Exam4Training

Huawei H13-811_V2.2-ENU HCIA-Cloud Service V2.2 Online Training

Question #1

Elastic load balancing can add cloud servers with different operating systems.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #2

The flexible file service supports the standard ( ) protocol.(Multiple Choice)

  • A . HTTP
  • B . CIFS
  • C . CFTP
  • D . NFSv3

Reveal Solution Hide Solution

Correct Answer: BD
Question #3

What are the product advantages of VPC? (Multiple Choice)

  • A . Flexible deployment
  • B . Dynamic BGP
  • C . Safe isolation
  • D . Support hybrid cloud deployment

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #4

The alarm threshold is composed of three parts: aggregation mode, condition, and critical value, which are used to configure alarm conditions.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #5

Data access service provides a one-stop big data collaborative development platform to help users easily complete multiple tasks such as data modeling, data integration, script development, and job scheduling.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #6

What are the components of the elastic cloud server? (Multiple Choice)

  • A . CPU
  • B . Cloud hard drive
  • C . Memory
  • D . Mirror

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #7

Which of the following services can be used in conjunction with elastic scaling? (Multiple Choice)

  • A . Flexible file service
  • B . Elastic Cloud Server
  • C . Cloud monitoring
  • D . Elastic load balancing

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #8

What applications and services does Huawei cloud market provide? (Multiple Choice)

  • A . Commercial software
  • B . Basic software
  • C . Professional services
  • D . Developer tools

Reveal Solution Hide Solution

Correct Answer: ABC
Question #9

Cloud hard disk backup supports () to record the operation of backup service resources, so that users can query, audit, and backtrack.

  • A . Cloud Audit Service
  • B . Cloud hard drive
  • C . Cloud Monitoring Service
  • D . Object storage service

Reveal Solution Hide Solution

Correct Answer: C
Question #10

What does the elastic cloud server use for data storage?

  • A . Dedicated cloud
  • B . Elastic scaling
  • C . Mirror
  • D . Cloud hard drive

Reveal Solution Hide Solution

Correct Answer: D

Question #11

Which of the following options is not an advantage of cloud hard drives?

  • A . High reliability
  • B . Rich specifications
  • C . Can be used alone
  • D . Easy to use

Reveal Solution Hide Solution

Correct Answer: C
Question #12

There is no need to delete the virtual gateway and virtual interface bound to the physical leased line when unsubscribing to the physical leased line.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #13

After created a backup strategy, you can bind the cloud disk in the () state to the backup strategy.

  • A . Available
  • B . Recovery failure
  • C . Transfer
  • D . Error

Reveal Solution Hide Solution

Correct Answer: A
Question #14

There is no limit to the size of the exported image.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #15

Which of the following options is the most reasonable configuration process of virtual private cloud?

  • A . Create virtual private cloud and default subnet>Create new subnet>Add security group policy>Create security group
  • B . Create virtual private cloud and default subnet>Create new subnet>Create security group>Add security group rules
  • C . Create virtual private cloud and default subnet>Create security group>Create new subnet>Add security group rules

Reveal Solution Hide Solution

Correct Answer: B
Question #16

Which computing cloud service does not belong to Huawei?

  • A . Bare Metal Service
  • B . Mirror service
  • C . Elastic scaling
  • D . Flexible file service

Reveal Solution Hide Solution

Correct Answer: D
Question #17

After purchasing a VPN gateway, a public network exit IP address will be automatically assigned to the VPN gateway.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #18

Which of the following standard bucket strategies does OBS have? (Multiple Choice)

  • A . Public writing
  • B . Private
  • C . Public reading
  • D . Public read and write

Reveal Solution Hide Solution

Correct Answer: BCD
Question #19

After the elastic cloud server is bound to (), it can provide access to the outside through a fixed public IP address.

