Text Material Preview
H13-527-ENU Huawei HCIP Cloud Computing V4.0 exam dumps questions are the best material for you to test all the related Huawei exam topics. By using the H13-527-ENU exam dumps questions and practicing your skills, you can increase your confidence and chances of passing the H13-527-ENU exam. Features of Dumpsinfo’s products Instant Download Free Update in 3 Months Money back guarantee PDF and Software 24/7 Customer Support Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo files at lowest price. Huawei HCIP Cloud Computing V4.0 H13-527-ENU exam free dumps questions are available below for you to study. Full version: H13-527-ENU Exam Dumps Questions 1. Which of the following aspects is the essence of virtualization embodied in? (Multiple choice) A. Partition B. Isolation C. Package D. Relatively independent of hardware Answer: ABCD 2. When a user's virtual machine fails and cannot log in to the virtual machine through the HDP protocol, which component needs to be installed to log in to the virtual machine using the self- maintenance console for self-maintenance. A. vLB B. vAG 1 / 24 https://www.dumpsinfo.com/unlimited-access/ https://www.dumpsinfo.com/exam/h13-527-enu C. WI D. HDC Answer: B 3. In a complete FusionAccess desktop login and connection process, the AD component was accessed ____ times in total. Answer: 3 4. Which of the following are the mainstream desktop cloud protocols? (Multiple choice) A. HDP B. RDP C. ICA D. SIP Answer: ABC 5. In the FusionAccess system, each virtual machine group can only have virtual machines issued by the same type of template. A. TRUE B. FALSE Answer: B 6. Virtual machine desktops using GPU pass-through technology will lose features such as hot migration and HA. A. TRUE B. FALSE Answer: A 7. Regarding the FusionAccess administrator fault location method, which of the following statements is wrong? A. Check the login information on the management interface and find the person responsible for the failure B. Check whether the monitoring information is normal in the management interface C. Check whether the data configuration is correct in the management interface D. Query the operation log and analyze whether there are errors in the operation process Answer: A 8. In the process of creating and associating desktop virtual machines, which components are required to cooperate to complete the provision of virtual desktops? (Multiple choice) A. GaussDB B. HDC C. WI D. ITA Answer: ABCD 9. In the process of implementing remote screen display on Huawei Desktop Cloud, the cloud desktop 2 / 24 https://www.dumpsinfo.com/ operating system interacts with the graphics card through TC, intercepts the screen display content, and transmits it to the remote terminal graphics card A. TRUE B. FALSE Answer: B 10. Regarding Huawei FusionSphere Virtualization Suite, which of the following description is incorrect? (Multiple choice) A. Huawei FusionSphere Virtualization Suite is an industry-leading virtualization solution that can greatly improve the efficiency of data center infrastructure. B. Huawei FusionSphere only has virtualization functions, which can realize server computing, storage, and network virtualization. C. Huawei FusionSphere is open-source compatible. D. Huawei FusionSphere can connect to third-party management platforms. Answer: BC 11. Three single-disk virtual machines share a data storage capacity of 10GB. Which of the following situations may occur? (Multiple choice) A. The virtual machine disk sizes are: 3GB, 4GB, 12GB B. The virtual machine disk sizes are: 4GB, 3GB, 5GB, and the data storage uses non-virtualized types C. The disk sizes of the virtual machine are: 8GB, 9GB, and 7GB. D. The actual space occupied by the virtual machine disks are: 4GB, 3GB, and 5GB. Answer: AC 12. Which statement is wrong about the snapshot management operation below? A. Can create snapshot B. Can delete snapshots C. Can clone snapshots D. Can roll back the snapshot Answer: C 13. In FusionAccess, which of the following functions are supported by the Huawei vDesk tool that comes with the virtual desktop? (Multiple choice) A. One-click inspection/optimization B. Automatic repair C. System acceleration D. Log collection Answer: ABCD 14. Which of the following are the nursing items of Huawei's VIP desktop real-time nursing strategy? (Multiple choice) A. CPU usage exceeds 80% B. Virtual machine shutdown C. The virtual machine registration status is abnormal D. The data disk usage rate exceeds 80% Answer: ABC 3 / 24 https://www.dumpsinfo.com/ 15. The FusionCompute distributed switch is a virtual switch with a function similar to a three-layer physical switch. It connects to virtual machines through port groups and connects to physical networks through uplinks. A. TRUE B. FALSE Answer: B 16. In the virtual machine registration process of FusionAccess, if the HDC information read by the virtual machine from the registry cannot be parsed. It may be caused by the exception of the _______ service. Answer: DNS 17. In the desktop cloud system, what are the correct steps to make a template? ? Create a virtual machine ? Install operating system patches and application software ? Use tools to make templates ? Install the operating system and Tools A. 1324 B. 1423 C. 1342 D. 1432 Answer: B 18. In FusionAccess, in order to support more advanced features, when deploying vAG/rLB components, it is recommended to use "virtualized" shared data storage. A. TRUE B. FALSE Answer: A 19. In FusionAccess, users can better manage virtual