You are on page 1of 11
1, When creating an ECS, users can use the file injection function provided by the system to initialize the ECS. A twe 8 false 2, Which ofthe fllowing AS policies shouldbe selected for dynamically expanding resources when users create an AS poly? A Schedules 8 Peride arm 3, When using an image file to register fra private image, you must ensure thatthe specified system dsk capacity ofthe private image is not smaller than that ofthe image fle. Otherwise, the image creation wil fail 4, You cannot deploy applications on ECSs in a manner similar to that on tradi Ame 8. false 5, An ECS must be stopped before being used to create a private image. A. true B. false 6, Which of the following services can distribute access traffic to each instance in an AS group? A. Cloud Eye 8. EB sis EP 7, Multiple ECSs can share the same key pair. A. true B. false 8, Which of the following is used by ECSs to set up a logically, fully isolated network? AAS 8. VPC . NAT Gateway D. ELB 9. A major diference between ECS and BMS is that multiple ECS users may share the same physical resources whereas the resources ofa BMS are exclusive to the BMS use. 9. tse 10. What should users do when the VCPUs and memory oftheir ECSs are insufficient to deal with the workload? A. Moaty te specification 8. Reinstal the OS. Attach ks D.Changetheas. 111, The HUAWEI CLOUD IoT platform leverages Huawei PaaS and laa cloud services in Al, big data, DevCloud, cloud communications, and s0.0n, 4 te 5. fase 12, Which of the following is not a component of FusionInsight? ‘A. MapReduce B. Openstack C. HDFS D. Yarn 13, To enable remote SSH access toa Linux ECS, which ofthe following ports must be added to an inbound security group rule? 414, When unsubscribing from a Direct Connect connection, you do not need to delete the virtual gateway and virtual interface associated with the connection, Ame 8. fae 15, IF PCs connected by a VPC peering connection have overlapping CIDR blocks, the peering connection can only enable communication between specific (non-overlapping) subnets inthe VPCs. If ubnets in the two VPCs of a VPC peering connection have overlapping CIDR blocks, the peering connection will not take effect. 8 te 16 Which of the following statements about a partner's connections is false? A. A partner can buy an operations connection, B. Apartner can create hosted connections for common users. C. An operations connection can be associated with multiple hosted connections. D. A partner does not need to use the administrator account when buying an operations connection. 17, To enable communication between two sites over the Intemet, you can deploy the IPsec VPN on the firewall a each ste ta protec intemal network access trafic between the two site. A tue 8 fae 18, Which of the folowing cloud services can be combined with ELB to protect applications against external atacks? A couse bas emo pas 19, Which of the following cloud services can be used to view real-time monitoring metrics of ELB? AcE 8, Cloud Eye cas 2 vec 20, Which ofthe following statements about VPN gateway bancvith is false? [A Te Bandwidth ofa VPN gntewoy i shored by a VPN connections created forthe VN gateway. 8. The total bandwith used by all VN connection create fora VPN gateway canbe gteate than the bandit ofthe VPN gateway tthe network afi used by VPN connections exceeds the VPN gotety bandwith, network congestion may occur and VPN ‘connections wll be ineruped ©, You can configu lai rlsin loud Ee te monitor bandh, 21, A Virtual Private Cloud (VPC) is a private and isolated virtual network on HUAWEI CLOUD. A true 8, false 22, CBR supports four types of backups: EVS disk backups, cloud server backups fle system backups and hybrid cloud backups. 2 fale 23, Like using hard cisks of treditional servers, users can attach an EVS disk toa cloud server perform operations such as formatting the disk and creating a filesystem, and permanently store data on the EVS disk 8 fe 24, CBR supports one-off backup and periodic backup. A true B. false 25, Which of the following services can be used to monitor performance metrics of SFS? A CCE 8, Cloud Eye CAS D. vec 2, Which ofthe following services can record VBS resource operations for further query, auelt, and backtrecking? Acs 8. Goud ye cas 2. 08s 27, Which of the following measures can be taken to resolve EVS disk capacity insufficiency? ‘A. Buying anew EVS disk and attac 9 it to the cloud server 8. Expanding the EVS disk capacity . Clearing the EVS disk space D, Setting the EVS disk to be a shared disk 28, InCBR a fll backups performed ony forthe fist Backup All subsequent backups ae incremental. An incremental backup backs up only the data that has changed since the last backup, which ceuces the time and space requied for bockup. 