security group is deleted, all security group rules in the group will be deleted as well.
d) When a security group to which a VM belongs is deleted, the effects of other security groups on
this VM are not changed.
Q209) Which of the following is not included in the 4V features of big data?
a) Volume
b) Value
c) Variety
d) Valid
Q210) Fog computing is a distributed computing model that extends cloud computing concepts to
network edges to support low latency and distributed applications in mobile and internet of Things (loT)
fields. Which of the following statements about fog computing is false?
34 | P a g e
a) Fog computing can quickly generate big data at the edge of a network to reduce the latency.
b) Fog computing can reduce the bandwidth consumed by the core Internet and restrict the
movement of data to the local network.
c) Fog computing delivers higher network reliability and physical device security than cloud
computing.
d) Fog computing can temporarily cache data to reduce network pressure.
Q211) The function of loT is only to collect the data generated by everything.
a) True
b) False
Q212) Artificial intelligence (Al) is a new science of researching and developing theories, methods,
technologies, and application systems to imitate and enhance human intelligence. Which of the following
statements about Al is false?
Q213) The 3GPP plenary meeting held in 2018 officially approved the standalone (SA) variant of the fifth
generation of mobile communications (5G) new radio (NR) specifications. Since then, the independent
deployment of 5G networks is supported. The uRLLC and mMTC technologies in 5G are mainly applied to
loT.
a) True
b) False
Q214) The nature of IoT is the Internet. As long as hardware or products are connected to the Internet
and data interactions exist, it can be called an IoT.
a) True
b) False
Q215) Which of the following does not belong to the elements of AI?
a) Big data
b) Perceptual analysis capability
c) Computing capability
d) Scenario
Q216) Which of the following statements about big data and cloud computing is true?
a) Cloud computing is a broad term for data sets so large or complex that traditional data processing
applications are inadequate.
b) Big data uses the pay-per-use mode, which supports available, convenient, and on demand
network access.
c) Big data can be used as a type of cloud computing service for users to choose.
35 | P a g e
d) Cloud computing cannot provide the underlying computing resources used for big data
processing.
Q217) Sound recognition, image recognition, and companion robots are all Al applications.
a) True
b) False
Q218) As Internet+ gains more and more attention and big data and cloud services become popular, more
and more advanced technologies are on the rise. Docker is one of the most widely used and important
technologies. Which of the following statements about Docker is false?
a) Before installing Docker, a virtualization layer and virtual operating system must be created on
the host machine or the host machine operating system.
b) Docker can be used to package the underlying environment of applications to ensure that
applications can still run properly after migration.
c) Docker is booted faster than other VM technologies.
d) Docker uses containers to run applications. Containers are running instances created from images.
Q219) Which of the following statements about the relationship between cloud computing and IoT is
false?
a) Cloud computing is the cornerstone of IoT development, and IoT promotes the development of
cloud computing.
b) Data transmission in IoT depends on cloud computing.
c) The IoT operating efficiency will be greatly reduced if there is no support from cloud computing
technologies.
d) Cloud computing provides sufficient storage space for massive da a in the IoT.
Q220) Which of the following statements about Virtual Network Computing (VNC)are true?
a) Uplink
b) Port group
c) Virtual NIC
d) iNIC
36 | P a g e
Q222) In FusionCompute, which of the following operations can take effect immediately?
a) Deleting a NIC
b) Installing Tools
c) Reducing disk capacity
d) Directly reading and writing data on a newly attached disk
Q223) The storage virtualization technology improves storage utilization and provides storage resources
for multiple VMs
a) True
b) False
Q224) In Huawei FusionCompute, which of the following statements about the CPU QoS technology is
false?
a) Adjust the CPU reservation, quota, and limitation to control the CPU usage of VMs.
b) CPU reservation is used to ensure the minimum VM computing capability that is the minimum
number of resources that can be used.
c) CPU quota is used to balance and adjust resources based on the relative CPU quotas of multiples
VMs when computing resources are insufficient.
d) CPU limitation is used to specify the maximum number of VMs that can run on a host.