machine desktops by configuring desktop policies. Which of the following descriptions of the desktop strategy are correct? (Multiple choice) A. Users can create custom strategies B. After the policy configuration is completed, it can take effect immediately C. After the policy configuration is completed, it will take effect the next time the user logs in to the virtual machine D. The strategy supports setting different priorities Answer: CD 20. In FusionAccess, the administrator logs in to the ITA/GaussDB/HDC/wI/License virtual machine through VNC and enters the () command to enter the FusionAccess installation interface and install the ITA/GaussDB/HDC/WI/Li cense component. Answer: StartTools 4 / 24 https://www.dumpsinfo.com/ 21. The FusionAccess system administrator reclaims dynamic multi-user desktops whose desktop group type is a static pool. Which of the following steps is not involved? A. Delete users on the desktop virtual machine B. Delete the desktop virtual machine C. Delete the user from the user group in AD D. Desktop virtual machine deallocation Answer: A 22. After FusionCompute sets HA resource reservation, when the cluster resources are extremely tight, the reserved resources will be preferentially allocated to virtual machines to ensure the normal operation of the business. A. TRUE B. FALSE Answer: B 23. Its FusionAecess system administrator needs to distribute several virtual machine desktops, and multiple users are allowed to use and bind together, so when the administrator distributes virtual machine desktops, the allocation type can be selected as " static pool ". A. TRUE B. FALSE Answer: A 24. Which of the following description of the load sharing algorithm based on source and destination IP and port is correct? A. This mode is generally used in scenarios where most of the network flow is inside the Layer 2 network. At this time, the network flow can be evenly hashed by MAC. B. This mode has high reliability, but the network flow will only be shared by one network card, and the other network card serves as a backup. C. When there are IP and port in the message, use the source and destination IP, port and MAC for load sharing; when the message has only an IP address, use the IP address and MAC for load sharing, when the message has only a MAC address, Use MAC address for loadsharing. D. This mode enables the network stream to be sent to each network port completely and evenly, but large messages may be out of order. Answer: C 25. Regarding the IDV desktop cloud architecture, which of the following descriptions is wrong? A. When managing large-scale terminals, a dedicated server is required to centrally manage terminal mirroring. B. Can work offline without being affected by the network. C. Introducing local virtual desktops, the terminal complexity is relatively high. D. The calculation is performed on the terminal, and the data is stored in the cloud. Answer: B 26. What network planes need to be planned for the FusionCompute system? A. Management plane B. Storage plane C. Business plane 5 / 24 https://www.dumpsinfo.com/ D. BMC network plane Answer: ABCD 27. In FusionCompute, the disk bus type created on the data storage mapped by the raw device can only be virtio or IDE. A. TRUE B. FALSE Answer: B 28. What is the wrong correspondence between the storage model and the actual object in FusionCompute? A. FusionStorage is a storage resource. B. OceanStor V5 is a storage resource. C. Shared folders are data storage. D. LUN is a storage device. Answer: D 29. Generally () pair of vLB can meet the performance requirements of a desktop cloud site. Answer: 1 30. Regarding the description of the HDP voice technology implementation process, which of the following is correct? (Multiple choice) A. Audio is very sensitive to delay, so the process implemented by HDP voice technology must strictly control the audio delay. B. In the playback stage, the audio driver will receive the audio data sent by the Windows audio subsystem, and directly transmit it to the desktop cloud client for playback without compression. C. The desktop cloud server can implement an audio driver in the virtual machine, and the audio driver will interact with the audio subsystem of Windows. D. In the recording stage, the desktop cloud client will obtain the local recording data, compress the data and transmit it to the desktop cloud server, and the server will decode it and return it to the Windows audio subsystem by the audio driver. Answer: ACD 31. With the rapid development of informatization, a certain university installed and deployed a set of Huawei FusionAccess desktop cloud in the electronic reading room. Based on the above intentions, which of the following descriptions are correct? (Multiple choice) A. It is recommended to select the "dynamic pool" type for the virtual machine desktop group in the electronic reading room B. The virtual machine desktop of the electronic reading room is recommended to select "linkage reduction" C. It is recommended to select "Complete Copy" for the virtual machine desktop of the electronic reading room D. It is recommended to select "proprietary" type for the virtual machine desktop group of the electronic reading room. Answer: AB 6 / 24 https://www.dumpsinfo.com/ 32. When the FusionCompute deployment mode is the separation of three members, the system super administrator account is admin. A. TRUE B. FALSE Answer: B 33. On AD, sub-OUs can be created for OUs according to the organizational structure of the company. A. TRUE B. FALSE