Manuel Eduardo Peña Pernia
Quiz by , created more than 1 year ago

Este es un examen que nos ayudará a reforzar y fijar ciertos conocimiento de gran importancia para alcanzar el éxito en la prueba de certificación de Cloud Computing H13-511. (Manuel Peña)

605
0
2
Manuel Eduardo Peña Pernia
Created by Manuel Eduardo Peña Pernia over 9 years ago
Close

Huawei HCNA-Cloud-BCCP H13-511.

Question 1 of 114

1

What elements promote cloud compunting? (Three answer)

Select one or more of the following:

  • Maximizes the reuse of existing resources to reduce operating expenditure

  • Are absorbing an increasing number of subscribers

  • Cloud computing standards develop rapidly and integration of IT and CT technologies requires IT infrastructure upgrades

  • Hardware Computing upgrades every time

Explanation

Question 2 of 114

1

Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet (True or False)

Select one of the following:

  • True
  • False

Explanation

Question 3 of 114

1

How the evolution of cloud computing is?

Select one of the following:

  • Parallel computing -> Distributed Computing -> Grid computing -> Cloud Computing

  • Cloud Computing -> Parallel computing -> Distributed Computing -> Grid computing

  • Parallel computing -> Grid computing -> Distributed Computing ->Cloud Computing

  • Cloud Computing -> Grid computing-> Parallel computing -> Distributed Computing

Explanation

Question 4 of 114

1

Cloud Computing, over the Internet provides shared software and hardware resources as well as data information on demand to computers and other devices (True or False)

Select one of the following:

  • True
  • False

Explanation

Question 5 of 114

1

Cloud computing is a style of computing in which isn't dynamically scalable but it often virtualized resources are provided as a service over Internet (True or False)

Select one of the following:

  • True
  • False

Explanation

Question 6 of 114

1

What could be the key characteristics of cloud computing? (two Answer)

Select one or more of the following:

  • On-demand self-service

  • Pay per use

  • Location dependent resource pooling

  • Slightly elastic

Explanation

Question 7 of 114

1

Which of this statements are true? (Three answers)

Select one or more of the following:

  • Dedicated mainframes, minicomputers, and high-end servers are replaced by massive inexpensive servers.

  • Standalone operating systems (OSs) are replaced by distributed software

  • Centralized management is replaced by automated control software

  • Multiples store area network is replaced by newest storage system

Explanation

Question 8 of 114

1

The CORE of cloud computing is...

Select one of the following:

  • Cloud service platform software

  • Cloud platform software

  • Cloud application platform software

  • Cloud servers and storage platform software

Explanation

Question 9 of 114

1

Under Cloud era, software, hardware, and services are not provided over the Internet, because the users will access services using a web browser or a Lightweight terminal, every day and every time. (True or False)

Select one of the following:

  • True
  • False

Explanation

Question 10 of 114

1

What are the different methods deployment for Cloud Computing? (three answers)

Select one or more of the following:

  • Mixed Cloud

  • Hybrid Cloud

  • Public Cloud

  • Private Cloud

Explanation

Question 11 of 114

1

Provides applications running, development environments and application development component such as databases, emails, and messages.

Select one of the following:

  • IasS

  • PasS

  • SaaS

  • MasS

Explanation

Question 12 of 114

1

The technologie Huawei FusionSphere is based on...

Select one of the following:

  • Hosted virtualization

  • Bare-metal virtualization

  • Os-level virtualization

  • Hybrid virtualization

Explanation

Question 13 of 114

1

Some advantages from Bare-metal are: (choose two answers)

Select one or more of the following:

  • Easy to implement

  • OS independent VMs

  • Wide compatibility with OS and applicatios

  • High performance due to no redundancy

Explanation

Question 14 of 114

1

The Hypervisor uses one of kind of memory to release the free memory space of lighter-loaded VMs to those VMS that heavier load. In this way de memory utilization is increased. What kind of memory we talk about?

Select one of the following:

  • Memory Sharing

  • Copy on write

  • Memory swapping

  • Memory Ballooning

Explanation

Question 15 of 114

1

How are based on the resource priorities of QoS in a Internet Data Center leasing?

