Elastic load balancing can add cloud servers with different operating systems.
- A . True
- B . False
The flexible file service supports the standard ( ) protocol.(Multiple Choice)
- A . HTTP
- B . CIFS
- C . CFTP
- D . NFSv3
What are the product advantages of VPC? (Multiple Choice)
- A . Flexible deployment
- B . Dynamic BGP
- C . Safe isolation
- D . Support hybrid cloud deployment
The alarm threshold is composed of three parts: aggregation mode, condition, and critical value, which are used to configure alarm conditions.
- A . True
- B . False
Data access service provides a one-stop big data collaborative development platform to help users easily complete multiple tasks such as data modeling, data integration, script development, and job scheduling.
- A . True
- B . False
What are the components of the elastic cloud server? (Multiple Choice)
- A . CPU
- B . Cloud hard drive
- C . Memory
- D . Mirror
Which of the following services can be used in conjunction with elastic scaling? (Multiple Choice)
- A . Flexible file service
- B . Elastic Cloud Server
- C . Cloud monitoring
- D . Elastic load balancing
What applications and services does Huawei cloud market provide? (Multiple Choice)
- A . Commercial software
- B . Basic software
- C . Professional services
- D . Developer tools
Cloud hard disk backup supports () to record the operation of backup service resources, so that users can query, audit, and backtrack.
- A . Cloud Audit Service
- B . Cloud hard drive
- C . Cloud Monitoring Service
- D . Object storage service
What does the elastic cloud server use for data storage?
- A . Dedicated cloud
- B . Elastic scaling
- C . Mirror
- D . Cloud hard drive
Which of the following options is not an advantage of cloud hard drives?
- A . High reliability
- B . Rich specifications
- C . Can be used alone
- D . Easy to use
There is no need to delete the virtual gateway and virtual interface bound to the physical leased line when unsubscribing to the physical leased line.
- A . True
- B . False
After created a backup strategy, you can bind the cloud disk in the () state to the backup strategy.
- A . Available
- B . Recovery failure
- C . Transfer
- D . Error
There is no limit to the size of the exported image.
- A . True
- B . False
Which of the following options is the most reasonable configuration process of virtual private cloud?
- A . Create virtual private cloud and default subnet>Create new subnet>Add security group policy>Create security group
- B . Create virtual private cloud and default subnet>Create new subnet>Create security group>Add security group rules
- C . Create virtual private cloud and default subnet>Create security group>Create new subnet>Add security group rules
Which computing cloud service does not belong to Huawei?
- A . Bare Metal Service
- B . Mirror service
- C . Elastic scaling
- D . Flexible file service
After purchasing a VPN gateway, a public network exit IP address will be automatically assigned to the VPN gateway.
- A . True
- B . False
Which of the following standard bucket strategies does OBS have? (Multiple Choice)
- A . Public writing
- B . Private
- C . Public reading
- D . Public read and write
After the elastic cloud server is bound to (), it can provide access to the outside through a fixed public IP address.
- A . System Disk
- B . Mirror
- C . Data Disk
- D . Elastic public network IP
The elastic file service can set read-only permission control for users.
- A . True
- B . False
How many types of VPNs can be divided according to business purposes? (Multiple Choice)
- A . Lay2 and Lay3 tunnel VPN
- B . Access VPN
- C . Extranet VPN
- D . Intranet VPN
Which of the following are the advantages of load balancing? (Multiple Choice)
- A . Support cross-availability zone active-active disaster recovery.
- B . Adopting clustered deployment, supporting active-active disaster recovery in the same city in multiple availability zones, and seamless real-time switching.
- C . Automatically complete distribution according to application traffic, seamlessly integrate with elastic scaling services, and flexibly expand the external service capabilities of user applications.
- D . Support monitoring performance indicators based on listener granularity, which is more suitable for customer business statistics.
Which of the following is not included in the main application scenarios of KMS (Key Management Service)?
- A . Encryption and decryption of key information assets
- B . Network transmission data encryption
- C . Business core data encryption and decryption
- D . Encryption and decryption of user personal data
The cloud dedicated line service is a dedicated line network service that establishes a connection between the local data center and the public cloud. What types of dedicated lines are currently supported by the cloud dedicated line?
