If Tools are not installed on the virtual machine on FusionCompute, which of the following functions can be implemented?
- A . Create a virtual machine snapshot
- B . Virtual machine live migration
- C . Safely shut down the virtual machine
- D . Configure an IP address for the virtual machine
The large page memory of the host is configured in FusionComute, which can optimize the efficiency of host internal training access and improve system performance.
- A . TRUE
- B . FALSE
FusionCompute is a basic component in FusionSphere, which is mainly responsible for the virtualization of hardware resources and the centralized management of virtual resources, business resources, and user resources.
- A . TRUE
- B . FALSE
The storage resources in FusionCompute correspond to IP-SAN, FC-SAN, NAS, FusionStorage and local hard drives.
- A . TRUE
- B . FALSE
After FusionCompute sets HA resource reservation, when the cluster resources are extremely tight, the reserved resources will be preferentially allocated to virtual machines to ensure the normal operation of the business.
- A . TRUE
- B . FALSE
Which of the following descriptions about FusionCompute memory reuse is incorrect?
- A . The FusionCompute system turns on the memory reuse technology by default, and can only be turned off using the command line in the background.
- B . Memory replacement technology is to dump the data that has not been accessed for a long time in the memory to the hard disk, and then read it when needed.
- C . Memory sharing allows multiple virtual machines to share memory pages with the same data content.
- D . Memory reuse technology can reduce hardware procurement costs.
In FusionCompute, when the virtual machine’s disk mode is in subordinated type, which of the following descriptions is correct?
- A . The subordinated disk is not included in the snapshot, and the changes will be written to the disk immediately and will become invalid after restart.
- B . The subordinated disk is not included in the snapshot, and the changes will be written to the disk immediately and permanently.
- C . The subordinated disk is included in the snapshot, and the changes will be written to the disk immediately and permanently.
- D . The subordinated disk is included in the snapshot, and the changes will be written to the disk immediately and become invalid after restart.
Which of the following disk modes can be used to store user personal data and be shared among multiple virtual machines like a USB flash drive?
- A . Normal
- B . Independent – non-persistent
- C . Independence – Enduring
- D . Subordination
What is the incorrect description about virtio?
- A . Compared to full analog devices, virtio has better performance.
- B . The use of virtio devices requires the installation of special device drivers.
- C . The virtio drivers of FusionCompute are all included in Tools.
- D . When I/O is frequent, the server CPU usage rate is high.
Which memory reuse technology can reclaim physical memory temporarily not used by virtual machines and allocate them to virtual machines that need to reuse memory?
- A . Memory bubbles
- B . Memory replacement
- C . Memory transparent huge pages
- D . Memory sharing
Which of the following descriptions about storage hot migration is wrong?
- A . Support the migration of non-persistent disks.
- B . Support for real-time migration of virtual machine disks without affecting user usage, so that planned storage maintenance and storage migration can be performed without interrupting business.
- C . Storage hot migration can be migrated between different storage devices within the same storage device under storage virtualization management.
- D . It does not support hot migration of mounted " shared " disks and disks of linked clone virtual machines.
In FusionCompute, which of the following descriptions of virtual machine templates is incorrect?
- A . The virtual machine is cloned as a template: After the cloning is completed, the virtual machine can still be used normally.
- B . Template cloning as template: After cloning is completed, the original template still exists.
- C . Convert the virtual machine to a template: After the conversion, the virtual machine can still be used normally.
- D . Import template: Some parameter settings can be adjusted to make it slightly different from the local virtual machine template.
In the FusionCompute system, which of the following descriptions is incorrect?
- A . If it is bound to a USB device, the virtual machine cannot be migrated to another host.
- B . Virtual machine export is a kind of virtual machine hot migration.
- C . If the " Bind with selected host " option is not checked, the virtual machine will not be able to add pass-through devices.
- D . Support the migration of virtual machines across clusters.
When FusionCompute converts the template to a virtual machine, the attributes such as the operating system type and version number of the virtual machine are inherited from the template, and the attributes such as the number of CPUs can be customized.
- A . TRUE
- B . FALSE
On FusionCompute, the premise that the DP M function is available is that the BMC information of the host is configured.
- A . TRUE
- B . FALSE
Which of the following batch operations cannot be performed by FusionCompute?
- A . Add hosts in batches
- B . Migrate virtual machines in batches
- C . Binding network ports in batches
- D . Associate storage resources in batches
Each cluster in FusionCompute can only create one distributed virtual switch.
- A . TRUE
- B . FALSE
In FusionCompute, what is the correct connection relationship between virtual network interfaces?
