Question 210- 240

Q211) The function of loT is only to collect the data generated by everything.

  • a) True
  • b) False

Correct Answer: B

Q212) Artificial intelligence (Al) is a new science of researching and developing theories, methods, technologies, and application systems to imitate and enhance human intelligence. Which of the following statements about Al is false?

  • a) Al does not have initiative and creativity peculiar to human consciousness.
  • b) Al is not social.
  • c) Al is an unconscious, mechanical, and physical process.
  • d) Al is a technology in which objects are interconnected through the network to exchange information.

Correct Answer: D

Q213) The 3GPP plenary meeting held in 2018 officially approved the standalone (SA) variant of the fifth generation of mobile communications (5G) new radio (NR) specifications. Since then, the independent deployment of 5G networks is supported. The uRLLC and mMTC technologies in 5G are mainly applied to loT.

  • a) True
  • b) False

Correct Answer: A

Q214) The nature of IoT is the Internet. As long as hardware or products are connected to the Internet and data interactions exist, it can be called an IoT.

  • a) True
  • b) False

Correct Answer: A

Q215) Which of the following does not belong to the elements of AI?

  • a) Big data
  • b) Perceptual analysis capability
  • c) Computing capability
  • d) Scenario

Correct Answer: B

Q216) Which of the following statements about big data and cloud computing is true?

  • a) Cloud computing is a broad term for data sets so large or complex that traditional data processing applications are inadequate.
  • b) Big data uses the pay-per-use mode, which supports available, convenient, and on demand network access.
  • c) Big data can be used as a type of cloud computing service for users to choose.
  • d) Cloud computing cannot provide the underlying computing resources used for big data processing.

Correct Answer: C

Q217) Sound recognition, image recognition, and companion robots are all Al applications.

  • a) True
  • b) False

Correct Answer: A

Q218) As Internet+ gains more and more attention and big data and cloud services become popular, more and more advanced technologies are on the rise. Docker is one of the most widely used and important technologies. Which of the following statements about Docker is false?

  • a) Before installing Docker, a virtualization layer and virtual operating system must be created on the host machine or the host machine operating system.
  • b) Docker can be used to package the underlying environment of applications to ensure that applications can still run properly after migration.
  • c) Docker is booted faster than other VM technologies.
  • d) Docker uses containersto run applications. Containers are running instances created from images.

Correct Answer: A

Q219) Which of the following statements about the relationship between cloud computing and IoT is false?

  • a) Cloud computing is the cornerstone of IoT development, and IoT promotes the development of cloud computing.
  • b) Data transmission in IoT depends on cloud computing.
  • c) The IoT operating efficiency will be greatly reduced if there is no support from cloud computing technologies.
  • d) Cloud computing provides sufficient storage space for massive da a in the IoT.

Correct Answer: B

Q220) Which of the following statements about Virtual Network Computing (VNC)are true?

  • a) VNC must support the Linux operating system.
  • b) VNC is a lightweight remote control computer software.
  • c) A controlled computer can function as a VNC server only when the corresponding software is installed on it.
  • d) The host that initiates a control request can function as a VNC server only when the corresponding software is installed on it.

Correct Answer: B, C

Q221) In FusionCompute, virtual switches connect to a physical network ().

  • a) Uplink
  • b) Port group
  • c) Virtual NIC
  • d) iNIC

Correct Answer: A

Q222) In FusionCompute, which of the following operations can take effect immediately?

  • a) Deleting a NIC
  • b) Installing Tools
  • c) Reducing disk capacity
  • d) Directly reading and writing data on a newly attached disk

Correct Answer: A

Q223) The storage virtualization technology improves storage utilization and provides storage resources for multiple VMs

  • a) True
  • b) False

Correct Answer: A

Q224) In Huawei FusionCompute, which of the following statements about the CPU QoS technology is false?

  • a) Adjust the CPU reservation, quota, and limitation to control the CPU usage of VMs.
  • b) CPU reservation is used to ensure the minimum VM computing capability that is the minimum number of resources that can be used.
  • c) CPU quota is used to balance and adjust resources based on the relative CPU quotas of multiples VMs when computing resources are insufficient.
  • d) CPU limitation is used to specify the maximum number of VMs that can run on a host.