  • A . System Disk
  • B . Mirror
  • C . Data Disk
  • D . Elastic public network IP

Reveal Solution Hide Solution

Correct Answer: D
Question #20

The elastic file service can set read-only permission control for users.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A

Question #21

How many types of VPNs can be divided according to business purposes? (Multiple Choice)

  • A . Lay2 and Lay3 tunnel VPN
  • B . Access VPN
  • C . Extranet VPN
  • D . Intranet VPN

Reveal Solution Hide Solution

Correct Answer: BCD
Question #22

Which of the following are the advantages of load balancing? (Multiple Choice)

  • A . Support cross-availability zone active-active disaster recovery.
  • B . Adopting clustered deployment, supporting active-active disaster recovery in the same city in multiple availability zones, and seamless real-time switching.
  • C . Automatically complete distribution according to application traffic, seamlessly integrate with elastic scaling services, and flexibly expand the external service capabilities of user applications.
  • D . Support monitoring performance indicators based on listener granularity, which is more suitable for customer business statistics.

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #23

Which of the following is not included in the main application scenarios of KMS (Key Management Service)?

  • A . Encryption and decryption of key information assets
  • B . Network transmission data encryption
  • C . Business core data encryption and decryption
  • D . Encryption and decryption of user personal data

Reveal Solution Hide Solution

Correct Answer: B
Question #24

The cloud dedicated line service is a dedicated line network service that establishes a connection between the local data center and the public cloud. What types of dedicated lines are currently supported by the cloud dedicated line?

  • A . IPSec VPN
  • B . OSPF VPN
  • C . MPLS VPN
  • D . SSL VPN

Reveal Solution Hide Solution

Correct Answer: C
Question #25

Elastic cloud servers between different availability zones in the same area cannot communicate with each other.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #26

Users can use the object storage service in two ways: the management console (OBS Console) and the client (OBS Browser).

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #27

When the capacity of the cloud hard disk is insufficient, which of the following solutions are available? (Multiple Choice)

  • A . Set the cloud disk as a shared disk
  • B . Purchase a new cloud hard disk and mount it to the cloud server
  • C . Clear the space of the cloud hard drive
  • D . Expand the original cloud hard disk capacity

Reveal Solution Hide Solution

Correct Answer: BCD
Question #28

The file system supports batch creation.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #29

The relational database service RDS does not have database backup and recovery functions.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #30

What are the types of scaling strategies for elastic scaling? (Multiple Choice)

  • A . Timing strategy
  • B . Warning strategy
  • C . Random strategy
  • D . Cycle strategy

Reveal Solution Hide Solution

Correct Answer: ABD

Question #31

The CIFS type file system supports the cloud server using the Linux operating system for mounting.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #32

Which of the following are the main functions of the enterprise host security HSS? (Multiple Choice)

  • A . Weak password detection
  • B . Software vulnerability detection
  • C . Remote login detection
  • D . Malicious program detection

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #33

Vulnerability scanning service can repair the vulnerabilities scanned out.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #34

What computing services does Huawei public cloud provide? (Multiple Choice)

  • A . Mirror service
  • B . Cloud hard drive
  • C . Elastic Cloud Server
  • D . Elastic scaling service

Reveal Solution Hide Solution

Correct Answer: ACD
Question #35

Host monitoring supports monitoring of elastic cloud servers and bare metal servers.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #36

According to the classification of Huawei cloud services, which cloud service is not a computing cloud service?

  • A . Bare Metal Service
  • B . Elastic Cloud Service
  • C . Elastic Scaling cloud services
  • D . Virtual Private Cloud

Reveal Solution Hide Solution

Correct Answer: D
Question #37

Which of the following are the application scenarios of elastic load balancing? (Multiple Choice)

  • A . Realize more flexible service forwarding
  • B . Shield the real IP from the outside to achieve the purpose of security protection
  • C . Provide routing balancing capabilities based on domain names and URLs
  • D . Applicable to web services with large traffic

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #38

Scalable bandwidth supports the setting of three types of scalable bandwidth strategies, which are alarm strategy, timing strategy and periodic strategy.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #39

The API gateway service is a booster for the digital transformation of enterprises.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #40

The identities of API providers and API consumers are not separated, but can be converted to each other.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version