Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Huawei H31-522 Huawei Certified Network Professional –Cloud DataCentre Operations Exam Practice Test

Page: 1 / 26
Total 262 questions

Huawei Certified Network Professional –Cloud DataCentre Operations Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Which of the following statements about backup is incorrect?

Options:

A.

Backup helps retrieve lost data.

B.

Backup helps recover damaged data.

C.

Backup helps find historical data.

D.

Backup ensures business continuity.

Question 2

Which of the following are the two core components of ManageOne? (Multiple Choice)

Options:

A.

FusionCompute

B.

ServiceCenter

C.

eSight

D.

OperationCenter

Question 3

What networks are used in the Active-Passive DR Solution? (Multiple Choice)

Options:

A.

Replication data network

B.

Service data network

C.

Storage network

D.

DR management network

Question 4

FusionSphere is a unified cloud infrastructure platform for U and CT. Which of the following delivery scenarios does FusionSphere focus on? (Multiple Choice)

Options:

A.

Storage virtualization

B.

Server virtualization

C.

Cloud data center

D.

NFVI

Question 5

Physical security is the first line of defense used to prevent unauthorized access to non-physical assets, stealing of records and trade secrets, and industrial espionage and fraud.

Options:

A.

TRUE

B.

FALSE

Question 6

Which of the following layer does FusionSphere focuses on?

Options:

A.

IaaS

B.

PasS

C.

SaaS

D.

MaaS

Question 7

Which of the following statements is correct about the division of responsibilities in a data center service migration project?

Options:

A.

During the project implementation, the project implementer is responsible for progress management, risk control quality management, subcontract management, construction management, contract change confirmation, and engineering delivery.

B.

During the project implementation, the customer must provide necessary resources to ensure power supply, refrigerating, lighting, firefighting, equipment room protection, network bandwidth, applying for contract changes, migration personnel arrangement, and so on.

C.

Common responsibilities refer to the work that requires both parties to confirm or to complete together during the project implementation.

D.

During the project implementation, the migration implementer is responsible for confirming the project progress, acceptance criteria, hardware installation environment, and device quantity.

Question 8

Which of the following is incorrect about the eSight log management function?

Options:

A.

Security logs

B.

System logs

C.

Device logs

D.

Background run logs

Question 9

Inventory management of virtual resources is to collect and organize existing FusionCompute and VMware resource pools and then add resources to the FusionSphere OpenStack platform. Which of the following resources have been provisioned? (Multiple Choice)

Options:

A.

VMs

B.

Hosts

C.

Virtual switches

D.

VM templates

Question 10

Which of the following proxy services are provided by the reserve proxy IP address of

External_API?

(Multiple Choice)

Options:

A.

system

B.

vnc

C.

cps-web

D.

Internet

Question 11

Who should be responsible for the security of IaaS and PaaS?

Options:

A.

Cloud customers' system administrators

B.

Internet service providers

C.

Service providers' system administrators

D.

Governments

Question 12

Which of the following is not a FusionCompute storage device?

Options:

A.

LUN

B.

Local disk

C.

Advanced SAN storage pool or FusionStorage pool

D.

Local RAM disk

Question 13

Which of the following is not a process module of the ITTL_ frame?

Options:

A.

Service strategy

B.

Service design

C.

Service transition

D.

Service measuring

Question 14

Relationship management of services provided by external service providers is generally performed by business relationship management (BRM) personnel or the customer manager.

Options:

A.

TRUE

B.

FALSE

Question 15

Which of the following types can event upgrade be divided into? (Multiple Choice)

Options:

A.

Technical upgrade

B.

Service upgrade

C.

Management upgrade

D.

Hybrid upgrade

Question 16

Cloud computing is a computing model that provides dynamically scalable and virtualized resources as services for users over the Internet. Users need to know how to manage the infrastructure that supports cloud computing.

Options:

A.

TRUE

B.

FALSE

Question 17

On which of the following pages, client logout upon timeout can be disabled?

Options:

A.

User management

B.

Account policy

C.

Idle timeout settings

D.

User session inspection

Question 18

Which of the following statements is incorrect about the Configuration Management System (CMS)?

Options:

A.

CMS is a part of the service knowledge management system.

B.

CMS must contain all service data covering employees, providers, location, service units, customers, and users.

C.

CMS contains tools used to collect, store, manage, upgrade, and display configuration items and their relationships.

D.

CMS contains information of events, problems, known issues, changes, and release.

Question 19

In FusionSphere OpenStack installation, which of the following roles does the installed PC act as? (Multiple Choice)

Options:

A.

DHCP server

B.

TFTP server

C.

HTTP server

D.

FTP server

Question 20

Which of the following statements is incorrect about backup management software?

Options:

A.

Backup management software supports automatic backup.

B.

Backup management software does not support backup for heterogeneous platforms.

C.

Backup management software manages storage media and all backup jobs in a centralized manner.

D.

Backup management software provides a comprehensive log system, enabling administrators to perform monitoring and query operations based on different requirements.

Question 21

Which of the following infrastructures are supported by eSight? (Multiple Choice)

Options:

A.

Power supply device

B.

Refrigeration device

C.

Environment device

D.