- A . vNIC (VW) >vPort (DVS) >pNIC (network card) >port (switch)
- B . vNIC (VI) >pNIC (network card) >vPort (DVS) >port (switch)
- C . vNIC (VI) >pNIC (network card) >port (switch) >vPort (DVS)
- D . Port (DVS) >vWIC (VM) >pNIC (network card) >port (switch)
The load balancer can automatically perform a health check on the WI to ensure that all user requests can be allocated to the available WI.
- A . TRUE
- B . FALSE
What kind of protocol is the load balancer used to distribute user requests to different components?
- A . TRUECP
- B . SIP
- C . HTTP S
- D . SSL
Regarding the description of the shortcomings of the PCoIP desktop cloud protocol, which is incorrect?
- A . This protocol can maximize the use of network bandwidth.
- B . Native PCoIP does not have the ability to redirect peripherals such as serial and parallel ports.
- C . Compared with other desktop cloud protocols, the transmission reliability is low.
- D . This protocol belongs to the rendering protocol on the host side and has poor compatibility.
During the daily operation and maintenance of FusionAccess, Huawei desktop cloud administrators can use TCM tools to manage virtual desktops, making self-service maintenance more convenient and greatly improving operational efficiency.
- A . TRUE
- B . FALSE
Which of the following desktops is not supported by the FusionAccess desktop cloud solution?
- A . VIP Desktop
- B . Offline desktop
- C . VDI dedicated desktop
- D . Resource Pool Desktop
Which of the following is not the procedure to configure the Linux infrastructure virtual machine of Huawei Desktop Cloud?
- A . Install the operating system
- B . Set virtual machine mutual exclusion
- C . Set virtual machine self-recovery properties
- D . Install HAD
What is the role of DHCP in Huawei Desktop Cloud?
- A . Assign IP addresses, gateways, and DNS to the virtual machines of the desktop cloud infrastructure.
- B . Provide domain name resolution function for each virtual desktop.
- C . Assign IP address, gateway, DNS for each virtual desktop.
- D . Assign permissions to each virtual desktop.
If a group policy is set for the domain huawei.com, the computer configuration in this group policy will be applied to all computers in this domain.
- A . TRUE
- B . FALSE
A large multinational company’s IT system needs to use AD.
Regarding the planning of AD, which of the following descriptions is incorrect?
- A . Within each subdomain and between different departments, different users and devices can be managed separately by setting different 0Us.
- B . According to the different regions of the department, establish different sub-domains, but there should be as few sub-domains as possible.
- C . There is no need to synchronize user data between different subdomains.
- D . Adopt multi-domain deployment, different regions have different sub-domain strategies, management, maintenance, and deployment are more complicated than a single domain.
What is the correct sequence of the virtual machine registration process?
① The virtual machine asks AD to initiate a request to verify the validity of the DC domain name;
② The virtual machine selects a DC to initiate a registration request;
③ The HDA process is started;
④ HDC issues license version information and desktop group information to virtual machines
- A . ①②③④
- B . ③①②④
- C . ②①③④
- D . ③②①④
Which of the following methods cannot rule out the problem that the virtual machine in the Huawei desktop cloud cannot be logged in?
- A . Check by TCM.
- B . Users log in to check virtual machine through FusionCompute on VNC
- C . Try whether the same TC can log in to other virtual machines normally.
- D . Check the desktop cloud system through FusionCare.
What is the correct process of replicating virtual machine issuance?
① Check whether the virtual machine IP can be reachable;
② Create virtual machine;
③ Add users to the desktop group;
④ Join the virtual machine to the domain
- A . ②①③④
- B . ②④③①
- C . ②①④③
- D . ②③④①
Which of the following is the correct sequence of the desktop cloud virtual machine login process?
① User authentication
② Access WI
③ Pre-connection
④ Get a list of virtual machines
- A . ①②③④
- B . ②①③④
- C . ②①④③
- D . ①②④③
Which of the following descriptions about the daily operation and maintenance specifications of Huawei Desktop Cloud is incorrect?
- A . Pay attention to the number of unregistered users. If there is a large area of unregistered users, analyze the reasons and deal with it urgently.
- B . Emergency alarms such as abnormal server heartbeat, restart, and abnormal data service need to be dealt with in time.
- C . If the license is about to expire, you need to process it in time and apply for a new license.
- D . After the storage resource and computing resource utilization rate exceeds 100%, start the expansion task.
In which way can desktop virtual machines be migrated?
- A . On the FusionCompute Portal interface, find the virtual machine to be migrated, and click the " Migrate " button on the virtual machine tab.
- B . Find the virtual machine ID on the FusionAccess Portal interface, log in to the HDC component backend, and enter the corresponding command line to migrate.