Answer: A 34. In the FusionCompute system, which of the following descriptions about snapshots is incorrect? A. After checking "Memory Snapshot" and clicking "OK", the snapshot will save the data in the memory when you click "OK". B. When creating a disk snapshot, the system will save the currently unsaved cache data of the virtual machine before creating the snapshot. C. When the virtual machine is in the stopped state, "memory snapshots" and "consistent snapshots" cannot be created, but disk snapshots can be created. D. When the virtual machine is hibernated, "memory snapshot" is checked by default. Answer: B 35. In FusionAccess, the desktop allocation method of "single user" and "static pool", the difference between the two is that the "static pool" is bound to the virtual machine when the user first checks, while the "single user" is distributed the virtual machine is bound to the user. A. TRUE B. FALSE Answer: A 36. What is the hierarchical structure of DNS domain names? A. Top level domain C second level domain - subdomain - host B. Root domain C top level domain C second level domain - subdomain - host C. Root domain C top level domain - second level domain - third level domain - subdomain C host D. Root domain - second level domain - subdomain - host Answer: B 37.What are the ways to create a virtual machine on FusionCompute? (Multiple choice) A. Convert the template to a virtual machine B. Use templates to deploy virtual machines C. The virtual machine is cloned as a virtual machine D. Import the virtual machine Answer: ABCD 38. A company needs to build a FusionCompute system with 200 servers. Which method is recommended? A. VRH adopts physical deployment, manual installation of CNA and VRM. 7 / 24 https://www.dumpsinfo.com/ B. VRM adopts virtualization deployment, tools install CNA and install VM. C. VRM adopts virtualization deployment, manual installation of CNA, and tool installation of VM. D. VRM adopts physical deployment, tool installation CNA, manual installation of VM. Answer: D 39. Which of the following is not a high-risk operation of the Huawei desktop cloud system? A. Disable virtual machine network card B. Modify the time of infrastructure components C. Enable the virtual machine firewall D. Modify the IP of the infrastructure virtual machine Answer: C 40. In the FusionCompute system, which of the following description of virtualized antivirus are correct? (Multiple choice) A. When using the FusionCompute virtualized antivirus function, the security service virtual machine does not support generating memory snapshots. B. When using the FusionCompute virtualized antivirus function, the security service virtual machine supports the generation of memory snapshots. C. Each host deploys a security service virtual machine. D. Each host can be configured with multiple secure user virtual machines. Answer: AC 41. Regarding the difference between user group and organizational unit OU, which of the following descriptions is correct? (Multiple choice) A. Both OU and user group are objects of AD. B. Both OU and user groups can configure group policies. C. The user group can only contain account types of object types. D. The OU can contain object types such as accounts, computers, printers, and shared folders. Answer: ACD 42. Before creating a FusionCare information collection task, you must ensure that the client time, FusionCare server time, and the machine time of the collected node are consistent, otherwise, abnormal information collection may occur. A. TRUE B. FALSE Answer: A 43. Which of the following descriptions of the memory reuse features of FusionCompute is wrong? A. After the host memory reuse is turned off, the memory size of all virtual machines running on each host is not greater than the actual available physical memory used by the virtual machines. B. Turning off host memory reuse requires that the memory reuse rate of all hosts in the cluster is less than or equal to 150% C. After setting the host memory reuse, the total number of virtual machine memory created on the host can exceed the physical memory to increase the machine's virtual machine density D. After the host memory reuse is enabled, the specific memory reuse degree of the virtual machine can be controlled through the virtual machine memory qos setting. Answer: B 8 / 24 https://www.dumpsinfo.com/ 44. In Huawei Desktop Cloud, what are the main factors affecting VM density? (Multiple choice) A. QoS B. Server load C. Load balancing D. Memory size Answer: ABCD 45. The FusionAcces system administrator reclaims the dynamic multi-users whose desktop group type is dynamic pool, and only needs to delete the userfrom the user group in Ad. A. TRUE B. FALSE Answer: B 46. In FusionAccess, after modifying the application policy of the virtual machine desktop, the user must log in to the virtual machine again to take effect. A. TRUE B. FALSE Answer: B 47. After adopting FusionCompute virtualization, server resource utilization can be greatly improved, thereby improving server performance. A. TRUE B. FALSE Answer: A 48. If Tools are not installed on the virtual machine, FusionCompute cannot query the memory usage of the virtual machine. A. TRUE B. FALSE Answer: A 49. On the one hand, FusionCompute distributed virtual switches can configure, manage, and monitor the virtual switches of multiple servers. On the other hand, it can also ensure the consistency of network configuration when virtual machines are migrated between servers. A. TRUE B. FALSE Answer: A 50. In FusionAccess, the