What elements promote cloud compunting? (Three answer)
Maximizes the reuse of existing resources to reduce operating expenditure
Are absorbing an increasing number of subscribers
Cloud computing standards develop rapidly and integration of IT and CT technologies requires IT infrastructure upgrades
Hardware Computing upgrades every time
Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet (True or False)
How the evolution of cloud computing is?
Parallel computing -> Distributed Computing -> Grid computing -> Cloud Computing
Cloud Computing -> Parallel computing -> Distributed Computing -> Grid computing
Parallel computing -> Grid computing -> Distributed Computing ->Cloud Computing
Cloud Computing -> Grid computing-> Parallel computing -> Distributed Computing
Cloud Computing, over the Internet provides shared software and hardware resources as well as data information on demand to computers and other devices (True or False)
Cloud computing is a style of computing in which isn't dynamically scalable but it often virtualized resources are provided as a service over Internet (True or False)
What could be the key characteristics of cloud computing? (two Answer)
Pay per use
Location dependent resource pooling
Which of this statements are true? (Three answers)
Dedicated mainframes, minicomputers, and high-end servers are replaced by massive inexpensive servers.
Standalone operating systems (OSs) are replaced by distributed software
Centralized management is replaced by automated control software
Multiples store area network is replaced by newest storage system
The CORE of cloud computing is...
Cloud service platform software
Cloud platform software
Cloud application platform software
Cloud servers and storage platform software
Under Cloud era, software, hardware, and services are not provided over the Internet, because the users will access services using a web browser or a Lightweight terminal, every day and every time. (True or False)
What are the different methods deployment for Cloud Computing? (three answers)
Provides applications running, development environments and application development component such as databases, emails, and messages.
The technologie Huawei FusionSphere is based on...
Some advantages from Bare-metal are: (choose two answers)
Easy to implement
OS independent VMs
Wide compatibility with OS and applicatios
High performance due to no redundancy
The Hypervisor uses one of kind of memory to release the free memory space of lighter-loaded VMs to those VMS that heavier load. In this way de memory utilization is increased. What kind of memory we talk about?
Copy on write
How are based on the resource priorities of QoS in a Internet Data Center leasing?
Based on the importance sequence of an enterprise
Based on the importance sequence of customers
Base on the carrier´s internal applicacions
Does "the Huawei cloud management expert system" permit unified hardware and software management? (true or false)
What type of network topology are used commonly ? (two answers)
Logical topology, Bus network, framework network topology
Bus network, star network, tree network
Ring network, Mesh network
Ring network, computer network topology
SDLC, HDLC, PPP, STP, and frame relay are protocols, which layer are they?
Data link layer
to which OSI level these protocols belong?: IP, IPX, RIP, OSPF, ARP, RARP, ICMP and IGMP.
The MAC address is also known as a physical address, it have 6 bytes, theirs first three bytes represent the vendor code, What is the Huawei vendor code?
What is the order the Layer 2 Switching process?
Broadcast, Forward, Update, Learn
Learn, Broadcast, Forward, Update
Broadcast, Forward, Learn, Update
Learn, Broadcast, Update, Forward
The layer 2 forwarding feature of switches complies with the 802.1D Bridges Standard. (true or false)
VLAN identifier is a 12-bit into TCI field in the 802.1q header, support up to 4096 VLANs. have 3 bit as a Priority and Canonical Format indicator. (true or false)
Type of VLANs are...
Port-based, MAC Address-based, Protocol-based, Subnet-based VLANs
Port-based, MAC Address-based,
Protocol-based, Subnet-based VLANs
MAC Address-based, Protocol-based,
A trunk link is generally used the connection between (two answer):
L2 switches and L2 switches
L2 switches and L3 routers
L2 routers and L3 routers
L2 routers and L2 routers
Trunk port belongs to one or multiple VLANS untagged mode. (True or false)
Which of the following statements are correct? (Two Answers)
Hypervisor allows you to group VMs from different departments into different VLANs
Hypervisor allows you to configure VLANs for connection route point to point
Hypervisor allows you to configure VLANs for distributed virtual switches (DVSs) and use port groups to configure VM VLANs.
Hypervisor allows you to group VMs from any geographical location and any dry switches
The best effort service is a type of QoS into IP networks? (T or F).
Some usages about QoS could be: (Three answers)
Prevent and manage IP network congestion.
Reduce the loss rate of IP packets.
Support real-time services on IP networks
QoS provides the following functions: (three answers)
Packet categorization and coloring
Network congestion avoidance
QoS signaling protocol
QoS failure level
Indicates the maximum rate at which packets are lost during transmission on the network.