- C . Find the virtual machine ID on the FusionAccess Portal interface, log in to the backend of the WI component, and enter the corresponding command line to migrate.
- D . On the FusionAccess Portal interface, find the virtual machine to be migrated, and click the " Migrate " button.
When the desktop virtual machine cannot be connected, you can use vDesk to detect and automatically repair the repairable options.
- A . TRUE
- B . FALSE
Windows operating system running for a long time may have the problem of insufficient memory and system running slowly because pf the high CPU resources occupied by the process. It is recommended that the system administrator restart the user virtual machines in batches every 3-5 days.
- A . TRUE
- B . FALSE
Regarding the operation of the HUAWEI desktop cloud system, which of the following descriptions is incorrect?
- A . Users are prohibited from uninstalling the.NET Framework software of the desktop virtual machine to prevent the virtual desktop from malfunctioning due to missing related services.
- B . In order to make the desktop virtual machine system run more smoothly, users can install optimization software by themselves to clean up and optimize the registry and junk files.
- C . In order to avoid the leakage of desktop information when the desktop virtual machine is not used for a period, the user needs to activate the system default screen saver.
- D . The user is not allowed to start the sleep mode when using the desktop virtual machine to prevent the loss of user data after the desktop virtual machine sleeps.
Regarding DHCP backup, which of the following descriptions is incorrect?
- A . The backup path needs to be configured on the DHCP server.
- B . DHCP information needs to be configured in the "Alarm Components" of FusionAccess.
- C . It is necessary to set "Whether to enable backup" to " Yes" in FusionAccess "System Management > Initial Configuration > Domain /O U".
- D . Need to install the monitoring agent on the DHCP server.
Regarding the TC terminal access security authentication process in FusionAccess, which of the following descriptions is incorrect?
- A . After the switch detects the authentication request sent by the TC, it sends the authentication information to the AD server for processing through the Radius protocol.
- B . TC after the certificate is detected, it will automatically switch to initiate the EAP-TLS of 802.1x two-way certificate authentication.
- C . The certificate on the TC is issued from the CA based on the TC information.
- D . After the TC is powered on, it will check whether it has a certificate, if not, it will automatically apply for a certificate from TCM.
What information does not need to be collected when FusionAccess fails?
- A . FusionCompute build time
- B . System version number
- C . Customer live network information
- D . Time of failure
What is the maximum number of client connections allowed in FusionAccess when the license is not loaded?
- A . 40
- B . 50
- C . 60
- D . 30
Which of the following regarding the description of FusionCare description is incorrect?
- A . FusionCare can be set to collect logs periodically to avoid excessive repetitive manual operations.
- B . FusionCare can collect the running logs of the various components of FusionAccess and the operating system of the user’s virtual machine.
- C . FusionCare can check the health status of all CNA nodes and FusionAccess infrastructure virtual machines, and generate a health check report.
- D . FusionCare can collect and package logs of all CNA nodes and FusionAccess infrastructure virtual machines.
Which component in the FusionSphere virtualization suite can complete the backup of the virtual machine?
- A . FusionCompute
- B . FALSEusionManager
- C . OceanStor BCManager eBackup
- D . UltraVR
Which virtualization technology does FusionCompute ‘s CPU virtualization use?
- A . Paravirtualization
- B . Operating system virtualization
- C . Hardware-assisted virtualization
- D . Full virtualization
Which of the following descriptions about FusionCompute is correct?
- A . VRM supports both virtual deployment and physical deployment. Single-node deployment is recommended to reduce the resource occupation of the cluster.
- B . FALSEusionCompute contains two functional modules, CNA and VRM. CNA is a virtualized operating system that provides virtualization capabilities for computing, storage, and network resources. VRM is used for virtual resource management.
- C . The CNA virtualization system uses sojourn virtualization.
- D . VRM can manage virtualized resources and physical resources.
Which of the following description of the virtual machine is incorrect?
- A . With virtualization technology, multiple virtual machines can be run on one physical machine at the same time.
- B . Virtual machines can run operating systems and applications like physical machines.
- C . With virtualization, physical equipment is no longer needed.
- D . Computing virtualization can realize the reuse of computing resources.
Non-uniform Architecture solves the scalability problem in multiprocessing systems.
- A . TRUE
- B . FALSE
When FusionCompute enables memory reuse, virtual machine hot migration is performed. If part of the virtual machine data is in the swap space, the migration time will be longer.
- A . TRUE
- B . FALSE
The customer storage system needs to be upgraded, and one existing virtual machine is bound to the host. Which of the following technologies is recommended to upgrade the storage system online?
- A . Virtual machine hot migration changes the host.