AD group policy is a very important configuration in the deployment and operation and maintenance links. Both () and domain can set group policies. (Fill in the English abbreviation) Answer: OU 9 / 24 https://www.dumpsinfo.com/ 51. After a user moves to a new OU, the permission settings granted to the user will not change. A. TRUE B. FALSE Answer: A 52. Non-uniform Memory Architecture, a distributed memory access method in which the processor can access different memory addresses at the same time, greatly improving parallelism. A. TRUE B. FALSE Answer: B 53. In FusionAccess, when the business plane of the virtual machine cannot communicate with the TC network plane, the virtual machine needs to add a third network card that communicates with the TC network plane in addition to the business plane network card and the management plane network card. A. TRUE B. FALSE Answer: A 54. In FusionCompute, which of the following options is not included in the startup method of a virtual machine? A. Hard disk startup B. Network startup C. Local startup D. CD-ROM startup Answer: C 55. Which state of the virtual machine can be used to restore the system? (Multiple choice) A. Linked clone virtual machines whose "running status" is “running", "allocation status" is "allocated", and "login status" is not "in use" B. Linked clone virtual machines whose "running status" is "stopped", "allocation status" is "allocated", and "login status" is "in use" C. Fully replicated virtual machines whose "running status" is "running", "allocation status" is "allocated", and "login status" is not "in use" D. Linked clone virtual machines whose "running status" is "stopped", "allocation status" is "allocated", and "login status" is not "in use" Answer: AD 56. In FusionAccess, when ITA/GaussDB/HDC/WI/License virtual machines are deployed in active and standby mode and deployed together, the two virtual machines must be located on different CNA nodes. A. TRUE B. FALSE Answer: B 57. An existing virtual machine needs to deploy a certain service, and the service I/O is random small 10 / 24 https://www.dumpsinfo.com/ I/O, which requires relatively high IOPS. Virtual machine is recommended to use () disk. Answer: ordinary 58. In Huawei Desktop Cloud, when configuring the DHCP service after installing DHCP, which of the following items need to be configured? (Multiple choice) A. Default gateway B. IP address range C. AD server service plane address D. Domain name Answer: AB 59. In the process of making FusionAccess full copy virtual machine template, you need to use the _______ tool for system packaging. (Fill in English) Answer: Sysprep 60. When using Huawei Desktop Cloud, you can enter the cloud server address in the IE browser and log in to the virtual desktop for use. Which login method is this method? A. Soft terminal B. Thin terminal C. Fat terminal D. Hard terminal Answer: A 61. In the HUAWEI desktop cloud system, which of the following descriptions is incorrect? (Multiple choice) A. When the desktop group type is a dedicated single user, after the quick provisioning is completed, a new user can be added to the virtual machine. B. When the desktop group type is static pool, when the user logs in again after disconnecting from the virtual machine, he may log in to another virtual machine C. When the desktop group type is dynamic pool, the user may log in to another virtual machine after disconnecting from the virtual machine and logging in again. D. When the desktop group type is a virtual machine of a dynamic pool, the system will be restarted and restored by default. Answer: AB 62. About FusionCompute data stored description, which is correct? A. Each storage device must create a data storage before it can be used. B. Virtual machine files and snapshots are stored in data storage. C. Each host uses independent data storage. D. With the help of storage thin provisioning technology, data storage can have a larger capacity than storage devices. Answer: A 63. When creating a desktop group in the FusionAccess system, when the desktop group type is proprietary, the optional virtual machine type can only be a full copy. A. TRUE 11 / 24 https://www.dumpsinfo.com/ B. FALSE Answer: B 64. FusionAccess supports the full replication virtual mechanism that has been issued as a full replication virtual machine template, and match the operation sequence to its operations. Answer: 65. In the Huawei desktop cloud system, the correspondence between virtual machine groups and desktop groups cannot be: A. Virtual machine (complete copy) - Group Type Desktop (dynamic pool) 12 / 24 https://www.dumpsinfo.com/ B. virtual machines (linked clone) - Desktop group type (static pool) C. virtual machines (complete copy) - the desktop group type (proprietary) D. virtual machines (linked clone) - Desktop group type (proprietary) Answer: D 66. In FusionCompute, for the network card of a running virtual machine, which of the following operations cannot be performed? A. Modify NAC B. Modify the port group C. Set the network card speed limit D. Remove the network card Answer: A 67. Which component of the load balance can be achieved by deploying vLB components? A. lTA B. HDC C. WI D. vAG Answer: C 68. The administrator finds that there may be a problem with the ITA of the Huawei desktop cloud system, and tries to make progress diagnosis by collecting logs. Then, which one of the following software should he use for this task? A. HDA B. FALSEusionCare C. vDesk D. vTools Answer: B 69. A user needs to use a virtual face