Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

H13-527-ENU Huawei HCIP Cloud Computing V4.0 exam dumps questions are
the best material for you to test all the related Huawei exam topics. By using the
H13-527-ENU exam dumps questions and practicing your skills, you can
increase your confidence and chances of passing the H13-527-ENU exam.
Features of Dumpsinfo’s products
Instant Download
Free Update in 3 Months
Money back guarantee
PDF and Software
24/7 Customer Support
Besides, Dumpsinfo also provides unlimited access. You can get all
Dumpsinfo files at lowest price.
Huawei HCIP Cloud Computing V4.0 H13-527-ENU exam free dumps
questions are available below for you to study. 
Full version: H13-527-ENU Exam Dumps Questions
1. Which of the following aspects is the essence of virtualization embodied in? (Multiple choice)
A. Partition
B. Isolation
C. Package
D. Relatively independent of hardware
Answer: ABCD
2. When a user's virtual machine fails and cannot log in to the virtual machine through the HDP
protocol, which component needs to be installed to log in to the virtual machine using the self-
maintenance console for self-maintenance.
A. vLB
B. vAG
 1 / 24
https://www.dumpsinfo.com/unlimited-access/
https://www.dumpsinfo.com/exam/h13-527-enu
C. WI
D. HDC
Answer: B
3. In a complete FusionAccess desktop login and connection process, the AD component was
accessed ____ times in total.
Answer: 3
4. Which of the following are the mainstream desktop cloud protocols? (Multiple choice)
A. HDP
B. RDP
C. ICA
D. SIP
Answer: ABC
5. In the FusionAccess system, each virtual machine group can only have virtual machines issued by
the same type of template.
A. TRUE
B. FALSE
Answer: B
6. Virtual machine desktops using GPU pass-through technology will lose features such as hot
migration and HA.
A. TRUE
B. FALSE
Answer: A
7. Regarding the FusionAccess administrator fault location method, which of the following statements
is wrong?
A. Check the login information on the management interface and find the person responsible for the
failure
B. Check whether the monitoring information is normal in the management interface
C. Check whether the data configuration is correct in the management interface
D. Query the operation log and analyze whether there are errors in the operation process
Answer: A
8. In the process of creating and associating desktop virtual machines, which components are
required to cooperate to complete the provision of virtual desktops? (Multiple choice)
A. GaussDB
B. HDC
C. WI
D. ITA
Answer: ABCD
9. In the process of implementing remote screen display on Huawei Desktop Cloud, the cloud desktop
 2 / 24
https://www.dumpsinfo.com/
operating system interacts with the graphics card through TC, intercepts the screen display content,
and transmits it to the remote terminal graphics card
A. TRUE
B. FALSE
Answer: B
10. Regarding Huawei FusionSphere Virtualization Suite, which of the following description is
incorrect? (Multiple choice)
A. Huawei FusionSphere Virtualization Suite is an industry-leading virtualization solution that can
greatly improve the efficiency of data center infrastructure.
B. Huawei FusionSphere only has virtualization functions, which can realize server computing,
storage, and network virtualization.
C. Huawei FusionSphere is open-source compatible.
D. Huawei FusionSphere can connect to third-party management platforms.
Answer: BC
11. Three single-disk virtual machines share a data storage capacity of 10GB. Which of the following
situations may occur? (Multiple choice)
A. The virtual machine disk sizes are: 3GB, 4GB, 12GB
B. The virtual machine disk sizes are: 4GB, 3GB, 5GB, and the data storage uses non-virtualized
types
C. The disk sizes of the virtual machine are: 8GB, 9GB, and 7GB.
D. The actual space occupied by the virtual machine disks are: 4GB, 3GB, and 5GB.
Answer: AC
12. Which statement is wrong about the snapshot management operation below?
A. Can create snapshot
B. Can delete snapshots
C. Can clone snapshots
D. Can roll back the snapshot
Answer: C
13. In FusionAccess, which of the following functions are supported by the Huawei vDesk tool that
comes with the virtual desktop? (Multiple choice)
A. One-click inspection/optimization
B. Automatic repair
C. System acceleration
D. Log collection
Answer: ABCD
14. Which of the following are the nursing items of Huawei's VIP desktop real-time nursing strategy?
(Multiple choice)
A. CPU usage exceeds 80%
B. Virtual machine shutdown
C. The virtual machine registration status is abnormal
D. The data disk usage rate exceeds 80%
Answer: ABC
 3 / 24
https://www.dumpsinfo.com/
15. The FusionCompute distributed switch is a virtual switch with a function similar to a three-layer
physical switch. It connects to virtual machines through port groups and connects to physical
networks through uplinks.
A. TRUE
B. FALSE
Answer: B
16. In the virtual machine registration process of FusionAccess, if the HDC information read by the
virtual machine from the registry cannot be parsed. It may be caused by the exception of the _______
service.
