Huawei HCIA-Cloud Service V3.0 Cloud Service Engineer Online Course Chapter Test Questions + Final Test Questions Summary

Chapter test questions:

1. Cloud computing basics

1. (Single-choice question) Which of the following options is not a characteristic of a virtual machine?
A. Partitioning
B. Isolation
C. Encapsulation
D. Depend on hardware

Correct answer: D

2. (Multiple choice question) Which of the following options belong to the service model of cloud computing?
A.laaS
B.PaaS
C.SaaS
D.CaaS

Correct answer: ABC

3. (Multiple choice question) Which of the following descriptions of the characteristics of cloud computing are correct?
A. On-demand self-service
B. Rapid deployment
C. Extensive network access
D. Measurable service

Correct answer: ABCD

4. (True or False) Compared with virtual machines, containers are more lightweight.

Correct answer: Correct

2. Introduction to Huawei Cloud

1. (Single-choice question) Which of the following options does not belong to the delivery model of Huawei Cloud?
A. Private cloud
B .Public Cloud
C. Huawei Cloud Stack
D. Edge Cloud

Correct answer: A

2. (Multiple choice question) Which of the following options are solutions provided by Huawei Cloud?
A. Enterprise cloud migration
B. Industry solutions Solution
C. Universal solution
D. Organizational solution

Correct answer: ABCD

3. (True or False Question) Huawei Cloud’s support and service system mainly includes three categories: novice entry, customer support, and value-added services.

Correct answer: Correct

4. (True or False Question) Users need to select a region to purchase services on Huawei Cloud. The selection of the region mainly considers the geographical location and resource prices.

Correct answer: Correct

3. Getting started with Huawei Cloud operations

1. (Single-choice question) Which of the following descriptions of availability zones AZ is incorrect?
A. An AZ is one or more physical data centers Set
B. An AZ has independent wind, fire, water and electricity
C. AZ can cross regions
D. Logically within AZ Then divide computing, network, storage and other resources into multiple clusters

Correct answer: C

2. (Multiple choice question) Which of the following options belong to the ECS billing method?
A. On-demand billing
B. Bidding calculation Fee
C. Annual/monthly subscription
D. Billed by traffic

Correct answer: ABC

3. (True or False Question) The console is the backend for each user to apply for and manage cloud service resources. Through the cloud service console, we can better manage and control our own resources.
Correct answer: Correct

4. (True or False) IAM is a unified identity authentication service that can help users more securely control access to cloud services and resources.

Correct answer: Correct

4. Computing cloud services

1. (Single choice question) Which of the following options does not belong to the AS creation process?
A. Create a scaling configuration
B. Create a scaling group
C. Create a backend server
D. Create a scaling policy

Correct answer: C

2. (Multiple choice question) Which of the following options belong to the network type of BMS?
A. Virtual private cloud
B. High-speed network a>
C.IB network
D. Custom VLAN network

Correct answer: ABCD

3. (True or False Question) You can use password authentication or key authentication to log in to ECS.
Correct answer: Correct

4. (True or False Question) In order to ensure that the Windows server created using a private image can be configured with customization, it is recommended that users install the Cloud-init tool before creating a private image.

Correct answer: False

5. Network cloud services

1. (True or False Question) When the cloud host in the VPC needs to provide services to the public network, you can use the DNAT function of the NAT gateway.
Correct answer: Correct

2. (Multiple choice question) Which of the following options belong to the algorithm used in load balancing?
A. Polling algorithm
B. Least connections< /span> D. Destination IP algorithm
C. Source IP algorithm

Correct answer: ABC

3. (Multiple choice question) Which of the following options are the advantages of VPN?
A. High security
B. Seamless expansion D. Ready to use
C. Low cost

Correct answer: ABCD

4. (True or False Question) A security group is a logical grouping that provides access policies for elastic cloud servers in the same VPC that have the same security protection requirements and trust each other.

Correct answer: Correct

6. Storage cloud service

1. (Single-choice question) Which of the following options does the object of OBS not include?
A.Key
B.Data< a i=3> C.Metadata D.File

Correct answer: D

2. (Multiple choice question) Which of the following options are key performance indicators of EVS?
A.IOPS
B. Throughput D. Capacity
C.IO read and write latency

Correct answer: ABC

3. (True or False Question) OBS supports permanent AK/SK authentication, and also supports authentication and authentication through temporary AK/SK and securitytoken.

