Huawei H13-527-ENU Huawei HCIP Cloud Computing V4.0 Online Training
Huawei H13-527-ENU Online Training
The questions for H13-527-ENU were last updated at Jan 12,2025.
- Exam Code: H13-527-ENU
- Exam Name: Huawei HCIP Cloud Computing V4.0
- Certification Provider: Huawei
- Latest update: Jan 12,2025
In FusionAccess, if the user inserts a USB device, the page prompts " Driver needs to be installed ", it may be caused by a problem with the USB device itself.
- A . TRUE
- B . FALSE
In Fuionlccoss, when reclaiming the "dynamic multi-user" type of virtual machine desktop, it is also necessary to remove the user from the "dynamic multi-user" type of user group.
- A . TRUE
- B . FALSE
FusionAcces supports the use of Backup Server to temporarily backup all components. When the backup space is sufficient, the backup server will save the backup data within 10 days; When the backup space is insufficient, the system will generate an alarm message, and the administrator needs to manually remove the unnecessary backup files.
- A . TRUE
- B . FALSE
In FusionAccess, after the administrator reclaims the "static multi-user" type of virtual machine desktop, it does not affect the user’s independent execution authority, and the user can still access desktop resources through the self-maintenance channel.
- A . TRUE
- B . FALSE
In FusionAccess, linked clone virtual machines share the same system master disk. If users need to install personalized applications, they can be installed in a differential disk and saved.
- A . TRUE
- B . FALSE
In FusionCompute, which of the following options will be used by the port aggregation for load sharing?
- A . Source and destination IP
- B . Source MAC
- C . Source and destination port groups
- D . Source and destination ports
On the one hand, FusionCompute distributed virtual switches can configure, manage, and monitor the virtual switches of multiple servers. On the other hand, it can also ensure the consistency of network configuration when virtual machines are migrated between servers.
- A . TRUE
- B . FALSE
Which of the following description of the load sharing algorithm based on source and destination IP and port is correct?
- A . This mode is generally used in scenarios where most of the network flow is inside the Layer 2 network. At this time, the network flow can be evenly hashed by MAC.
- B . This mode has high reliability, but the network flow will only be shared by one network card, and the other network card serves as a backup.
- C . When there are IP and port in the message, use the source and destination IP, port and MAC for load sharing; when the message has only an IP address, use the IP address and MAC for load sharing, when the message has only a MAC address, Use MAC address for load sharing.
- D . This mode enables the network stream to be sent to each network port completely and evenly, but large messages may be out of order.
Which one of the following descriptions about the memory reuse feature of FusionCompute is wrong?
- A . After the host memory reuse is enabled, the specific memory reuse degree of the virtual machine can be controlled by the virtual machine memory QoS setting.
- B . After the host memory reuse is turned off, the sum of the memory sizes of all virtual machines running on each host cannot be greater than the sum of the actual available physical memory used by the virtual machines
- C . After setting the host memory reuse, the total number of virtual machine memory created on the host can exceed the host’s physical memory to increase the host’s virtual machine density
- D . Turning off host memory reuse requires that the memory utilization rate of all hosts in the cluster is less than or equal to 150%
In FusionCompute, which of the following on DVS description is wrong?
- A . Cross-server communication does not need to be forwarded through a physical switch
- B . Due to the consumption of virtual switching modules, the switching performance is slightly lower than that of physical switches
- C . Provide virtual network security capabilities, which can prevent the IP address of virtual machines from spoofing
- D . Using pure software to achieve, compared with the use of physical switches, flexible function expansion