Answer: DNS
17. In the desktop cloud system, what are the correct steps to make a template?
? Create a virtual machine
? Install operating system patches and application software
? Use tools to make templates
? Install the operating system and Tools
A. 1324
B. 1423
C. 1342
D. 1432
Answer: B
18. In FusionAccess, in order to support more advanced features, when deploying vAG/rLB
components, it is recommended to use "virtualized" shared data storage.
A. TRUE
B. FALSE
Answer: A
19. In FusionAccess, users can better manage virtual machine desktops by configuring desktop
policies.
Which of the following descriptions of the desktop strategy are correct? (Multiple choice)
A. Users can create custom strategies
B. After the policy configuration is completed, it can take effect immediately
C. After the policy configuration is completed, it will take effect the next time the user logs in to the
virtual machine
D. The strategy supports setting different priorities
Answer: CD
20. In FusionAccess, the administrator logs in to the ITA/GaussDB/HDC/wI/License virtual machine
through VNC and enters the () command to enter the FusionAccess installation interface and install
the ITA/GaussDB/HDC/WI/Li cense component.
Answer: StartTools
 4 / 24
https://www.dumpsinfo.com/
21. The FusionAccess system administrator reclaims dynamic multi-user desktops whose desktop
group type is a static pool. Which of the following steps is not involved?
A. Delete users on the desktop virtual machine
B. Delete the desktop virtual machine
C. Delete the user from the user group in AD
D. Desktop virtual machine deallocation
Answer: A
22. After FusionCompute sets HA resource reservation, when the cluster resources are extremely
tight, the reserved resources will be preferentially allocated to virtual machines to ensure the normal
operation of the business.
A. TRUE
B. FALSE
Answer: B
23. Its FusionAecess system administrator needs to distribute several virtual machine desktops, and
multiple users are allowed to use and bind together, so when the administrator distributes virtual
machine desktops, the allocation type can be selected as " static pool ".
A. TRUE
B. FALSE
Answer: A
24. Which of the following description of the load sharing algorithm based on source and destination
IP and port is correct?
A. This mode is generally used in scenarios where most of the network flow is inside the Layer 2
network. At this time, the network flow can be evenly hashed by MAC.
B. This mode has high reliability, but the network flow will only be shared by one network card, and
the other network card serves as a backup.
C. When there are IP and port in the message, use the source and destination IP, port and MAC for
load sharing; when the message has only an IP address, use the IP address and MAC for load
sharing, when the message has only a MAC address, Use MAC address for loadsharing.
D. This mode enables the network stream to be sent to each network port completely and evenly, but
large messages may be out of order.
Answer: C
25. Regarding the IDV desktop cloud architecture, which of the following descriptions is wrong?
A. When managing large-scale terminals, a dedicated server is required to centrally manage terminal
mirroring.
B. Can work offline without being affected by the network.
C. Introducing local virtual desktops, the terminal complexity is relatively high.
D. The calculation is performed on the terminal, and the data is stored in the cloud.
Answer: B
26. What network planes need to be planned for the FusionCompute system?
A. Management plane
B. Storage plane
C. Business plane
 5 / 24
https://www.dumpsinfo.com/
D. BMC network plane
Answer: ABCD
27. In FusionCompute, the disk bus type created on the data storage mapped by the raw device can
only be virtio or IDE.
A. TRUE
B. FALSE
Answer: B
28. What is the wrong correspondence between the storage model and the actual object in
FusionCompute?
A. FusionStorage is a storage resource.
B. OceanStor V5 is a storage resource.
C. Shared folders are data storage.
D. LUN is a storage device.
Answer: D
29. Generally () pair of vLB can meet the performance requirements of a desktop cloud site.
Answer: 1
30. Regarding the description of the HDP voice technology implementation process, which of the
following is correct? (Multiple choice)
A. Audio is very sensitive to delay, so the process implemented by HDP voice technology must strictly
control the audio delay.
B. In the playback stage, the audio driver will receive the audio data sent by the Windows audio
subsystem, and directly transmit it to the desktop cloud client for playback without compression.
C. The desktop cloud server can implement an audio driver in the virtual machine, and the audio
driver will interact with the audio subsystem of Windows.
D. In the recording stage, the desktop cloud client will obtain the local recording data, compress the
data and transmit it to the desktop cloud server, and the server will decode it and return it to the
Windows audio subsystem by the audio driver.
Answer: ACD
31. With the rapid development of informatization, a certain university installed and deployed a set of
Huawei FusionAccess desktop cloud in the electronic reading room. Based on the above intentions,
which of the following descriptions are correct? (Multiple choice)
A. It is recommended to select the "dynamic pool" type for the virtual machine desktop group in the
electronic reading room
B. The virtual machine desktop of the electronic reading room is recommended to select "linkage
reduction"
C. It is recommended to select "Complete Copy" for the virtual machine desktop of the electronic
reading room
D. It is recommended to select "proprietary" type for the virtual machine desktop group of the
electronic reading room.