with 0penGL2.1 and 3D9 graphics processing capabilities for work, so what does he need to apply to the administrator? A. GPU virtual desktop B. Completely copy the virtual desktop C. Full memory virtual desktop D. Link clone virtual desktop Answer: A 70. During VRM single-node virtualization deployment, the FusionCompute page cannot be opened, and restarting the VRM virtual machine in CNA cannot be resolved. What are the possible reasons? (Multiple choice) A. License not loaded B. Abnormal power off C. Host RAID card failure D. The VRM file system is damaged Answer: CD 13 / 24 https://www.dumpsinfo.com/ 71. In FusionComoute, when adding a network card to a virtual machine, the number of queues cannot exceed the current number of vCPU of the virtual machine. A. TRUE B. FALSE Answer: A 72. During the O&M process of FusionAccess., O&M personnel need to analyze and locate the fault phenomenon, and match the following fault symptoms to their possible causes. Answer: 73. Which of the following operations should be performed on the desktop virtual machine, the virtual machine needs to be restarted to take effect? A. Modify the desktop virtual machine specifications B. Add desktop virtual machine users C. Set the desktop virtual machine policy 14 / 24 https://www.dumpsinfo.com/ D. Take a snapshot of the desktop virtual machine Answer: A 74. In the FusionAccess system, if the localbackup mode is configured, the system will automatically backup at what time of day by default? A. 01:00 B. 02:00 C. 03:00 D. 08:00 Answer: C 75. In FusionCompute, which of the following descriptions of CPU manual binding are correct? (Multiple choice) A. Bind NUMA Node, vCPU is bound to all available physical CPUs on the specified NUMA node. B. Binding physical CPU (precise), pecify the binding relationship between each vCPU and the physical CPU, and fine-tune the binding relationship C. CPU used by emulator, bind the physical CPU used by the qemu main process. D. Bind physical CPU (range), all vCPUs are bound to the same physical CPU bitmap. Answer: ABCD 76. What are the functions of CNA in FusionCompute? (Multiple choice) A. Manage the life cycle of virtual machines in the cluster and the distribution and migration of virtual machines on computing nodes. B. Manage computing, storage, and network resources on computing nodes. C. Provide virtual computing functions. D. Manage virtual machines on compute nodes. Answer: BCD 77. Regarding AD backup, which of the following descriptions is incorrect? A. It is necessary to set "Whether to enable backup" to " Yes " in FusionAccess " System Management >Initial Configuration >Domain /O U". B. The backup path needs to be configured on the AD server. C. AD information needs to be configured in the " Alarm Component " of FusionAccess. D. Need to install a monitoring agent on the AD server. Answer: C 78. What is the order of making a complete copy template for Huawei Desktop Cloud? A. Create a bare virtual machine > install the operating system > configure the operating system > package template > convert the virtual machine into a template > configure a template B. Create a bare virtual machine > install the operating system > join the domain > configure the operating system > package template > convert the virtual machine into a template > configure a template C. Create a bare virtual machine > install the operating system > configure the operating system > package template > join the domain > convert the virtual machine into a template > configure the template D. Create a bare virtual machine > install the operating system > configure the operating system > join the domain > encapsulate the template > convert the virtual machine into a template > configure 15 / 24 https://www.dumpsinfo.com/ the template Answer: A 79. In the Huawei desktop cloud system, which of the following may be caused by the failure of desktop virtual machine registration? (Multiple choice) A. The network status between the virtual machine and HDC is abnormal. B. The configuration information of the forward lookup zone in the DNS server is modified. C. The time between the two HDC servers is not synchronized. D. The DHCP component is abnormal. Answer: ABCD 80. In FusionAccess, in order to support more advanced features and deploy vAG/vLB components, it is recommended to use "virtualized" shared data storage. A. TRUE B. FALSE Answer: A 81. Regarding the description of the user logging in to the virtual machine, which of the following is wrong? A. The user virtual machine synchronizes information from the city controller. It can be synchronized when the user logs in, or it can be forcibly synchronized through AD. B. When a user logs in to a desktop virtual machine using a non-domain account VNC, the system will compare the account information stored in the virtual machine database with the information provided by the user. C. When a user logs in to a desktop virtual machine using a domain account, the system will compare the account information stored in the domain controller database with the information provided by the user. D. When a user uses a domain account to log in to the desktop virtual machine, WI will authenticate the user information to the AD. Answer: B 82. What is the value of storage hot migration characteristics? (Multiple choice) A. It can achieve load balancing of storage resources. B. Provide basic capabilities for storage dynamic resource scheduling. C. The storage soft and hard disk can be upgraded without interrupting the business. D. Support the thin disk to be changed to a normal disk after migration to improve the performance of the virtual machine disk. Answer: ABCD 83. In the cloud desktop solution, compared to the fast-packaging template, using a complete copy template to issue virtual machines is faster and more efficient. A. TRUE B. FALSE Answer: B 84. Only the allocated full copy and linked clone virtual machines can be upgraded to VIP desktops. 