Correct answer: Correct

4. (True or False Question) The SFS file system supports the configuration of multiple VPCs, so that cloud servers belonging to different VPCs can also share access to the same file system
.

Correct answer: Correct

7. More cloud services

1. (Single choice question) Which of the following is not a component of the Document Database Service (DDS) cluster?
A.mongos
B. config
C.schedule
D.shard

Correct answer: C

2. (Multiple choice question) Which of the following options belong to the deployment method of Web Application Firewall (WAF)?
A. Cloud mode
B. Exclusive mode
C. Shared mode
D.ELB mode

Correct answer: ABD

3. (Multiple choice question) Which of the following options belong to the application scenarios of Content Delivery Network (CDN)?
A. Website acceleration
B. On-demand acceleration
C.CPU acceleration
D.Full site acceleration

Correct answer: ABD

4. (True or False Question) Non-relational database refers to a non-relational data storage system that does not guarantee compliance with ACID principles.
Correct answer: Correct

8.Huawei Cloud Operation and Maintenance Basics

1. (Single choice question) Which of the following is not the main function of Cloud Monitoring Service (CES)?
A. Automatic monitoring
B .Log query
C. Monitoring panel
D.OBS dump
Correct answer: B

2. (Multiple choice question) Which of the following items belong to the technical architecture of IT?

A. Monoblock architecture
B. Vertical architecture
C.SOA architecture
D. Microservice architecture

Correct answer: ABCD

3. (True or False Question) The purpose of monitoring is to nip problems in the bud and nip the root causes of all problems in the cradle.
Correct answer: Correct

4. (True or False Question) Each event generated by the cloud audit service will record a resource change and the result of the change. Users can count and trace resource usage based on
these records to better manage their own cloud service resources.
Correct answer: Correct

9. Comprehensive practice

1. (Single choice question) Which of the following options does the SFS configuration process not include?
A. Create a file system
B. Add IP/ Add VPC to the accessible list
C. Create an IAM account
D. Mount the SFS file system

Correct answer: C

2. (Multiple choice question) Which of the following options are configuration items in creating a scaling group?
A. Multi-AZ expansion strategy
B .Maximum/minimum number of instances
C. Expected number of instances
D. Instance removal strategy

Correct answer: ABCD

3. (Multiple choice question) Which of the following options are configuration items in creating a VPN connection?
A. Local subnet
B. Remote End gateway
C. Remote subnet
D. Pre-shared key

Correct answer: ABCD

4. (True or False) Through VPC peering connection, users can use private IP addresses to communicate between two VPCs.
Correct answer: Correct

Final test questions (HCIA-Cloud Service V3.0 mock exam) (the questions and options are out of order):

Multiple choice questions:

1. Which of the following is not a typical application scenario of elastic scaling service AS?
A. Interactive forum
B. Live video website a>
C. E-commerce platform
D. Image processing

Correct answer: D

2. In order to facilitate subsequent security analysis and problem location of cloud resources, a customer dumped cloud audit event files into an OBS bucket. Which of the following storage types is suitable for storing CTS event files? D. High Frequently accessed storage C. Standard storage B. Archive storage
A. Low-frequency access storage


Correct answer: C

3. Which of the following is not the main function of cloud audit service CTS?
A. Recording audit logs
B. Querying audit logs a>
C. Audit log dump
D. Operating system monitoring
Correct answer: D

4. When tenants use relational database services (such as RDS for PostgreSQL), which of the following is not a key performance indicator for monitoring database instances and database engines?
A. Network bandwidth
B.QPS
C.IOPS
D. Number of database connections
Correct answer: A

5. When Huawei Cloud tenants use the object storage service OBS, if they want to retain multiple versions of an object, which of the following methods can be used to achieve this?
A. Enable multiple versions Control
B. Configure life cycle rules
C. Modify storage class
D. Enable log management

Correct answer: A

6. When a virtual machine on a physical host fails, it will not affect other virtual machines on the physical host. Which characteristic of virtualization technology does this belong to?
A. Partition
B. Isolation
C. Encapsulation
D. Independence

Correct answer: B

7. The cloud service purchased by the user only includes the running environment of the application. Which of the following models does this scenario belong to?
A.laaS
B.PaaS
C.SaaS
D.NaaS

