You are on page 1of 45

HCNA Cloud вопросы/ответы

Question/answers Huawei HCNA Cloud BCCP H13-511 из разных источников


(mock, вопросы honorcup, с обучения Huawei, лекций на git и из разных мест в
интернете – например, отсюда и отсюда) единым списком для удобства
подготовки. Это не dumps, а те дампы, которые есть, они не имеют отношения
к текущему HCNA Cloud – то что я видел вообще были для старого Storage.

Теорию можно посмотреть тут и тут. Есть так же хороший конспект на git.

Cloud computing is just a technique.

What stages does the evolution of cloud computing have? (Select 3 Answers)

A. parallel computing
B. distributed computing
C. serial computing
D. cloud computing

ABD

What are the value of cloud computing? (Select 3 Answers)

A. resource exclusive , efficient performance


B. automatic scheduling, energy conservation and emissions reduction
C. cooling denoising, green office
D. efficient maintenance, reduce the cost

BCD

What elements promote cloud compunting? (Three answer)


A. Maximizes the reuse of existing resources to reduce operating expenditure
B. Are absorbing an increasing number of subscribers
C. Cloud computing standards develop rapidly and integration of IT and CT
technologies requires IT infrastructure upgrades
D. Hardware Computing upgrades every time

ABC

Cloud computing is a style of computing in which dynamically scalable and often


virtualized resources are provided as a service over the Internet (True or False)

How the evolution of cloud computing is?

A. Cloud Computing -> Parallel computing -> Distributed Computing -> Grid
computing
B. Parallel computing -> Grid computing -> Distributed Computing ->Cloud
Computing
C. Parallel computing -> Distributed Computing -> Grid computing -> Cloud
Computing
D. Cloud Computing -> Grid computing-> Parallel computing -> Distributed
Computing

Cloud computing mainly refers to computing, little relationship with storage areas.

What is the core technology of cloud computing ?

A. A. Virtualization
B. B. High performance hardware
C. C. Data center management and control software
D. D. Integration Consulting and Delivery

A
Computing tasks assigned to multiple independent machines in the network, the
calculation mode refers to?
A. parallel computing
B. distributed computing
C. grid computing
D. cloud computing

Internet company’s data are generally structured data.

The company set up a cloud computing service platform. It provides virtual machine
resource to make the users in need to purchase and use. Which cloud compute
deployment model does this company belong to?

A. Public Cloud
B. Private Cloud
C. government Cloud
D. Hybrid Cloud

An enterprise is a traditional Internet data center services provider, have self-built


data center. When the company considers restructuring towards cloud computing
industry, which of the following cloud computing business model is the most likely
choice?

A. IaaS
B. PaaS
C. SaaS
D. DaaS

From a business perspective, which of the following is similar with cloud


computing?

A. gas stations
B. water pipe
C. Plant Information
D. Reservoir

What factors jointly promote the result of the generation of Cloud computing ?
(Select 3 Answers)

A. demand-driven
B. technical progress
C. business model transformation
D. transformation of the mode of thinking

ABC

Intranet Chinese name is the Internet, also known as the Internet , it is by using the
common language of mutual communication computer connection network around
the world.

Cloud Computing, over the Internet provides shared software and hardware
resources as well as data information on demand to computers and other devices
(True or False)

Cloud computing is a style of computing in which isn’t dynamically scalable but it


often virtualized resources are provided as a service over Internet (True or False)

What could be the key characteristics of cloud computing? (two Answer)

A. On-demand self-service
B. Location dependent resource pooling
C. Pay per use
D. Slightly elastic
AC

Which of this statements are true? (Three answers)

A. Dedicated mainframes, minicomputers, and high-end servers are replaced by


massive inexpensive servers.
B. Standalone operating systems (OSs) are replaced by distributed software
C. Multiples store area network is replaced by newest storage system
D. Centralized management is replaced by automated control software

ABD

The CORE of cloud computing is…

A. Cloud service platform software


B. Cloud application platform software
C. Cloud servers and storage platform software
D. Cloud platform software

Under Cloud era, software, hardware, and services are not provided over the
Internet, because the users will access services using a web browser or a
Lightweight terminal, every day and every time. (True or False)

What are the different methods deployment for Cloud Computing? (three answers)

A. Private Cloud
B. Hybrid Cloud
C. Public Cloud
D. Mixed Cloud

ABC

Provides applications running, development environments and application


development component such as databases, emails, and messages.
A. IaaS
B. PaaS
C. SaaS
D. MaaS

The technologie Huawei FusionSphere is based on…

A. Hosted virtualization
B. Os-level virtualization
C. Bare-metal virtualization
D. Hybrid virtualization

Some advantages from Bare-metal are: (choose two answers)

A. Wide compatibility with OS and applicatios


B. Easy to implement
C. High performance due to no redundancy
D. OS independent VMs

AD

The Hypervisor uses one of kind of memory to release the free memory space of
lighter-loaded VMs to those VMS that heavier load. In this way de memory utilization
is increased. What kind of memory we talk about?

A. Memory Ballooning
B. Memory Sharing
C. Copy on write
D. Memory swapping

How are based on the resource priorities of QoS in a Internet Data Center leasing?

