Question 181- 210
Q181) Which of the following is not a prerequisite for installing Tools for a VM on FusionCompute?
- a) The OS has been installed on the VM.
- b) Tools of a different version has not been installed on the VM.
- c) The available free space of the system disk is greater than 32 MB.
- d) You have obtained the password of user Administrator if the VM runs the Windows Server 2008 or Windows 7 OS.
- e) The VM is in the Stopped state.
Correct Answer: E
Q182) In Huawei FusionCompute, if a VM is in the Running or Stopped state, users can increase or decrease the number of vCPUs of the VM as required.
- a) True
- b) False
Correct Answer: B
Q183) Which of the following is not included in the snapshot management functions?
- a) Creating a snapshot
- b) Modifying a snapshot
- c) Deleting a snapshot
- d) Copying a snapshot
Correct Answer: D
Q184) Which of the following statements about snapshots is false?
- a) Snapshots can be used to store VM settings and VM disk data.
- b) Snapshots can be used to store the VM memory status.
- c) Multiple snapshots can be created for a VM. If a VM is restored using a snapshot, the later snapshots become invalid.
- d) Only one memory snapshot can be created for all VMs on a host at a time.
Correct Answer: C
Q185) During the creation of a snapshot, users can perform other operations on the VM.
- a) True
- b) False
Correct Answer: B
Q186) Which of the following scenarios are snapshots inapplicable to?
- a) Critical service change
- b) Service patch installation
- c) Destructive testing of services
- d) Long-term storage of service data
Correct Answer: D
Q187) In Huawei FusionCompute, which of the following statements about memory overcommitment is false?
- a) The VM performance deteriorates on a host that has the memory overcommitment function enabled.
- b) The memory overcommitment function can be disabled only when the memory overcommitment ratio of all hosts in the cluster is less than or equal to 100%.
- c) After memory overcommitment is disabled, the total memory size of all VMs is less than or equal to the total available physical memory size.
- d) Administrators can enable or disable the memory overcommitment function anytime.
Correct Answer: D
Q188) Which of the following statements about live migration and cold migration is false?
- a) Cold migration is to migrate a stopped VM from one host to another. During the migration, services are interrupted.
- b) Live migration is to migrate a running VM from one host to another. During the migration, services are not interrupted.
- c) The reliability test in performance tests includes the tests on the VM migration, such as live migration, cold migration, migration duration, and service interruption duration.
- d) Memory data and disk data are migrated during live migration and cold migration.
Correct Answer: D
Q189) Which of the fallowing QoS parameters can be set for VMs on FusionCompute?
- a) Memory
- b) CPU
- c) GPU
- d) Disk IOPS
- e) Network
Correct Answer: C
Q190) In Huawei FusionCompute, which of the following statements about snapshot-based VM restoration is false?
- a) A VM can have multiple snapshots.
- b) If the port group where VM NICs belong is deleted after a snapshot is created for the VM, the deleted port group will be restored when the VM is restored using the snapshot.
- c) If the disk mode of a VM is Independent & persistent or Independent & nonpersistent, the data on the disk will not be restored when the VM is restored using a snapshot.
- d) A created snapshot of a VM can be used to restore the VM data to the state when the snapshot was created.
Correct Answer: B
Q191) Which of the following statements about snapshots is false?
- a) A consistency snapshot will be to be created if disk I/O pressure is high. You are advised to create a consistency snapshot when the disk I/O pressure is low.
- b) After a snapshot is generated, incremental disks take space of the datastore where the disks are located. To prevent storage resource insufficiency, control the number of snapshots.
- c) Another snapshot can be created for a VM when a snapshot is being created for the VM.
- d) Snapshots do not store information about passthrough devices such as USB/GPU/SSD or GPU virtualization devices.
Correct Answer: C
Q192) VM live migration is to migrate VMs from one physical server to another physical server in the same cluster when the VM is powered off.
- a) True
- b) False
Correct Answer: B
Q193) In Huawei FusionCompute, which of the following statements is false about the conditions for VM live migration?
- a) The source host and the destination host communicate with each other properly.
- b) The destination host has sufficient resources.
- c) The VM is running.
- d) The type of the destination storage device is different from that of the source storage device.
Correct Answer: D
Q194) Which of the following statements about the live migration application scenario is false?
- a) If a host is faulty or overloaded, the VMs running on it can be migrated to another host to prevent service interruption.
- b) If the service load is too light on multiple hosts, the VMs can be migrated to a smaller number of hosts to consolidate the host resources used. This decreases the number of hosts that need to be running and reduces power consumption.
- c) VMs at a graphics- capable workstation can be live migrated after being bound to an image processor.
- d) During host maintenance, VMs running on the host can be migrated to other hosts to ensure normal service running.
Correct Answer: C
Q195) In Huawei FusionCompute, which of the following statements about live migration is false?
- a) Live migration includes VM live migration and disk live migration.
- b) During VM live migration, the host can be changed, the datastore can be changed, or both the host and datastore can be changed.
- c) Storage live migration can be performed only in the same storage device under storage virtualization management
- d) Rapid memory data replication and shared storage are used during VM live migration to ensure data consistency before and after the migration.
Correct Answer: C
Q196) O&M engineers can migrate VMs on a physical server to be upgraded to other servers to prevent service interruption during system maintenance performed by a carrier.