Packet loss rate
Latency is the time interval between sending a data packet from one end and receiving it on the other end.
What is the rate data packets delivery over the network and can be expressed by the average rate or peak rate?
Data flow rate
Name the IP QoS model (three answers):
Best-Effort service model
Integrated service model
Differentiated service model
Quality service model
Which is the meaning this statement? This model manage network congestion by forwarding traffic in a differentiated manner based on QoS settings…
Network Quality model
In the header IP packet, talk about the QoS, What are the bits name of old TOS (Type of Service) bye? (two answers)
Traffic Policing is used to monitor the traffic volume entering a network and keep it within a specified range. Use Committed Access Rate, Token bucket algorithm and traffic control.
CAR, GTS and LR use the token bucket to control traffic. (T or F).
First in first out queuing, priority queuing, custom queuing and weighted fair queuing, are not algorithms queuing for a Congestion Management, are algorithms for congestion avoidance?
Which the sentences are correct? (Three answers)
Traditional packet drop policies adopt the tail drop method, in congestion avoidance
WFQ (weighted fair queuing) classifies packets by flow.
“Custom Queuing” have among the 18 queues for traffic policing.
“Priority queuing” guarantees the QoS of high priority queues
iStack is a stacking system for access devices, such as S5700 and S3000. Currently, up to 9 devices can be stacked.
Clustering: Multiple connected switches are managed as a …
Multiple logical devices
CSS (clustering for core devices and iStack are almost the same in terms of the mechanism and the management plane, and therefore can be collectively referred to as stacking technologies.
Which Huawei equipment could be clustering? (Three answer)
Core and aggregation switches are stacked using CSS and Acces switches are stacked using iStack
The Active Directory is a sophisticated service component of a Windows Server. It processes network objects, including users, groups, computers, network domain controllers, emails, organizational units, and trees in organizations.
These are functions about AD? (Three answers)
Basic network services like DNS, WINS, DHCP and certificate services
Server and client computer management, user service, printers and file sharing services
Desktop configuration and application system support , like email, office automation, antivirus systems, etc.
Virtual desktop, virtual storage, virtual hardware, LUNs and host
An AD structure is an arrangement of object information
The AD network domain organizes the following basic objects into a tree structure: (two answers)
Foreign domain groups
Domain controllers, computers and users
Organizational Units and Built in account groups
Fixed virtual storages domain
AD directory tree form a doman directory tree in this order:
Parent domain, child domain
Child domain and parent domain
tree domain group and tree domain parent
tree domain parent and tree domain group
In AD, the root domain and other domain trees in a forest are linked through a transitive trust hierarchy
How the order the process into AD desktop application is?
The user VM synchronizes domain information with the domain controller, the user logs in to the desktop using the username in the domain, the Desktop Delivery Controller request the AD server to authenticate user information.
The Desktop Delivery Controller request the AD server to authenticate user information, the user logs in to the desktop using the username in the domain, the user VM synchronizes domain information with the domain controller.
The user logs in to the desktop using the username in the domain, the Desktop Delivery Controller request the AD server to authenticate user information, the user VM synchronizes domain information with the domain controller.
Dynamic Host Configuration Protocol (DHCP) is a LAN protocol running at the UDP layer to assign dynamic IP addresses to clients on the Internet.
a) Simplifies client network configurations, requiring no static IP address configuration. b) Simplifies client network configuration changes. When network parameters change, the administrator does no need to change the client configurations one by one. There are advantages from:
How the mechanism DHCP order is?
Selection, Discovery, Provisioning, Confirmation
Provisioning, Discovery, Selection, Confirmation
Discovery, Provisioning, Selection, Confirmation
Confirmation, Discovery, Provisioning, Selection
What are the statement correct about DHCP? (Two answers)
The discovery mechanism select the IP address for the VM
One DHCP application is assign IP addresses on one network segment and other is, assign IP addresses across multiple network segments
The confirmation mechanism obtain the valid status form for seek a new IP address for DHCP clients
The VM can automatically obtain an IP address from the configured subnet using the DHCP service of the VRM in FusionSphere.
Which network equipment is a distributed database supporting the translation between domain names and IP addresses?
Some DNS Characteristics could be ? (Three answers)
Is based on UDP
It can identity only 512 bytes
Users only need to use simple characters to access networks, instead of IP addresses
What are the types DNS record commonly used?