Select one of the following:

  • Based on the importance sequence of an enterprise

  • Based on the importance sequence of customers

  • Base on the carrier´s internal applicacions

Explanation

Question 16 of 114

1

Does "the Huawei cloud management expert system" permit unified hardware and software management? (true or false)

Select one of the following:

  • True
  • False

Explanation

Question 17 of 114

1

What type of network topology are used commonly ? (two answers)

Select one or more of the following:

  • Logical topology, Bus network, framework network topology

  • Bus network, star network, tree network

  • Ring network, Mesh network

  • Ring network, computer network topology

Explanation

Question 18 of 114

1

SDLC, HDLC, PPP, STP, and frame relay are protocols, which layer are they?

Select one or more of the following:

  • Presentation Layer

  • Data link layer

  • Network layer

  • Session layer

Explanation

Question 19 of 114

1

to which OSI level these protocols belong?: IP, IPX, RIP, OSPF, ARP, RARP, ICMP and IGMP.

Select one of the following:

  • Level 1

  • Level 2

  • Level 3

  • Level 4

Explanation

Question 20 of 114

1

The MAC address is also known as a physical address, it have 6 bytes, theirs first three bytes represent the vendor code, What is the Huawei vendor code?

Select one of the following:

  • 0x00:E0:FD

  • 0x00:H0:FC

  • 0x00:H0:AC

  • 0x00:E0:FC

Explanation

Question 21 of 114

1

What is the order the Layer 2 Switching process?

Select one of the following:

  • Broadcast, Forward, Update, Learn

  • Learn, Broadcast, Forward, Update

  • Broadcast, Forward, Learn, Update

  • Learn, Broadcast, Update, Forward

Explanation

Question 22 of 114

1

The layer 2 forwarding feature of switches complies with the 802.1D Bridges Standard. (true or false)

Select one of the following:

  • True
  • False

Explanation

Question 23 of 114

1

VLAN identifier is a 12-bit into TCI field in the 802.1q header, support up to 4096 VLANs. have 3 bit as a Priority and Canonical Format indicator. (true or false)

Select one of the following:

  • True
  • False

Explanation

Question 24 of 114

1

Type of VLANs are...

Select one of the following:

  • Port-based, MAC Address-based, Protocol-based, Subnet-based VLANs

  • Port-based, MAC Address-based,

  • Protocol-based, Subnet-based VLANs

  • MAC Address-based, Protocol-based,

Explanation

Question 25 of 114

1

A trunk link is generally used the connection between (two answer):

Select one or more of the following:

  • L2 switches and L2 switches

  • L2 switches and L3 routers

  • L2 routers and L3 routers

  • L2 routers and L2 routers

Explanation

Question 26 of 114

1

Trunk port belongs to one or multiple VLANS untagged mode. (True or false)

Select one of the following:

  • True
  • False

Explanation

Question 27 of 114

1

Which of the following statements are correct? (Two Answers)

Select one or more of the following:

  • Hypervisor allows you to group VMs from different departments into different VLANs

  • Hypervisor allows you to configure VLANs for connection route point to point

  • Hypervisor allows you to configure VLANs for distributed virtual switches (DVSs) and use port groups to configure VM VLANs.

  • Hypervisor allows you to group VMs from any geographical location and any dry switches

Explanation

Question 28 of 114

1

The best effort service is a type of QoS into IP networks? (T or F).

Select one of the following:

  • True
  • False

Explanation

Question 29 of 114

1

Some usages about QoS could be: (Three answers)

Select one or more of the following:

  • Prevent and manage IP network congestion.

  • Reduce the loss rate of IP packets.

  • Increase traffic

  • Support real-time services on IP networks

Explanation

Question 30 of 114

1

QoS provides the following functions: (three answers)

Select one or more of the following:

  • Packet categorization and coloring

  • Network congestion avoidance

  • QoS signaling protocol

  • QoS failure level

Explanation

Question 31 of 114

1

Indicates the maximum rate at which packets are lost during transmission on the network.

Select one of the following:

  • Jitter

  • Bandwith limit

  • Packet loss rate

  • Latency

Explanation

Question 32 of 114

1

Latency is the time interval between sending a data packet from one end and receiving it on the other end.

Select one of the following:

  • True
  • False

Explanation

Question 33 of 114

1

What is the rate data packets delivery over the network and can be expressed by the average rate or peak rate?