- B . Virtual machine hot migration changes the host and data storage.
- C . Unable to meet demand.
- D . Virtual machine hot migration to data storage.
Which one of the following descriptions of DRS is correct?
- A . In order to achieve the best resource scheduling effect, it is recommended that the CPU, memory, network, and storage configurations of the hosts in the cluster are as the same as possible, so that the virtual machine can be migrated to any host in the cluster
- B . It is recommended to set the time-sharing value of resource scheduling to a conservative strategy when the business pressure is high, and set to a medium or advanced strategy when the business pressure is small.
- C . The advanced rules of resource scheduling can be used to meet some special needs. For example, when two virtual machines are in the active/standby relationship, it can be configured as an aggregation strategy to improve data interaction performance between virtual machines.
- D . Resource fullness can be configured with different measurement factors. If memory reuse is used, it is recommended to configure it according to CPU scheduling.
In FusionAccess, when distributing a fully replicated virtual machine of the "static multi-user" type, after changing the display name of the virtual machine, delete the Tomcat domain account added after adding the domain.
- A . TRUE
- B . FALSE
In FusionAccess, if the user inserts a USB device, the page prompts " Driver needs to be installed ", it may be caused by a problem with the USB device itself.
- A . TRUE
- B . FALSE
In Fuionlccoss, when reclaiming the "dynamic multi-user" type of virtual machine desktop, it is also necessary to remove the user from the "dynamic multi-user" type of user group.
- A . TRUE
- B . FALSE
FusionAcces supports the use of Backup Server to temporarily backup all components. When the backup space is sufficient, the backup server will save the backup data within 10 days; When the backup space is insufficient, the system will generate an alarm message, and the administrator needs to manually remove the unnecessary backup files.
- A . TRUE
- B . FALSE
In FusionAccess, after the administrator reclaims the "static multi-user" type of virtual machine desktop, it does not affect the user’s independent execution authority, and the user can still access desktop resources through the self-maintenance channel.
- A . TRUE
- B . FALSE
In FusionAccess, linked clone virtual machines share the same system master disk. If users need to install personalized applications, they can be installed in a differential disk and saved.
- A . TRUE
- B . FALSE
In FusionCompute, which of the following options will be used by the port aggregation for load sharing?
- A . Source and destination IP
- B . Source MAC
- C . Source and destination port groups
- D . Source and destination ports
On the one hand, FusionCompute distributed virtual switches can configure, manage, and monitor the virtual switches of multiple servers. On the other hand, it can also ensure the consistency of network configuration when virtual machines are migrated between servers.
- A . TRUE
- B . FALSE
Which of the following description of the load sharing algorithm based on source and destination IP and port is correct?
- A . This mode is generally used in scenarios where most of the network flow is inside the Layer 2 network. At this time, the network flow can be evenly hashed by MAC.
- B . This mode has high reliability, but the network flow will only be shared by one network card, and the other network card serves as a backup.
- C . When there are IP and port in the message, use the source and destination IP, port and MAC for load sharing; when the message has only an IP address, use the IP address and MAC for load sharing, when the message has only a MAC address, Use MAC address for load sharing.
- D . This mode enables the network stream to be sent to each network port completely and evenly, but large messages may be out of order.
Which one of the following descriptions about the memory reuse feature of FusionCompute is wrong?
- A . After the host memory reuse is enabled, the specific memory reuse degree of the virtual machine can be controlled by the virtual machine memory QoS setting.
- B . After the host memory reuse is turned off, the sum of the memory sizes of all virtual machines running on each host cannot be greater than the sum of the actual available physical memory used by the virtual machines
- C . After setting the host memory reuse, the total number of virtual machine memory created on the host can exceed the host’s physical memory to increase the host’s virtual machine density
- D . Turning off host memory reuse requires that the memory utilization rate of all hosts in the cluster is less than or equal to 150%
In FusionCompute, which of the following on DVS description is wrong?
- A . Cross-server communication does not need to be forwarded through a physical switch
- B . Due to the consumption of virtual switching modules, the switching performance is slightly lower than that of physical switches
- C . Provide virtual network security capabilities, which can prevent the IP address of virtual machines from spoofing
- D . Using pure software to achieve, compared with the use of physical switches, flexible function expansion
In FusionAccess, when the business plane of the virtual machine cannot communicate with the TC network plane, the virtual machine needs to add a third network card that communicates with the TC network plane in addition to the business plane network card and the management plane network card.
- A . TRUE
- B . FALSE
Which of the following descriptions about the load sharing algorithm based on source and destination IP and port is correct?
- A . This mode is highly reliable, but the network traffic will only be shared by one network card, and the other network card serves as a backup.