16 / 24 https://www.dumpsinfo.com/ A. TRUE B. FALSE Answer: A 85. Which of the following options is not a function of the VRM module in FusionCompute? A. Manage block storage resources in the cluster B. through the unified management of virtual resources, user data, and provide external elastic computing, storage, IP and other services C. Manage the dynamic adjustment of resources in the cluster D. Provide virtual computing functions Answer: D 86. In the HUAWEI desktop cloud solution, which description of FusionSphere is wrong? A. FusionCompute provides basic computing, storage, and network virtualization functions B. In addition to FusionSphere, the underlying virtualization platform of Huawei's desktop solution can also use vSphere C. FusionCompute's main VRM and CAN components D. Provide the management function of user desktop virtual resources and physical resources Answer: D 87. In FusionAccess, when using the tool to make a complete copy of a virtual machine template, users need to check the corresponding functions according to different usage scenarios, and match the following functions with their usage scenarios: Answer: 88. In the physical networking of a single data center in Huawei's desktop cloud solution, which network planes do storage devices need to access? (Multiple choice) A. Management network B. Storage network C. TC access network D. Business network 17 / 24 https://www.dumpsinfo.com/ Answer: AB 89. There are two formats for exporting virtual machine templates on FusionCompute : ova and ovf. The ova format template has only one ova file, and the ovf format template consists of ovf files and vhd files. A. TRUE B. FALSE Answer: B 90. When the customer does not have an external clock source and the AD is provided by Huawei, the CNA node corresponding to the VRM is the primary clock source. After FusionAcces configures the clock source, AD as the secondary clock source will automatically synchronize time from the first clock source. User virtual machines and infrastructure virtual machines automatically synchronize time from AD. A. TRUE B. FALSE Answer: A 91. In FusionAccess, after the administrator uses the backup data to create and restore a faulty single- node ITA/GussDB/HDC/WI/License server, the original license file will be unavailable, and the license needs to be re-applied and configured. [After data recovery, the data from the time of backup to the time of restoration will be lost. After the system is reinstalled, the ESN of the license server changes, and the original license file is unavailable, so you need to apply for and configure the license again. A. TRUE B. FALSE Answer: B 92. A site plans to deploy a FusionAccess desktop cloud and already has AD/DNS/DHP servers and F5 devices. Which of the following mandatory components need to be deployed? (Multiple choice) A. vAG B. WI C. GaussDB D. License EITA Answer: BCDE 93. Only when the status of the virtual machine in FusionCompute is " running ", the CD-ROM drive can be mounted. A. TRUE B. FALSE Answer: A 94. In the FusionCompute system, when creating a common type of port group, what advanced settings can be done? (Multiple choice) A. Binding of ip and mac address B. Accept traffic shaping 18 / 24 https://www.dumpsinfo.com/ C. Broadcast suppression D. dhcp isolation Answer: ABCD 95. Whatis the hierarchical architecture of Huawei's desktop cloud solution? (Multiple choice) A. Cloud operating system management layer B. Hardware resource layer C. Terminal access layer D. Desktop and session management Answer: ABCD 96. Regarding the FusionAccess system reinstallation and recovery, which of the following descriptions is wrong? A. In the scenario of a single node failure of the vAG/vLB server of the system, copy the data of the backup vAG server and vLB server to the new server, and perform the operation of restoring the server. B. In the scenario of a single node failure of the Backup Server of the system, create a new Backup Server and complete the "Execute Backup Now" on the FusionAccess interface. C. In the scenario of a single node failure of the main or backup AD/DNS/DHCP server of the system, copy the backup AD/DNS/DHCP server data to the new server, and perform the operation of restoring the server. D. In the scenario of a single node failure of the ITA/GaussDB/HDC/WI/License server of the system, copy the backup data to the new server and perform the operation of restoring the server. Answer: B 97. After a user moves to the new 0U, the group policy setting items in the new 0U will not be used, and the group policy setting items in the original 0U will still be maintained. A. TRUE B. FALSE Answer: B 98. Which of the following will not generate FusionAccess alarms? A. WI works in emergency mode. B. The template virtual machine is deleted. C. The ITA component is abnormal. D. The FusionCompute server is abnormal. Answer: B 99. In FusionAccess, the secure access gateway encrypts the WI data stream to improve the security of the desktop cloud system. A. TRUE B. FALSE Answer: B 100. Which snapshot method does FusionCompute not support? A. Normal snapshot 19 / 24 