Select one of the following:

  • Bandwidth limit

  • Throughput

  • Data flow rate

  • Traffic rate

Explanation

Question 34 of 114

1

Name the IP QoS model (three answers):

Select one or more of the following:

  • Best-Effort service model

  • Integrated service model

  • Differentiated service model

  • Quality service model

Explanation

Question 35 of 114

1

Which is the meaning this statement? This model manage network congestion by forwarding traffic in a differentiated manner based on QoS settings…

Select one of the following:

  • IntServ model

  • Best-Effort model

  • DiffServ model

  • Network Quality model

Explanation

Question 36 of 114

1

In the header IP packet, talk about the QoS, What are the bits name of old TOS (Type of Service) bye? (two answers)

Select one or more of the following:

  • DSCT

  • DSCP

  • ECN

  • TC

Explanation

Question 37 of 114

1

Traffic Policing is used to monitor the traffic volume entering a network and keep it within a specified range. Use Committed Access Rate, Token bucket algorithm and traffic control.

Select one of the following:

  • True
  • False

Explanation

Question 38 of 114

1

CAR, GTS and LR use the token bucket to control traffic. (T or F).

Select one of the following:

  • True
  • False

Explanation

Question 39 of 114

1

First in first out queuing, priority queuing, custom queuing and weighted fair queuing, are not algorithms queuing for a Congestion Management, are algorithms for congestion avoidance?

Select one of the following:

  • True
  • False

Explanation

Question 40 of 114

1

Which the sentences are correct? (Three answers)

Select one or more of the following:

  • Traditional packet drop policies adopt the tail drop method, in congestion avoidance

  • WFQ (weighted fair queuing) classifies packets by flow.

  • “Custom Queuing” have among the 18 queues for traffic policing.

  • “Priority queuing” guarantees the QoS of high priority queues

Explanation

Question 41 of 114

1

iStack is a stacking system for access devices, such as S5700 and S3000. Currently, up to 9 devices can be stacked.

Select one of the following:

  • True
  • False

Explanation

Question 42 of 114

1

Clustering: Multiple connected switches are managed as a …

Select one of the following:

  • Logical device

  • Physical device

  • Autonomous device

  • Multiple logical devices

Explanation

Question 43 of 114

1

CSS (clustering for core devices and iStack are almost the same in terms of the mechanism and the management plane, and therefore can be collectively referred to as stacking technologies.

Select one of the following:

  • True
  • False

Explanation

Question 44 of 114

1

Which Huawei equipment could be clustering? (Three answer)

Select one or more of the following:

  • S9300

  • S9700

  • CE12800

  • S5500T

Explanation

Question 45 of 114

1

Core and aggregation switches are stacked using CSS and Acces switches are stacked using iStack

Select one of the following:

  • True
  • False

Explanation

Question 46 of 114

1

The Active Directory is a sophisticated service component of a Windows Server. It processes network objects, including users, groups, computers, network domain controllers, emails, organizational units, and trees in organizations.

Select one of the following:

  • True
  • False

Explanation

Question 47 of 114

1

These are functions about AD? (Three answers)

Select one or more of the following:

  • Basic network services like DNS, WINS, DHCP and certificate services

  • Server and client computer management, user service, printers and file sharing services

  • Desktop configuration and application system support , like email, office automation, antivirus systems, etc.

  • Virtual desktop, virtual storage, virtual hardware, LUNs and host

Explanation

Question 48 of 114

1

An AD structure is an arrangement of object information

Select one of the following:

  • True
  • False

Explanation

Question 49 of 114

1

The AD network domain organizes the following basic objects into a tree structure: (two answers)

Select one or more of the following:

  • Foreign domain groups

  • Domain controllers, computers and users

  • Organizational Units and Built in account groups

  • Fixed virtual storages domain

Explanation

Question 50 of 114

1

AD directory tree form a doman directory tree in this order:

Select one of the following:

  • Parent domain, child domain

  • Child domain and parent domain

  • tree domain group and tree domain parent

  • tree domain parent and tree domain group

Explanation

Question 51 of 114

1

In AD, the root domain and other domain trees in a forest are linked through a transitive trust hierarchy

Select one of the following:

  • True
  • False

Explanation

Question 52 of 114

1

How the order the process into AD desktop application is?