A, CNAME, PTR, NS, SVR
PKI, PUNK, PINK, Address
TUNK, BNS, SIP, Name
Domain, IN, SOL, Bare-Metal
Typical DNS application (Three answers)
The DNS client configuring the DNS interface in the main port
The domain names of the LB and DDC are registered in the DNS
The users accesses the desktop using the LB domain name
The VM regularly registers with the DDC using the DDC domain name
A virtual machine (VM) is a software computer that functions like a physical computer, running an operating system (OS) and applications.
A VM runs on a host, obtains CPUs, memory, GPU, USB devices, and other resources on the host, and uses network connection and storage access capabilities of the host. Multiple VMs can run concurrently on one host. (True or False)
What are the correct? (Three answers)
The VM creation location can be a host or a cluster.
After a VM is created, you can migrate it to another host
After a VM is created, you can perform operations to adjust its specifications and peripherals, such as adding network interface cards (NICs), mounting CD/DVD-ROM drivers, attaching disks, GPU, and USB devices.
After you created a VM, you can not change the its attribute
A VM template is a copy of a VM, containing an OS, applications, and VM specification configurations. It is used to create VMs that have OSs installed. Compared with creating bare VMs, creating VMs using a template reduces much time. (true or false)
A VM template could to consist of (three answers)
one OVM file
one OVA file
or one OVF file
and multiple VHD files.
Each virtual network interface card (NIC) has an IP address and a MAC address. It has the same functions as a physical NIC on a network. FusionCompute supports intelligent NICs (iNICs),
FusionCompute supports intelligent NICs (iNICs) which use (two answers)
multiple queues, virtual swapping
engine NIC corrector
memory random NIC
quality of service (QoS), and uplink aggregation to improve NIC I/O performance.
In Bandwidth control based on a network plane: The management plane, storage plane, and service plane are allocated with specified bandwidth based on the physical bandwidth resources. Does the traffic congestion on a plane affect I/O on other planes?
Each host connects to a distributed virtual switch (DVS), which functions as a physical switch. The DVS connects to VMs through a virtual port in the downstream direction and to the host NIC in the upstream direction. The DVS implements network communication between hosts and VMs. In addition, the DVS ensures unchanged network configuration for VMs when the VMs are migrated across hosts.
Server virtualization enables physical server resources to be converted to logical resources. With virtualization technology, a server can be divided into multiple virtual computing resources that are isolated with each other. CPU, memory, disks, and I/O resources become pooled resources that are dynamically managed.
erver virtualization characteristics are: (three answers)
Increases resource utilization rate.
Simplifies system management
Implements server integration.
One VM support a maximum of 64 vCPUs.
Server virtualization involves the following features (Three answers)
Bare metal architecture
Floppy disk pass-through
CPU and Memory virtualization
GPU, iNIC, and USB pass-through
Today, One VM support more than of 1 TB virtual memory.
Storage virtualization enables a storage device to be converted to a logical data store. A VM is stored as a set of files in a directory on a data store. A data store is a logical repository that is similar to a file system. It can combine storage devices of different types and provide a unified model to store VM files. The storage virtualization technology helps the system manage virtual infrastructure storage resources with high resource utilization and flexibility.
Huawei data stores support the following file system formats:
Virtual image management system (VIMS)
Network file system (NFS)
What is the type data level from FC SAN?
The JBOD provide data redundancy (true or false)
Redundant Array of Independent Disk is a storage technology that combines multiple physical disk into a logical unit for improving data redundancy and performance.
Raid has the following three characteristics:
Stripes disk data so that data can be accessed on a per block basis, reducing the seek time
Accesses multiple disks concurrently on the same disk array to reduce the total seek time
The different RAID level are technological superiority than each other
Employs mirroring or parity check to provide data redundancy
What is the incorrect statement?
RAID 1 does not stripe data like RAID0
RAID 5 employs a rotating parity scheme and does not have a fixed parity disk
RAID 10 performs mirroring first and then striping
20 member RAID disks delivers superior performance than 8 or 9 member RAID disks.
When a member disk of a RAID group fails, a spare disk replaces the failed disk without interrupting the RAID group. How is named this disk?
LUN copy disk
RAID backup disk
Hot spare disk
Free Hot disk
What is the transferring function the data into spare disk when a RAID disk fail?
On the physical volume, one or more logical unit numbers can be created and mapped as basic block devices to hosts.
... provides the multiple paths for connecting a host to a disk array.
Storage network System
Host multipathing technology
When multipathing software is installed, it creates a virtual HBA between the disk driver and the two HBAs. The disk driver detects only one virtual disk and maps it to the host, on the contrary, the LUN is mapped several times to the host operating system.