Correct answer: B

8. Through the cloud monitoring service CES, a variety of cloud service resources can be monitored. In the following description of host monitoring, which one is wrong?
A. Host monitoring It is divided into basic monitoring and operating system monitoring
B. Basic monitoring is the monitoring indicator automatically reported by ECS
C. Operating system monitoring can provide users with the hardware level of the server , Passive monitoring service
D. Agent needs to be installed when monitoring the operating system of the elastic cloud server

Correct answer: C

9. Cloud hard disk is not suitable for data storage in which of the following application scenarios?
A. Sharing of massive video and picture files
B. Data Warehouse
C. High performance computing
D. Development testing

Correct answer: A

10. Which of the following descriptions of log groups of Huawei Cloud Log Service is wrong?
A. Log groups are the basic unit of log reading and writing
B. The creation types of log groups are divided into user creation (active) and cloud service creation (passive)
C. Log groups can create log streams and set log storage time a>
D. Log group is the basic unit of log management for cloud log service
Correct answer: A

11. On the same host, virtual machine A can ping virtual machine B, but virtual machine B cannot ping virtual machine A. Which of the following reasons may be the cause?
A. The IP address configuration of virtual machine A is wrong
B. The network card type of virtual machine B is wrong
C. The firewall configuration of virtual machine A is wrong
D. The gateway configuration of virtual machine B is incorrect
Correct answer: C

12. The network security isolation function of Huawei Cloud Virtual Private Cloud VPC does not depend on which of the following technologies or equipment?
A. Hardware firewall
B. Software firewall
C. Switch
D. Elastic IP
Correct answer: D

13. In Huawei Cloud, Regions are usually divided according to which of the following?
A. Geographical location and network latency
B. Cluster server
C. Availability Zone (AZ)
D.POD
Correct answer: A

14. When creating a scaling policy in Huawei Cloud Auto Scaling Service, to achieve dynamic expansion of resources, which of the following strategies can be selected?
A. Timing strategy
B. Periodic strategy
C. Alarm strategy
D. Random strategy
Correct answer: C

15. By default, IAM users created by administrators do not have any permissions. Which of the following descriptions of permissions in IAM is wrong?
A. Created IAM Users need to join the user group and grant policies or roles to the user group so that users in the user group can obtain corresponding permissions
B. After IAM user authorization, the user can be authorized based on Permissions to operate cloud services
C.The permissions granted by IAM are divided into roles and policies according to the granularity
D.FullAccess type permissions indicate that in addition to unified identity authentication Except for services, it has read-only permissions for all other services
Correct answer: D

16. Which of the following descriptions of Huawei Cloud Elastic File Service SFS is wrong?
A. SFS is actually NAS file storage
B. Files are stored, and data will be organized and presented in a hierarchical structure of files and folders
C. Supports data sharing
D. Cannot be used alone Use, it is required to mount and use it on the cloud server
Correct answer: D

17. Which of the following is not the type of cloud disk used by elastic cloud servers?
A. General-purpose SSD
B. High lO a>
C. Ultra-high IO
D. Local disk
Correct answer: D

18. Cloud computing is a computing model that provides dynamically scalable virtualized resources as a service through the Internet. Which of the following descriptions of cloud computing is incorrect?< a i=1> A. Cloud computing is not a single technology, but a model B. Users can use resources anytime and anywhere through cloud computing, provided the network is reachable< a i=3> C. Through cloud computing, the resources that users can use include networks, servers, storage, applications and services, etc. D. Cloud computing resources can be quickly supplied and released, which reflects the pressure of cloud computing. Features that require self-serviceCorrect answer: D




19. Which of the following does the main function of Huawei Cloud Web Application Firewall WAF not include?
A. Web page tampering prevention
B. Elastic cloud Server brute force cracking protection
C. Website anti-crawler
D. Prevention of sensitive information leakage
Correct answer: B

20. The user deployed an elastic cloud server ECS instance on Huawei Cloud and deployed service A on it. When service A no longer needs to provide services, the user plans to deploy service B on the ECS that is different from the operating system used by service A. At this time, the system disk of the ECS needs to be replaced. So during the process of performing this operation, which of the following is wrong?
A. After replacing the system disk, the IP address of the elastic cloud server ECS will change
B. After replacing the system disk, the snapshot of the existing system disk and the data on it will be lost
C. When replacing the system disk, you can choose a private image or a public image
D. If there is a data disk, if the Windows system is replaced by a Linux system, since Linux cannot recognize the NTFS format by default, separate recognition software needs to be installed

Correct answer: A

Multiple choice questions:

