Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Huawei H31-522 Dumps Questions Answers

Page: 1 / 10
Total 262 questions

Huawei Certified Network Professional –Cloud DataCentre Operations Questions and Answers

Question 1

Which of the following statements is incorrect about the adjustment of VM specifications?

Options:

A.

You can select the CPU quota, reserved CPUs, and CPU limit for VM CPU resource control.

B.

The disk capacity can increase or decrease.

C.

You can select memory quotas for memory resource control.

D.

NICs can be added or deleted.

Buy Now
Question 2

Which of the following statements is incorrect about the FusionSphere OpenStack network?

Options:

A.

In FusionSphere OpenStack, physical networks define mappings between virtual networks and host physical network ports.

B.

VMs can directly use physical networks.

C.

A physical network is mapped to a physical network port or port bonding.

D.

No matter on which host a VM is running, the VM can communicate with external networks using the same physical network.

Question 3

Which of the following types can event upgrade be divided into? (Multiple Choice)

Options:

A.

Technical upgrade

B.

Service upgrade

C.

Management upgrade

D.

Hybrid upgrade

Question 4

To install FusionSphere OpenStack, the host CPU virtualization function must be enabled or else the VMs cannot be created.

Options:

A.

TRUE

B.

FALSE

Question 5

Which of the following is not a support sub-procedure of capacity management?

Options:

A.

Service capacity management

B.

Plan capacity management

C.

Component capacity management

D.

Service capacity management

Question 6

How many IPSec SAs will be created when one IPSec channel is created using AH+ESP in IPSec?

Options:

A.

2

B.

3

C.

4

D.

1

Question 7

Which of the following proxy services are provided by the reserve proxy IP address of

External_API?

(Multiple Choice)

Options:

A.

system

B.

vnc

C.

cps-web

D.

Internet

Question 8

Cloud computing is a computing model that provides dynamically scalable and virtualized resources as services for users over the Internet. Users need to know how to manage the infrastructure that supports cloud computing.

Options:

A.

TRUE

B.

FALSE

Question 9

Which of the following is not a type of service change?

Options:

A.

Exception change

B.

Standard change

C.

Emergency change

D.

Routine change

Question 10

What subsystems are used in the Active-Passive DR Solution? (Multiple Choice)

Options:

A.

Application subsystem

B.

Disk array subsystem

C.

Network interconnection subsystem

D.

DR management subsystem

Question 11

If a user wants to use the VXLAN network in FusionSphere OpenStack, which of the following network plane information needs to be configured?

Options:

A.

External_OM

B.

External_Base

C.

Internal_Base

D.

Tunnel Bearing

Question 12

During the WebUI-based installation of ServiceCenter, which of the following disk types should be selected?

Options:

A.

Local disk

B.

IP SAN

C.

FusionStorage

D.

NAS

Question 13

IaaS is an infrastructure service of cloud computing. Which of the following are applications of IaaS?

(Multiple Choice)

Options:

A.

End-to-end software development environment

B.

Data-intensive application

C.

Compute-intensive application

D.

Large scale distributed application

Question 14

OperationCentercan monitor VM alarms.

Options:

A.

TRUE

B.

FALSE

Question 15

Storage devices in FusionCompute need to be scanned. These devices refer to physical storage devices, such as IP SAN, AdvancedSAN, and NAS.

Options:

A.

TRUE

B.

FALSE

Question 16

Which of the following does not belong to territorial disasters?

Options:

A.

Disasters in equipment rooms

B.

Disasters in buildings

C.

Regional disasters

D.

Misoperations

Question 17

What networks are used in the Active-Passive DR Solution? (Multiple Choice)

Options:

A.

Replication data network

B.

Service data network

C.

Storage network

D.

DR management network

Question 18

Which of the following statements is incorrect about the characteristics of the data center service migration?

Different models of physical machines and VMs running Windows or Linux are supported.

Options:

A.

Both file-level and image-level migration are supported.

B.

Resumable transfer is not supported.

C.

The multi-data-synchronization function ensures data consistency.

Question 19

Role is a concept introduced by Huawei for service installation. A role defines a group of components that have the same property or functions in a template. Hosts with the same role can have a component deployed at the same time. CPS automatically selects all qualified hosts to deploy all components the role supports.

Options:

A.

TRUE

B.

FALSE

Question 20

In the cloud backup architecture, which of the following products is not used?

Options:

A.

ManageOne SC

B.

BCManager eReplication

C.

OceanStor DJ-DFS

D.

BCManager eBackup

Question 21

Which of the following statements about key FusionCompute functions is incorrect?