A. Based on the importance sequence of an enterprise


B. Based on the importance sequence of customers
C. Base on the carrier´s internal applicacions

Does “the Huawei cloud management expert system” permit unified hardware and
software management? (true or false)

Which of the following statements are correct? (Two Answers)

A. Hypervisor allows you to group VMs from different departments into different
VLANs
B. Hypervisor allows you to configure VLANs for connection route point to point
C. Hypervisor allows you to group VMs from any geographical location and any dry
switches
D. Hypervisor allows you to configure VLANs for distributed virtual switches (DVSs)
and use port groups to configure VM VLANs.

AD

The Active Directory is a sophisticated service component of a Windows Server. It


processes network objects, including users, groups, computers, network domain
controllers, emails, organizational units, and trees in organizations. (true or false)

An AD structure is an arrangement of object information (true or false)

These are functions about AD? (Three answers)

A. Virtual desktop, virtual storage, virtual hardware, LUNs and host


B. Basic network services like DNS, WINS, DHCP and certificate services
C. Server and client computer management, user service, printers and file sharing
services
D. Desktop configuration and application system support , like email, office
automation, antivirus systems, etc.
BCD

The AD network domain organizes the following basic objects into a tree structure:
(two answers)

A. Domain controllers, computers and users


B. Foreign domain groups
C. Organizational Units and Built in account groups
D. Fixed virtual storages domain

AC

AD directory tree form a doman directory tree in this order:

A. Child domain and parent domain


B. tree domain group and tree domain parent
C. tree domain parent and tree domain group
D. Parent domain, child domain

In AD, the root domain and other domain trees in a forest are linked through a
transitive trust hierarchy  (true or false)

How the order the process into AD desktop application is?

A. The user logs in to the desktop using the username in the domain, the Desktop
Delivery Controller request the AD server to authenticate user information, the
user VM synchronizes domain information with the domain controller.
B. The user VM synchronizes domain information with the domain controller, the
user logs in to the desktop using the username in the domain, the Desktop
Delivery Controller request the AD server to authenticate user information.
C. The Desktop Delivery Controller request the AD server to authenticate user
information, the user logs in to the desktop using the username in the domain,
the user VM synchronizes domain information with the domain controller.

A
What are the statement correct about DHCP? (Two answers)

A. The discovery mechanism select the IP address for the VM


B. The confirmation mechanism obtain the valid status form for seek a new IP
address for DHCP clients
C. One DHCP application is assign IP addresses on one network segment and other
is, assign IP addresses across multiple network segments
D. The VM can automatically obtain an IP address from the configured subnet using
the DHCP service of the VRM in FusionSphere.

CD

Which network equipment is a distributed database supporting the translation


between domain names and IP addresses?

A. DHCP
B. DNS
C. AD
D. VLAN

Typical DNS application (Three answers)

A. The domain names of the LB and DDC are registered in the DNS
B. The users accesses the desktop using the LB domain name
C. The VM regularly registers with the DDC using the DDC domain name
D. The DNS client configuring the DNS interface in the main port

ABC

A virtual machine (VM) is a software computer that functions like a physical


computer, running an operating system (OS) and applications.  A VM runs on a host,
obtains CPUs, memory, GPU, USB devices, and other resources on the host, and uses
network connection and storage access capabilities of the host. Multiple VMs can run
concurrently on one host. (True or False)

What are the correct? (Three answers)


A. The VM creation location can be a host or a cluster.
B. After a VM is created, you can migrate it to another host
C. After you created a VM, you can not change the its attribute
D. After a VM is created, you can perform operations to adjust its specifications and
peripherals, such as adding network interface cards (NICs), mounting CD/DVD-
ROM drivers, attaching disks, GPU, and USB devices.

ABD

A VM template is a copy of a VM, containing an OS, applications, and VM


specification configurations. It is used to create VMs that have OSs installed.
Compared with creating bare VMs, creating VMs using a template reduces much
time. (true or false)

A VM template could to consist of (three answers)

A. one OVA file


B. one OVM file
C. or one OVF file
D. and multiple VHD files.

ACD

Each virtual network interface card (NIC) has an IP address and a MAC address. It
has the same functions as a physical NIC on a network. FusionCompute supports
intelligent NICs (iNICs),

FusionCompute supports intelligent NICs (iNICs) which use (two answers)

A. engine NIC corrector


B. memory random NIC
C. multiple queues, virtual swapping
D. quality of service (QoS), and uplink aggregation to improve NIC I/O performance.

 CD
Each host connects to a distributed virtual switch (DVS), which functions as a
physical switch. The DVS connects to VMs through a virtual port in the downstream
direction and to the host NIC in the upstream direction. The DVS implements
network communication between hosts and VMs. In addition, the DVS ensures
unchanged network configuration for VMs when the VMs are migrated across hosts.
(true or false)

Server virtualization enables physical server resources to be converted to logical


resources. With virtualization technology, a server can be divided into multiple
virtual computing resources that are isolated with each other. CPU, memory, disks,
and I/O resources become pooled resources that are dynamically managed. (true or
false)

Server virtualization characteristics are: (three answers)

A. Increases resource utilization rate.


B. Simplifies system management
C. Implements server integration.
D. Reduce efficiency

ABC

One VM support a maximum of 64 vCPUs. (true or false)

Today, One VM support more than of 1 TB virtual memory. (true or false)

Server virtualization involves the following features (Three answers)

A. Bare metal architecture


B. Floppy disk pass-through
C. CPU and Memory virtualization
D. GPU, iNIC, and USB pass-through
 

ACD

Storage virtualization enables a storage device to be converted to a logical data store.