21. Which of the following security policies should be followed when using the unified identity authentication service IAM?
A. Set a strong password policy on the IAM console
B .Regularly modify identity credentials and set password validity policies
C. Enable virtual MFA function
D. Others who want to access the resources in the user's Huawei Cloud account can The account is temporarily shared, and the password is changed immediately after sharing
Correct answer: ABC

22. Each region of Huawei Cloud corresponds to a project by default. This project is preset by the system to isolate resources between physical regions. IAM users can access all resources in the region in the user account. The following is about the project Which items are correct in the description?
A. Subprojects can be created in the project to make resource permission control more precise
B. Resources in the project Can be transferred
C. Projects can be created across regions
D. Cross-account resource operation and authorization

Correct answer: AD

23. Which of the following scenarios is suitable for object storage?
A. Mass storage resource pool
B. Static website hosting
C. Big data storage
D. Archiving
Correct answer: ABCD

24. In Huawei Cloud, which of the following reasons may cause the file system to fail to mount?
A. The file system capacity is too large
B. The file system has been deleted
C. The share path input in the mount command is incorrect
D. The DNS used to access the file system is incorrect
Correct answer: BCD

25. Which of the following descriptions of CDN are incorrect?
A. CDN is a layer of intelligent virtual network built on the existing Internet
B. By deploying node servers throughout the network, the origin content can be distributed to specific CDN nodes, allowing users to obtain the highest quality content
C. CDN services can be improved The usage efficiency of cloud servers such as ECS cannot improve the response speed and availability of the website for users to access the website
D. CDN service solves the problems of small network bandwidth, large user visits, and uneven distribution of outlets.
Correct answer: BC

26. Compared with SAN, which of the following items are the advantages of NAS?
A.NAS has an independent file system
B.NAS support Multiple protocols and operating systems
C. Optimized for block data transfer
D. Optimized for file sharing
Correct answer: ABD

27. Which of the following services can realize interconnection between the VPC internal network and the external network?
A.ELB
B. Elastic IP< a i=3> C.VPN D.NAT GatewayCorrect answer: BCD


28. Which of the following descriptions of public network NAT gateways are correct?
A. A VPC can only be associated with one NAT gateway
B. Multiple rules under the same NAT gateway can reuse the same elastic public IP
C. SNAT and DNAT can share the same elastic public IP, saving elastic public IP resources< /span>Correct answer: BC
D. Multiple SNAT rules can be added to each subnet in the VPC

29. Which of the following cloud services can Huawei Cloud Monitoring monitor?
A. Virtual private cloud
B. Elastic cloud server< a i=3> C. Auto-scaling D. Cloud diskCorrect answer: ABCD


30. Which of the following descriptions of cloud computing resource pooling features are incorrect?
A. Cloud computing resource pooling features can shield small-scale location differences between similar resources
B. The resource pooling feature of cloud computing can put CPU and hard disk into the same resource pool.
C. The resource pooling feature of cloud computing can realize extensive network Prerequisite for access
D. Cloud computing resource pooling is the prerequisite for virtualization
Correct answer: BCD

31. Which of the following descriptions of Cloud Container Engine CCE are correct?
A. Create a Kubernetes cluster with one click through the console interface
B. Adopt bare metal NUMA architecture and high-speed LB network card
C. Fully compatible with Kubernetes APl and Kubectl
D. The cluster control plane supports 3 Masters with high HA Available
Correct answer: ABCD

32. Which of the following descriptions of the advantages of elastic scaling service AS are correct?
A. Dynamically adjustable resources
B. It can improve business fault tolerance
C. It can improve system security
D. It can simplify business operation complexity
Correct answer: ABD

33. What are the ways to interconnect the private network segment of the local data center (IDC) and the VPC subnet segment of Huawei Cloud?
A. Establish a peering connectionCorrect answer: BD D. Establish a virtual private network C. Apply for an elastic public IP
B. Establish a cloud dedicated line


34. Which of the following descriptions about cloud disk backup are wrong?
A. Cloud disk supports online backup, and the cloud server needs to be shut down during the backup process< a i=2> B. Cloud disk backup supports both manual backup and automatic backup C. The backup data of cloud disk is stored together with the data of cloud disk itself D. Supports restoring backup to cloud disk, and also supports creating new cloud disk through backupCorrect answer: AC



35. Which of the following components does Huawei Cloud security service system include?
A. Network security
B. Application security
C. Data security
D. Computing security and security management
Correct answer: ABCD

True or False:

36. Huawei Cloud Object Storage Service OBS has no limit on storage capacity and number of objects.
Correct answer: Correct

37. Huawei Cloud elastic cloud server ECS supports cross-account and cross-region online migration.

Correct answer: False

38. Cloud servers with different operating systems cannot be added to the same elastic load balancing backend server group.

