Winter Sale Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Huawei H13-511_V5.5 HCIA-Cloud Computing V5.5 Exam Exam Practice Test

Page: 1 / 12
Total 116 questions

HCIA-Cloud Computing V5.5 Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Desktop users on the same FusionAccess can be authenticated using different domains.

Options:

A.

TRUE

B.

FALSE

Question 2

FusionAccess application policies allow users to use VM desktops. Match the following application scenarios with their operations

Options:

Question 3

Match the following VLAN interface types with their descriptions.

Options:

Question 4

A router manages path information by managing its___

Options:

Question 5

In compute virtualization, which of the following is the operating system running on a virtual machine (VM)?

Options:

A.

Hypervisor

B.

Host OS

C.

Guest OS

D.

Host machine

Question 6

Which of the following statements are true about the differences between OpenStack and FusionCompute?

Options:

A.

OpenStack is open-source software, and FusionCompute is closed-source commercial software.3

B.

OpenStack does not have any virtualization capability, while FusionCompute can directly pool physical hardware resources.

C.

OpenStack can manage VMs, bare metal servers, and containers, but FusionCompute cannot manage containers.

D.

OpenStack has concepts about projects and tenants, but FusionCompute does not have the concept about tenants.

Question 7

In Huawei FusionCompute, which of the following functions enables virtual machines (VMs) to be migrated between CNA hosts with different CPU models?

Options:

A.

Cluster I/O ring adaptation

B.

Cluster HANA optimization

C.

Cluster Guest NUMA policy

D.

Cluster IMC policy

Question 8

Which of the following statements isfalseabout host requirements during FusionCompute installation?

Options:

A.

The location where the host OS is booted first must be the location where the host OS is installed.

B.

The disk requirements of the host where the VRM is located are the same as those of other compute nodes.

C.

If CPU virtualization is not enabled for a host, virtual machines cannot be created on the host.

D.

FusionCompute can be installed even if there is only one host network port.

Question 9

During the deployment of the FusionAccess gateway and load balancer, the HA status is abnormal after vAG/vLB configuration. Which of the following is not a possible cause of this fault?

Options:

A.

The administrator changed the "root" password for vAG/vLB.

B.

The administrator changed the "root" password for HDC.

C.

The administrator changed the "gandalf" password for vAG/vLB.

D.

The administrator changed the password for logging in to the ITA portal.

Question 10

Which of the following statements is false about CPU virtualization?

Options:

A.

CPU virtualization includes full virtualization, paravirtualization, and hardware-assisted virtualization.

B.

Full virtualization does not modify the guest OS. Virtual machines are highly portable and compatible and support a wide range of operating systems.

C.

The host OS in paravirtualization supports only open-source operating systems.

D.

Hardware-assisted virtualization does not require the CPUs to support it.

Question 11

Programs and data must be loaded into memory for CPU processing, and then be placed on external storage for long-term preservation.

Options:

A.

TRUE

B.

FALSE

Question 12

When a user VM uses a USB device, FusionAccess defaults to "USB Port Redirection". If the device is still unavailable, the"Device Redirection"policy can be configured.

Options:

Question 13

The Central Processing Unit (CPU) is the computer's computing and control core. Mainly composed of an arithmetic logic unit (ALU) and a controller, it reads and executes data according to instructions.

Options:

A.

TRUE

B.

FALSE

Question 14

Which of the following are functions of FusionCompute?

Options:

A.

Datastores support file system formats VIMS, NFS, and EXT4.

B.

Users can expand or reduce the memory capacity for online or offline VMs as needed.

C.

Storage live migration is to migrate data within a storage device or between different storage devices.

D.

VM live migration only allows VMs to migrate among hosts that share the same storage.

Question 15

Which of the following statements isfalseabout virtualization concepts?

Options:

A.

A guest OS is the operating system running on a virtual machine (VM).

B.

A guest machine is a virtual machine (VM).

C.

A host machine is a physical machine.

D.

A host OS is the virtualization software layer.

Question 16

Which of the following statements about the differences between adomainand anorganizational unit (OU)aretrue?

Options:

A.

Both OUs and domains can contain Active Directory (AD) objects.

B.

Users can log in to a domain but not to an OU.

C.

Group policies can be configured for both OUs and domains.

D.

