The following incorrect description of Huawei FusionCompute architecture is
The following incorrect description of Huawei FusionCompute architecture isA . CNA provides computing resources for virtual machinesB . VRM can run on CAN or can be deployed on a separate physical machineC . VRM provides a management portal for administratorsD . CNA can manage cluster network, storage and computing resources...
The following description of the characteristics of cloud computing resource pooling is correct
The following description of the characteristics of cloud computing resource pooling is correctA . Cloud computing resource pooling is a prerequisite for achieving extensive network accessB . Cloud computing resource pooling feature can put CPU and hard disk in the same resource poolC . Cloud computing resource pooling characteristics can...
ISCSI is a standardized protocol based on the _____ protocol and the SCSI instruction set.
ISCSI is a standardized protocol based on the _____ protocol and the SCSI instruction set. It is widely used in many storage networks using the ____ architecture.A . FC IP SANB . TCP / IP FC SANC . FC FC SAND . TCP / IP IP SANView AnswerAnswer: D
The picture describes the service model
The picture describes the service modelA . IaaSB . DaaSC . PaaSD . SaaSView AnswerAnswer: A
Which of the following virtual machine disk file formats does Huawei fusioncompute not support?
Which of the following virtual machine disk file formats does Huawei fusioncompute not support?A . VMDKB . VHDC . RAWD . QCOW2View AnswerAnswer: A
In Huawei FusionCompute, the following incorrect description of the security group rule is.
In Huawei FusionCompute, the following incorrect description of the security group rule is.A . When a virtual machine has multiple network cards, you can configure a security group for each network card.B . A virtual machine can communicate with the outside world only after a security group is created and...
The following are the north-south traffic (multi-select)
The following are the north-south traffic (multi-select)A . Traffic generated by virtual machine live migrationB . Traffic between virtual machines accessing each other across data centersC . Traffic generated by customers accessing data center business via the InternetD . Traffic between virtual machines inside the data centerView AnswerAnswer: B,C
The storage resource types supported by Huawei FusionCompute are (multi-select)
The storage resource types supported by Huawei FusionCompute are (multi-select)A . FusionStorageB . Advanced SANC . NASD . IP SANE . FC SANView AnswerAnswer: A, B, C, D, E
CORRECT TEXT
CORRECT TEXT As FusionSphere, the disk thin provisioning can be achieved is (multiple choice)A . thin provisioning and virtual storage operating system, hardware has nothing to do, so as long as the use of virtual image management system, will be able to achieve disk thin provisioningB . does not currently...
CORRECT TEXT
CORRECT TEXT CPU virtualization technology can be divided into full virtualization, paravirtualization, software virtualization, and hardware-assisted virtualization.A . TRUEB . FALSEView AnswerAnswer: A