Answer: AB
 6 / 24
https://www.dumpsinfo.com/
32. When the FusionCompute deployment mode is the separation of three members, the system
super administrator account is admin.
A. TRUE
B. FALSE
Answer: B
33. On AD, sub-OUs can be created for OUs according to the organizational structure of the
company.
A. TRUE
B. FALSE
Answer: A
34. In the FusionCompute system, which of the following descriptions about snapshots is incorrect?
A. After checking "Memory Snapshot" and clicking "OK", the snapshot will save the data in the
memory when you click "OK".
B. When creating a disk snapshot, the system will save the currently unsaved cache data of the
virtual machine before creating the snapshot.
C. When the virtual machine is in the stopped state, "memory snapshots" and "consistent snapshots"
cannot be created, but disk snapshots can be created.
D. When the virtual machine is hibernated, "memory snapshot" is checked by default.
Answer: B
35. In FusionAccess, the desktop allocation method of "single user" and "static pool", the difference
between the two is that the "static pool" is bound to the virtual machine when the user first checks,
while the "single user" is distributed the virtual machine is bound to the user.
A. TRUE
B. FALSE
Answer: A
36. What is the hierarchical structure of DNS domain names?
A. Top level domain C second level domain - subdomain - host
B. Root domain C top level domain C second level domain - subdomain - host
C. Root domain C top level domain - second level domain - third level domain - subdomain C host
D. Root domain - second level domain - subdomain - host
Answer: B
37.What are the ways to create a virtual machine on FusionCompute? (Multiple choice)
A. Convert the template to a virtual machine
B. Use templates to deploy virtual machines
C. The virtual machine is cloned as a virtual machine
D. Import the virtual machine
Answer: ABCD
38. A company needs to build a FusionCompute system with 200 servers. Which method is
recommended?
A. VRH adopts physical deployment, manual installation of CNA and VRM.
 7 / 24
https://www.dumpsinfo.com/
B. VRM adopts virtualization deployment, tools install CNA and install VM.
C. VRM adopts virtualization deployment, manual installation of CNA, and tool installation of VM.
D. VRM adopts physical deployment, tool installation CNA, manual installation of VM.
Answer: D
39. Which of the following is not a high-risk operation of the Huawei desktop cloud system?
A. Disable virtual machine network card
B. Modify the time of infrastructure components
C. Enable the virtual machine firewall
D. Modify the IP of the infrastructure virtual machine
Answer: C
40. In the FusionCompute system, which of the following description of virtualized antivirus are
correct? (Multiple choice)
A. When using the FusionCompute virtualized antivirus function, the security service virtual machine
does not support generating memory snapshots.
B. When using the FusionCompute virtualized antivirus function, the security service virtual machine
supports the generation of memory snapshots.
C. Each host deploys a security service virtual machine.
D. Each host can be configured with multiple secure user virtual machines.
Answer: AC
41. Regarding the difference between user group and organizational unit OU, which of the following
descriptions is correct? (Multiple choice)
A. Both OU and user group are objects of AD.
B. Both OU and user groups can configure group policies.
C. The user group can only contain account types of object types.
D. The OU can contain object types such as accounts, computers, printers, and shared folders.
Answer: ACD
42. Before creating a FusionCare information collection task, you must ensure that the client time,
FusionCare server time, and the machine time of the collected node are consistent, otherwise,
abnormal information collection may occur.
A. TRUE
B. FALSE
Answer: A
43. Which of the following descriptions of the memory reuse features of FusionCompute is wrong?
A. After the host memory reuse is turned off, the memory size of all virtual machines running on each
host is not greater than the actual available physical memory used by the virtual machines.
B. Turning off host memory reuse requires that the memory reuse rate of all hosts in the cluster is
less than or equal to 150%
C. After setting the host memory reuse, the total number of virtual machine memory created on the
host can exceed the physical memory to increase the machine's virtual machine density
D. After the host memory reuse is enabled, the specific memory reuse degree of the virtual machine
can be controlled through the virtual machine memory qos setting.
Answer: B
 8 / 24
https://www.dumpsinfo.com/
44. In Huawei Desktop Cloud, what are the main factors affecting VM density? (Multiple choice)
A. QoS
B. Server load
C. Load balancing
D. Memory size
Answer: ABCD
45. The FusionAcces system administrator reclaims the dynamic multi-users whose desktop group
type is dynamic pool, and only needs to delete the userfrom the user group in Ad.
A. TRUE
B. FALSE
Answer: B
46. In FusionAccess, after modifying the application policy of the virtual machine desktop, the user
must log in to the virtual machine again to take effect.
A. TRUE
B. FALSE
Answer: B
47. After adopting FusionCompute virtualization, server resource utilization can be greatly improved,
thereby improving server performance.
A. TRUE
B. FALSE
Answer: A
48. If Tools are not installed on the virtual machine, FusionCompute cannot query the memory usage
of the virtual machine.
A. TRUE
B. FALSE
Answer: A
49. On the one hand, FusionCompute distributed virtual switches can configure, manage, and monitor
the virtual switches of multiple servers. On the other hand, it can also ensure the consistency of
network configuration when virtual machines are migrated between servers.