Security device

Question 22

Which of the following statements is incorrect about the service design?

Options:

A.

The service design package is a suite that describes service release.

B.

Implement the transition from service design to service change.

C.

The service design package is used for each new IT service, major service change, or IT service retirement.

D.

The service design contains documents that define all aspects of IT services and requirements on each phase in the service lifecycle.

Question 23

Which of the following statements about FusionCompute cluster management is incorrect?

Options:

A.

The computing resource scheduling automation technology can determine whether to migrate a VM based on the CPU usage, memory usage, or both the CPU and memory usage.

B.

In power management, hosts can be powered on or powered off manually or automatically.

C.

The VM migration rules include the keep-VMs-together, mutually-exclusive-VM, and the VM-to-host-group rules.

D.

The IMC policy supports only live migration of Intel CPU series. CPUs from other vendors can be configured with this policy.

Question 24

Which of the following statements about block storage and object storage is incorrect?

Options:

A.

Cinder provides block storage to be attached to VMs to provide additional disk space for VMs.

B.

Swift is used to store VM images.

C.

In the FusionSphere environment, Glance backend storage is the Swift object storage by default.

D.

In the FusionCompute environment, block storage contains only SAN storage and local storage.

Question 25

Which of the following options are included on the Alarm Settings page of OperationCenter? (Multiple Choice)

Options:

A.

Alarm Masking

B.

Alarm Severity Redefinition

C.

Alarm Notification

D.

Alarm Transfer to Work Order

Question 26

Disaster recovery (DR) combines local backup and remote replication to provide comprehensive data protection.

Options:

A.

TRUE

B.

FALSE

Question 27

What actions are taken to ensure service security?

Options:

A.

Launch expensive advertising campaigns and investigate employees' personal information.

B.

Run standard security software.

C.

Comprehensively investigate employees' personal information and meet or exceed the government's compliance requirements.

D.

Ensure physical security and hire TSA personnel.

Question 28

Which of the following statements is incorrect about the characteristics of the data center service migration?

Different models of physical machines and VMs running Windows or Linux are supported.

Options:

A.

Both file-level and image-level migration are supported.

B.

Resumable transfer is not supported.

C.

The multi-data-synchronization function ensures data consistency.

Question 29

Which of the following is incorrect about the mode of adding devices on eSight?

Options:

A.

Automatic device discovery

B.

Manual creation of a device

C.

Manual import of devices in batches

D.

Built-in device template

Question 30

Which of the following are practices adopted by cloud O&M? (Multiple Choice)

Options:

A.

Lightweight, self-service, and automated ITSM management system architecture

B.

Agile DevOps O&M method which prevails in the industry

C.

Passive management

D.

Focus only on the service strategy from the view of management.

Question 31

Why is it important to know how data is accessed?

Options:

A.

Data access devices may have different ownership characteristics.

B.

Data access devices have different storage formats.

C.

Data access devices use different applications or clients and thus may have different security characteristics.

D.

Data access devices use different operating systems and thus may run different applications.

Question 32

During routine O&M, which of the following roles in the OperationCenter system is responsible for dispatching work orders?

Options:

A.

System administrator

B.

Monitoring personnel

C.

Maintenance personnel

D.

Development personnel

Question 33

Which of the following statements about virtualization and VMs is incorrect?

Options:

A.

If one physical machine is virtualized into multiple VMs, the physical machine is a host machine, and the VMs are guest machines. The OS installed on the physical machine is the host OS, and that installed on the VMs is the guest OS.

B.

Through virtualization by the virtualization layer, upper-layer software regards the VM as a real machine. The virtualization layer is called VMM (virtual machine monitor) or hypervisor.

C.

OS virtualization does not have an independent hypervisor layer, and servers and clients can have different OSs.

D.

Bare-metal virtualization is a VM monitoring program running on physical hardware.

Question 34

Which of the following tools is not supported by FusionSphere?

Options:

A.

FusionCube

B.

Update tool

C.

Fusion Care

D.

Automatic web UI installation and deployment tool

Question 35

In the multi-tenant, resource sharing scenario, which of the following issues causes customer information and processes to be attacked by another customer?

Options:

A.

Isolation failure

B.

Information disclosure

C.

Data loss

D.

Relationship invalidity

Question 36

Which of the following components is not required for cloud data center O&M in private cloud scenario?

Options:

A.

OperationCenter

B.

eSight

C.

CSB

D.

FusionSphere OpenStack OM

Question 37

Which of the following best describes the advantages of SaaS?

Options:

A.

Security responsibilities are shifted to other companies to shoulder, which belittles some disadvantages like high cost and low flexibility.

B.

Flexible service provision and SECaaS service providers' extensive knowledge and high efficiency lead to a higher service flexibility and continuity.

C.

Security software standardization makes SaaS outsourcing infeasible.

D.

SaaS applications, excluding antimalware software and anti-spam applications, are sophisticated in many fields and can be used widely.

Question 38

The charging mode of the cloud computing services is based on the usage instead of the device cost.

Options:

A.

TRUE

B.

FALSE

Question 39

All object information collected by OperationCenter needs manual review.

Options:

A.

TRUE

B.

FALSE

Page: 1 / 26
Total 262 questions