A VM is stored as a set of files in a directory on a data store. A data store is a logical
repository that is similar to a file system. It can combine storage devices of different
types and provide a unified model to store VM files. The storage virtualization
technology helps the system manage virtual infrastructure storage resources with
high resource utilization and flexibility.  (true or false)

Huawei data stores support the following file system formats:

A. Virtual image management system (VIMS)


B. MKDF
C. Network file system (NFS)
D. EXT4

ACD

Snapshots of a VM record… (three answers)

A. cache data
B. the disk data
C. memory data
D. configuration data

BCD

What is the virtualization? (two answers)

A. Convert logical resources into resources physical


B. Convert physical resources into logical resources
C. Add a virtualization layer on the system to virtualized its underlying resources
D. Adds y recovery logical devices to physical devices

BC
Some benefits of Virtualization could be… (Three answers)

A. Improved hardware utilization and OS desacouple from hardware


B. Reduce carbon footprints
C. Reduce IOPS between hardware and software
D. Efficient IT operation, maintenance and lower labor cost

ABD

In Principle of de Virtualization, what define it: Multiple VMs can run on the same
physical server?

A. Zoning
B. Isolation
C. Encapsulation
D. Hardware-independence

Virtual Machine Monitor is refered to…

A. Host Machine Monitoring


B. Guest Machine Monitoring
C. Reduce Machine Monitoring
D. Hypervisor

Which of the virtualization patterns is the major trend?

A. Hosted Virtualization
B. Bare-metal Virtualization
C. OS-level virtualization
D. Hybrid Virtualization

Types of computing virtualization (Three answers)

A. CPU Virtualization
B. Memory Virtualization
C. I/O Device Virtualization
D. Monitor Virtualization

ABC

Multiple VMs share the same physical device, such as a disk or network adapter.
Those I/O devices are multiplexed using time-division technology. This technology is
called as

A. I/O CPU
B. I/O Memory
C. I/O Storage
D. I/O device

Into Virtual CPU. VMs share the same Memory addresses (true or false)

The typical virtualization approaches are privilege deprivileging and trap-and-


emulation. Specifically, guest OSs run at a non-privileged level deprivileging)
whereas the Virtual Machine Monitor (VMM) runs at the highest privilege level (full
control of system resources). After guest OSs are de-privileged, most of their
instructions can still be executed on hardware. Only the privileged instructions are
trapped and emulated by the VMM. (True or False)

The key point of memory virtualization lies in introducing a new layer of address
space, that is, the physical address space of clients. Clients think that they run in the
actual physical address space; however, they access physical addresses through the
VMM in fact. The VMM saves the mapping table that records relationships between
clients’ address spaces and physical machines’ address spaces.

T
An x86 processor has four priorities in protected mode, Ring 0, Ring 1, Ring 2, and
Ring 3. The priority of each Ring is subject to the performed function. Ring 0 is used
for the OS kernel and has the highest priority. Ring 1 and Ring 2 are used for OS
services and have lower priorities. Ring 3 is used for applications and has the lowest
priority.

I/O virtualization needs to resolve the following two problems:

A. Device discovery: Controls the devices accessible to VMs.


B. Reuse the memory: Many VM request great amount the memory
C. Access interception: Processes devices’ access requests through I/O ports.
D. Try and try CPU resources: Many VM request great amount the CPU instructions

AC

In the I/O virtualization, How to discover a device? (Three answers)

A. The front-end OS for the device is loaded.


B. The device information about all VMs is saved on the XenStore of Domain0.
C. The XenBus (a paravirtualizaton driver designed for Xen) on VMs communicates
with the XenStore of Domain0 to obtain device information.
D. The front-end driver for the device is loaded.

BCD

In I/O virtualization, How to intercept device data? (two answers)

A. The front-end device driver forwards data completely to the back-end driver
through the interfaces provided by the VMM.
B. The back-end driver processes VM data on a time and channel basis.
C. The front-end device driver forwards I/O instructions to core cpu
D. The back-end driver processes data host

AB

VT-x refers to the VT technology adopted by Xeon processors and VT-I refers to the
VT technology adopted by Itanium processors. (True or false)
T

VT-d: VT for Direct I/O, which is applied on chip sets. It allows VMs to directly access
I/O devices to relieve the loads of the VMM and CPU. (True or false)

VT-c: VT for Connectivity, which is mainly applied on network adapters. It includes


two core technologies: VMDq and VMDc. (True or false)

Storage device virtualization leverages storage devices’ capabilities to maintain


volumes. With this type of virtualization, storage devices can offer some advanced
storage functions such as … (Three answer)

A. thin provisioning,
B. lun copy
C. snapshot
D. linked clone

ACD

“Host storage virtualization + File system” allows hosts to manage VM disk files
through file systems. This type of virtualization allows the virtualization layer to
provide advanced services that are independent of storage devices. (True or false)

