HCIA-Cloud Computing V5.0 Huawei Certified Cloud Computing Engineer Online Course Chapter Test Questions and Analysis

Chapter 1: Overview of Cloud Computing

1. Which of the following is the main driving force for the emergence and development of virtualization technology?

A.The emergence of the Internet

B. Reduce the failure rate of hardware resources

C. Make full use of hardware resources

D. Improve the recognition of hardware resources

Correct answer: C

Answer analysis: Virtualization technology initially decouples traditional hardware and software. More operating systems and software can be run on the virtualization platform, thus improving the utilization of hardware resources.

2. Cloud computing is a pay-per-use model that provides available, convenient, on-demand network access and configurable ()?

A. Computing resource sharing pool

B.Work group

C. Client shared resources

D. Service providers share resources

Correct answer: A

Answer analysis: In cloud computing scenarios, physical hardware is virtualized through virtualization technology to form a computing resource pool, for example, from which users can obtain the resources and services they want.

3. Which of the following descriptions of the relationship between virtualization and cloud computing are correct?

A. Without cloud computing, virtualization has no value.

B. Virtualization and cloud computing are two technologies. Virtualization promotes the development of cloud computing.

C. Without virtualization, cloud computing has no value in existence.

D.Virtualization is one of the important technologies for realizing cloud computing

Correct answer: CD

Answer analysis: Option A: Virtualization technology initially decouples traditional hardware and software. More operating systems and software can be run on the virtualization platform, thus improving the utilization of hardware resources. The origin of virtualization technology is earlier than cloud computing;

Option B: Cloud computing is a service model, not a technology;

Option C: Cloud computing requires virtualization technology to pool various hardware resources, so users can obtain the resources they want from various resource pools;

Option D: In the cloud computing model, in addition to virtualization technology, there are also distributed technology, programming technology and cloud computing platform management technology.

4. Which of the following items belong to the cloud computing model?

A. Software as a Service

B. Platform as a Service

C. Infrastructure as a Service

D. Resources as a Service

Correct answer: ABC

Answer analysis: Common cloud computing models are: laaS: Infrastructure as a Service, infrastructure as a service; PaaS: Platform as a Service, platform as a service; SaaS: Software as a Service, software as a service.

5. Which of the following cloud computing service models are included in the laaS model?

A.Application

B.Virtualization

C. Operating system

D. Server

Correct answer: BD

Answer analysis: Options B and D, in the laaS model, include our common computing, storage, network and virtualization resources; option A belongs to the SaaS model; option C belongs to the PaaS model.

6. Which of the following descriptions of the "cloudification" transformation of enterprise data centers are correct?

A. From resource islands to real resource pooling

B. Transformation from distributed to centralized architecture

C. Transform from manual processing to self-service and automatic services

D. Transformation from decentralized statistics to unified measurement

Correct answer: ACD

Answer analysis: Option B, the "cloudification" transformation of enterprise data centers is a gradual transformation from a centralized architecture to a distributed architecture. In this process, resources can be utilized and shared more efficiently.

7. Which of the following descriptions of the concept of cloud computing are correct?

A. Cloud computing is a model that can obtain the required resources from a shared pool of configurable computing resources anytime, anywhere, conveniently and on demand.

B. Cloud computing is a computing model that provides dynamically scalable virtualized resources in the form of services through the Internet.

C. The goal of cloud computing is to allow the public to obtain IT services just like water and electricity.

D. Through the Internet, computers powerful enough can be used to provide services to users, so cloud computing is a technology

Correct answer: ABC

Answer analysis: Option D, cloud computing is a service model, not a technology.

8. Which of the following descriptions of challenges faced by traditional IT are correct?

A. Business launch is slow

B. Difficulty in expansion

C. High reliability

D. Life cycle management is complex

Correct answer: ABD

Answer analysis: Option C. Under the traditional IT architecture, the reliability and security of enterprise business and data are limited by factors such as technology, funds, and talents, and there are hidden dangers and inadequacies.

9. Cloud computing is a product of the development of the Internet and computing technology, so cloud computing must be inseparable from the network.

Correct answer: Correct

Answer analysis: Cloud computing allows users to use various cloud services remotely. Therefore, in this scenario, users need to access cloud services through various network channels.

10. Cloud computing allows enterprises to obtain technical services through the Internet, and users do not need to know where and how the services are provided.

Correct answer: Correct

Answer analysis: When users use cloud computing services, they usually do not need to pay attention to the source and background provision mode of the services used.