A. TRUE
B. FALSE
Answer: A
50. In FusionAccess, the AD group policy is a very important configuration in the deployment and
operation and maintenance links. Both () and domain can set group policies. (Fill in the English
abbreviation)
Answer: OU
 9 / 24
https://www.dumpsinfo.com/
51. After a user moves to a new OU, the permission settings granted to the user will not change.
A. TRUE
B. FALSE
Answer: A
52. Non-uniform Memory Architecture, a distributed memory access method in which the processor
can access different memory addresses at the same time, greatly improving parallelism.
A. TRUE
B. FALSE
Answer: B
53. In FusionAccess, when the business plane of the virtual machine cannot communicate with the
TC network plane, the virtual machine needs to add a third network card that communicates with the
TC network plane in addition to the business plane network card and the management plane network
card.
A. TRUE
B. FALSE
Answer: A
54. In FusionCompute, which of the following options is not included in the startup method of a virtual
machine?
A. Hard disk startup
B. Network startup
C. Local startup
D. CD-ROM startup
Answer: C
55. Which state of the virtual machine can be used to restore the system? (Multiple choice)
A. Linked clone virtual machines whose "running status" is “running", "allocation status" is "allocated",
and "login status" is not "in use"
B. Linked clone virtual machines whose "running status" is "stopped", "allocation status" is "allocated",
and "login status" is "in use"
C. Fully replicated virtual machines whose "running status" is "running", "allocation status" is
"allocated", and "login status" is not "in use"
D. Linked clone virtual machines whose "running status" is "stopped", "allocation status" is
"allocated", and "login status" is not "in use"
Answer: AD
56. In FusionAccess, when ITA/GaussDB/HDC/WI/License virtual machines are deployed in active
and standby mode and deployed together, the two virtual machines must be located on different CNA
nodes.
A. TRUE
B. FALSE
Answer: B
57. An existing virtual machine needs to deploy a certain service, and the service I/O is random small
 10 / 24
https://www.dumpsinfo.com/
I/O, which requires relatively high IOPS. Virtual machine is recommended to use () disk.
Answer: ordinary
58. In Huawei Desktop Cloud, when configuring the DHCP service after installing DHCP, which of the
following items need to be configured? (Multiple choice)
A. Default gateway
B. IP address range
C. AD server service plane address
D. Domain name
Answer: AB
59. In the process of making FusionAccess full copy virtual machine template, you need to use the
_______ tool for system packaging. (Fill in English)
Answer: Sysprep
60. When using Huawei Desktop Cloud, you can enter the cloud server address in the IE browser and
log in to the virtual desktop for use. Which login method is this method?
A. Soft terminal
B. Thin terminal
C. Fat terminal
D. Hard terminal
Answer: A
61. In the HUAWEI desktop cloud system, which of the following descriptions is incorrect? (Multiple
choice)
A. When the desktop group type is a dedicated single user, after the quick provisioning is completed,
a new user can be added to the virtual machine.
B. When the desktop group type is static pool, when the user logs in again after disconnecting from
the virtual machine, he may log in to another virtual machine
C. When the desktop group type is dynamic pool, the user may log in to another virtual machine after
disconnecting from the virtual machine and logging in again.
D. When the desktop group type is a virtual machine of a dynamic pool, the system will be restarted
and restored by default.
Answer: AB
62. About FusionCompute data stored description, which is correct?
A. Each storage device must create a data storage before it can be used.
B. Virtual machine files and snapshots are stored in data storage.
C. Each host uses independent data storage.
D. With the help of storage thin provisioning technology, data storage can have a larger capacity than
storage devices.
Answer: A
63. When creating a desktop group in the FusionAccess system, when the desktop group type is
proprietary, the optional virtual machine type can only be a full copy.
A. TRUE
 11 / 24
https://www.dumpsinfo.com/
B. FALSE
Answer: B
64. FusionAccess supports the full replication virtual mechanism that has been issued as a full
replication virtual machine template, and match the operation sequence to its operations.
Answer:
65. In the Huawei desktop cloud system, the correspondence between virtual machine groups and
desktop groups cannot be:
A. Virtual machine (complete copy) - Group Type Desktop (dynamic pool)
 12 / 24
https://www.dumpsinfo.com/
B. virtual machines (linked clone) - Desktop group type (static pool)
C. virtual machines (complete copy) - the desktop group type (proprietary)
D. virtual machines (linked clone) - Desktop group type (proprietary)
Answer: D
66. In FusionCompute, for the network card of a running virtual machine, which of the following
operations cannot be performed?
A. Modify NAC
B. Modify the port group
C. Set the network card speed limit
D. Remove the network card
Answer: A
67. Which component of the load balance can be achieved by deploying vLB components?
A. lTA
B. HDC
C. WI
D. vAG
Answer: C
68. The administrator finds that there may be a problem with the ITA of the Huawei desktop cloud
system, and tries to make progress diagnosis by collecting logs. Then, which one of the following
software should he use for this task?