An OU can exist in a domain, and a domain can also exist in an OU.

Question 17

Options:

Question 18

FusionAccess can use a provisioned full copy VM as a full copy VM template. Place the following operations in the correct order.

Options:

Question 19

Which of the following technologies is used by Open vSwitch (OVS) for remote access and traffic control?

Options:

A.

OpenFlow

B.

Open vSwitch database (OVSDB)

C.

Bidirectional forwarding detection (BFD)

D.

Network quality analysis (NQA)

Question 20

In FusionCompute, the user can set the priority for each member port in a port group.

Options:

A.

TRUE

B.

FALSE

Question 21

Which of the following statements about VM group types and related operations during virtual desktop provisioning on FusionAccess is false?

Options:

A.

If the desktop group type is Static Pool, linked clone and full copy VMs can be provisioned.

B.

During quick provisioning of virtual desktops, administrators can assign desktops of different types to different users.

C.

During virtual desktop creation, the system cannot add the virtual desktop to a specified VM group until virtual desktop assignment.

D.

If the desktop group type is Dynamic Pool, linked clone and full copy VMs can be provisioned.

Question 22

Which of the following technologies cannot be used to manage networks?

Options:

A.

Distributed virtual switch (DVS)

B.

Snapshot

C.

Virtual NIC

D.

Network I/O control

Question 23

Which of the following statements aretrueabout distributed storage?

Options:

A.

Distributed storage features outstanding scalability.

B.

Distributed storage typically uses general-purpose servers rather than storage devices.

C.

Distributed storage leverages RAID technology to ensure high data availability and security.

D.

Distributed storage has no controller enclosure or disk enclosure. All disk storage resources are delivered by general-purpose servers.

Question 24

When a VM template is created on FusionAccess, select“Configure user login”if the_____group members want to log in to the VM.

(Enter the correct word on the GUI)

Options:

Question 25

Which of the following statements isfalseabout Redundant Array of Independent Disks (RAID)?

Options:

A.

RAID 0 uses striping to improve data read and write performance.

B.

RAID 6 uses mirroring to ensure user data reliability.

C.

RAID 1 uses mirroring to ensure user data reliability.

D.

RAID 5 uses parity check to ensure data reliability.

Question 26

The following table lists the FusionAccess environment plan. Which of the following network segments is the most suitable for deploying FusionAccess Linux infrastructure VMs?

Options:

A.

192.168.108.0/22

B.

192.168.10.0/24

C.

192.168.30.0/24

D.

192.168.20.0/24

Question 27

Match the emerging technologies with their respective features or application scenarios

Options:

Question 28

In FusionCompute, which of the following statements are false about security groups?

Options:

A.

Similar to firewalls, security groups use iptables to filter packets for access control.

B.

A running VM can be added to a security group.

C.

If VM A is added to security group B, it cannot be added to other security groups.

D.

Users can create security groups on VMs and add security group rules.

Question 29

Match the following virtualization technologies with their descriptions.

Options:

Question 30

Which of the following statements about the differences betweenuser groupsandorganizational units (OUs)aretrue?

Options:

A.

OUs and user groups are Active Directory objects.

B.

An OU can contain objects such as accounts, computers, printers, and shared folders.

C.

Group policies can be configured for both OUs and user groups.

D.

A user group can only contain accounts.

Question 31

Cloud-native technologies enable organizations to build and run scalable applications in public, private, or hybrid cloud environments. Which of the following isnota representative cloud-native technology?

Options:

A.

Service mesh

B.

Virtualization

C.

Microservice

D.

Container

Question 32

Which of the following statements about the differences between a domain and an OU are true?

Options:

A.

Users can log in to a domain but not to an OU.

B.

Group policies can be configured for both OUs and domains.

C.

An OU can exist in a domain, and a domain can also exist in an OU.

D.

Both OUs and domains can contain AD objects.

Question 33

FusionCompute adopts hardware-assisted virtualization technology to reduce memory virtualization overhead.

Options:

A.

TRUE

B.

FALSE

Question 34

Common storage networks include direct attached storage (DAS), network attached storage (NAS), and storage area network (SAN). SANs are divided into Fibre Channel storage area networks (FC SANs) and IP storage area networks (IP SANs).

Options:

A.

TRUE

B.

FALSE

Page: 1 / 12
Total 116 questions