Chapter 2: Server Basics

1. Which of the following descriptions about affecting hard disk performance are correct?

A.Hard disk interface

B. Hard drive speed

C.Hard disk type

D. The remaining storage capacity in the hard disk

Correct answer: ABC

Answer analysis: Option D. The remaining storage capacity in the hard disk usually does not affect the performance of the hard disk.

2. Which of the following descriptions of the characteristics of the IPMI interface are correct?

A.IPMI information is managed using hardware rather than the operating system

B.IPMI is a free standard

C.IPMI is a management subsystem based on BIOS

D.The core of IPMI is BMC

Correct answer: ABD

Answer analysis: Option C, IPMI is an open standard hardware management interface specification, which defines how various individual devices can communicate with the CPU in a standard way. Through a standard interface such as IPMI, system administrators can easily remotely monitor the health status of servers and client computers. Even when the system (OS) fails, IPMI can still operate, helping administrators quickly understand the cause of hardware failure. and further diagnose the hardware problems so that the system can resume operation in the shortest possible time. BIOS is actually a set of programs solidified into the computer, which provides the lowest and most direct hardware control services for the computer system and solves the real-time needs of the hardware.

3. Which of the following browsers are in the compatibility list of RH server?

A.Internet Explorer

B.360 Browser

C.Google Chrome

D.Mozilla Firefox

Correct answer: ACD

Answer analysis: When logging in to iBMC WebUI, the browsers that comply with the compatibility list are: Internet Explorer 11.0, Microsoft Edge, Mozilla Firefox 45.0~79.0, Google Chrome 55.0~84.0, and Safari 9.0~13.1. Option B, 360 Browser is not in the compatibility list.

4. Which of the following methods can be used to set the IP address of the iBMC management network port?

A. iBMC Web UI

B. iBMC CLI

C.BIOS

D.RAID card

Correct answer: ABC

Answer analysis: Option D. The RAID card is mainly used to combine several hard drives into a whole system managed by the array controller according to certain requirements. It can improve the performance and reliability of the disk subsystem and cannot configure the management network port of the iBMC. IP address.

5. When the server performs a large number of write operations, which technical description of the RAID card to improve write performance is correct?

A. Turning on the cache can improve the write performance of the entire machine.

B. Enabling cache will increase the risk of data loss

C. A battery can be configured for the RAID card to improve read and write performance and data security.

D. When the server is powered on normally, the cache does not need to be powered by the RAID card

Correct answer: ABC

Answer analysis: Option A, when the server performs a large number of write operations, because the speed of writing data to the cache is greater than the speed of writing data to the hard disk. Turning on the cache can improve the write performance of the entire machine. When the server write pressure decreases or the cache is full, the data is written to the hard disk from the cache.

Option B, while enabling the cache improves write performance, it also increases the risk of data loss. When the entire machine unexpectedly loses power, the data in the cache will be lost.

Option C, in order to improve the high read and write performance of the entire machine and the security of data in the cache, a supercapacitor can be configured for the RAID control card.

Option D, when the server power supply is normal, the server power supply supplies power to the cache; when the server loses power abnormally, the supercapacitor supplies power to the RAID control card, NAND Flash and cache, ensuring that the data in the cache is transferred to the NAND Flash for permanent storage. After the data transfer is completed, the supercapacitor stops supplying power. This ensures data security when the server loses power unexpectedly. When the server is powered on normally, the RAID control card supplies power to the cache to ensure normal use of the cache.

6. Which of the following descriptions of BIOS functions are correct?

A. Detect and initialize hardware

B. Operating system boot

C.Remote management server

D. Advanced power management

Correct answer: ABD

Answer analysis: BIOS is actually a set of programs solidified into the computer, which provides the lowest and most direct hardware control services for the computer system and solves the real-time needs of the hardware. Its main functions are hardware detection and initialization, operating system booting and advanced power management.

7. During the BIOS startup process, which of the following functions does the server mainly complete?

A. Self-test and initialization POST

B. Program service processing

C. Hardware interrupt handling

D.Access control

Correct answer: ABC

Answer analysis: BIOS is actually a set of programs solidified into the computer, which provides the lowest and most direct hardware control services for the computer system and solves the real-time needs of the hardware. Its main functions are hardware detection and initialization, operating system booting and advanced power management.

Option D, access control is usually used by system administrators to control users' access to network resources such as servers, directories, files, etc., so it does not fall within the scope of BIOS functions.