Currently, storage device virtualization applies ….. and provides a small number of
advanced functions. (Two answers)

A. Huawei Advanced SAN


B. FusionStorage
C. FusionCPU
D. Huawei Advanced NAS

AB
“Host Storage Virtualization + File System” allows hosts to manage VM disk files
through file systems. This type of virtualization allows the virtualization layer to
provide advanced services. Currently, this type of virtualization is widely
applied. (True or false)

A cloud computing data center don’t allows dynamic migration of VMs, which is easy
in traditional data centers. (True or false)

Distributed virtual switching implement… one u other switches, What are they?
(Two answers)

A. vSwitches
B. eSwithes
C. Traditional Switches
D. Physical Switches

AB

Virtualization improves resource utilization: 6 cores are functionally equivalent to 7


cores and 8 GB functionally equivalent to 10 GB (True or false)

Virtual hardware correspond to physical hardware in a one-to-one mapping.


Virtualization technologies can virtualize one physical device into one virtual
device. (True or false)

What is the Huawei Cloud Computing Solution name?

A. FusionStack
B. FusionSphere
C. FusionCloud
D. FusionCompute
C

FusionAccess provides a customer experience oriented “any devices ” + “any


networks ” + “any applications” solution seamless visit to cloud (True or false)

———————-

What main terms best describe cloud computing?

Cloud
Parallel processing
Virtualization (storage, compute)
Dynamic and expandable
Reliable

Name four reasons why a company could consider using a cloud computing
solution?

improved hw utilization
lower labor cost
lower energy cost
OS and app hw independent

What is compute virtualization?

Когда один CPU делится несколькими машинами


Когда несколько машин выполняют совместные вычисления

Which of the following are the deployment models of cloud computing?

a. Private cloud
b. Public cloud
c. Hybrid cloud
d. Desktop cloud
ABC

Which of the following is not the deployment mode of cloud computing?


A.Public cloud
B.Private cloud
C.Hybrid cloud
D.E-Government cloud

Which of the following are the business models of cloud computing?

a. IaaS
b. PaaS
c. SaaS
d. DaaS

ABCD

Which of the following does not belong to business models of cloud computing?
A.IaaS
B.MaaS
C.SaaS
D.PaaS

Which of the following models of cloud computing can be described as: the cloud
provider arranges the installation, configuration and updating of all operting
systems and applications a user remotely connects to.

a. IaaS
b. PaaS
c. SaaS
d. DaaS

C
Which of the following are the benefits of cloud datacenters?
A.Distributed computing and storage improve reliability.
B.Virtualization technology improves resource utilization.
C.Mainframe servers improve performance.
D.Unified resource management improves efficiency.

ABD

Statement 1: A category of the deployment of cloud computing is the division of a big


physical machine into small virtual machines.
Statement 2: A category of the deployment of cloud computing is the aggregation of
smaller physical machines into a big physical machine.
A.Statement 1 and 2 are true.
B.Statement 1 is true; Statement 2 is false.
C.Statement 1 is false; Statement 2 is true.
D.Statement 1 and 2 are false.

Which of the following are false about cloud computing?


A.Cloud computing is dynamically scalable.
B.End users of cloud computing need to know how the cloud operates.
C.Cloud computing can provides virtual disk space.
D.Cloud computing should only be considered in very specific situations.

BD

The Huawei FusionCube solution provides such functions as computing, storage and


network (T/F).

Как называется ПО устанавливаемое на все хосты сайта при развертывании


облачной ОС FusionCompute.

Computing Node Agent (CNA)

Облачная ОС FusionCompute использует в своей работе базу данных. Для


сценария масштабного развертывания среды облачных вычислений
применяется БД Oracle, а для средних и небольших – именно эта база данных.
Gauss database

В чем заключается Northbound функции FusionManager.

По сути это API для вышестоящих сервисов, а Southbound - куда


подключаются управляемые устройства/VM платформы.
Северный интерфейс (англ. Northbound interface, сокр. NBI) — в
программировании это программный интерфейс, с помощью которого
приложение представляет низкоуровневые детали вышестоящему в
архитектуре системы приложению. Северный интерфейс обычно рисуют
наверху архитектурной схемы.

Fingerprint может использоваться для авторизации в приложениях.

T, только требует установки ПО по работе с отпечатком в ОС VDI.

CD-ROM host machine доступен для VM.

Виртуализация приближает OS к Hardware и повышает производительность.

Storage Virtualization может реализовываться на базе IP SAN/FC SAN/NAS/Local


Storage.

Из трех типов виртуализации только Storage Device Virtualization позволяет


реализовать продвинутые фичи типа thing provisioning, snapsot, linked clone и
не может работать на двух оставшихся типах Raw Device+Logical Volume или
Host Storage Virtualization+File System.

F, весь расширенный функционал который поддерживает Storage Device


Virtualization поддерживает и Host Storage Virtualization+File System и
даже больше

vGPU функционал поддерживает любой hardware GPU


F, только Nvidia grid K1/K2, которые могут на себе создавать vGPU.
которые биндятся к VM. Причем даже на них без поддержки HA.

FusionAccess is a virtual desktop control system developed by Huawei. It is mainly


used to create and provision virtual desktops.

