Huawei H13-811-ENU - HCIA Cloud Service - Set #2

Techhyme's Practice Exam Questions with Answers

Q1) Which container application management features are provided by CCE? (Multiple choices)

  • A. Rolling upgrade
  • B. Flexibility
  • C. Application monitoring
  • D. Viewing events

Q2) The cloud dedicated service is a dedicated network service that connects the local data center to the public cloud. What kind of green line does the cloud only support?

  • A. MPLS VPN
  • B. IPSec VPN
  • C. SSL VPN
  • D. OSPF VPN

Q3) Cloud disks must be used with an elastic cloud server.

  • A. True
  • B. False

Q4) What are the benefits of containers? (Multiple choices)

  • A. More efficient virtualization
  • B. Safer application
  • C. Faster delivery and deployment
  • D. Easier migration and expansion
  • E. Simpler management

Q5) Which of the following actions will result in charges?

  • A. Create EIP
  • B. Create subnet
  • C. Create VPC
  • D. Create security group

Q6) Which of the following states can be deleted directly by the shared file system?

  • A. Creating
  • B. Not available
  • C. Deleting
  • D. Delete failed

Q7) In order to monitor the Huawei elastic cloud server use the cloud monitoring service, you need to install the plug-in separately on the elastic cloud server.

  • A. True
  • B. False

Q8) File system data stores data use Erasure Code.

  • A. True
  • B. False

Q9) With regard to cloud hard disk backup, what is the correct answer? (Multiple choices)

  • A. After deleting the cloud disk, the backup data is also deleted
  • B. After deleting the cloud hard disk, you can also use the backup to restore the cloud hard disk
  • C. After deleting the cloud hard disk, you can also use backup to create cloud hard disk
  • D. After deleting the cloud disk, the backup data will not be deleted

Q10) Cloud computing is a model, it can acquire the required resources (for example, computing, storage, networks, applications and services) from configurable resource sharing pool anytime, anywhere, easily and on demand. Resources can be quickly provisioned and released, minimizing the workload of managing resources and interaction with service providers.

  • A. True
  • B. False

Q11) What is wrong with Anti-DDoS traffic cleaning?

  • A. Web vulnerability security detection capabilities
  • B. Provides the ability to configure and modify Anti-DDoS related parameters for public network IP (Requests per second, HTTP requests per second, single source IP connections).
  • C. Provides the public network IP protection capabilities of elastic cloud hosts and load balancing devices.
  • D. Provides the ability to view the monitoring capabilities of a single public IP network, including the current protection status, current protection configuration parameters, traffic conditions 24 hours ago to the present and 24 hours of abnormal events (cleaning and black holes).

Q12) Which of the following is the procedure for using CCE?

  • A. 1. Create an application 2, upload the image 3, create a cluster
  • B. 1. Create a cluster 2, create an application 3, upload the image
  • C. 1. Create a cluster 2, upload the image 3, create an application
  • D. 1. Upload the image 2, create an application 3, create a cluster

Q13) Which of the following key technologies are used by SSA (Security Situation Awareness Service)? (Multiple choices)

  • A. Big data technology
  • B. Reptile Technology
  • C. Encryption technology
  • D. Identity authentication technology

Q14) When creating an ECS, you can initialize the ECS through the file injection function provided by the system.

  • A. True
  • B. False

Q15) The problem with traditional PC office is?

  • A. High cost of operation and maintenance management
  • B. Poor video playback experience
  • C. Unable to monitor the use of PC
  • D. Poor software compatibility

Q16) The two sites communicate across the Internet. IPSec VPNs can be deployed at both ends of the firewall to protect the traffic between the two intranets.

  • A. True
  • B. False

Q17) Which of the following does not include the key features of WAF (Web Application Firewall)?

  • A. Prevent excessive traffic
  • B. Anti-SQL injection
  • C. Anti-theft chain
  • D. Anti-Webshell Upload

Q18) How many monitoring panels can the user create on the overview page?

  • A. 1
  • B. 2
  • C. 3
  • D. 4

Q19) The alarm threshold consists of three parts: aggregation mode (original data, maximum value, minimum value, average value, variance value), judgment conditions (>, >=, <, <=, =), and critical value. It is used to configure alarms condition.

  • A. True
  • B. False

Q20) As an important component of cloud security services, network security implements network isolation, responds to network attacks and ensures network security.

  • A. True
  • B. False

Q21) If dynamic resource expansion is required, which policy should be selected when creating a scaling policy?

  • A. Timing policy
  • B. Cycle policy
  • C. Alarm policy
  • D. Random policy

Q22) The Workspace data transmission process is encrypted through TLS.

  • A. True
  • B. False

Q23) What steps do I need to take to create a Windows image from a cloud server? (Multiple choices)

  • A. Configure the Windows server
  • B. Install Cloudbase-init tool
  • C. Creating a Windows Private Image
  • D. View and Clean Up the Network Rules File

Q24) Which level of cloud service is usually provided for the application to run the development environment?

  • A. IaaS
  • B. PaaS
  • C. SaaS

Q25) How many alarm rules can users create?

  • A. 20
  • B. 50
  • C. 80
  • D. 100