Huawei H13-811-ENU - HCIA Cloud Service - Set #4

Techhyme's Practice Exam Questions with Answers

Q1) Workspace users want to access the U disk in the terminal device. Which of the following is correct?

  • A. Clipboard redirection
  • B. USB port redirection
  • C. Printer Redirection
  • D. The user desktop cannot access the terminal local USB device

Q2) Cloud Container Engine is a high-performance and scalable container service that provides enterprises with the rapidly package/deploy applications, automate operations and maintenance of life cycle management capability of Docker containers, enabling you to create and deploy applications efficiently.

  • A. True
  • B. False

Q3) The elastic cloud server is billed and supports two billing methods: "packet year/month" and "pay as you go."

  • A. True
  • B. False

Q4) Which of the following is not the main function of HVD (host vulnerability detection)?

  • A. Elastic Cloud Server Vulnerability Scanning
  • B. Elastic cloud server brute force protection
  • C. Provide Vulnerability Test Report
  • D. Vulnerability scan results query

Q5) Availability Zone is a collection of one or more physical data centers. There is an independent wind power hydropower system. AZ logically divides resources such as computing, network, and storage into multiple clusters.

  • A. True
  • B. False

Q6) Which way can you access the container directly from the public network?

  • A. Elastic IP
  • B. Elastic load balancing
  • C. Elastic Cloud Server
  • D. Virtual Private Cloud

Q7) PTS (Penetration Testing Service) is a security assessment service product.

  • A. True
  • B. False

Q8) In which of the following states can the cloud disk backup be created?

  • A. Available
  • B. Deleting
  • C. Delete failed
  • D. Creating

Q9) The image created by the cloud server must be shut down.

  • A. True
  • B. False

Q10) When the cloud connection is opened, the port type is 10GE. What is the type of the port?

  • A. Electrical port
  • B. Optical port
  • C. Ethernet port
  • D. Serial port

Q11) Workspace support 3D applications, which of the following devices need to configure?

  • A. CPUs that support hardware virtualization
  • B. GPU card
  • C. Smart Network Card
  • D. SSD hard disk

Q12) Which RDS can be used in combination with the following cloud services to ensure network security isolation between RDS instances and other services?

  • A. ECS
  • B. VPC
  • C. CES
  • D. OBS

Q13) Which of the following are not the supported load methods for the listener? (Multiple choice)

  • A. the maximum connection
  • B. Polling
  • C. Setting weights
  • D. the minimum connection

Q14) Which of the following components is not part of the big data platform?

  • A. MapReduce
  • B. OpenStack
  • C. HDFS
  • D. Yarn

Q15) Which of the following description about the ELB configuration is incorrect?

  • A. Configure a listening policy when you create a listener
  • B. Select IP when adding elastic load balancer
  • C. Selecting session retention when configuring listener
  • D. Configurable health check timeout

Q16) The Web application firewall performs anomaly detection on HTTP requests to effectively prevent malicious network intrusions such as web page tampering, information leakage, Trojan horse implantation and so on.

  • A. True
  • B. False

Q17) What are the options for cloud computing security services? (Multiple choices)

  • A. Data protection
  • B. Operational Environmental Protection
  • C. The independence and linkage of services
  • D. Safety assessment

Q18) The encrypted image cannot be modified to be unencrypted.

  • A. True
  • B. False

Q19) What does the elastic cloud server use to construct a logically isolated logical area?

  • A. Flexibility
  • B. Virtual Private Cloud
  • C. Exclusive cloud
  • D. Cloud Container Engine

Q20) Is Huawei's cloud service positioning correct?

  • A. Focus on layer I, enable layer P, aggregate layer S
  • B. Focus on layer S, enable layer P, aggregate layer I
  • C. Focus on layer P, enable layer I, aggregate layer S
  • D. Focus on layer I, enable layer S, aggregate layer P

Q21) From which perspectives does the SSA (Security Situation Awareness Service) analyze security posture? (Multiple choices)

  • A. Global perspective
  • B. User perspective
  • C. Management perspective
  • D. Attacker's perspective

Q22) Cloud monitoring service is currently available free of charge and no fee is charged.

  • A. True
  • B. False

Q23) What scenes does the user copy the image from? (Multiple choices)

  • A. Copy non-encrypted mirrors as non-encrypted mirrors
  • B. Copy an unencrypted image as an encrypted image
  • C. Copy the encrypted image as an encrypted image
  • D. Copy the encrypted image as a non-encrypted image

Q24) The mirroring service provides flexible self-service and complete mirroring management capabilities. Users can create private mirrors and create or bulk copy an elastic cloud server through mirroring.

  • A. True
  • B. False

Q25) The traditional IT infrastructure architecture has been unable to support the efficient operation of enterprises. It urgently calls for the arrival of structural changes. Which is not the main reason?

  • A. Business is slow and lifecycle management is complex
  • B. TCO remains high
  • C. Critical application performance is limited by IO bottlenecks
  • D. The speed is too slow