8. Which of the following modules does iBMC mainly consist of?

A.Remote control module

B. Web module

C. Operation monitoring module

D.SNMP module

Correct answer: ABD

Answer analysis: Option C, the operation monitoring module consists of a detection module solidified on the motherboard, so it is not an iBMC module.

9. After RAID grouping of server hard disks, hot spare disks are generally configured to improve security. Which of the following descriptions of hot spare disks are correct?

A. When any hard disk in the RAID fails, the local hot spare disk can be automatically replaced.

B. A hard disk that has been added to RAID cannot be configured as a hot spare disk.

C. Except RAID 0, other types of RAID support hot spare disks

D. The capacity of the hot spare disk is required to be no less than the maximum capacity of the RAID member disk.

Correct answer: BCD

Answer analysis: Option A, for example, for RAID 0, RAID 0 only uses data striping technology and does not use XOR verification algorithm or other data protection technology. It does not have the ability to recover data when the data is damaged, so hot backup The disk will not participate in data reconstruction.

10. Which of the following functions does the BMC module on the server motherboard mainly implement?

A. Server management and monitoring

B.KVM function of server

C. Server’s SOL redirection function

D. Integrated PCle controller function

Correct answer: ABC

Answer analysis: BMC mainly implements the following functions:

Remote control, alarm management, status detection, device information management, heat dissipation control, support for ipmitool tool, support for web interface management, support for centralized account management, etc.

Option D, PCl Express interface mode is usually used for graphics cards, network cards, etc. Motherboard interface cards require that the motherboard must have a dedicated slot for PCl Express, which is an expansion component independent of the BMC module.

Chapter 3: Basics of Storage Technology

1. A bank will launch a business system with very high performance and security requirements. The database uses Oracle database and plans to deploy the Oracle database to a certain storage system. Then, when creating a RAID group for the Oracle database , which one should be the optimal RAID strategy?

A.RAID 1

B.RAID 5

C.RAID 6

D.RAID 10

Correct answer: D

Answer analysis: Option D. It is known that the business system runs on a database and has high requirements for performance and security. Therefore, RAID10 meets the requirements. It can not only meet the requirements for data protection, but is also better than RAID 5 in terms of data reading and writing efficiency. .

2. What are the implementation methods of RAID?

A.Hardware RAID

B.Software RAID

C. XOR operation

D. Parity check

Correct answer: AB

Answer analysis: There are two main ways to implement traditional RAID: one is hardware-based RAID, which is implemented by using hardware RAID adapter cards; the other is software RAID, which refers to installing software in the operating system. To realize the corresponding functions of RAID.

3. Compared with traditional RAID, which of the following advantages does RAID 2.0+ have?

A.Business load balancing

B. Faster

C. Quick reconstruction

D. Fully participate in reconstruction

Correct answer: ACD

Answer analysis: Option B. The advantages of Huawei's RAID 2.0+ technology are mainly reflected in business load balancing, rapid data reconstruction after hard disk failure, and full participation in reconstruction to reduce the occurrence of high-voltage disks.

4. Which of the following RAIDs can recover data when data is damaged?

A.RAID 3

B.RAID 0

C.RAID 5

D.RAID 6

Correct answer: ACD

Answer analysis: Option B, RAID0 only uses data striping technology and does not use XOR verification algorithm or other data protection technology, so the data cannot be restored when the data is damaged.

5. Which of the following RAID technologies need to calculate parity data when writing data?

A.RAID 0

B.RAID 3

C.RAID 6

D.RAID 50

Correct answer: BCD

Answer analysis: RAID0 only uses data striping technology and does not use the XOR verification algorithm

6. Which of the following descriptions of RAID 10 features are correct?

A.RAID10 requires at least 4 member disks

B.RAID10 is suitable for scenarios with high requirements on speed and fault tolerance.

C. In RAID10, data is first mirrored and then striped.

D. In RAID10, if two hard disks are broken, the data will be read normally.

Correct answer: ABC

Answer analysis: Option D. In RAID10, if the two failed physical hard disks originate from any one of the RAID1 arrays, the overall data will be incomplete.

7. Which of the following descriptions of Huawei RAID 2.0+ features are correct?

A. It overcomes the performance bottleneck of traditional RAID reconstruction hot spare disks and greatly improves the reconstruction speed.

B. Data is automatically load balanced among the hard disks in the storage pool, reducing the overall storage failure rate.

C. Data on a single LUN is distributed to different hard disks to avoid hard disk hot spots.

D. There is no write penalty, which overcomes the impact of write penalty on LUN performance in traditional RAID technology.