Какой компонент FusionAccess не разворачивается с отказоустойчивостью


active-standby?

Loggeter

Все компоненты FusionAccess разворачиваются на VM.

Huawei FusionAccess allows users to log into VMs by using Android or iOS mobile
terminals.

The Huawei FusionCloud Desktop solution consists of FusionCompute,


FusionManager, and FusionAccess.

FusionManager can centrally manage VMware’s vCenter and Huawei’s


FusionCompute.

Linked clone VMs provide higher perormance than full copy VMs.

F (меньше времени создаются и меньше потребляют памяти,


производительность аналогичная full copy)
When deploying Huawei deskop cloud, users must use TCs to access the deskop
cloud.

Cloud compuing hardware devices include servers, storage devices, nework devices,
and client devices.

VRM nodes can be deployed on VMs or on physical servers.

VMs in a linked clone VM group share a system disk and feature quick creation and
easy software update.

VRM is the core management component of FusionCompute. It implements I service


orchestration, provisioning, and automatic management, as well as cascading
management.

When FusionAccess is deployed in branches, users in the branches cannot connect to


desktop cloud systems if networks between the branches and the headquarters are
interrupted.

When creating a VM template, you need to enable the Windows firewall.

Cloud computing is a type of computing technology based on Internet. Using this


technology, end users can provide shared hardware and software resources and
information for computers and other devices on demand.

FusionSphere does not support mainstream X86 servers or SAN storage devices.

Which way does FusionManager use to interact with FusionCompute?

A. FusionCompute Driver
B. FusionCompute SDK
C. FusionCompute API
D. FusionCompute SOAP

А.  Взаимодействия между FusionManager и FusionCompute со стороны


FusionManager осуществляется через driver для FusionCompute. Со стороны
через FusionCompute взаимодействие происходит через REST интерфейс,
который взаимодействует с драйвером. Помимо REST у FusionManager есть и
другие открытые интерфейсы - Java SDK (драйвер для взаимодействия с
VMware), SOAP, SNMP.

В каком компоненты FusionSphere находится функционал DHCP сервера

FusionSphere -> VSAM (DHCP, ACL, LB) - Virtual Service Appliance Management

За что отвечает AccessGateway

AG (Access Gateway) - удаленный доступ к DC (intranet из extranet) на базе


SSL VPN, типа VPN концентратора (авторизация, назначение прав, NAT)

Bare-metal virtualization delivers a high performance and supports multiple OSs. It


is a major virtualization trend.

Which of the following is not a FusionAccess component?

a. ITA
b. HDC
c. WI
d. VRM
D

Какой компонент требует обязательной установки перед установкой


FusionAccess

FusionCompute

Huawei FusionCloud solution has 3+1 major parts:

FusionSphere
FusionCube
FusionAccess
FusionInsight

Which of the following are Huawei cloud computing software modules?

A. FusionCompute
B. FusionManager
C. FusionAccess
D. FusionStorage

ABCD

Huawei cloud computing solution is called FusionCloud. It consists of three


solutions: Infrastructure Virtualization, Fusion Cube, and Desktop Cloud Solutions
(true or false)

What is Huawei cloud computing “hardware” architecture?

E6000/E9000, RH2288H

What is Huawei cloud computing software architecture?

FusionCompute
FusionManager
FusionStorage
How many cloud computing solutions are provide by Huawei?

1 FusionSphere
1.1 FusionCompute
1.1 FusionManager
2 FusionCube
3 FusionAccess
4 FusionInsight

Which type of desktop is suitable for cloud call center?

a. Full copy VM
b. Linked clone VM
c. Graphics Desktop
d. Security Desktop

How frequently should you restart a user VM?

a. Every 1 day
b. Every 1 week
c. Every 1 month
d. Every 3 months

Which desktop group type is supported by linked clone VMs?

a. Dynamic pool
b. Static pool
c. Both dynamic pool and static pool
d. Neither dynamic pool nor static pool

Which of the following functions is provided by the application layer protocol DNS?

a. Mapping from network device names to IP addresses


b. Mapping from network hardware addresses to IP addresses
c. Mapping from process addresses to IP addresses
d. Mapping from usernames to process addresses

Which of the following options must be enabled before VMs can be migrated among
hosts using CPUs of different generations?

a. DRS
b. DPM
c. IMC mode
d. HA

FusionManager can be installed in many ways. When FusionManager is deployed in


a VMware virtualization environment, which of the following installation mode is
recommended?

a. FusionManager installation using an ISO image.


b. FusionManager installation using a template.
c. Automatic PME installation.
d. FusionManager installation using either the ISO image or the template.

Which of the following protocols is developed by Huawei to solve the problems of


virtual desktops, such as poor experience, low compatibility, and difficulty in
management?

a. RDP
b. ICA
c. HDX
d. HDP

Which of the following can be counted as the base for the Huawei FusionCloud
solution?

a. FusionAccess
b. FusionSphere
c. FusionInsight
d. FusionCube

Which of the following statements about virtual or physical hardware are CORRECT?

a. Virtual hardware and physical hardware are in a one-to-one mapping


relationship.
b. The specification of virtual hardware CANNOT be adjusted flexibly.
c. Due to the use of new technology, the performance of virtual hardware is higher
than that of physical hardware.
d. Users can use virtual hardware just like physical hardware.