Q225) In Huawei FusionCompute, the gateway address of a VM is set on which of the following network
devices?
a) Layer 3 switch
b) Layer 2 switch
c) Virtual switch
d) Layer 1 physical device
Q227) In Huawei FusionCompute, snapshots can be created for Computing Node Agent (CNA) hosts.
a) True
b) False
Q228) In Huawei FusionCompute, which of the following functions will be affected after a USB device is
attached to a VM?
a) Restarting a VM
37 | P a g e
b) VM live migration
c) Cluster scheduling
d) VM resource capacity expansion
Q229) In FusionCompute, the administrator binds the two NICs of the CNA host through active/standby
mode. The data transmission rate is equal to the sum of the transmission rates of the two network ports
a) True
b) False
Q230) In Huawei FusionCompute, after a user logs in to a VM using VNC, operations on the VM fail. For
example, files cannot be opened. Which of the following is the most possible cause of this problem?
Q231) In Huawei FusionCompute, when a compute node is powered off, the system can start HA-enabled
VMs on the compute node from other compute nodes. Which of the following is not a prerequisite for
using this function?
a) HA-enabled VMs on a compute node use IP addresses on the same network segment.
b) The VM is not bound to the host.
c) HA is enabled for the cluster to which the compute node belongs.
d) The source and destination compute nodes share the same datastore.
a) True
b) False
Q233) During the installation of Huawei FusionCompute, which of the following storage is VRM
recommended to be deployed on?
a) Local disk
b) FC SAN
c) IPSAN
d) NAS
Q234) In Huawei FusionCompute, multiple VMs can be deployed in batches using a template.
a) True
b) False
Q235) Which of the following statements about the cluster, host, and VM in Huawei FusionCompute is
false?
38 | P a g e
c) Whether multiple hosts belong to the same cluster depends on whether they use the same shared
storage.
d) A cluster consists of multiple hosts and their associated storage and network resources.
Q236) In Huawei FusionCompute, which of the following are the methods for creating VM?
Q237) In Huawei FusionCompute, if a host in a cluster becomes faulty, VMs on the host are automatically
migrated to other hosts in the cluster.
a) True
b) False
Q238) Which of the following methods is used for installing VRM VMs using FusionCompute Installer?
Q239) In FusionCompute, which of the following is not a method for creating a template?
a) Converting a VM to a VM template
b) Converting a snapshot to a VM template
c) Cloning a VM to a VM template
d) Cloning a VM template to a VM template
Q241) In Huawei FusionCompute, which of the following data storage types does not support disk capacity
expansion?
Q242) In Huawei FusionCompute, which of the following statements about storage is false?
39 | P a g e
Q243) In Huawei FusionCompute, when multiple VMs write data to the shared disk at the same time, the
application software must control access to the disk to prevent data loss.
a) True
b) False
Q244) In Huawei FusionCompute, the resources in a cluster consist of hosts and associated storage and
Q245) When FusionCompute uses Internet Protocol storage area network (IP SAN) storage, the steps for
creating disks include:
3. Add datastores.
4. Create disks.
a) 1-2-3-4
b) 1-3-4-2
c) 2-1-3-4
d) 4-2-1-3
Q246) In Huawei FusionCompute, when viewing the disk status, the administrator finds that the value of
Used Capacity (GB) is less than that of Capacity (GB). The possible cause is: ( )
Q247) In Huawei FusionCompute, which of the following statements about VM storage live migration is
false?
Q248) In Huawei FusionCompute, after data in a VM is deleted, the disk size will not be automatically
reduced. When users write data to the VM next time, the space released by the VM will be used.
a) True
b) False
40 | P a g e
a) OVF
b) VMDK
c) VHD
d) DHT
Q250) In Huawei FusionCompute, when mounting a local image file to a VM to install the OS, the
administrator can close the VNC window anytime without
Q251) In Huawei FusionCompute, which of the following VM disk configuration modes requires the least
physical storage space?
Q252) In Huawei FusionCompute, which of the following statements about shared disks are true?
Q253) Which of the following storage resource types are supported by Huawei FusionCompute?
a) FC SAN
b) IP SAN
c) NAS
d) Advanced SAN
e) FusionStorage
Q254) In Huawei FusionCompute, memory and CPU resources used by VMs can only be provided by the
same cluster. Therefore, the maximum number of available
Q255) After Huawei FusionCompute is deployed using the unified installation and deployment tool, the
system automatically creates a cluster. What operations can administrators perform on the cluster?