Correct answer: ABC

Answer analysis: Option D. Since the traditional RAID strategy is still used during the implementation of Huawei's RAID 2.0+ technology, there is a write penalty. The specific write penalty coefficient depends on the RAID strategy selected when configuring the storage pool.

8. Which of the following descriptions of RAID 5 features are correct?

A.RAID5 uses XOR algorithm for verification.

B. RAID5 data reading and writing are performed in stripes.

C. RAID5 can tolerate 2 disk failures.

D.RAID5 has a separate parity disk.

Correct answer: AB

Answer analysis: Option C, because RAID 5 has only one parity bit, so at most one hard disk in the current disk array is allowed to fail; Option D, there is a separate parity disk in RAID 3, and the parity data in RAID 5 is scattered in each disk. in a hard drive.

9. Which of the following descriptions of the IP-SAN storage system are correct?

A.IP SAN storage is a way to implement block-level data storage based on IP networks.

B.IP SAN storage system has the characteristics of easy deployment, high reliability and high scalability

C.IP-SAN storage system greatly saves investment costs and is increasingly widely used, and will gradually replace FC-SAN.

D.IP SAN storage uses the local iSCSI Initiator to establish a SAN network with the iSCSl Target through the IP network.

Correct answer: ABD

Answer analysis: Option A, SAN network is mainly used in block business scenarios;

Option B, IPSAN can directly use the existing TCP/IP network to encapsulate SCSI commands and data into TCP/IP packets, and then transmit them through the IP network. Compared with previous network storage technologies, it solves problems such as openness, capacity, transmission speed, compatibility, and security;

Option C, FC SAN has the characteristics of high scalability, high performance, high availability and easy network deployment. It has better advantages in some specific scenarios such as database services. Therefore, currently, IP SAN will not replace FC SAN. Instead, two storage network architectures coexist.

Option D, when IP SAN actually works, it encapsulates SCSI commands and data into TCP/IP packets and then transmits them through the IP network. The specific workflow is as follows:

(1) The iSCSI system sends a SCSI command by the SCSI adapter.

(2) The command is encapsulated into a TCP/IP packet and sent to the Ethernet network.

(3) The receiver extracts SCSI commands from the TCP/IP packet and performs related operations.

(4) Encapsulate the returned SCSI commands and data into TCP/IP packets and send them back to the sender.

(5) The system extracts data or commands and transmits them back to the SCSl subsystem.

10. Which of the following descriptions about RAID 6 are correct?

A.RAID6 technology includes P+Q and DP

B.RAID6 has double parity.

C. RAID6 can recover data when two member disks fail.

D.RAID6 requires at least 3 disks.

Correct answer: ABC

Answer analysis: Option D. Since RAID 6 adopts horizontal verification and diagonal verification mechanisms based on RAID 5, there are two independent verification data blocks. Therefore, RAID 6 requires at least 3 hard disks to form an array.

Chapter 4: Basics of Network Technology

1. Which layer of the TCP/IP standard model does TCP belong to?

A.Application layer

B. Transport layer

C. Network layer

D. Data link layer

Correct answer: B

Answer analysis: TCP and UDP are both typical protocols of the transport layer in the TCP/IP standard model.

2. To send information from one network or network segment to another network or network segment, which of the following devices must go through?

A.Gateway

B.Switch

C. Firewall

D.Router

Correct answer: A

Answer analysis: As a "gate" connecting two network segments, the gateway is responsible for forwarding information between network segments.

3. Which of the following can be directly assigned to a host port?

A.Network address

B.Broadcast address

C.Host address

Correct answer: C

Answer analysis: Neither network addresses nor broadcast addresses can be allocated to host ports. When calculating the number of available host addresses in a network segment, the two addresses occupied by the network address and broadcast address need to be subtracted.

4. What are the data frame processing behaviors of the switch?

A. Flooding

B.Forward

C. review

D. Discard

Correct answer: ABD

Answer analysis: The data frame processing behaviors of the switch include flooding, forwarding, and discarding.

5. Which of the following examples is the correct way to write the subnet mask?

A.20.9.0.77 255.255.255.0

B.192.168.10.1/33

C.10.1.10.1 255.0.0.0

D.192.168.10.1/24

Correct answer: ACD

Answer analysis: The subnet mask length 33 exceeds the subnet mask range allowed by IPv4.