What is the most distinct characteristic of virtualization antivirus function provided


by Huawei cloud platform compared with the traditional antivirus software?

a. Centralized management and control


b. No need to install antivirus software on the user VM
c. High efficiency of virus scanning and removing
d. Supporting multiple OSs

Which of the following is NOT the benefit that virtualization brings?

a. Improving hardware usage


b. Reducing energy consumption
c. Improving server performance
d. Decoupling the OS and hardware

What does FusionStorage mainly provide in the deployment of Huawei desktop


cloud FusionCube?
a. FusionStorage provides infrastructure virtualization. Centered on computing
virtualization, storage virtualization, and network virtualization, It assembles
heterogeneous hardware resources as a resource pool and provides resource
scheduling and service assurance in the resource pool.
b. FusionStorage provides cloud management function. It provides infrastructure
resource distribution, inter-cluster resource scheduling, application distribution,
and application scaling for external devices in a unified manner.
c. FusionStorage provides high-performance distributed storage. By assembling
service disks as a resource pool and storing data on multiple nodes in a
redundant manner, FusionStorage implements a large number of concurrent IO
accesses.
d. FusionStorage provides unified discovery, automatic configuration, and fault
monitoring for hardware devices.

Which of the following items is a full copy in common snapshot technology


classifications?

a. CoW
b. RoW
c. Mirror splitting
d. WA

During physical network device configuration, which of the following is used to


isolate different network planes?

a. Port
b. IP address
c. MAC address
d. VLAN

If FusionCompute is installed on Huawei servers, you must know the BMC system IP
address and host management network port IP address. Which of the following
descriptions of the IP addresses is CORRECT?

a. They are the same IP address.


b. The BMC system IP address is to add CNA nodes to the FusionCompute system.
c. The host management port IP address is used to remotely install operating
systems on physical hosts.
d. The BMC system IP address can be added to the FusionCompute system to
facilitate automatic host power-on and power-off.

ebackup is a backup management software of Huawei FusionSphere. Which level of


backup is it used for?

a. Storage level
b. Host level
c. VM level
d. OS level

Which of the following components is an optional component for FusionAccess?

a. SVN
b. HDC
c. ITA
d. WI

Which of the following virtual disk types is used by FusionCompute VMs with the
thin-provisioning configuration?

a. Dynamic disk
b. Fixed disk
c. Differential disk
d. HA

In the Huawei FusionSphere solution, if HA needs to be triggered to migrate VMs to


other servers in the event of a server failure, which of the following conditions is not
mandatory?
a. The hosts must be in the same cluster.
b. HA has been enabled for the cluster accommodating the host.
c. The hosts are connected with the same shared data store.
d. VMs that require the HA function use the same network IP address segment.

Each IT administrator in an enterprise manages 1500 devices and the fault response
is quick. Which of the following devices is most likely used?

a. Physical server
b. Virtual server
c. Virtual desktop PC
d. Physical PC

Which NUMA technology is supported by Huawei virtualization?

a. Host NUMA
b. Guest NUMA
c. Both host and guest NUMA.
d. Neither host nor guest NUMA.

Which of the following are components of FusionCompute?

a. UltraVR
b. Virtual Resource Management (VRM)
c. FusionManager
d. Computing Node Agent (CNA)

BD

Which of the following are cloud computing deployment modes?

a. Public cloud
b. Private cloud
c. E-Government Cloud
d. Hybrid cloud

ABD

Which of the following types of networks can be used by a VPC?

a. Direct network
b. Routed network
c. Internal network
d. Closed network

ABC

Huawei provides end-to-end cloud computing solutions covering hardware and


software. Which of the following hardware components is optional in the Huawei
cloud computing solutions?

a. Server
b. Load balancer
c. Firewall
d. TCs

BCD

Administrators in the FusionManager system can be granted the ServiceAdmin and


OperationAdmin roles. Which of the following descriptions of the two roles is
CORRECT?

a. The OperationAdmin role focuses on service operations.


b. The ServiceAdmin role focuses on resource pool construction, management and
maintenance.
c. The ServiceAdmin role focuses on service operations.
d. The OperationAdmin role focuses on resource pool construction, management
and maintenance.

CD

Which of the following features are provided by FusionCompute?

a. Raw Device Mapping (RDM)


b. VM HA
c. VPC
d. Remote CD/DVD-ROM Driver mounting

ABD (C нет т.к. это FusionManager)

Which of the following functions are based on Huawei Virtual Image Management
System (VIMS)?

a. Thin provisioning
b. VM snapshot
c. Storage migration
d. Linked cloning

ABCD

Which of the following aspects reflect that the virtualization technology of cloud
computing improves the resource usage?

a. VM resource adjustment
b. Memory overcommitment
c. Improving server usage
d. Automatic application deployment

ABC

Which of the following functions are supported by FusionSphere user management?

a. Creates a user.
b. Modifies a user.
c. Deletes a user.
d. Locks or unlocks a user.
e. Resets a user password.

ABCDE

Which of the following functions are supported by FusionManager?

a. Centralized management of heterogeneous virtualization platforms.


b. Centralized monitoring of heterogeneous hardware.
c. Secure network isolation.
d. Multi-tenant management.