Q256) In Huawei FusionCompute the VLAN ID of a port group is set to 10, which indicates ( ).
a) The system will untag the data frames with the VLAN 10 tag that pass through the port group and
then forward the data frames.
b) The system will add the VLAN 1 O tag to the data frames without a VLAN tag that pass through
the port group and then forward the data frames.
c) The system will discard the data frames with a tag other than VLAN 10 that pass through the port
group.
41 | P a g e
d) The system will change the tag of data frames with a non-VlAN-10 tag that pass through the port
group to VLAN 10 and then forward the data frames.
Q257) In Huawei FusionCompute, administrators can view the DVS ports connected to VMs.
a) True
b) False
Q258) In Huawei FusionCompute, users can create VMs by importing a VM template file. Which of the
following file format is not supported?
a) ova
b) qwcow2
c) vmdk
d) ovf
Q259) Which of the following operating systems allows users to format disks in New Technology File
System (NTFS) format?
a) Linux
b) UVP
c) Windows
d) Unix
Q260) In Huawei FusionCompute, which of the following is not a restriction for VM live migration?
Q261) ???????????????????
Q262) When attaching a disk to a VM on Huawei FusionCompute, users have the following requirements:
When a snapshot is created for the VM, no snapshot is created for the disk. When a VM is restored using
the snapshot, the disk is not restored and all data is written to the disk permanently. Which of the
following modes of disks should be selected?
a) Dependent
b) Independent
c) Independent & persistent
d) Independent & persistent
Q263) Huawei FusionCompute allows users to add hosts in batches. The administrator fills in host
information based on the template provided by the system and imports the host information at a time.
a) True
b) False
42 | P a g e
Q264) Which of the following statements about Huawei FusionCompute HA is false?
Q265) In Huawei FusionCompute, port groups are classified as common port groups, trunk groups, and
hybrid port groups.
a) True
b) False
Q266) Which of the following operations for creating port groups in Huawei FusionCompute is false?
Q267) In Huawei FusionCompute, the VLAN ID of a port group is set to 0, which indicates ( ).
a) The VLAN tag of the data frames that pass through the port group will be set to 0.
b) Only data frames with the VLAN 0 tag can pass through the port group
c) Data frames with a VLAN tag are not allowed to pass through the port group.
d) The data frames that pass through the port group Will not be modified.
Q268) In Huawei FusionCompute, the virtual NICs of each VM are connected to the ports of the virtual
switch. To facilitate simultaneous configuration and management of multiple ports, the ports with the
same network attributes are added to the same port group.
a) True
b) False
Q269) Which of the following statements about port groups in Huawei FusionCompute are true?
Q270) In Huawei FusionCompute, if there are just a few physical NICs on the server, multiple planes can
be co-deployed and logically isolated by using VLANs.
a) True
b) False
43 | P a g e
Q271) In Huawei FusionCompute, which of the following are not supported by the VMs that use raw
device mapping (ROM) storage?
a) Snapshot
b) Thin provisioning
c) Storage live migration
d) CPU hot-add
a) Hypervisor is virtualization.
b) A hypervisor is an operating system.
c) A hypervisor is a key technology in computing virtualization.
d) A hypervisor contains a large number of drivers Therefore, drivers and patches do not need to be
installed for the hypervisor.
Q274) In Huawei FusionCompute, what network device does a DVS correspond to?
a) Router
b) Layer 3 switch
c) Layer 2 switch
d) Hub
Q275) Memory swapping in memory overcommitment means that external storage is virtualized into
memory for VMs to use, Data that is not used temporarily is stored in external storage. If the system needs
such data, the system exchanges the data with the data reserved in memory.
a) True
b) False
Q275) Which of the following statements about the Huawei FusionCompute architecture is false?
a) CNAs can manage the network, storage, and computing resources of a cluster.
b) VRM provides a management portal for administrators.
c) CNAs provide computing resources for VMs.
d) VRM can be deployed on a CNA or a dedicated server.