6. Hosts within a VLAN can communicate directly with each other, but VLANs cannot directly communicate with each other.

Correct answer: Correct

Answer analysis: Normal direct communication can be used between hosts in VLANs; the main function of VLANs is to divide broadcast domains and control the transmission range of broadcast messages, so direct communication between VLANs is not possible.

7. At the data link layer, PDU (communication protocol data unit) is called Packet.

Correct answer: False

Answer analysis: At the data link layer, PDU is called a data frame (frame).

8. The IP address consists of two parts, the network part and the host part.

Correct answer: Correct

Answer analysis: The IP address consists of a network address and a host address. The network address is used to distinguish network segments, and the host address is used to identify the host.

9. In classful addressing, ABC class addresses are used for ()

Correct answer: Assign host usage

Answer analysis: In a classed organization, Class ABC networks are used to allocate hosts, that is, unicast; Class D is used for multicast; Class E is reserved for research.

10. () refers to the unique logical address used to identify the device that sends or receives data packets in the network.

Correct answer: IP address

Answer analysis: IP refers to the unique logical address used to identify the device that sends or receives data packets in the network.

Chapter 5: Operating System Basics
1. What is the default file system type of the openEuler operating system?

A.ext2

B.ext3

C. ext4

D.xfs

Correct answer: C

Answer analysis: The default file system type of the openEuler operating system is ext4.

2. Process control, file read and write operations, file system operations and other controls are usually completed by which of the following layers?

A.Application/Shell

B. Function library

C. System call

D. Kernel

Correct answer: C

Answer analysis: System calls usually perform process control, file read and write operations, file system operations, etc.

3. Which of the following systems is not a Linux operating system?

A.SUSE

B. Solaris

C. Redhat

D. My village

Correct answer: B

Answer analysis: Solaris is a UNIX operating system.

4. Which of the following file directories is the Linux configuration file directory?

A./boot

b./thousand

C./etc

D./media

Correct answer: C

Answer analysis: Configuration files in Linux are stored in the /etc directory by default.

5. Which of the following are features of the Linux operating system?

A.Support multiple platforms

B. Fully compatible with POSIX1.0 standard

C. Single user multi-tasking

D. Free software

Correct answer: ABD

Answer analysis: The description of single-user multitasking is wrong. The correct answer is multi-user multitasking.

6. openEuler is an open source, free Linux distribution platform that supports multiple processor architectures such as x86, ARM, and RISC-V.

Correct answer: Correct

Answer analysis: None

7. GUI is the command line interface. Characterize the user interface, use the keyboard as an input tool, enter commands, options, and parameters to execute the program, pursuing high efficiency.

Correct answer: False

Answer analysis: The question stem describes the CLI command line interface, and the GUI is the graphical interface.

8. Unix is ​​the collective name for Linux-like computer operating systems.

Correct answer: False

Answer analysis: Linux is the collective name for UNIX-like computer operating systems.

9. Use the () command to view all non-hidden files and directories in the root directory.

Correct answer: ls /

Answer analysis: The ls / command can view all non-hidden files and directories in the root directory.

10. Linux inherits the design philosophy of Unix, which is ().

Correct answer: Everything is a file

Answer analysis: The design concept of UNIX is "—everything is a file".

Chapter Six: Introduction to Virtualization Technology

1. At which CPU run level does the user application run?

A.ring0

B. ring1

C.ring2

D.ring3

Correct answer: D

Answer analysis: The command authority level from ring0 to ring3 layers gradually decreases. The ring0 layer runs sensitive instructions, and the ring3 layer runs user applications.

2. Which of the following CPU virtualization methods achieves virtualization by capturing, translating, and simulating sensitive instructions?

A. Paravirtualization

B. Full virtualization

C. Hardware-assisted virtualization

Correct answer: B

Answer analysis: The way to achieve full virtualization is to achieve virtualization by capturing translation simulation sensitive instructions.

3. Which of the following is the "description of partition" in the virtualization features?

A. The entire virtual machine execution environment is encapsulated in a separate file, and the virtual machine can be migrated by moving the file.

B. Isolate multiple virtual machines on a single physical server from each other

C. Run multiple virtual machines simultaneously on a single physical server

D. The virtual machine can run on any server without modification.

Correct answer: C

Answer analysis: The other options are encapsulation, isolation and description independent of hardware.

4. What operating modes will the Linux system have after installing the KVM module?

A.Customer model

B. Kernel mode

C.User mode

D. Free mode

Correct answer: ABC

Answer analysis: After installing KVM on Linux, there are only three operating modes: guest mode, kernel mode and user mode.