A. HDA
B. FALSEusionCare
C. vDesk
D. vTools
Answer: B
69. A user needs to use a virtual face with 0penGL2.1 and 3D9 graphics processing capabilities for
work, so what does he need to apply to the administrator?
A. GPU virtual desktop
B. Completely copy the virtual desktop
C. Full memory virtual desktop
D. Link clone virtual desktop
Answer: A
70. During VRM single-node virtualization deployment, the FusionCompute page cannot be opened,
and restarting the VRM virtual machine in CNA cannot be resolved. What are the possible reasons?
(Multiple choice)
A. License not loaded
B. Abnormal power off
C. Host RAID card failure
D. The VRM file system is damaged
Answer: CD
 13 / 24
https://www.dumpsinfo.com/
71. In FusionComoute, when adding a network card to a virtual machine, the number of queues
cannot exceed the current number of vCPU of the virtual machine.
A. TRUE
B. FALSE
Answer: A
72. During the O&M process of FusionAccess., O&M personnel need to analyze and locate the fault
phenomenon, and match the following fault symptoms to their possible causes.
Answer:
73. Which of the following operations should be performed on the desktop virtual machine, the virtual
machine needs to be restarted to take effect?
A. Modify the desktop virtual machine specifications
B. Add desktop virtual machine users
C. Set the desktop virtual machine policy
 14 / 24
https://www.dumpsinfo.com/
D. Take a snapshot of the desktop virtual machine
Answer: A
74. In the FusionAccess system, if the localbackup mode is configured, the system will automatically
backup at what time of day by default?
A. 01:00
B. 02:00
C. 03:00
D. 08:00
Answer: C
75. In FusionCompute, which of the following descriptions of CPU manual binding are correct?
(Multiple choice)
A. Bind NUMA Node, vCPU is bound to all available physical CPUs on the specified NUMA node.
B. Binding physical CPU (precise), pecify the binding relationship between each vCPU and the
physical CPU, and fine-tune the binding relationship
C. CPU used by emulator, bind the physical CPU used by the qemu main process.
D. Bind physical CPU (range), all vCPUs are bound to the same physical CPU bitmap.
Answer: ABCD
76. What are the functions of CNA in FusionCompute? (Multiple choice)
A. Manage the life cycle of virtual machines in the cluster and the distribution and migration of virtual
machines on computing nodes.
B. Manage computing, storage, and network resources on computing nodes.
C. Provide virtual computing functions.
D. Manage virtual machines on compute nodes.
Answer: BCD
77. Regarding AD backup, which of the following descriptions is incorrect?
A. It is necessary to set "Whether to enable backup" to " Yes " in FusionAccess " System
Management >Initial Configuration >Domain /O U".
B. The backup path needs to be configured on the AD server.
C. AD information needs to be configured in the " Alarm Component " of FusionAccess.
D. Need to install a monitoring agent on the AD server.
Answer: C
78. What is the order of making a complete copy template for Huawei Desktop Cloud?
A. Create a bare virtual machine > install the operating system > configure the operating system >
package template > convert the virtual machine into a template > configure a template
B. Create a bare virtual machine > install the operating system > join the domain > configure the
operating system > package template > convert the virtual machine into a template > configure a
template
C. Create a bare virtual machine > install the operating system > configure the operating system >
package template > join the domain > convert the virtual machine into a template > configure the
template
D. Create a bare virtual machine > install the operating system > configure the operating system >
join the domain > encapsulate the template > convert the virtual machine into a template > configure
 15 / 24
https://www.dumpsinfo.com/
the template
Answer: A
79. In the Huawei desktop cloud system, which of the following may be caused by the failure of
desktop virtual machine registration? (Multiple choice)
A. The network status between the virtual machine and HDC is abnormal.
B. The configuration information of the forward lookup zone in the DNS server is modified.
C. The time between the two HDC servers is not synchronized.
D. The DHCP component is abnormal.
Answer: ABCD
80. In FusionAccess, in order to support more advanced features and deploy vAG/vLB components, it
is recommended to use "virtualized" shared data storage.
A. TRUE
B. FALSE
Answer: A
81. Regarding the description of the user logging in to the virtual machine, which of the following is
wrong?
A. The user virtual machine synchronizes information from the city controller. It can be synchronized
when the user logs in, or it can be forcibly synchronized through AD.
B. When a user logs in to a desktop virtual machine using a non-domain account VNC, the system
will compare the account information stored in the virtual machine database with the information
provided by the user.
C. When a user logs in to a desktop virtual machine using a domain account, the system will compare
the account information stored in the domain controller database with the information provided by the
user.
D. When a user uses a domain account to log in to the desktop virtual machine, WI will authenticate
the user information to the AD.