Options:

A.

The virtualization layer automatically binds the virtual devices involved in the I/O operation, services, and virtual interrupted threads, and allocates these resources based on NUMA nodes.

B.

A high-precision VM is a high-performance VM imposing strict requirements for the task processing performance, latency, and jittering.

C.

DRS monitors resource usage for each computing node in the same cluster in real time, and uses the VM live migration function to intelligently migrate VMs with high workloads to other nodes with sufficient resources.

D.

By taking workloads and physical resources into consideration, DRS powers off idle hosts to save energy.

Question 22

In FusionSphere OpenStack installation, which of the following roles does the installed PC act as? (Multiple Choice)

Options:

A.

DHCP server

B.

TFTP server

C.

HTTP server

D.

FTP server

Question 23

What actions are taken to ensure service security?

Options:

A.

Launch expensive advertising campaigns and investigate employees' personal information.

B.

Run standard security software.

C.

Comprehensively investigate employees' personal information and meet or exceed the government's compliance requirements.

D.

Ensure physical security and hire TSA personnel.

Question 24

In eSight server configuration deployment the networking requirement of the network, iBMC, power-on and power-off, switch board, and OS deployment is the same as that of server management.

Options:

A.

TRUE

B.

FALSE

Question 25

Which of the following components is not required for cloud data center O&M in private cloud scenario?

Options:

A.

OperationCenter

B.

eSight

C.

CSB

D.

FusionSphere OpenStack OM

Question 26

The security policy matching rule is as follows: search for the manually configured inter-zone security policy. If no such a policy is found, discard the data packet directly.

Options:

A.

TRUE

B.

FALSE

Question 27

Which of the following segments is used for communication between FusionSphere OpenStack components?

Options:

A.

172.28.0.0/24

B.

192.168.0.0/20

C.

172.28.0.0/20

D.

192.168.0.0/24

Question 28

Which of the following is incorrect about the stateless computing profile of eSight?

Options:

A.

To facilitate stateless computing, configurations to be migrated are uniformly managed through a profile.

B.

By defining and implementing a profile, the device replacing a damaged device can obtain the same physical attributes of the damaged device.

C.

A computing node can be associated with multiple profiles.

D.

A group of profiles with the same configuration policy corresponds to the stateless device group concept. Configuration policies in the group profile are the same.

Question 29

Which of the following is not an indicator in the disk information monitoring of eSight?

Options:

A.

Disk name

B.

Health status

C.

Installation status

D.

Hard disk usage

Question 30

Which of the following statements is incorrect about the data migration process?

Options:

A.

Assign the LUNs on the target storage array to a host and ensure that the host can detect the LUNs.

B.

Replicate or migrate data using the third-party volume management software on the host.

C.

Modify the storage mapping relationship on the host.

D.

Remove the source storage and delete the image relationship.

Question 31

VXLAN can satisfy the multi-tenant scenario demands. Which of the following is the maximum quantity of VLANs that VXLAN supports?

Options:

A.

2KB

B.

4KB

C.

16MB

D.

32MB

Question 32

Which of the following VMs does Domain0 running in the Xen hypervisor belong to?

Options:

A.

Privilege VMs

B.

Common VMs

C.

Security VMs

D.

Management VMs

Question 33

In distributed deployment, the eSight management platform and service components are deployed on a server, and service component collectors and distributed nodes are deployed on another server.

Options:

A.

TRUE

B.

FALSE

Question 34

When an enterprise IT system is moved to the cloud, services will be migrated accordingly. The specific migration objects include the basic IT service, office system, service production system, development and test system, and management system.

Options:

A.

TRUE

B.

FALSE

Question 35

Does ServiceCenter support duration-based metering of VMs in a VDC?

Options:

A.

TRUE

B.

FALSE

Question 36

Which of the following are components of Cinder? (Multiple Choice)

Options:

A.

cinder-driver

B.

cinder-api

C.

cinder-scheduler

D.

cinder-volume

Question 37

During the installation of Ope ration Center, which of the following root disk sizes should be selected?

Options:

A.

500 GB

B.

GB

C.

1500 GB

D.

5000 GB

Question 38

Which of the following methods can be used to create VMs in FusionCompute? (Multiple Choice)

Options:

A.

Create a bare VM.

B.

Create a VM using an image file.

C.

Create a VM using a template.

D.

Use an existing VM to clone a VM.

Question 39

Which of the following is the first line of defense that fights against the intruders or unauthorized visitors?

Options:

A.

Firewall

B.

Financial security

C.

Border security

D.

Social security

Page: 1 / 10
Total 262 questions