5. The Xen platform architecture focuses on security, and the KVM platform architecture focuses on performance.

Correct answer: Correct

Answer analysis: None

6. KVM itself is a Hypervisor.

Correct answer: False

Answer analysis: KVM itself is a kernel module. After Linux installs the KVM module, it is converted into a Hypervisor.

7. The characteristics of virtualization are partitioning, isolation, encapsulation and relative software independence.

Correct answer: False

Answer analysis: The description of "independent relative to software" in the question stem is wrong. The correct answer is "independent relative to hardware".

8. Computer virtualization architecture is divided into two types, namely host virtualization (also called type I) and bare metal virtualization (also called type II).

Correct answer: False

Answer analysis: The description of the question inverts type I and type II virtualization. Host-type virtualization is called type II virtualization, and bare metal virtualization is called type I virtualization.

9. DomU can directly access physical hardware (such as storage and network cards).

Correct answer: False

Answer analysis: Dom0 can directly access the physical hardware. DomU needs to access hardware resources through Dom0.

10. When the number of DomUs is too large, () will become a performance bottleneck.

Correct answer: Dom0

Answer analysis: When there are too many DomUs, because they need to go through Dom0 to access hardware resources, the performance of Dom0 will directly determine the access efficiency of DomUs and become a performance bottleneck.

Chapter 7: Introduction to Huawei Virtualization Platform

1. In FusionCompute’s network planning, which of the following does the network plane include?

A.Storage plane

B.Customer plane

C.BMC plane

D. Management plane

Correct answer: ACD

Answer analysis: The network plane includes the storage plane, BMC plane and management plane.

2. Which of the following are the functions of VRM?

A. Provide elastic computing, storage, IP and other services to external parties through unified management of virtual resources and user data.

B. Manage block storage resources within the cluster

C. Manage computing, storage, and network resources on computing nodes

D. Provide virtual computing functions

Correct answer: AB

Answer analysis: The wrong option describes the function of CNA, which cannot be directly implemented by VRM.

3. Which of the following products are optional in the FusionCompute virtualization suite?

A.FusionCompute

B.FusionCompute Pro

C.eBackup

D.UltraVR

Correct answer: BCD

Answer analysis: FusionCompute is a required component. FusionCompute Pro, eBackup, and UltraVR are optional components.

4. VRM cannot be physically deployed.

Correct answer: False

Answer analysis: VRM can be physically deployed.

5. FusionCompute supports abstracting server physical resources into logical resources, turning CPU, memory, disk, I/O and other hardware into "resource pools" that can be dynamically managed, thereby improving resource utilization and simplifying system management.

Correct answer: Correct

Answer analysis: None

6. CNA can manage the life cycle of virtual machines in the cluster and the distribution and migration of virtual machines on computing nodes.

Correct answer: False

Answer analysis: The question stem describes the VRM management node, not the function of CNA

7. Distributed virtual switch DVS is a physical concept device.

Correct answer: False

Answer analysis: Distributed virtual switch DVS is a logical concept device.

8. When installing a CNA host, if the number of nodes is small, you can choose to manually mount ISOs to install CNA nodes one by one. If the number is large, you can use the FusionCompute installation tool to install host CAN in batches.

Correct answer: Correct

Answer analysis: None

9. The uplink is used to connect the DVS and the physical machine network card.

Correct answer: Correct

Answer analysis: The uplink is the device that connects the distributed switch DVS and the physical network card.

10. When installing the CNA host, you can install the host in batches through () method.

Correct answer: PXE

Answer analysis: To install CNA, you can install hosts in batches through PXE.

Chapter 8: Management and use of Huawei virtualization platform

1. Which of the following types of snapshots does FusionCompute support?

A. Ordinary snapshot

B. Consistency snapshot

C. Database snapshot

D. Memory snapshot

Correct answer: ABD

Answer analysis: FC supports memory snapshots, consistent snapshots and ordinary snapshots, but no database snapshots.

2. Among the rule groups that are one of the characteristics of FC, which of the following are included?

A. Aggregate virtual machines

B. Virtual machine to host

C. Host to virtual machine

D. Mutually exclusive virtual machines

Correct answer: ABD

Answer analysis: In the FC rule group, there are clustered virtual machines, virtual machines to hosts and mutually exclusive virtual machines, but no host to virtual machines.

