New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Huawei > HCIA-Cloud Computing > H13-511_V5.5

H13-511_V5.5 HCIA-Cloud Computing V5.5 Exam Question and Answers

Question # 4

Which of the following statements about the differences between a domain and an OU are true?

A.

Users can log in to a domain but not to an OU.

B.

Group policies can be configured for both OUs and domains.

C.

An OU can exist in a domain, and a domain can also exist in an OU.

D.

Both OUs and domains can contain AD objects.

Full Access
Question # 5

On FusionAccess, modifying or deleting a full copy template will affect the virtual machines created using the template.

A.

TRUE

B.

FALSE

Full Access
Question # 6

Which of the following statements about HDP display technology is false?

A.

It applies lossless compression to non-natural images.

B.

It only supports Huawei-developed image compression algorithms.

C.

It compresses natural images such as photos at an appropriate rate.

D.

It automatically identifies text and non-natural images such as Windows frames and lines within images.

Full Access
Question # 7

A router manages path information by managing its___

Full Access
Question # 8

Which of the following statements aretrueabout the features and functions of the FusionCompute virtualization suite?

A.

Allowing users to add or reduce VM resources on demand without interrupting applications.

B.

Supporting x86- or Arm-based servers, various storage devices, and mainstream Linux/Windows operating systems, thereby allowing mainstream applications to run on virtualization platforms.

C.

Allowing users to define service level agreement (SLA) policies to control VM resources, thereby allocating physical resources based on application priority.

D.

Automatically migrating workloads based on preset policies, thereby optimizing resource allocation, system response efficiency, and user experience.

Full Access
Question # 9

Match the emerging technologies with their respective features or application scenarios

Full Access
Question # 10

Which of the following statements is false about centralized storage and distributed storage?

A.

Distributed storage stores data on multiple independent devices. During data reading, data is read from these devices at the same time, affecting read efficiency.

B.

Centralized storage has a simple deployment structure. It can leverage the redundant array of independent disks (RAID) technology to ensure data security and reliability.

C.

In terms of technical architectures, centralized storage can be classified into network attached storage (NAS) and storage area network (SAN). SANs are further divided into Fibre Channel storage area networks (FC SANs) and IP storage area networks (IP SANs).

D.

Distributed storage adopts a scalable system architecture and enables multiple storage servers to share the storage load, improving scalability, reliability, availability, and access efficiency.

Full Access
Question # 11

Which of the following statements istrueabout the FusionCompute storage architecture?

A.

Physical storage media that deliver storage space for virtualization are called storage devices.

B.

LUNs allocated by Huawei Distributed Storage can be encapsulated as datastores.

C.

After storage resources are converted to datastores and associated with hosts, virtual disks can be created for VMs.

D.

FusionCompute uniformly encapsulates storage units of storage resources into datastores.

Full Access
Question # 12

Which of the following statements aboutservice adjustmentin FusionAccess aretrue?

A.

A computer whose assignment type isAssign a Computer to Multiple UsersorAssign Computers to a Desktop Groupcannot be assigned again after being unassigned.

B.

If a computer whose assignment type isAssign a Computer to a Useris unassigned and then assigned again, the computer automatically starts. After the virtual desktop icon on the WI turns on, wait about three minutes and then log in.

C.

If a computer whose assignment type isAssign a Computer to a Useris unassigned and then assigned again, the computer can only be assigned to the original user and cannot be assigned to other users.

D.

A computer whose assignment type isAssign a Computer to a Useris automatically shut down after being unassigned.

Full Access
Question # 13

FusionCompute integrates physical CPU and memory resources on hosts into a compute resource pool and divides the resources into virtual CPU and memory resources for VMs. The compute resources actually used by a VM cannot exceed the specifications of the hardware resources on the host because the CPU and memory resources used by the VM must be provided by the same host. If this host malfunctions, the system automatically assigns another host to the VM to provide compute resources.

A.

TRUE

B.

FALSE

Full Access
Question # 14

The following table lists the FusionAccess environment plan. Which of the following network segments is the most suitable for deploying FusionAccess Linux infrastructure VMs?

A.

192.168.108.0/22

B.

192.168.10.0/24

C.

192.168.30.0/24

D.

192.168.20.0/24

Full Access
Question # 15

FusionAccess can use a provisioned full copy VM as a full copy VM template. Place the following operations in the correct order.

Full Access
Question # 16

Which of the following statements is false about virtualized storage?

A.

LUNs allocated by Huawei Distributed Block Storage can be encapsulated as data stores.

B.

Storage virtualization abstracts storage devices to a data store so that each VM can be stored as a group of files in a directory on the data store.

C.

A data store is a logical repository that is similar to a file system. It combines storage devices of different types and provides a unified model to store VM files.

D.

Storage virtualization greatly improves storage resource utilization.

Full Access
Question # 17

In FusionCompute, which of the following statements are false about security groups?

A.