Answer: B
82. What is the value of storage hot migration characteristics? (Multiple choice)
A. It can achieve load balancing of storage resources.
B. Provide basic capabilities for storage dynamic resource scheduling.
C. The storage soft and hard disk can be upgraded without interrupting the business.
D. Support the thin disk to be changed to a normal disk after migration to improve the performance of
the virtual machine disk.
Answer: ABCD
83. In the cloud desktop solution, compared to the fast-packaging template, using a complete copy
template to issue virtual machines is faster and more efficient.
A. TRUE
B. FALSE
Answer: B
84. Only the allocated full copy and linked clone virtual machines can be upgraded to VIP desktops.
 16 / 24
https://www.dumpsinfo.com/
A. TRUE
B. FALSE
Answer: A
85. Which of the following options is not a function of the VRM module in FusionCompute?
A. Manage block storage resources in the cluster
B. through the unified management of virtual resources, user data, and provide external elastic
computing, storage, IP and other services
C. Manage the dynamic adjustment of resources in the cluster
D. Provide virtual computing functions
Answer: D
86. In the HUAWEI desktop cloud solution, which description of FusionSphere is wrong?
A. FusionCompute provides basic computing, storage, and network virtualization functions
B. In addition to FusionSphere, the underlying virtualization platform of Huawei's desktop solution can
also use vSphere
C. FusionCompute's main VRM and CAN components
D. Provide the management function of user desktop virtual resources and physical resources
Answer: D
87. In FusionAccess, when using the tool to make a complete copy of a virtual machine template,
users need to check the corresponding functions according to different usage scenarios, and match
the following functions with their usage scenarios:
Answer:
88. In the physical networking of a single data center in Huawei's desktop cloud solution, which
network planes do storage devices need to access? (Multiple choice)
A. Management network
B. Storage network
C. TC access network
D. Business network
 17 / 24
https://www.dumpsinfo.com/
Answer: AB
89. There are two formats for exporting virtual machine templates on FusionCompute : ova and ovf.
The ova format template has only one ova file, and the ovf format template consists of ovf files and
vhd files.
A. TRUE
B. FALSE
Answer: B
90. When the customer does not have an external clock source and the AD is provided by Huawei,
the CNA node corresponding to the VRM is the primary clock source. After FusionAcces configures
the clock source, AD as the secondary clock source will automatically synchronize time from the first
clock source. User virtual machines and infrastructure virtual machines automatically synchronize
time from AD.
A. TRUE
B. FALSE
Answer: A
91. In FusionAccess, after the administrator uses the backup data to create and restore a faulty single-
node ITA/GussDB/HDC/WI/License server, the original license file will be unavailable, and the license
needs to be re-applied and configured. [After data recovery, the data from the time of backup to the
time of restoration will be lost. After the system is reinstalled, the ESN of the license server changes,
and the original license file is unavailable, so you need to apply for and configure the license again.
A. TRUE
B. FALSE
Answer: B
92. A site plans to deploy a FusionAccess desktop cloud and already has AD/DNS/DHP servers and
F5 devices. Which of the following mandatory components need to be deployed? (Multiple choice)
A. vAG
B. WI
C. GaussDB
D. License
EITA
Answer: BCDE
93. Only when the status of the virtual machine in FusionCompute is " running ", the CD-ROM drive
can be mounted.
A. TRUE
B. FALSE
Answer: A
94. In the FusionCompute system, when creating a common type of port group, what advanced
settings can be done? (Multiple choice)
A. Binding of ip and mac address
B. Accept traffic shaping
 18 / 24
https://www.dumpsinfo.com/
C. Broadcast suppression
D. dhcp isolation
Answer: ABCD
95. Whatis the hierarchical architecture of Huawei's desktop cloud solution? (Multiple choice)
A. Cloud operating system management layer
B. Hardware resource layer
C. Terminal access layer
D. Desktop and session management
Answer: ABCD
96. Regarding the FusionAccess system reinstallation and recovery, which of the following
descriptions is wrong?
A. In the scenario of a single node failure of the vAG/vLB server of the system, copy the data of the
backup vAG server and vLB server to the new server, and perform the operation of restoring the
server.
B. In the scenario of a single node failure of the Backup Server of the system, create a new Backup
Server and complete the "Execute Backup Now" on the FusionAccess interface.
C. In the scenario of a single node failure of the main or backup AD/DNS/DHCP server of the system,
copy the backup AD/DNS/DHCP server data to the new server, and perform the operation of restoring
the server.
D. In the scenario of a single node failure of the ITA/GaussDB/HDC/WI/License server of the system,
copy the backup data to the new server and perform the operation of restoring the server.
Answer: B
97. After a user moves to the new 0U, the group policy setting items in the new 0U will not be used,
and the group policy setting items in the original 0U will still be maintained.
A. TRUE
B. FALSE
Answer: B
98. Which of the following will not generate FusionAccess alarms?
A. WI works in emergency mode.
B. The template virtual machine is deleted.
C. The ITA component is abnormal.
D. The FusionCompute server is abnormal.
Answer: B
99. In FusionAccess, the secure access gateway encrypts the WI data stream to improve the security
of the desktop cloud system.