3. What parts does memory reuse technology consist of?

A. Memory bubble

B. Memory replacement

C. Memory swap

D. Memory sharing

Correct answer: ACD

Answer analysis: Memory reuse technology includes memory bubbles, memory swapping and memory sharing.

4. The object of the security group is the virtual machine network card, and a virtual machine network card can only be added to one security group.

Correct answer: Correct

Answer analysis: None

5. Non-persistent disks, that is, data can be saved permanently. Persistent disk means that the data is not saved permanently.

Correct answer: False

Answer analysis: The description of the question stem is reversed. Persistent disk data can be saved permanently, but non-persistent disk data is not saved permanently.

6. The thin disk will allocate space before writing, and allocate as much space as it uses.

Correct answer: Correct

Answer analysis: None

7. LUN is a storage resource.

Correct answer: False

Answer analysis: LUN is a storage device.

8. () When the disk is created, the size is the same as the virtual disk, and all positions of the file are filled with 0, which takes up a lot of space and takes a long time to provision.

Correct answer: Normal

Answer analysis: When the Jintong disk is created, all space will be allocated immediately and reset to zero, which will occupy a large space and take a long time to prepare.

9. () You can migrate virtual machine disks from one storage to another without interrupting business.

Correct answer: hot migration

Answer analysis: Live migration can migrate the disk of a virtual machine without interrupting business.

10. When creating a virtual machine, you can specify the corresponding CPU QoS based on the CPU performance requirements of the virtual machine's expected deployment business. Different CPU QoS represent different () capabilities of the virtual machine.

Correct answer: Calculate

Answer analysis: CPU QoS can provide different computing capabilities for virtual machines.

Chapter 9: Overview of Desktop Cloud Solution

1. Which of the following devices is included in the cloud operating system management layer?

A.FusionCompute

B.TC

C.FusionAccess

D. Server

Correct answer: A

Answer analysis: The cloud computing system management layer includes FusionCompute, and the BCD option is not a component of the system management layer.

2. Which of the following is not a function of the desktop protocol?

A.2D graphics display technology

B. Voice technology

C. Video display technology

D.Artificial intelligence technology

Correct answer: D

Answer analysis: The current desktop protocol does not have artificial intelligence technology.

3. Which of the following are the shortcomings of traditional PC office use?

A.Data security vulnerability

B. Resource pooling

C. Inflexible curing and low utilization rate

D. The subsequent operation and maintenance expenses are huge

Correct answer: ACD

Answer analysis: Security vulnerabilities, low resource utilization, and high operating costs are the shortcomings of traditional PC offices, but resource pooling is not.

4. Mobile phones are a type of thin terminal.

Correct answer: False

Answer analysis: Mobile phones are not thin terminals.

5. AD/DHCP/DNS are not components of FusionAccess.

Correct answer: False

Answer analysis: AD/DHCP/DNS are components of FusionAccess, but they are third-party components.

6. We can use desktop cloud to replace traditional PCs in ordinary office scenarios, secure office scenarios, cloud workstation scenarios, call centers and other scenarios.

Correct answer: Correct

Answer analysis: None

7. The peripheral redirection technology in the desktop protocol function is divided based on the principle of peripheral technology implementation, and is mainly divided into port redirection and ().

Correct answer: device redirection

Answer analysis: Peripheral redirection is divided into port redirection and device redirection.

8. The HDP protocol provides the ability to support 4K video playback. This ability is to send the audio and video data packets after the original video file () to the client, and the client directly uses the audio and video data packets for decoding and display.

Correct answer: Decapsulation

Answer analysis: HDP's 4K video playback capability is achieved by sending the audio and video data packets after decapsulating the original video file to the client, and the client decodes and displays it.

9. HDP is a new generation cloud access desktop protocol developed by Huawei. It supports up to () virtual channels. Each virtual channel can carry different upper-layer application protocols.

Correct answer: 64

Answer analysis: HDP supports a maximum of 64 virtual channels.

10. After installing HDA on the virtual machine, the desktop information of the virtual machine is sent to the thin client through the () protocol.

Correct answer: HDP

Answer analysis: After installing HDA, the desktop information of the virtual machine is sent to the thin client through the HDP protocol.

Chapter 10: Desktop Cloud Planning and Deployment

1. Regarding the difference between user groups and organizational units OU, which of the following descriptions is wrong?

A. There are no restrictions on the types of objects contained in user groups

B.OU can contain accounts, computers, printers, and shared folders

C.OU and user groups are both objects of Active Directory

D.OU also has the function of group policy

Correct answer: A

Answer analysis: There are restrictions on the types of objects contained in user groups.