Select one of the following:

  • The user VM synchronizes domain information with the domain controller, the user logs in to the desktop using the username in the domain, the Desktop Delivery Controller request the AD server to authenticate user information.

  • The Desktop Delivery Controller request the AD server to authenticate user information, the user logs in to the desktop using the username in the domain, the user VM synchronizes domain information with the domain controller.

  • The user logs in to the desktop using the username in the domain, the Desktop Delivery Controller request the AD server to authenticate user information, the user VM synchronizes domain information with the domain controller.

Explanation

Question 53 of 114

1

Dynamic Host Configuration Protocol (DHCP) is a LAN protocol running at the UDP layer to assign dynamic IP addresses to clients on the Internet.

Select one of the following:

  • True
  • False

Explanation

Question 54 of 114

1

a) Simplifies client network configurations, requiring no static IP address configuration. b) Simplifies client network configuration changes. When network parameters change, the administrator does no need to change the client configurations one by one. There are advantages from:

Select one of the following:

  • AD

  • DNS

  • DHCP

  • HUB

Explanation

Question 55 of 114

1

How the mechanism DHCP order is?

Select one of the following:

  • Selection, Discovery, Provisioning, Confirmation

  • Provisioning, Discovery, Selection, Confirmation

  • Discovery, Provisioning, Selection, Confirmation

  • Confirmation, Discovery, Provisioning, Selection

Explanation

Question 56 of 114

1

What are the statement correct about DHCP? (Two answers)

Select one or more of the following:

  • The discovery mechanism select the IP address for the VM

  • One DHCP application is assign IP addresses on one network segment and other is, assign IP addresses across multiple network segments

  • The confirmation mechanism obtain the valid status form for seek a new IP address for DHCP clients

  • The VM can automatically obtain an IP address from the configured subnet using the DHCP service of the VRM in FusionSphere.

Explanation

Question 57 of 114

1

Which network equipment is a distributed database supporting the translation between domain names and IP addresses?

Select one of the following:

  • DHCP

  • DNS

  • AD

  • VLAN

Explanation

Question 58 of 114

1

Some DNS Characteristics could be ? (Three answers)

Select one or more of the following:

  • Is based on UDP

  • It can identity only 512 bytes

  • Support DNSSEC

  • Users only need to use simple characters to access networks, instead of IP addresses

Explanation

Question 59 of 114

1

What are the types DNS record commonly used?

Select one of the following:

  • A, CNAME, PTR, NS, SVR

  • PKI, PUNK, PINK, Address

  • TUNK, BNS, SIP, Name

  • Domain, IN, SOL, Bare-Metal

Explanation

Question 60 of 114

1

Typical DNS application (Three answers)

Select one or more of the following:

  • The DNS client configuring the DNS interface in the main port

  • The domain names of the LB and DDC are registered in the DNS

  • The users accesses the desktop using the LB domain name

  • The VM regularly registers with the DDC using the DDC domain name

Explanation

Question 61 of 114

1

A virtual machine (VM) is a software computer that functions like a physical computer, running an operating system (OS) and applications.
A VM runs on a host, obtains CPUs, memory, GPU, USB devices, and other resources on the host, and uses network connection and storage access capabilities of the host. Multiple VMs can run concurrently on one host. (True or False)

Select one of the following:

  • True
  • False

Explanation

Question 62 of 114

1

What are the correct? (Three answers)

Select one or more of the following:

  • The VM creation location can be a host or a cluster.

  • After a VM is created, you can migrate it to another host

  • After a VM is created, you can perform operations to adjust its specifications and peripherals, such as adding network interface cards (NICs), mounting CD/DVD-ROM drivers, attaching disks, GPU, and USB devices.

  • After you created a VM, you can not change the its attribute

Explanation

Question 63 of 114

1

A VM template is a copy of a VM, containing an OS, applications, and VM specification configurations. It is used to create VMs that have OSs installed. Compared with creating bare VMs, creating VMs using a template reduces much time. (true or false)

Select one of the following:

  • True
  • False

Explanation

Question 64 of 114

1

A VM template could to consist of (three answers)

Select one or more of the following:

  • one OVM file

  • one OVA file

  • or one OVF file

  • and multiple VHD files.