44 | P a g e
Q277) In Huawei FusionCompute, users can configure DRS rules
Q278) In Huawei FusionCompute, which of the following operations can be performed on a VM even if
Tools is not installed on the VM?
a) Restarting the VM
b) Forcibly stopping the VM
c) Stopping the VM
d) Converting the VM to a VM template when the VM is powered on
Q279) In Huawei FusionCompute, if a VM is bound to a host, which of the following functions will be
affected?
a) Snapshot
b) DRS
c) Hot migration
d) Memory hot-add
Q280) Huawei FusionCompute is able to check the usage of global physical resources during VM running,
calculate the optimal host for the VM based on the intelligent scheduling algorithm, and enable the VM
to run on the optimal host by means of live migration, thereby improving the overall service experience.
a) True
b) False
Q281) In Huawei FusionCompute, which of the following statements about VM NICs is true?
a) Virtual NIC and physical NIC are two different NIC types. A virtual NIC does not require a MAC
address.
b) The MAC address and IP address of a virtual NIC can be manually configured.
c) The MAC address and IP address of a virtual NIC are automatically allocated by VRM.
d) The IP address of a Virtual NIC must be manually configured
Q282) In Huawei FusionCompute, if VMs need to be migrated between CNA hosts with different CPU
models, which of the following functions must be enabled?
Q283) In Huawei FusionCompute, which of the following statements about the IMC function is false?
a) You are advised to enable the IMC function when the CPU models of CNA hosts in the cluster are
inconsistent.
45 | P a g e
b) If the IMC function is enabled, VMs cannot be migrated between hosts with different CPU models.
Determine whether to enable the IMC function based on the site requirements.
c) IMC only supports the VM migration from an earlier CPU generation to a later CPU generation.
d) You are advised to enable the IMC function when the memory sizes of CNA hosts in the cluster
are inconsistent
Q284) In Huawei FusionCompute, which of the following statements about roles is true?
Q285) In Huawei FusionCompute, which of the following statements about raw device mapping is false?
a) ROM disks deliver the best performance among all disk types.
b) An ROM datastore corresponds to only one disk.
c) It is recommended that the operating system be installed on an ROM disk.
d) An ROM datastore can only correspond to a LUN on SAN storage.
a) True
b) False
Q287) In Huawei FusionCompute, which of the following statements about the fac tors affecting
computing resource scheduling is false?
a) When both CPU and memory are configured as the factors. The scheduling policy is triggered only
when the CPU and memory conditions are met.
b) When CPU is configured as the only factor, the scheduling policy is triggered when the CPU
conditions are met.
c) When memory is configured as the only factor, the scheduling policy is triggered when the
memory conditions are met.
d) When both CPU and memory are configured as the factors, the scheduling policy is triggered
when either the CPU conditions or the memory conditions are met.
Q288) ??????????????????????
Q289) Assume that three VMs (A, B, and C) run on the host that uses a single-core physical CPU whose
clock speed is 2.8 GHz, their respective quotas are set to 100, 200, and 400, and their respective CPU
reservation values are set to 700 MHz, 0 MHz, and o MHz. What is the computing capability of VM C when
the three VMs are running at full CPU load?
a) 700 MHz
b) 300 MHz
c) 1400 MHz
46 | P a g e
d) 600 MHz
a) True
b) False
Q291) The KVM virtualization architecture includes the KVM module, QEMU, and Libvirt. Which of the
following statements about these modules is false?
a) The KVM module is responsible for creating vCPUs and allocating virtual memory.
b) The QEMU module is responsible for simulating I/O operations.
c) Libvirt and OEMU can form a virtualization solution.
d) KVM and OEMU can form a Virtualization solution.
Q293) In cloud computing, there are virtual networks and physical networks.
a) True
b) False
Q294) With the development of Al, almost all technologies involve Al. Which of the following scenarios
is Al applicable to?
Q295) loT devices may be connected to the Internet and can be controlled through the Internet.
a) True
b) False
Q296) In the OpenStack solution, which of the following modules provides persistent block storage?
a) Cinder
b) Swift
c) Nova
d) Glance
Q297) Which of the fallowing statements about the common Internet file System (CIFS) is true?
a) CIFS has low requirements on network transmission reliability. The TCP/IP or UDP protocol can be
used.
47 | P a g e
b) CIFS requires the client to have dedicated software installed.
c) CIFS supports multi-user access.
d) CIFS retains the file format characteristics.
Q298) Which of the fallowing are the features of the cloud computing 1.0 era?
Q299) In the cloud computing, hardware of the same type of different models can form a resource pool.
a) True
b) False
Q300) Virtualization includes computing virtualization, storage virtualization, and network virtualization,
which correspond to elastic cloud servers (ECSs), Elastic Volume Service (EVS) disks, and cloud networks
in cloud computing respectively.
a) True
b) False
48 | P a g e