2. Regarding the description of groups in AD, which one is incorrect?

A. A user can be a member of many groups

B. A user can only be a member of one group

C. Groups can be nested within other groups

D. Use groups to simplify the assignment of resource permissions

Correct answer: B

Answer analysis: Groups in AD A user can be a member of multiple groups.

3. In FusionAccess, which of the following is not a component of the access and access control layer?

A.vAG

B.WI

C.US

D.ITA

Correct answer: D

Answer analysis: ITA is not an access and access control layer component.

4. In FusionAccess, which of the following components does GaussDB provide database services?

A.WI

B.ITA

C.HDC

D. vAG

Correct answer: B.C.

Answer analysis: GuassDB only provides database services for ITA and HDC in the options.

5. In FusionAccess, which of the following are required components?

A.WI

B.OFF

C.TCM

D.License

Correct answer: AD

Answer analysis: WI and License are required components. They manage user access and user authentication respectively.

6. The domain name system is a distributed database that provides conversion between domain names and IP addresses to facilitate network access.

Correct answer: Correct

Answer analysis: None
7. The smallest management unit of Active Directory (AD) is the organizational unit (OU).

Correct answer: False

Answer analysis: The smallest administrative unit of AD is the domain user.

8. When the used number reaches () times the total number of licenses, new users will not be able to log in to the desktop.

Correct answer: 1.1

Answer analysis: When the number of used licenses reaches 1.1 times the total number of licenses, new users will not be able to log in to the desktop.

9. The main function of the vLB function is to perform load balancing when users access ().

Correct answer: WI

Answer analysis: vLB is a virtual load balancing. Its main function is to perform load balancing when users access the WI.

10. The main functions of () are desktop access gateway and self-service maintenance gateway.

Correct answer: vAG

Answer analysis: vAG is a virtual access gateway. The role of vAG is the desktop access gateway and autonomous maintenance gateway.

Chapter 11: Desktop cloud service provisioning

1. Which of the following desktop group types have "Virtual Machine Group Type" set to "Linked Clone"?

A.Proprietary

B. Dynamic pool

C. Static pool

Correct answer: B.C.

Answer analysis: The virtual machine group type is linked clone and can only be a "pool" mode desktop group.

2. Which of the following is not an advantage of linked clone virtual desktops?

A.Significantly improve management efficiency

B. Fast creation speed

C.Significantly reduce storage costs

D. Have independent CPU memory disk resources

Correct answer: ABC

Answer analysis: Linked clone virtual desktops do not have independent CPU, memory, and disk resources.

3. The "proprietary" distribution mode is often used in scenarios such as call centers.

Correct answer: False

Answer analysis: The correspondence between users and virtual desktops in the "exclusive" allocation mode is 1:1, which is not suitable for call center scenarios.

4. The linked clone parent volume is a read-only volume and is shared by multiple linked clone virtual machines.

Correct answer: Correct

Answer analysis: None

5. "Pool" refers to a group of people sharing a set of virtual machines with personalized data. It is often used in scenarios such as call centers.

Correct answer: False

Answer analysis: "Pool" mode has no personalized data.

6. Compared with complete copying templates, using quick encapsulation templates to provision virtual machines is faster and more efficient. There is an essential difference between complete copying and rapid distribution.

Correct answer: False

Answer analysis: The first half of the question is correct, and the second half is wrong. There is no essential difference between complete copying and rapid distribution.

7. Rapid encapsulation does not use Sysprep encapsulation when making templates, and the template needs to be added to a domain to facilitate rapid distribution.

Correct answer: Correct

Answer analysis: None

8. Linked-clone differential volumes are read-only volumes, and their storage is thinly provisioned. Each linked-clone virtual machine has one copy, which stores the differentiated data of each virtual machine.

Correct answer: False

Answer analysis: The linked clone parent volume is a read-only volume, and the differential volume is a read-write volume.

9. When a user logs in for the first time, a () type desktop group will randomly assign a virtual machine to the user and bind it to the user, and a user can only bind to one virtual machine.

Correct answer: static pool

Answer analysis: The static pool will randomly allocate virtual desktops, and the virtual desktops will be bound to users.

10. The personalized data in the linked clone desktop is stored in ().

Correct answer: differential plate

Answer analysis: The personalized data of the linked clone virtual desktop is stored in the differential disk.

Guess you like

Origin blog.csdn.net/gaogao0305/article/details/134495890