Explanation

Question 65 of 114

1

Each virtual network interface card (NIC) has an IP address and a MAC address. It has the same functions as a physical NIC on a network. FusionCompute supports intelligent NICs (iNICs),

Select one of the following:

  • True
  • False

Explanation

Question 66 of 114

1

FusionCompute supports intelligent NICs (iNICs) which use (two answers)

Select one or more of the following:

  • multiple queues, virtual swapping

  • engine NIC corrector

  • memory random NIC

  • quality of service (QoS), and uplink aggregation to improve NIC I/O performance.

Explanation

Question 67 of 114

1

In Bandwidth control based on a network plane: The management plane, storage plane, and service plane are allocated with specified bandwidth based on the physical bandwidth resources. Does the traffic congestion on a plane affect I/O on other planes?

Select one of the following:

  • True
  • False

Explanation

Question 68 of 114

1

Each host connects to a distributed virtual switch (DVS), which functions as a physical switch. The DVS connects to VMs through a virtual port in the downstream direction and to the host NIC in the upstream direction. The DVS implements network communication between hosts and VMs. In addition, the DVS ensures unchanged network configuration for VMs when the VMs are migrated across hosts.

Select one of the following:

  • True
  • False

Explanation

Question 69 of 114

1

Server virtualization enables physical server resources to be converted to logical resources. With virtualization technology, a server can be divided into multiple virtual computing resources that are isolated with each other. CPU, memory, disks, and I/O resources become pooled resources that are dynamically managed.

Select one of the following:

  • True
  • False

Explanation

Question 70 of 114

1

erver virtualization characteristics are: (three answers)

Select one or more of the following:

  • Increases resource utilization rate.

  • Simplifies system management

  • Implements server integration.

  • Reduce efficiency

Explanation

Question 71 of 114

1

One VM support a maximum of 64 vCPUs.

Select one of the following:

  • True
  • False

Explanation

Question 72 of 114

1

Server virtualization involves the following features (Three answers)

Select one or more of the following:

  • Bare metal architecture

  • Floppy disk pass-through

  • CPU and Memory virtualization

  • GPU, iNIC, and USB pass-through

Explanation

Question 73 of 114

1

Today, One VM support more than of 1 TB virtual memory.

Select one of the following:

  • True
  • False

Explanation

Question 74 of 114

1

Storage virtualization enables a storage device to be converted to a logical data store. A VM is stored as a set of files in a directory on a data store. A data store is a logical repository that is similar to a file system. It can combine storage devices of different types and provide a unified model to store VM files. The storage virtualization technology helps the system manage virtual infrastructure storage resources with high resource utilization and flexibility.

Select one of the following:

  • True
  • False

Explanation

Question 75 of 114

1

Huawei data stores support the following file system formats:

Select one or more of the following:

  • Virtual image management system (VIMS)

  • Network file system (NFS)

  • MKDF

  • EXT4

Explanation

Question 76 of 114

1

What is the type data level from FC SAN?

Select one of the following:

  • File Level

  • File Label

  • Block level

  • Block Label

Explanation

Question 77 of 114

1

The JBOD provide data redundancy (true or false)

Select one of the following:

  • True
  • False

Explanation

Question 78 of 114

1

Redundant Array of Independent Disk is a storage technology that combines multiple physical disk into a logical unit for improving data redundancy and performance.

Select one of the following:

  • True
  • False

Explanation

Question 79 of 114

1

Raid has the following three characteristics:

Select one or more of the following:

  • Stripes disk data so that data can be accessed on a per block basis, reducing the seek time

  • Accesses multiple disks concurrently on the same disk array to reduce the total seek time

  • The different RAID level are technological superiority than each other

  • Employs mirroring or parity check to provide data redundancy

Explanation

Question 80 of 114

1

What is the incorrect statement?

Select one of the following:

  • RAID 1 does not stripe data like RAID0

  • RAID 5 employs a rotating parity scheme and does not have a fixed parity disk

  • RAID 10 performs mirroring first and then striping

  • 20 member RAID disks delivers superior performance than 8 or 9 member RAID disks.

Explanation

Question 81 of 114

1

When a member disk of a RAID group fails, a spare disk replaces the failed disk without interrupting the RAID group. How is named this disk?