A. TRUE
B. FALSE
Answer: B
100. Which snapshot method does FusionCompute not support?
A. Normal snapshot
 19 / 24
https://www.dumpsinfo.com/
B. Consistent snapshot
C. Memory snapshot
D. Session snapshot
Answer: D
101. In FusionAccess, which of the following description about recycling virtual machine desktops of
the "dynamic multi-user" type are correct? (Multiple choice)
A. If the "dynamic pool" desktop is recycled, the virtual machine must be deleted
B. If the "dynamic pool" desktop is recycled, you need to log in to the AD server to delete the user
C. If the "static pool" desktop is recycled, you need to log in to the AD server to delete the user
D. If the "static pool" desktop is recycled, the virtual machine must be deleted
Answer: BCD
102. In FusionAccess, when creating a linked clone virtual machine template, the configuration mode
of the template virtual machine disk can be set to "normal delay zeroing", and it will not affect the
subsequent distribution of linked clone virtual machine desktops based on the template.
A. TRUE
B. FALSE
Answer: B
103. Which of the following descriptions of the virtual machine template vhd file are correct? (Multiple
choice)
A. The "disk identification" in the vhd file name consists of the disk bus type and the disk serial
number.
B. vd indicates that the bus type of the disk is IDE type.
C. hd indicates that the bus type of the disk is VIRTIO.
D. sd indicates that the bus type of the disk is SCSI.
Answer: AD
104. In FusionAccess, the administrator logs in to the ITA/GaussDB/HDC/wI/License virtual machine
through VNC and enters the () command to enter the FusionAccess installation interface and install
the ITA/GaussDB/HDC/WI/Li cense component.
Answer: StartTools
105. In FusionAccess, the "virtual machine template" corresponds to the "considered unit type" and is
automatically associated. When the "considered unit type" is "full copy", the associated "virtual
machine template" includes two templates "full copy" and "________".
Answer: quick package
106. Which of the following descriptions of computing virtualization features are wrong?
A. It has a flexible management structure and ensures the reliability of the system through active and
standby deployment.
B. Support GPU virtualization, GPU pass-through.
C. When FusionCompute is compatible with a new operating system, the manufacturer does not need
to provide a supporting PV driver.
D. Dynamic resource scheduling, in the same cluster, VMs are automatically load balanced by the
 20 / 24
https://www.dumpsinfo.com/
system according to the strategy.
Answer: C
107. The shortcomings of enterprises using traditional PC office are mainly reflected in which of the
following aspects? (Multiple choice)
A. Low data reliability
B. High operating and maintenance expenses
C. Poor data security
D. Low resource utilization
Answer: ABCD
108. Which one of the following descriptions of DRS is correct?
A. In order to achieve the best resource scheduling effect, it is recommended that the CPU, memory,
network, and storage configurations of the hosts in the cluster are as the same as possible, so that
the virtual machine can be migrated to any host in the cluster
B. It is recommended to set the time-sharing value of resource scheduling to a conservative strategy
when the business pressure is high, and set to a medium or advanced strategy when the business
pressure is small.
C. The advanced rules of resource scheduling can be used to meet some special needs. For
example, when two virtual machines are in the active/standby relationship, it can be configured as an
aggregation strategy to improve data interaction performance between virtual machines.
D. Resource fullness can be configured with different measurement factors. If memory reuse is used,
it is recommended to configure it according to CPU scheduling.
Answer: B
109. Before distributing virtual desktops, you need to create multiple domain administrator accounts in
the AD server to connect to FusionAccess and assign them to virtual desktops during the initial
configuration of FusionAccess.
A. TRUE
B. FALSE
Answer: B
110. Which types of FusionCompute distributed switches support? (Multiple choice)
A. Normal mode
B. SR-IOV pass-through mode
C. User mode exchange mode
D. Standard mode
Answer: ABC
111. Which of the following types of ports should be added when FusionCompute configures the
uplink?
A. Storage interface
B. Port group
C. BMC network port
D. Converged network port
Answer: D
 21 / 24
https://www.dumpsinfo.com/
112. Regarding the TC security mechanism of the HUAWEI desktop cloud system, which of the
following descriptions is incorrect?
A. TRUEC can perform port control.
B. The user cannot perform file management, command execution and other operations in the TC.
C. TC can perform identity authentication, MAC address and virtual desktop binding authentication.
D. The internal hard disk of the TC saves the data of the desktop virtual machine.
Answer: D
113. Which of the following descriptions about the features of FusionCompute distributed virtual
switches is wrong?
A. Each VM can have multiple vNIC interfaces, and each vNIC can join multiple port groups of the
distributed switch.
B. Each distributed switch can be configured with multiple port groups, and each port group has its
own attributes.
C. Each distributed switch can be configured with an uplink group for VM external communication.
D. Users can configure multiple distributed switches, and each distributed switch can cover multiple
CNA nodes in the cluster.