ABCD

An user rents VMs from a cloud service provider for daily use and returns them
when traveling. Which of the following key characteristics of cloud computing does
this reflect?

a. On-demand self-service
b. Location-independent resource pool
c. Pay per use
d. Elasticity

What are the two factors in FusionAccess USB key authentication?

a. USB key hardware


b. Domain account
c. User fingerprint
d. PIN code

AD

Which of the following functions does the FusionAccess WI provide?

a. It provides a web login page for users.


b. It is used to balance web access loads.
c. It is a desktop access protocol gateway that isolates internal and external
networks and encrypts transmission.
d. It exchanges information with the HDA in the VM and collects information about
the VM operating status and access status reported by the HDA.

Which of the following descriptions of FusionCompute is INCORRECT?

a. FusionCompute is virtualization software of FusionSphere.


b. FusionCompute virtualizes x86 servers, storage devices, and network devices to
form elastic IT resource pools.
c. FusionCompute implements IT service orchestration and provisioning as well as
automatic deployment.
d. FusionCompute is the foundation for FusionSphere.

C (это задачи FusionManager)

Which of the following statements about the active directory (AD) is most accurate?

a. The AD serves as a database.


b. The AD is a database used to store user information.
c. The AD is a database used to store computer accounts.
d. The AD is a collection of user information, computer accounts, service
configurations, and other object information.

A desktop cloud is considered as a PC in a cloud, which of the following technologies


is its underlying core technology?

a. Distributed management
b. Desktop protocol
c. Virtualization
d. Mobile terminal

FusionSphere consists of multiple components. What is the logical position of


FusionCompute from the FusionSphere positioning?

a. Above FusionManager
b. Between FusionManager and physical devices
c. Above FusionAccess
d. FusionCompute consists of FusionManager and FusionAccess

Which of the following components belong to the E9000 server?


a. Management module
b. Compute node
c. PSU
d. Switch module

ABCD

Which hardware devices can FusionManager manage?

a. Storage devices
b. Servers
c. Switches
d. Firewalls
e. LBs (loadbalancers)

ABCDE

Which of the following descriptions of a VPC is INCORRECT?

a. A VPC provides an isolated network environment.


b. VPNs can be used in a VPC.
c. Security groups can be used in a VPC.
d. A VPC does not provide NAT services.

D  (provide many firewall functions, including firewall)

Which of the following statements is CORRECT about the virtual memory of VMs?

a. The VMM needs to save the mapping between physical memory address and
virtual memory address.
b. The use of virtual memory is the same as physical memory, which can be used
directly without conversion.
c. Physical memory can be divided into multiple memory blocks, and each VM is
assigned a single virtual memory block.
d. A virtual memory address maps to a physical memory address. When the
memory overcommitment technology is used, available virtual memory is less
than or equal to the physical memory.

A
Which benefits those cloud computing bring to enterprise IT?

a. Reusing resources, improving resource usage


b. Unified maintenance, cutting down maintenance costs
c. Fast and elastic, and flexible deployment
d. Central data management, enhancing information security

ABCD

Which of the following optional modules are included in Huawei FusionSphere


architecture?

a. FusionCompute
b. FusionStorage
c. FusionNetwork
d. FusionCloud

BC

What are the ways for implementing network virtualization?

a. eSwitch
b. vSwitch
c. Physical switch
d. Network router

ABC

Which are main components of FusionAccess?

a. AD, DHCP and DNS


b. LB and AG
c. HDC
d. WIN and ITA

ABCD

Which of the following software systems are mainly involved in the FusionCloud
deployment?
a. FusionCompute
b. FusionManager
c. FusionAccess
d. FusionSphere

ABC

When a company builds IT systems, using virtualization platform to make the


physical server abstractly being combined into multiple virtual servers to use, to
improve resource utilization and reduce enterprise investment costs. Which kind of
genre does the company’s use of cloud computing belong to?

A. big divided into small


B. gather small to big
C. virtualize one server to many servers
D. integrate many to one

The following about FusionManager basic concepts description, which is wrong?

A. Region is a region, such as the Asia-Pacific region


B. DC is data center concept, such as Beijing, Hong Kong, Tokyo Data Center
C. Zone is an independent two-story network area within data center
D. Cluster is data center virtualization network isolation boundary

Compared with RDP protocol, the desktop connection protocol that FusionAccess use
have the characteristics such as many peripherals supports and good multimedia
performance. But its occupied bandwidth is larger than RDP protocol.

A company’s cloud computing environment is constructed by themselves. And it


combines resources into virtual desktops to provide for employees to use. This usage
mode belongs to PaaS
F

Cloud service providers in a virtual machine install the operating system,


middleware and application software, and then provide this overall resource for the
users to use. This cloud computing business model belongs to SaaS.

When deploying FusionCompute, it is recommended to deploy the primary and


secondary VRM directly on the physical host, to improve the management node
performance.

F, рекомендуется на VM в режимах active/standby

Huawei cloud computing software can be deployed in advance on the specific


hardware. Software and hardware are combined to be one machine and sell to
customers. Which of the following Huawei servers support one machine deployment
mode? (Multiple choice)

A. E9000
B. RH5885
C. RH2288H
D. X8000

AC

Which of the following does not belong to FusionInsight architecture?