- B . When there are IP and port in the message, use the source and destination IP, port, and MAC for load sharing; when the message has only an IP address, use the IP address
Perform load sharing with MAC; when the message has only MAC address, use MAC address for load sharing. - C . This mode is generally used in scenarios where most of the network traffic is inside the Layer 2 network. At this time, the network traffic can be evenly hashed by MAC.
- D . This mode enables network traffic to be sent to each network port completely and evenly, but many messages may be out of order.
Which of the following operations can be performed on a virtual machine on FusionCompute in the hibernation state?
- A . Ordinary deletion
- B . Convert to template
- C . Clone the virtual machine
- D . Restart
In FusionCompute, which of the following options is not included in the startup method of a virtual machine?
- A . Hard disk startup
- B . Network startup
- C . Local startup
- D . CD-ROM startup
About the description of the virtual network of FusionCompute, which of the following is not correct?
- A . All virtual machine NICs in the same security group will use the security group rules for network communication.
- B . SR-IOV pass-through mode network card does not support IO ring settings.
- C . Different IO ring sizes will affect the network performance of the virtual machine network card.
- D . Compared with multiple queues, a single queue will take up more CPU resources of the host.
In FusionCompute, what operations cannot be performed on a stopped virtual machine?
- A . Restart
- B . Move
- C . Create a consistent snapshot
- D . Migration
In the FusionCompute system, which of the following is not a storage device?
- A . NAS
- B . A LUN on OceanStor
- C . Storage pool on FusionStorage
- D . Local hard disk
In the FusionCompute system, which is the incorrect description of the virtual machine network card?
- A . SR-IOV pass-through mode network card supports online addition.
- B . There is a limit to the number of network cards that can be added to each virtual machine.
- C . The virtual machine configured with the pass-through device must monopolize the memory. After monopolizing the memory, the virtual machine’s memory will not be swapped to the swap space.
- D . Virtual machines with memory reuse (not 100% memory reservation) cannot be configured with pass-through devices.
In FusionCompute add a IP-SAN storage, and create the data storage according to this, what are the correct steps?
- A . Add data storage > Add host storage interface > Add storage resources > Scan storage devices
- B . Add host storage interface > Add data storage > Scan storage devices > Add data storage
- C . Add host storage interface > Add data storage > Add data storage > Scan storage devices
- D . Add storage resources > Add host storage interface > Scan storage devices > Add data storage
If Tools are not installed on the virtual machine, FusionCompute cannot query the memory usage of the virtual machine.
- A . TRUE
- B . FALSE
IDV can only be used with special terminals, mobile devices cannot support it.
- A . TRUE
- B . FALSE
In the Huawei desktop cloud clock synchronization solution, IP-SAN, servers, switches, firewalls, or third-party devices all synchronize time from the host where the main VRM is located through the management plane.
- A . TRUE
- B . FALSE
Regarding the description of HDP display technology, which of the following is incorrect?
- A . Use lossless compression for unnatural images.
- B . Only support Huawei’s specific self-developed image compression algorithm.
- C . It can automatically identify unnatural images such as text, Windows frames, lines, etc. in the entire image.
- D . Natural images such as photos and pictures are lossy compressed with an appropriate compression rate.
In the Huawei desktop cloud system software deployment plan, when multiple sets of FusionAccess use the same license component, how to deploy the license component?
- A . Integrated deployment with HDC
- B . Integrated deployment with WI
- C . Separate deployment
- D . Integrated deployment with ITA
Virtual machine desktops using GPU pass-through technology will lose features such as hot migration and HA.
- A . TRUE
- B . FALSE
Which component does the license server interact with to complete the license management?
- A . WI
- B . HDC
- C . ITA
- D . TCM
What will be used to perform setting by Group Policy?
- A . Group Policy Regulations
- B . Filter
- C . Rule Setter
- D . Group Policy Object
If a group policy is set for the organizational unit Us erOU, the user configuration in this group policy will apply to all users in this organizational unit.
- A . TRUE
- B . FALSE
TC can search for TC terminals managed by the TC, without the need for active connection on the TC side.
- A . TRUE
- B . FALSE
Which of the following descriptions of DNS is incorrect?
- A . On the Internet, the correspondence between domain names and IP addresses can be one-to-one or many-to-one. No matter what kind of correspondence, DNS can be resolved.
- B . The domain controller will register its host name, IP address and role played in the DNS service period so that other computers can find this pre-controller through the DNS server.
- C . DNS reverse resolution requires the establishment of a reverse lookup zone to resolve IP addresses into domain names.
- D . DNS provides services for converting between domain names and IP addresses.