Answer: A
114. Which application scenario description of Huawei application virtualization is correct?
A. Application virtualization cannot be used on soft terminals, and application virtualization needs to
be used in scenarios where thin terminals are used.
B. It is recommended to use application virtualization in mobile office scenarios to support multiple
smart phone terminals to access the same application across platforms.
C. It is not recommended to use application virtualization in the safe surfing scene.
D. In a simple office scenario, when each user needs an independent desktop, application
virtualization cannot be used.
Answer: B
115. In the FusionAccess system, when the desktop grouptype is a static pool, which of the following
is not included in the optional virtual machine type?
A. Full copy
B. Linked clone
C. Fast packaging
D. Full memory
Answer: C
116. For the running VRM virtual machine, which of the following operations cannot be performed on
the FusionCompute system? (Multiple choice)
A. Safe deletion
B. VNC login
C. Restart
D. Mount Tools
Answer: ACD
117. Which description about the architecture and components of Huawei Desktop Cloud is correct?
 22 / 24
https://www.dumpsinfo.com/
A. vLB provides load balancing function for HDC.
B. ITA provides a Portal interface for administrators.
C. When deploying Huawei Desktop Cloud, if there is only one WI, vAG is not required to be
deployed.
D. DB records user account information.
Answer: B
118. When a user connects a desktop Huawei cloud virtual machine, it will go to the License server
checks License, to determine whether the user can connect to a virtual machine.
A. TRUE
B. FALSE
Answer: A
119. In FusionAccess, users can access multiple FusionAccess systems with different WI domain
names through UNS (Unified Name Service).
Which of the following description of UNS are correct? (Multiple choice)
A. When the number of users is less than 20,000, or when the user wants to access local virtual
machine priority, precedence GSLB of UNS load balancing
B. When the number of users is higher than 20,000, or when the user needs access to the local
virtual machine priority, precedence GSLB of UNS load balancing
C. When the number of users is higher than 20,000, and the user does not require access to the local
virtual machine priority, precedence vLB of UNS do load balancing
D. When the number of users is less than 20000 and users do not need to access the local virtual
machine first, use vLB to perform load balancing on UNS first
Answer: BD
120. After VRM detects a virtual machine failure, it will automatically restart the failed virtual machine
on the normal CNA node. Which of the following mechanisms does this refer to?
A. HA
B. NUMA
C. DRS
D. DPM
Answer: A
121. In FusionAccess, which of the following description of the linked clone virtual machine is correct?
(Multiple choice)
A. Linked clone virtual machine templates need to add domains, but do not need to encapsulate the
system
B. Linking clone Desktop Group supports "pooling" and "proprietary" types
C. Linked clone virtual machines support rapid batch release
D. The linked clone virtual machine logically combines the master disk and the differential disk into a
linked clone disk, which serves as the virtual machine system disk
Answer: ACD
122. Which of the following descriptions about the load sharing algorithm based on source and
destination IP and port is correct?
A. This mode is highly reliable, but the network traffic will only be shared by one network card, and
 23 / 24
https://www.dumpsinfo.com/
the other network card serves as a backup.
B. When there are IP and port in the message, use the source and destination IP, port, and MAC for
load sharing; when the message has only an IP address, use the IP address
Perform load sharing with MAC; when the message has only MAC address, use MAC address for
load sharing.
C. This mode is generally used in scenarios where most of the network traffic is inside the Layer 2
network. At this time, the network traffic can be evenly hashed by MAC.
D. This mode enables network traffic to be sent to each network port completely and evenly, but
many messages may be out of order.
Answer: B
123.How does DPM shut down and power on the server?
A. The power on is controlled by BMC, and the shutdown is controlled by the CNA system.
B. Both startup and shutdown are through CNA system commands.
C. The boot is controlled by the CNA system command, and the shutdown is controlled by the server
BMC.
D. Both startup and shutdown are controlled by the server BMC.
Answer: A
124. When using a terminal to access a virtual desktop, the IP address of the cloud server needs to
be configured. Which of the following components is the IP address?
A. WI
B. HDC
C. HDA
D. ITA
Answer: A
125. In FusionAccess, if the user inserts a USB device, the page prompts " Driver needs to be
installed ", it may be caused by a problem with the USB device itself.
A. TRUE
B. FALSE
Answer: B
126. The transmission channel of the HUAWEI desktop cloud system will be encrypted to prevent
monitoring and stealing. Which of the following descriptions about the security of the transmission
channel is correct?
A. For the security of user information, the HDP protocol is set to enable client local drive mapping.
B. The transmission channel through which the user accesses the ITA Portal interface is encrypted
based on HTTPS.
C. When the user accesses the virtual machine through the HDP protocol, it is encrypted based on
HTTPS.
D. HDP protocol is set to open the USB port for user information security.
Answer: B
Powered by TCPDF (www.tcpdf.org)
 24 / 24
https://www.dumpsinfo.com/
http://www.tcpdf.org