- a) True
- b) False
Correct Answer: A
Q197) Which of the following statements about Non-Uniform Memory Access (NUMA) is false?
- a) Guest NUMA presents the NUMA topology to VMs to enable the guest OS to allocate resources to applications running on it based on logical NUMA nodes, thereby improving application performance.
- b) Host NUMA provides the CPU load balancing mechanism to eliminate the VM performance bottleneck due to unbalanced CPU resource allocation.
- c) Host NUMA ensures that VMs access only the local physical memory, which reduces memory access latency and improves VM performance.
- d) With NUMA, the speed of CPU access to memory on the same node is basically the same as that of access to memory on another node.
Correct Answer: D
Q198) Which of the following are included in virtual NUMA?
- a) Topology presentation: NUMA is identified in the VM to make NUMA optimization of the guest OS and applications effective.
- b) Initial placement: Based on the VM NUMA topology, select a physical node to place the vCPU and memory, so that the relationship
- c) Load balancing: During the scheduling, the association between nodes and the mapping between vNodes and physical nodes are considered to maximize the speed of vCPU access to local memory.
- d) Dynamic migration: When the affinity relationship between the vCPU and physical node changes, memory on the corresponding vNode will be migrated.
Correct Answer: A, B, C, D
Q199) Which of the following statements about the purpose of enabling the NUMA function is true?
- a) Optimize the memory access performance of VMs.
- b) Maximize the CPU computing capability of the physical host.
- c) Maximize the vCPU computing capability of VMs.
- d) Maximize the memory overcommitment ratio of the physical host.
Correct Answer: A
Q200) NUMA is a multiprocessor-based computer memory design. The memory access time depends on the relative location of memory to the processor. In NUMA, the speed of a processor to access its own local memory is faster than that to access a non-local memory (memory located on another processor or memory shared by processors).
- a) True
- b) False
Correct Answer: A
Q201) Which of the following statements about the NUMA Topology Adjustment switch is false?
- a) If the optimal NUMA topology cannot be calculated, the VM behavior is consistent with the switch status.
- b) After the switch is set to OFF, interleaving access occurs on NUMA nodes during VM memory access, resulting in performance loss.
- c) After this switch is set to ON, the system sets VM NUMA affinity and physical NUMA affinity during automatic adjustment to maximize VM memory access performance.
- d) After this switch is set to ON, VMs may not be scheduled to the specified nodes, and CPUs and memory are evenly allocated to bound nodes during manual adjustment.
Correct Answer: D
Q202) Which of the following statements about security groups are true?
- a) A security group, similar to a firewall, is used to set network access control for a single or multiple VMs. It is an important security isolation method.
- b) A security group is a logical group.
- c) Security groups are used to protect VM security.
- d) When a VM is created, a security group is generated at the same time.
Correct Answer: A, B, C
Q203) In Huawei FusionCompute, which of the following statements about security groups and rules is false?
- a) A security group must be created before rules can be added.
- b) Only a security group that contains no VMs can be deleted.
- c) The changes to security group rules can only be manually applied to VMs in the security group.
- d) By default, a security group rejects all access requests before rules are added to it.
Correct Answer: C
Q204) Which of the following statements about the application scenarios of security groups is false?
- a) Security group rules can be configured to prohibit VMs from accessing the FTP server.
- b) be configured to allow only the specified IP addresses to remotely log in to VMs.
- c) Security group rules can be configured to disallow access to VMs.
- d) Security group rules can be configured to control the permissions on folders in a VM.
Correct Answer: D
Q205) Not Available
Q206) If a security group is deleted, the rules in the security group will be deleted as well.
- a) True
- b) False
Correct Answer: B
Q207) In Huawei FusionCompute, which of the following statements about security group rules is false?
- a) A security group is essentially a set of rules.
- b) All VM NICs in the same security group use this security group rule for access control.
- c) VMs can communicate with external networks only after a security group is created for the VMs and rules are added to the security group.
- d) If a VM has multiple NICs, a security group can be configured for each NIC.
Correct Answer: C
Q208) In Huawei FusionCompute, which of the following statements about deleting a security group is false?
- a) A security group can be deleted properly even if it is authorized to access other security groups.
- b) The security group to be deleted cannot contain any VMs. If a VM exists in the security group, the VM must be removed from the security group before the security group can be deleted.
- c) After a security group is deleted, all security group rules in the group will be deleted as well.
- d) When a security group to which a VM belongs is deleted, the effects of other security groups on this VM are not changed.
Correct Answer: A
Q209) Which of the following is not included in the 4V features of big data?
- a) Volume
- b) Value
- c) Variety
- d) Valid
Correct Answer: D
Q210) Fog computing is a distributed computing model that extends cloud computing concepts to network edges to support low latency and distributed applications in mobile and internet of Things (loT) fields. Which of the following statements about fog computing is false?
- a) Fog computing can quickly generate big data at the edge of a network to reduce the latency.
- b) Fog computing can reduce the bandwidth consumed by the core Internet and restrict the movement of data to the local network.
- c) Fog computing delivers higher network reliability and physical device security than cloud computing.
- d) Fog computing can temporarily cache data to reduce network pressure.
Correct Answer: C