Number the multipathing functions (three answers)
Snapshots of a VM record... (three answers)
the disk data
¿What is the virtualization? (two answers)
Convert physical resources into logical resources
Add a virtualization layer on the system to virtualized its underlying resources
Convert logical resources into resources physical
Adds y recovery logical devices to physical devices
Some benefits of Virtualization could be... (Three answers)
Improved hardware utilization and OS desacouple from hardware
Reduce carbon footprints
Efficient IT operation, maintenance and lower labor cost
Reduce IOPS between hardware and software
In Principle of de Virtualization, what define it: Multiple VMs can run on the same physical server?
Virtual Machine Monitor is refered to...
Host Machine Monitoring
Guest Machine Monitoring
Reduce Machine Monitoring
Which of the virtualization patterns is the major trend?
Types of computing virtualization (Three answers)
I/O Device Virtualization
Multiple VMs share the same physical device, such as a disk or network adapter. Those I/O devices are multiplexed using time-division technology. This technology is called as
Into Virtual CPU. VMs share the same Memory addresses (true or false)
The typical virtualization approaches are privilege deprivileging and trap-and-emulation. Specifically, guest OSs run at a non-privileged level deprivileging) whereas the Virtual Machine Monitor (VMM) runs at the highest privilege level (full control of system resources). After guest OSs are de-privileged, most of their instructions can still be executed on hardware. Only the privileged instructions are trapped and emulated by the VMM. (True or False)
The key point of memory virtualization lies in introducing a new layer of address space, that is, the physical address space of clients. Clients think that they run in the actual physical address space; however, they access physical addresses through the VMM in fact. The VMM saves the mapping table that records relationships between clients' address spaces and physical machines' address spaces.
An x86 processor has four priorities in protected mode, Ring 0, Ring 1, Ring 2, and Ring 3. The priority of each Ring is subject to the performed function. Ring 0 is used for the OS kernel and has the highest priority. Ring 1 and Ring 2 are used for OS services and have lower priorities. Ring 3 is used for applications and has the lowest priority.
I/O virtualization needs to resolve the following two problems:
Reuse the memory: Many VM request great amount the memory
Device discovery: Controls the devices accessible to VMs.
Access interception: Processes devices' access requests through I/O ports.
Try and try CPU resources: Many VM request great amount the CPU instructions
In the I/O virtualization, How to discover a device? (Three answers)
The device information about all VMs is saved on the XenStore of Domain0.
The XenBus (a paravirtualizaton driver designed for Xen) on VMs communicates with the XenStore of Domain0 to obtain device information.
The front-end driver for the device is loaded.
The front-end OS for the device is loaded.
In I/O virtualization, How to intercept device data? (two answers)
The front-end device driver forwards data completely to the back-end driver through the interfaces provided by the VMM.
The back-end driver processes VM data on a time and channel basis.
The front-end device driver forwards I/O instructions to core cpu
The back-end driver processes data host
VT-x refers to the VT technology adopted by Xeon processors and VT-I refers to the VT technology adopted by Itanium processors. (True or false)
VT-d: VT for Direct I/O, which is applied on chip sets. It allows VMs to directly access I/O devices to relieve the loads of the VMM and CPU.
VT-c: VT for Connectivity, which is mainly applied on network adapters. It includes two core technologies: VMDq and VMDc.
Storage device virtualization leverages storage devices' capabilities to maintain volumes. With this type of virtualization, storage devices can offer some advanced storage functions such as ... (Three answer)
"Host storage virtualization + File system" allows hosts to manage VM disk files through file systems. This type of virtualization allows the virtualization layer to provide advanced services that are independent of storage devices. (True or false)
Currently, storage device virtualization applies ..... and provides a small number of advanced functions. (Two answers)
Huawei Advanced SAN
Huawei Advanced NAS
"Host Storage Virtualization + File System" allows hosts to manage VM disk files through file systems. This type of virtualization allows the virtualization layer to provide advanced services. Currently, this type of virtualization is widely applied.
A cloud computing data center don't allows dynamic migration of VMs, which is easy in traditional data centers.
Distributed virtual switching implement... one u other switches, What are they? (Two answers)
Virtualization improves resource utilization: 6 cores are functionally equivalent to 7 cores and 8 GB functionally equivalent to 10 GB
Virtual hardware correspond to physical hardware in a one-to-one mapping. Virtualization technologies can virtualize one physical device into one virtual device.
What is the Huawei Cloud Computing Solution name?
FusionAccess provides a customer experience oriented "any devices " + "any networks " + "any applications" solution seamless visit to cloud