Select one of the following:

  • LUN copy disk

  • RAID backup disk

  • Hot spare disk

  • Free Hot disk

Explanation

Question 82 of 114

1

What is the transferring function the data into spare disk when a RAID disk fail?

Select one of the following:

  • Precopy

  • LUN copy

  • Reconstruction

  • Mirror

Explanation

Question 83 of 114

1

On the physical volume, one or more logical unit numbers can be created and mapped as basic block devices to hosts.

Select one of the following:

  • True
  • False

Explanation

Question 84 of 114

1

... provides the multiple paths for connecting a host to a disk array.

Select one of the following:

  • Switch

  • Storage network System

  • Host multipathing technology

  • Router

Explanation

Question 85 of 114

1

When multipathing software is installed, it creates a virtual HBA between the disk driver and the two HBAs. The disk driver detects only one virtual disk and maps it to the host, on the contrary, the LUN is mapped several times to the host operating system.

Select one of the following:

  • True
  • False

Explanation

Question 86 of 114

1

Number the multipathing functions (three answers)

Select one or more of the following:

  • Failover

  • Failback

  • Load Balanxing

  • Failtranfer

Explanation

Question 87 of 114

1

Snapshots of a VM record... (three answers)

Select one or more of the following:

  • the disk data

  • memory data

  • configuration data

  • cache data

Explanation

Question 88 of 114

1

¿What is the virtualization? (two answers)

Select one or more of the following:

  • Convert physical resources into logical resources

  • Add a virtualization layer on the system to virtualized its underlying resources

  • Convert logical resources into resources physical

  • Adds y recovery logical devices to physical devices

Explanation

Question 89 of 114

1

Some benefits of Virtualization could be... (Three answers)

Select one or more of the following:

  • Improved hardware utilization and OS desacouple from hardware

  • Reduce carbon footprints

  • Efficient IT operation, maintenance and lower labor cost

  • Reduce IOPS between hardware and software

Explanation

Question 90 of 114

1

In Principle of de Virtualization, what define it: Multiple VMs can run on the same physical server?

Select one of the following:

  • Isolation

  • Zoning

  • Encapsulation

  • Hardware-independence

Explanation

Question 91 of 114

1

Virtual Machine Monitor is refered to...

Select one of the following:

  • Host Machine Monitoring

  • Guest Machine Monitoring

  • Hypervisor

  • Reduce Machine Monitoring

Explanation

Question 92 of 114

1

Which of the virtualization patterns is the major trend?

Select one of the following:

  • Hosted Virtualization

  • Bare-metal Virtualization

  • OS-level virtualization

  • Hybrid Virtualization

Explanation

Question 93 of 114

1

Types of computing virtualization (Three answers)

Select one or more of the following:

  • Monitor Virtualization

  • CPU Virtualization

  • Memory Virtualization

  • I/O Device Virtualization

Explanation

Question 94 of 114

1

Multiple VMs share the same physical device, such as a disk or network adapter. Those I/O devices are multiplexed using time-division technology. This technology is called as

Select one of the following:

  • I/O CPU

  • I/O Memory

  • I/O device

  • I/O Storage

Explanation

Question 95 of 114

1

Into Virtual CPU. VMs share the same Memory addresses (true or false)

Select one of the following:

  • True
  • False

Explanation

Question 96 of 114

1

The typical virtualization approaches are privilege deprivileging and trap-and-emulation. Specifically, guest OSs run at a non-privileged level deprivileging) whereas the Virtual Machine Monitor (VMM) runs at the highest privilege level (full control of system resources). After guest OSs are de-privileged, most of their instructions can still be executed on hardware. Only the privileged instructions are trapped and emulated by the VMM. (True or False)

Select one of the following:

  • True
  • False

Explanation

Question 97 of 114

1

The key point of memory virtualization lies in introducing a new layer of address space, that is, the physical address space of clients. Clients think that they run in the actual physical address space; however, they access physical addresses through the VMM in fact. The VMM saves the mapping table that records relationships between clients' address spaces and physical machines' address spaces.

Select one of the following:

  • True
  • False

Explanation

Question 98 of 114

1

An x86 processor has four priorities in protected mode, Ring 0, Ring 1, Ring 2, and Ring 3. The priority of each Ring is subject to the performed function. Ring 0 is used for the OS kernel and has the highest priority. Ring 1 and Ring 2 are used for OS services and have lower priorities. Ring 3 is used for applications and has the lowest priority.