Similar to firewalls, security groups use iptables to filter packets for access control.

B.

A running VM can be added to a security group.

C.

If VM A is added to security group B, it cannot be added to other security groups.

D.

Users can create security groups on VMs and add security group rules.

Full Access
Question # 18

On FusionAccess software deployment, if multiple FusionAccess systems share a License, the License component should be deployed independently.

A.

TRUE

B.

FALSE

Full Access
Question # 19

TAP is a virtual network device independently maintained in Linux.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Match the following service models for cloud computing with their descriptions.

Full Access
Question # 21

Which of the following statements isfalseabout High Availability (HA) in Huawei FusionCompute?

A.

Administrators can set different HA policies for VMs based on their importance.

B.

When data is stored in shared storage, if a VM is faulty, no data will be lost.

C.

This function enables a VM to reboot if the VM encounters a failure.

D.

The system periodically detects VM status. If a VM fault caused by a CNA host failure is detected, the system automatically migrates the VM to another CNA host in the same cluster and restarts the VM, thereby quickly restoring VM services.

Full Access
Question # 22

Cloud-native technologies enable organizations to build and run scalable applications in public, private, or hybrid cloud environments. Which of the following isnota representative cloud-native technology?

A.

Service mesh

B.

Virtualization

C.

Microservice

D.

Container

Full Access
Question # 23

Which of the following are functions of FusionCompute?

A.

Datastores support file system formats VIMS, NFS, and EXT4.

B.

Users can expand or reduce the memory capacity for online or offline VMs as needed.

C.

Storage live migration is to migrate data within a storage device or between different storage devices.

D.

VM live migration only allows VMs to migrate among hosts that share the same storage.

Full Access
Question # 24

After installing infrastructure VMs, you must configure the virtualized environment and vAG/vLB so that FusionAccess can work properly. Which of the following statements aboutFusionAccess initializationaretrue?

A.

After interconnection with a Windows AD domain is configured for authentication and authorization and the local domain is not enabled, the priority of the default LiteAS authentication and authorization is lower than that of the interconnected Windows AD domain.

B.

When the vAG and vLB are used as the gateway and load balancer, related parameters of a WI cluster must be configured on FusionAccess.

C.

If the CNA node or storage device where the backup server resides is faulty, backup data may be lost. Therefore, a third-party FTP backup server is preferred on the live network.

D.

When configuring the License on FusionAccess and the License supports both per-desktop and per-user modes, you must selectUser CountorConcurrent User Count.

Full Access
Question # 25

On FusionAccess policy management, match the following scenarios with their operations

Full Access
Question # 26

When FusionAccess is running properly, you are advised to restart infrastructure VMs once every quarter during off-peak hours. You can run the reboot command to restart Linux infrastructure VMs at the same time.

A.

TRUE

B.

FALSE

Full Access
Question # 27

Which of the following statements about Huawei FusionAccess isfalse?

A.

FusionAccess allows users to access personal desktops through thin clients (TCs), software clients (SCs), and Android/iOS mobile terminals, supporting hybrid office scenarios.

B.

FusionAccess uses the open-source Huawei Desktop Protocol (HDP) and supports 4K HD display.

C.

FusionAccess (cloud desktop) is a mature cloud computing application.

D.

FusionAccess supports the x86 + Kunpeng dual-stack architecture.

Full Access
Question # 28

Match the following virtualization technologies with their descriptions.

Full Access
Question # 29

Which of the following statements isfalseabout the development of cloud computing architecture?

A.

In terms of cloud platforms and cloud management software, it has evolved from closed-source and closed architecture to open-source and open architecture.

B.

It has evolved from non-critical IT applications to critical enterprise applications.

C.

It has evolved from unstructured or semi-structured data to structured data.

D.

It has evolved from small-scale resource virtualization and integration to large-scale resource pool construction.

Full Access
Question # 30

There are two types of virtual switches. FusionCompute uses ___, which can be distributed on different physical hosts and configured in a unified manner using the virtualization management tool. (Enter the abbreviation.)

Full Access
Question # 31

When deploying vLB, you can usually deploy vAG and vLB on the same VM, but you cannot deploy vLB and WI on the same VM.

A.

TRUE

B.

FALSE

Full Access
Question # 32

FusionAccess provides three protection mechanisms and 11 key measures to prevent data from being stored locally and make behaviors traceable and processes auditable, enhancing

end-to-end security. Match the key measures with the following protection mechanisms.

Full Access
Question # 33

Hypervisor is the key to virtualize compute resources.7Which of the following is also called a hypervisor?

A.

VPM

B.

VRM

C.

VNM

D.

VMM

Full Access
Question # 34

Which of the following statements is false about concepts of virtualization?

A.

A guest OS is the OS running on a virtual machine (VM).

B.

A host machine is a physical machine.

C.

A host OS is the virtualization software layer.

D.

A guest machine is a VM.

Full Access