Correct answer: False

39. Huawei Cloud CDN supports both public network-oriented resource acceleration and intranet acceleration.

Correct answer: False

40. By configuring security group rules in Huawei Cloud, you can prevent two elastic cloud servers located in the same VPC from communicating with each other.

Correct answer: Correct

41. Huawei Cloud SFS Turbo supports offline IDC access through cloud dedicated lines, VPN and cloud connections.

Correct answer: Correct

42. Log data on Huawei Cloud supports automatic cleaning when it expires, and administrators can also manually delete logs in log groups.

Correct answer: False

43. Huawei's public cloud peering connection service supports cross-tenant applications in the same region for peering connection services. However, after the local configuration is completed, it must wait for the consent of the peer tenant before it can take effect.

Correct answer: Correct

44. IP SAN has an independent file system. After the application server accesses IP SAN through the network sharing protocol, it can read and write files in the file system.

Correct answer: False

45. In order to remotely connect to the elastic cloud server installed with Windows operating system through remote desktop RDP in Huawei Cloud, port 3389 needs to be opened in the security group inbound direction.

Correct answer: Correct

46. ​​Huawei Cloud Database RDS has a database backup function that automatically backs up data every day and uploads it to the cloud hard disk.

Correct answer: Correct

47. On Huawei Cloud, after a tenant applies for an elastic cloud server, its specifications can be adjusted subsequently.

Correct answer: Correct

48. In Huawei Cloud, the same elastic file service SFS file system can be mounted to multiple cloud servers at the same time.

Correct answer: Correct

49. Elastic load balancing automatically distributes access traffic to multiple cloud servers, expanding the external service capabilities of the application system and improving application security.

Correct answer: False

50. Logs can complete the operation and maintenance of the entire life cycle of network, server and other equipment and services.

Correct answer: False

51. Cloud audit service CTS is a paid service. The paid items include related fees such as opening a tracker, event tracking, and storage and retrieval of events within 7 days.

Correct answer: False

52. Rapid elastic scaling includes many types. In addition to manual expansion or reduction, Huawei Cloud also supports automatic expansion or reduction according to preset policies. Scaling can increase or decrease the number of servers or a single server. Add or reduce resources.

Correct answer: Correct

53. In personal or small-scale virtualization, some virtual machines are bound to physical network cards in a bridging manner. Bridging usually uses a network bridge, which has two important functions, namely route learning and packet forwarding.

Correct answer: False

54. The scaling bandwidth policy of the elastic scaling service AS in Huawei Cloud only supports alarm policies and timing policies.
Correct answer: Wrong

55. It is known that a total of 6,000 access requests are currently distributed to the customer's 10 elastic cloud server ECS through elastic load balancing ELB, and each ECS handles 600 requests. When the customer increases the number of ECSs in the backend server group to 20 through the Auto Scaling AS service and the number of access requests is still 6,000, each ECS needs to handle 600 requests.

Correct answer: False

Fill in the blanks:

56. Document database service DDS provides three deployment methods: cluster, replica set and ().
Correct answer: single node

57. Through network technology (), different network segments in the network can be divided into different broadcast domains, so that hosts in the same network segment can communicate with each other, but hosts in different network segments cannot communicate by default. (please fill in the abbreviation)

Correct answer: VLAN

58. Through (), users can record operational events related to ECS, OBS, and SFS to facilitate future inquiries, audits, and backtracking. (Please fill in the English abbreviation of the Huawei Cloud service)

Correct answer: CTS

59. All data in Huawei Cloud's object storage OBS is in buckets. When a bucket policy is set to () permission, it means that the OBS bucket only allows other users to access objects belonging to this bucket.

Correct answer: public reading

60. An enterprise has a self-built large-scale data center with business scope covering multiple countries and cities. In order to cope with digital transformation, improve data center resource utilization, achieve separation of computing and data, share capabilities, and reduce business online time, it also needs to have the ability to cope with The disaster capability determines the enterprise cloud transformation. Under this requirement, enterprises can choose the () deployment mode.

Correct answer: hybrid cloud

Guess you like

Origin blog.csdn.net/gaogao0305/article/details/134383914