https://www.dumpsinfo.com/ B. Consistent snapshot C. Memory snapshot D. Session snapshot Answer: D 101. In FusionAccess, which of the following description about recycling virtual machine desktops of the "dynamic multi-user" type are correct? (Multiple choice) A. If the "dynamic pool" desktop is recycled, the virtual machine must be deleted B. If the "dynamic pool" desktop is recycled, you need to log in to the AD server to delete the user C. If the "static pool" desktop is recycled, you need to log in to the AD server to delete the user D. If the "static pool" desktop is recycled, the virtual machine must be deleted Answer: BCD 102. In FusionAccess, when creating a linked clone virtual machine template, the configuration mode of the template virtual machine disk can be set to "normal delay zeroing", and it will not affect the subsequent distribution of linked clone virtual machine desktops based on the template. A. TRUE B. FALSE Answer: B 103. Which of the following descriptions of the virtual machine template vhd file are correct? (Multiple choice) A. The "disk identification" in the vhd file name consists of the disk bus type and the disk serial number. B. vd indicates that the bus type of the disk is IDE type. C. hd indicates that the bus type of the disk is VIRTIO. D. sd indicates that the bus type of the disk is SCSI. Answer: AD 104. In FusionAccess, the administrator logs in to the ITA/GaussDB/HDC/wI/License virtual machine through VNC and enters the () command to enter the FusionAccess installation interface and install the ITA/GaussDB/HDC/WI/Li cense component. Answer: StartTools 105. In FusionAccess, the "virtual machine template" corresponds to the "considered unit type" and is automatically associated. When the "considered unit type" is "full copy", the associated "virtual machine template" includes two templates "full copy" and "________". Answer: quick package 106. Which of the following descriptions of computing virtualization features are wrong? A. It has a flexible management structure and ensures the reliability of the system through active and standby deployment. B. Support GPU virtualization, GPU pass-through. C. When FusionCompute is compatible with a new operating system, the manufacturer does not need to provide a supporting PV driver. D. Dynamic resource scheduling, in the same cluster, VMs are automatically load balanced by the 20 / 24 https://www.dumpsinfo.com/ system according to the strategy. Answer: C 107. The shortcomings of enterprises using traditional PC office are mainly reflected in which of the following aspects? (Multiple choice) A. Low data reliability B. High operating and maintenance expenses C. Poor data security D. Low resource utilization Answer: ABCD 108. Which one of the following descriptions of DRS is correct? A. In order to achieve the best resource scheduling effect, it is recommended that the CPU, memory, network, and storage configurations of the hosts in the cluster are as the same as possible, so that the virtual machine can be migrated to any host in the cluster B. It is recommended to set the time-sharing value of resource scheduling to a conservative strategy when the business pressure is high, and set to a medium or advanced strategy when the business pressure is small. C. The advanced rules of resource scheduling can be used to meet some special needs. For example, when two virtual machines are in the active/standby relationship, it can be configured as an aggregation strategy to improve data interaction performance between virtual machines. D. Resource fullness can be configured with different measurement factors. If memory reuse is used, it is recommended to configure it according to CPU scheduling. Answer: B 109. Before distributing virtual desktops, you need to create multiple domain administrator accounts in the AD server to connect to FusionAccess and assign them to virtual desktops during the initial configuration of FusionAccess. A. TRUE B. FALSE Answer: B 110. Which types of FusionCompute distributed switches support? (Multiple choice) A. Normal mode B. SR-IOV pass-through mode C. User mode exchange mode D. Standard mode Answer: ABC 111. Which of the following types of ports should be added when FusionCompute configures the uplink? A. Storage interface B. Port group C. BMC network port D. Converged network port Answer: D 21 / 24 https://www.dumpsinfo.com/ 112. Regarding the TC security mechanism of the HUAWEI desktop cloud system, which of the following descriptions is incorrect? A. TRUEC can perform port control. B. The user cannot perform file management, command execution and other operations in the TC. C. TC can perform identity authentication, MAC address and virtual desktop binding authentication. D. The internal hard disk of the TC saves the data of the desktop virtual machine. Answer: D 113. Which of the following descriptions about the features of FusionCompute distributed virtual switches is wrong? A. Each VM can have multiple vNIC interfaces, and each vNIC can join multiple port groups of the distributed switch. B. Each distributed switch can be configured with multiple port groups, and each port group has its own attributes. C. Each distributed switch can be configured with an uplink group for VM external communication. D. Users can configure multiple distributed switches, and each distributed switch can cover multiple CNA nodes in the cluster. Answer: A 114. Which application scenario description of Huawei application virtualization is correct? A. Application virtualization