Select one of the following:

  • True
  • False

Explanation

Question 99 of 114

1

I/O virtualization needs to resolve the following two problems:

Select one or more of the following:

  • Reuse the memory: Many VM request great amount the memory

  • Device discovery: Controls the devices accessible to VMs.

  • Access interception: Processes devices' access requests through I/O ports.

  • Try and try CPU resources: Many VM request great amount the CPU instructions

Explanation

Question 100 of 114

1

In the I/O virtualization, How to discover a device? (Three answers)

Select one or more of the following:

  • The device information about all VMs is saved on the XenStore of Domain0.

  • The XenBus (a paravirtualizaton driver designed for Xen) on VMs communicates with the XenStore of Domain0 to obtain device information.

  • The front-end driver for the device is loaded.

  • The front-end OS for the device is loaded.

Explanation

Question 101 of 114

1

In I/O virtualization, How to intercept device data? (two answers)

Select one or more of the following:

  • The front-end device driver forwards data completely to the back-end driver through the interfaces provided by the VMM.

  • The back-end driver processes VM data on a time and channel basis.

  • The front-end device driver forwards I/O instructions to core cpu

  • The back-end driver processes data host

Explanation

Question 102 of 114

1

VT-x refers to the VT technology adopted by Xeon processors and VT-I refers to the VT technology adopted by Itanium processors. (True or false)

Select one of the following:

  • True
  • False

Explanation

Question 103 of 114

1

VT-d: VT for Direct I/O, which is applied on chip sets. It allows VMs to directly access I/O devices to relieve the loads of the VMM and CPU.

Select one of the following:

  • True
  • False

Explanation

Question 104 of 114

1

VT-c: VT for Connectivity, which is mainly applied on network adapters. It includes two core technologies: VMDq and VMDc.

Select one of the following:

  • True
  • False

Explanation

Question 105 of 114

1

Storage device virtualization leverages storage devices' capabilities to maintain volumes. With this type of virtualization, storage devices can offer some advanced storage functions such as ... (Three answer)

Select one or more of the following:

  • thin provisioning,

  • snapshot

  • linked clone

  • lun copy

Explanation

Question 106 of 114

1

"Host storage virtualization + File system" allows hosts to manage VM disk files through file systems. This type of virtualization allows the virtualization layer to provide advanced services that are independent of storage devices. (True or false)

Select one of the following:

  • True
  • False

Explanation

Question 107 of 114

1

Currently, storage device virtualization applies ..... and provides a small number of advanced functions. (Two answers)

Select one or more of the following:

  • FusionCPU

  • Huawei Advanced SAN

  • FusionStorage

  • Huawei Advanced NAS

Explanation

Question 108 of 114

1

"Host Storage Virtualization + File System" allows hosts to manage VM disk files through file systems. This type of virtualization allows the virtualization layer to provide advanced services. Currently, this type of virtualization is widely applied.

Select one of the following:

  • True
  • False

Explanation

Question 109 of 114

1

A cloud computing data center don't allows dynamic migration of VMs, which is easy in traditional data centers.

Select one of the following:

  • True
  • False

Explanation

Question 110 of 114

1

Distributed virtual switching implement... one u other switches, What are they? (Two answers)

Select one or more of the following:

  • vSwitches

  • Traditional Switches

  • eSwithes

  • Physical Switches

Explanation

Question 111 of 114

1

Virtualization improves resource utilization: 6 cores are functionally equivalent to 7 cores and 8 GB functionally equivalent to 10 GB

Select one of the following:

  • True
  • False

Explanation

Question 112 of 114

1

Virtual hardware correspond to physical hardware in a one-to-one mapping. Virtualization technologies can virtualize one physical device into one virtual device.

Select one of the following:

  • True
  • False

Explanation

Question 113 of 114

1

What is the Huawei Cloud Computing Solution name?

Select one of the following:

  • FusionStack

  • FusionCloud

  • FusionSphere

  • FusionCompute

Explanation

Question 114 of 114

1

FusionAccess provides a customer experience oriented "any devices " + "any networks " + "any applications" solution seamless visit to cloud

Select one of the following:

  • True
  • False

Explanation