Correct Answer: D

Q225) In Huawei FusionCompute, the gateway address of a VM is set on which of the following network devices?

  • a) Layer 3 switch
  • b) Layer 2 switch
  • c) Virtual switch
  • d) Layer 1 physical device

Correct Answer: A

Q226) In Huawei FusionCompute, the uplink is used to ( ).

  • a) Assign IP addresses to VMs.
  • b) Manage MAC address of VMs.
  • c) Connect a virtual network to a physical network
  • d) Check the status of vNICs.

Correct Answer: C

Q227) In Huawei FusionCompute, snapshots can be created for Computing Node Agent (CNA) hosts.

  • a) True
  • b) False

Correct Answer: B

Q228) In Huawei FusionCompute, which of the following functions will be affected after a USB device is attached to a VM?

  • a) Restarting a VM
  • b) VM live migration
  • c) Cluster scheduling
  • d) VM resource capacity expansion

Correct Answer: B, C

Q229) In FusionCompute, the administrator binds the two NICs of the CNA host through active/standby mode. The data transmission rate is equal to the sum of the transmission rates of the two network ports

  • a) True
  • b) False

Correct Answer: B

Q230) In Huawei FusionCompute, after a user logs in to a VM using VNC, operations on the VM fail. For example, files cannot be opened. Which of the following is the most possible cause of this problem?

  • a) The management link is unstable.
  • b) The service link is unstable
  • c) The storage link is unstable
  • d) The VM is damaged.

Correct Answer: C

Q231) In Huawei FusionCompute, when a compute node is powered off, the system can start HA-enabled VMs on the compute node from other compute nodes. Which of the following is not a prerequisite for using this function?

  • a) HA-enabled VMs on a compute node use IP addresses on the same network segment.
  • b) The VM is not bound to the host.
  • c) HA is enabled for the cluster to which the compute node belongs.
  • d) The source and destination compute nodes share the same datastore.

Correct Answer: A

Q232) In Huawei FusionCompute, VM flavors cannot be modified during VM cloning.

  • a) True
  • b) False

Correct Answer: B

Q233) During the installation of Huawei FusionCompute, which of the following storage is VRM recommended to be deployed on?

  • a) Local disk
  • b) FC SAN
  • c) IPSAN
  • d) NAS

Correct Answer: A

Q234) In Huawei FusionCompute, multiple VMs can be deployed in batches using a template.

  • a) True
  • b) False

Correct Answer: A

Q235) Which of the following statements about the cluster, host, and VM in Huawei FusionCompute is false?

  • a) Hosts can move between different clusters.
  • b) VMs can be migrated across clusters.
  • c) Whether multiple hosts belong to the same cluster depends on whether they use the same shared storage.
  • d) A cluster consists of multiple hosts and their associated storage and network resources.

Correct Answer: A

Q236) In Huawei FusionCompute, which of the following are the methods for creating VM?

  • a) Importing a VM from other virtualization platforms
  • b) Deploying a VM using a template
  • c) Cloning a VM from an existing VM
  • d) Creating a new VM

Correct Answer: B, C, D

Q237) In Huawei FusionCompute, if a host in a cluster becomes faulty, VMs on the host are automatically migrated to other hosts in the cluster.

  • a) True
  • b) False

Correct Answer: B

Q238) Which of the following methods is used for installing VRM VMs using FusionCompute Installer?

  • a) Automatic installation of an ISO file.
  • b) Importing a template file to a VM
  • c) Automatic installation using PXE
  • d) Automatic VM creation and ISO file mounting

Correct Answer: B

Q239) In FusionCompute, which of the following is not a method for creating a template?

  • a) Converting a VM to a VM template
  • b) Converting a snapshot to a VM template
  • c) Cloning a VM to a VM template
  • d) Cloning a VM template to a VM template

Correct Answer: B

Not Available