- A . IPSec VPN
- B . OSPF VPN
- C . MPLS VPN
- D . SSL VPN
Elastic cloud servers between different availability zones in the same area cannot communicate with each other.
- A . True
- B . False
Users can use the object storage service in two ways: the management console (OBS Console) and the client (OBS Browser).
- A . True
- B . False
When the capacity of the cloud hard disk is insufficient, which of the following solutions are available? (Multiple Choice)
- A . Set the cloud disk as a shared disk
- B . Purchase a new cloud hard disk and mount it to the cloud server
- C . Clear the space of the cloud hard drive
- D . Expand the original cloud hard disk capacity
The relational database service RDS does not have database backup and recovery functions.
- A . True
- B . False
What are the types of scaling strategies for elastic scaling? (Multiple Choice)
- A . Timing strategy
- B . Warning strategy
- C . Random strategy
- D . Cycle strategy
The CIFS type file system supports the cloud server using the Linux operating system for mounting.
- A . True
- B . False
Which of the following are the main functions of the enterprise host security HSS? (Multiple Choice)
- A . Weak password detection
- B . Software vulnerability detection
- C . Remote login detection
- D . Malicious program detection
Vulnerability scanning service can repair the vulnerabilities scanned out.
- A . True
- B . False
What computing services does Huawei public cloud provide? (Multiple Choice)
- A . Mirror service
- B . Cloud hard drive
- C . Elastic Cloud Server
- D . Elastic scaling service
Host monitoring supports monitoring of elastic cloud servers and bare metal servers.
- A . True
- B . False
According to the classification of Huawei cloud services, which cloud service is not a computing cloud service?
- A . Bare Metal Service
- B . Elastic Cloud Service
- C . Elastic Scaling cloud services
- D . Virtual Private Cloud
Which of the following are the application scenarios of elastic load balancing? (Multiple Choice)
- A . Realize more flexible service forwarding
- B . Shield the real IP from the outside to achieve the purpose of security protection
- C . Provide routing balancing capabilities based on domain names and URLs
- D . Applicable to web services with large traffic
Scalable bandwidth supports the setting of three types of scalable bandwidth strategies, which are alarm strategy, timing strategy and periodic strategy.
- A . True
- B . False
The API gateway service is a booster for the digital transformation of enterprises.
- A . True
- B . False
The identities of API providers and API consumers are not separated, but can be converted to each other.
- A . True
- B . False
When the state of the alarm rule has not changed, the system will only send an alarm notification to the user when the state appears for the first time.
- A . True
- B . False
Which of the following cloud services will the data backed up by cloud hard drives be stored?
- A . Elastic Cloud Server ECS
- B . Object storage service OBS
- C . Cloud hard disk service EVS
- D . Bare Metal Server BMS
Cloud hard disk is a virtual block storage service based on distributed architecture that can be flexibly expanded.
- A . True
- B . False
There are two ways to create an encrypted image: through an encrypted elastic cloud server and through an external image file.
- A . True
- B . False
Which of the following key technologies does SA (Security Situation Awareness Service) use? (Multiple Choice)
- A . Encryption technology
- B . Big data technology
- C . Identity authentication technology
- D . Crawler technology
What are the basic concepts of HUAWEI CLOUD network services? (Multiple Choice)
- A . VPN
- B . Subnet
- C . Security Group
- D . EIP
What are the advantages of Map Reduce service? (Multiple Choice)
- A . Stable
- B . Open
- C . Easy to use
- D . Low cost
RDS can be used in combination with which of the following cloud services to ensure that the RDS instance can be safely isolated from other services on the network?
- A . VPC
- B . BOBS
- C . CECS
- D . DCES
Which EI service is used to implement batch data migration from below-cloud to over-the-cloud?
- A . Data Access Service DIS
- B . Real-time stream computing service Cloud Stream
- C . Cloud Data Migration Service CDM
- D . Data Warehouse Service DWS
In which service can cloud service operation logs be queried?
- A . Security expert services
- B . Cloud Audit Service
- C . Cloud Monitoring Service
- D . Cloud analysis service