Huawei H13-811-ENU - HCIA Cloud Service - Set #2
Techhyme's Practice Exam Questions with AnswersQ1) Which container application management features are provided by CCE? (Multiple choices)
- A. Rolling upgrade
- B. Flexibility
- C. Application monitoring
- D. Viewing events
Q2) The cloud dedicated service is a dedicated network service that connects the local data center to the public cloud. What kind of green line does the cloud only support?
- A. MPLS VPN
- B. IPSec VPN
- C. SSL VPN
- D. OSPF VPN
Q3) Cloud disks must be used with an elastic cloud server.
- A. True
- B. False
Q4) What are the benefits of containers? (Multiple choices)
- A. More efficient virtualization
- B. Safer application
- C. Faster delivery and deployment
- D. Easier migration and expansion
- E. Simpler management
Q5) Which of the following actions will result in charges?
- A. Create EIP
- B. Create subnet
- C. Create VPC
- D. Create security group
Q6) Which of the following states can be deleted directly by the shared file system?
- A. Creating
- B. Not available
- C. Deleting
- D. Delete failed
Q7) In order to monitor the Huawei elastic cloud server use the cloud monitoring service, you need to install the plug-in separately on the elastic cloud server.
- A. True
- B. False
Q8) File system data stores data use Erasure Code.
- A. True
- B. False
Q9) With regard to cloud hard disk backup, what is the correct answer? (Multiple choices)
- A. After deleting the cloud disk, the backup data is also deleted
- B. After deleting the cloud hard disk, you can also use the backup to restore the cloud hard disk
- C. After deleting the cloud hard disk, you can also use backup to create cloud hard disk
- D. After deleting the cloud disk, the backup data will not be deleted
Q10) Cloud computing is a model, it can acquire the required resources (for example, computing, storage, networks, applications and services) from configurable resource sharing pool anytime, anywhere, easily and on demand. Resources can be quickly provisioned and released, minimizing the workload of managing resources and interaction with service providers.
- A. True
- B. False
Q11) What is wrong with Anti-DDoS traffic cleaning?
- A. Web vulnerability security detection capabilities
- B. Provides the ability to configure and modify Anti-DDoS related parameters for public network IP (Requests per second, HTTP requests per second, single source IP connections).
- C. Provides the public network IP protection capabilities of elastic cloud hosts and load balancing devices.
- D. Provides the ability to view the monitoring capabilities of a single public IP network, including the current protection status, current protection configuration parameters, traffic conditions 24 hours ago to the present and 24 hours of abnormal events (cleaning and black holes).
Q12) Which of the following is the procedure for using CCE?
- A. 1. Create an application 2, upload the image 3, create a cluster
- B. 1. Create a cluster 2, create an application 3, upload the image
- C. 1. Create a cluster 2, upload the image 3, create an application
- D. 1. Upload the image 2, create an application 3, create a cluster
Q13) Which of the following key technologies are used by SSA (Security Situation Awareness Service)? (Multiple choices)
- A. Big data technology
- B. Reptile Technology
- C. Encryption technology
- D. Identity authentication technology
Q14) When creating an ECS, you can initialize the ECS through the file injection function provided by the system.
- A. True
- B. False
Q15) The problem with traditional PC office is?
- A. High cost of operation and maintenance management
- B. Poor video playback experience
- C. Unable to monitor the use of PC
- D. Poor software compatibility
Q16) The two sites communicate across the Internet. IPSec VPNs can be deployed at both ends of the firewall to protect the traffic between the two intranets.
- A. True
- B. False
Q17) Which of the following does not include the key features of WAF (Web Application Firewall)?
- A. Prevent excessive traffic
- B. Anti-SQL injection
- C. Anti-theft chain
- D. Anti-Webshell Upload
Q18) How many monitoring panels can the user create on the overview page?
- A. 1
- B. 2
- C. 3
- D. 4
Q19) The alarm threshold consists of three parts: aggregation mode (original data, maximum value, minimum value, average value, variance value), judgment conditions (>, >=, <, <=, =), and critical value. It is used to configure alarms condition.
- A. True
- B. False
Q20) As an important component of cloud security services, network security implements network isolation, responds to network attacks and ensures network security.
- A. True
- B. False
Q21) If dynamic resource expansion is required, which policy should be selected when creating a scaling policy?
- A. Timing policy
- B. Cycle policy
- C. Alarm policy
- D. Random policy
Q22) The Workspace data transmission process is encrypted through TLS.
- A. True
- B. False
Q23) What steps do I need to take to create a Windows image from a cloud server? (Multiple choices)
- A. Configure the Windows server
- B. Install Cloudbase-init tool
- C. Creating a Windows Private Image
- D. View and Clean Up the Network Rules File
Q24) Which level of cloud service is usually provided for the application to run the development environment?
- A. IaaS
- B. PaaS
- C. SaaS
Q25) How many alarm rules can users create?
- A. 20
- B. 50
- C. 80
- D. 100