cannot be used on soft terminals, and application virtualization needs to be used in scenarios where thin terminals are used. B. It is recommended to use application virtualization in mobile office scenarios to support multiple smart phone terminals to access the same application across platforms. C. It is not recommended to use application virtualization in the safe surfing scene. D. In a simple office scenario, when each user needs an independent desktop, application virtualization cannot be used. Answer: B 115. In the FusionAccess system, when the desktop grouptype is a static pool, which of the following is not included in the optional virtual machine type? A. Full copy B. Linked clone C. Fast packaging D. Full memory Answer: C 116. For the running VRM virtual machine, which of the following operations cannot be performed on the FusionCompute system? (Multiple choice) A. Safe deletion B. VNC login C. Restart D. Mount Tools Answer: ACD 117. Which description about the architecture and components of Huawei Desktop Cloud is correct? 22 / 24 https://www.dumpsinfo.com/ A. vLB provides load balancing function for HDC. B. ITA provides a Portal interface for administrators. C. When deploying Huawei Desktop Cloud, if there is only one WI, vAG is not required to be deployed. D. DB records user account information. Answer: B 118. When a user connects a desktop Huawei cloud virtual machine, it will go to the License server checks License, to determine whether the user can connect to a virtual machine. A. TRUE B. FALSE Answer: A 119. In FusionAccess, users can access multiple FusionAccess systems with different WI domain names through UNS (Unified Name Service). Which of the following description of UNS are correct? (Multiple choice) A. When the number of users is less than 20,000, or when the user wants to access local virtual machine priority, precedence GSLB of UNS load balancing B. When the number of users is higher than 20,000, or when the user needs access to the local virtual machine priority, precedence GSLB of UNS load balancing C. When the number of users is higher than 20,000, and the user does not require access to the local virtual machine priority, precedence vLB of UNS do load balancing D. When the number of users is less than 20000 and users do not need to access the local virtual machine first, use vLB to perform load balancing on UNS first Answer: BD 120. After VRM detects a virtual machine failure, it will automatically restart the failed virtual machine on the normal CNA node. Which of the following mechanisms does this refer to? A. HA B. NUMA C. DRS D. DPM Answer: A 121. In FusionAccess, which of the following description of the linked clone virtual machine is correct? (Multiple choice) A. Linked clone virtual machine templates need to add domains, but do not need to encapsulate the system B. Linking clone Desktop Group supports "pooling" and "proprietary" types C. Linked clone virtual machines support rapid batch release D. The linked clone virtual machine logically combines the master disk and the differential disk into a linked clone disk, which serves as the virtual machine system disk Answer: ACD 122. Which of the following descriptions about the load sharing algorithm based on source and destination IP and port is correct? A. This mode is highly reliable, but the network traffic will only be shared by one network card, and 23 / 24 https://www.dumpsinfo.com/ the other network card serves as a backup. B. When there are IP and port in the message, use the source and destination IP, port, and MAC for load sharing; when the message has only an IP address, use the IP address Perform load sharing with MAC; when the message has only MAC address, use MAC address for load sharing. C. This mode is generally used in scenarios where most of the network traffic is inside the Layer 2 network. At this time, the network traffic can be evenly hashed by MAC. D. This mode enables network traffic to be sent to each network port completely and evenly, but many messages may be out of order. Answer: B 123.How does DPM shut down and power on the server? A. The power on is controlled by BMC, and the shutdown is controlled by the CNA system. B. Both startup and shutdown are through CNA system commands. C. The boot is controlled by the CNA system command, and the shutdown is controlled by the server BMC. D. Both startup and shutdown are controlled by the server BMC. Answer: A 124. When using a terminal to access a virtual desktop, the IP address of the cloud server needs to be configured. Which of the following components is the IP address? A. WI B. HDC C. HDA D. ITA Answer: A 125. In FusionAccess, if the user inserts a USB device, the page prompts " Driver needs to be installed ", it may be caused by a problem with the USB device itself. A. TRUE B. FALSE Answer: B 126. The transmission channel of the HUAWEI desktop cloud system will be encrypted to prevent monitoring and stealing. Which of the following descriptions about the security of the transmission channel is correct? A. For the security of user information, the HDP protocol is set to enable client local drive mapping. B. The transmission channel through which the user accesses the ITA Portal interface is encrypted based on HTTPS. C. When the user accesses the virtual machine through the HDP protocol, it is encrypted based on HTTPS. D. HDP protocol is set to open the USB port for user information security. Answer: B Powered by TCPDF (www.tcpdf.org) 24 / 24 https://www.dumpsinfo.com/ http://www.tcpdf.org