A. DataFarm
B. VRM
C. Hadoop
D. Manager

Desktop Cloud is also known as “cloud PC,” What is the underlying core technology?

A. Distributed Management Technology


B. Desktop Protocol technology
C. virtualization technology
D. mobile terminal technology

FusionCube uses an innovative architecture to solve the I/O performance bottlenecks


problem, what does the architecture refer to?

A. computing, networking and storage infrastructure integration architecture


B. linear expansion architecture
C. Integration of hardware and software architecture
D. Distributed Server SAN architecture

Which CPU virtualization technology is the future trend?

A. Full virtualization
B. Paravirtualization
C. sojourn virtualization
D. hardware-assisted virtualization

 Which of the following are the components of FusionCompute? (Multiple choice)

A. Ultra VR components
B. VRM components
C. FusionCompute components
D. CNA components

BD

When using the FusionCompute’s installation wizard to deploy VRM, you can
configure and manage VLAN and set the VLAN ID. If not checked, then which of the
following is the management VLAN that VRM uses by default?

A. Host Manage VLAN that belongs to network cards


B. VLAN 0
C. VLAN 1
D. randomly select VLAN

Huawei cloud computing solutions brands, including which of the following


solutions? (Multiple choice)

A. FusionSphere infrastructure virtualization


B. FusionServer Huawei server
C. FusionAccess cloud access management
D. FusionInsight Big Data Processing

ABD

FusionInsight does not support user rights management.

The following description about Huawei cloud computing solutions host CPU
configuration requirements, which is wrong?

A. Intel or AMD X86 architecture’s 32-bit, 64-bit CPU


B. CPU supports hardware virtualization technology
C. Turn on the CPU virtualization features in the BIOS
D. within the same cluster, computing nodes CPU models can be inconsistent

Cloud computing virtualization technology can improve the utilization of resources,


which of the followings are included? (Multiple choice)

A. virtual machine resources adjustment


B. reuse memory
C. to improve server utilization
D. Application automatic deployment

ABC

Which techology does VPC’s Layer-two security isolation use?


A. ULAN
B. Security Group
C. ACL
D. VPN

The second layer of the OSI reference model is the data link layer.

What are the benefits of VLAN division? (Select 3 Answers)

A. isolation broadcast domain, inhibit the broadcast message


B. separating the different users , improve network security
C. virtual workgroups , working method beyond the traditional network
D. Use a router on the network layer section will network isolation

ABC

Based on subnet division of VLAN , according to the subnet segments of access the
client to inspect.

A department office staff use the laptop computer, but the working place often
changes, which way is used suitable to configure VLAN ?

A. based on port division of VLAN


B. based on protocol division of VLAN
C. based on subnet division of VLAN
D. based on MAC address division of VLAN

Based on MAC address division of VLAN, access the client can move freely, without
hysical location limitations.

T
Port-based divided VLAN, access the client can move freely .

What are the problems of traditional desktop application?

A. large energy consumption


B. high maintenance costs
C. PC replacement cost is high
D. low performance

ABC

What are the challenges of traditional IT systems ? (Select 3 Answers)

A. centralized management and control of resources , low per capita efficiency


B. chimney business system, the business exclusive resources
C. lower operation and maintenance efficiency, high maintenance costs
D. large energy consumption

BCD

What are the advantages of cloud computing

A. upgrading and expansion without service interruption


B. standalone hardware resource utilization is high
C. rapid deployment, flexible expansion
D. automatic scheduling, energy conservation and emissions reduction

ACD

Which of the following problem is not what a traditional data processing systems
face?

A. high storage costs


B. network bandwidth is insufficient
C. single data source
D. under large data volume, lack of data-processing performance
B

What are the main functions of FusionAccess? (Multiple choice)

A. assets management, manage the relationship between user and virtual machine
B. user access, users can view and operate their own virtual machine
C. Desktop transmission, using a virtual machine through desktop link protocol
D. resource scheduling, manage and schedule cloud platform computing, storage
resources

ABC

A company now has a set of VMware vCenter environment, ready to introduce


Huawei FuionSphere solutions. In the following FusionSphere functions’ each
component, which is the most suitable for the enterprise unified management of
these two environments?

A. FusionManager heterogeneous virtualization management function


B. FusionCompute server virtualization function
C. FusionManager multi-tenant function
D. FusionCompute multi-site cascade function

GPU virtualization refers to creating multiple vGPU on a physical GPU. Each virtual
machine by binding vGPU can directly access to physical GPU’s part of hardware
resoures, so that it can realize enabling virtual machines to share GPU capabilities. It
can be applied to any type of video card.

Which of the following are not VRM components of FusionCompute?


A. BRM
B. PMS
C. LOG
D. VNA

D
For bare metal architecture, description not correct is.

A. Virtual machine does not depend on the operating system


B. Support for multiple operating systems, multiple applications
C. Huawei FusionSphere is a typical bare metal architecture
D. VMware WorkStation is a typical bare metal architecture

 December 17, 2017  weril  Basic, HCNA Cloud, FusionSphere, FusionAccess, Virtualization

Proudly powered by WordPress

You might also like