2. fae 23, When a backup policy sereated, EVS disks in which ofthe following states canbe associted with the backup policy? A alae 2 Waneened tor ©. Restoration fled 30. Which of the following about bucket operations in OBS is false? ‘A. Creating a bucket B. Formatting a bucket C. Modifying a bucket D. Deleting a bucket 31, Application security protects ECSs and applications running in ECSs by protecting the operating systems and applications. A tue 2. fae 32, Compared with Advanced Anti-DD0S, Anti-DDoS provides professional CC defense. A. true 8. false 33, Which of the following layers does Anti-DDoS provide protection for? A. Layers 1103 8. Layers 2to4 ©. Layers 3105 D. Layers 4 to7 b 34, A trace lit of CS records deta sbout creating, configuring, and deleting cloud service resources inclu accounts CIS atows you to store races ofthe lst () das. 35, Under normal circumstances, value-added service charges incurred by Cloud Eye are pretty low. You can dump "monitoring data files and send alarm notifications using Cloud Eye 8. fase 36, Cloud Eye is an open monitoring platform that monitors resources, generates alarms, and notifies users. A tne 8. false 37, Which ofthe following statements about CON is false? A. CDN san inetigont vita network bit on he existing Internet. 1. CON disttts content rom crign servers to nodes around the worlds that wer can access desired content frm nearby nodes, CON cannot shorten acces latency or speed up ste respons to improve site avalbilly . CON solves problams such aslow bandwidth, wfc spikes, and uneven dsubuton of nodes 38, Which of the following stores RDS DB instance backups and snapshots? A VPC 8. OBS c Ecs D. Cloud Eye 39, After an RDS DB instance is created, you can change its instance flavor (CPU and memory) a5 needed. A tre 8. false 40, As a HUAWEI CLOUD El service, what is Content Moderation used for? |. Identifying object and scone tas in images 8. Searching for images based on text or content r performing revere image search Checking text, image, and video content fr advertisements, pomoagraphy, terrorism, and sensitive political information 1. Converting characters in images into editable text 41, Which of the following statements about private images are true? A. System disk images can be created using an ECS. B. Data disk images can be created using OBS files, C. System disk images can be created using an external image file. D. Full-ECS images can be created using ECS backups. 42, Which of the following are included in an ECS? A. CPU B. Memory C. Operating system D. EVS disk 43, Which of the following are container orchestration tools? A. Docker Swarm B. Mesos C. Openshift D. Kubernetes 44, Which ofthe following parameters must be set when replicating an image from one region to another? A. Destination region 8, Destination AZ . Destination project D. IAM agency 45, Which of the following are storage types defined by applicable interface protocols? A. Block storage 8. File storage ©. Object storage D. Data storage 46. Which of the following does the HUAWEI CLOUD VPN service consist of? A. VPN goteway B. VPN connection c. vec D. Subnet 47. Which of the following parameters can be modified when you modify a VPN connection? A. VPN connection name B, Remote gateway €. Local subnet D. Remote subnet 48, Which of the following can be used to connect VPCs in different regions? A. VPC Peering B. Direct Connect C. Cloud Connect D. VPN 49, Which of the following CIDR blocks are supported by HUAWEI CLOUD VPC? A. 192.168.0.0/16 B. 172.16.0.0/12 Cc. 10.0.0.0/8 D. 100.64.0.0/24 50. Which of the following are advantages of the VPC service? A. Security isolation B. Flexible deployment CC. Dynamic BGP D. Hybrid cloud support 51, When using OBS, which of the following can be implemented by configuring a lifecycle rule? A. Periodically deleting objects from a bucket 8, Deleting buckets C. Transitioning periodically between object storage classes . Defragmentation 52. Which of the following are monitoring metrics of OBS? A. GET requests B. PUT requests C. Download traffic D. Upload traffic 53, Which of the following are application scenarios of OBS? A. Video surveillance B. Video on demand C. Backup and archiving D. Web disk 54, Which of the following are application scenarios of WAF? A. Web tamper protection B. Protection for online flash sales C. Protection against zero-day vulnerabilities D. One-click detection of latest CVE vulnerabilities 55, Which of the following databases can be protected by DBSS? A. Self-built databases on ECSs B. Self-built databases on BMSs C. RDS databases D. Databases deployed in customers’ on-premises equipment rooms 56, Which of the following means can be used to subscribe to CTS traces? A. Email B. Telephone C. SMS message D. WeChat 57, Which of the following are the fields required for integrity verification in CTS? A. time B. service_type resource type D. trace name 58, Which of the following are acceleration scenarios supported by HUAWEI CLOUD CDN? A. Website acceleration 8. Download acceleration ©. VOD acceleration . Whole site acceleration 59, Which of the following are key performance metrics of RDS? A. Buffer pool usage B. QPS C. TPS D. Number of database connections 60, Among HUAWEI CLOUD El services, which of the following are visual services? A. Face Recognition B. Image Recognition C. Content Moderation D. ImageSearch

You might also like