In Huawei Cloud Stack, which of the following descriptions about CloudDNS is wrong?

In Huawei Cloud Stack, which of the following descriptions about CloudDNS is wrong?A . When the cloud server accesses internal cloud services such as OBS and performs resolution through public DNS, the access latency is small and the performance is high.B . One domain name can be associated with multiple...

March 10, 2025 No Comments READ MORE +

In Keystone, ownership of resources belongs to which of the following objects?

In Keystone, ownership of resources belongs to which of the following objects?A . ProjectB . RoleC . UserD . ServiceView AnswerAnswer: A

March 9, 2025 No Comments READ MORE +

In Huawei Cloud Stack, Service OM is responsible for providing basic operation and maintenance capabilities for which of the following resources?

In Huawei Cloud Stack, Service OM is responsible for providing basic operation and maintenance capabilities for which of the following resources?A . DaaSB . PaaSC . IaaSD . SaaSView AnswerAnswer: C

March 3, 2025 No Comments READ MORE +

In Huawei Cloud Stack, which of the following descriptions about the use of peer connections is wrong?

In Huawei Cloud Stack, which of the following descriptions about the use of peer connections is wrong?A . If the operating user has management rights for the project where the peer VPC is located, after the peer connection is created, the peer project administrator or salesperson needs to manually accept...

February 28, 2025 No Comments READ MORE +

In Huawei Cloud Stack, which of the following public components can block some illegal requests and prevent the internal management API from being exposed?

In Huawei Cloud Stack, which of the following public components can block some illegal requests and prevent the internal management API from being exposed?A . API GatewayB . NTPC . Combination APID . CCSView AnswerAnswer: A

February 27, 2025 No Comments READ MORE +

By default, which host will the virtual machine instance be provisioned to?

When Nova issues a virtual machine instance, the filter selects two hosts that meet the requirements from the 10 hosts. Host A has 128 GB of available memory and 1024 GB of available disk space; Host B has 64 GB of available memory and 2048 GB of available disk space....

February 27, 2025 No Comments READ MORE +

A user needs to start a new instance using the cirrus_test image. The instance uses the test.nano specification and is accessed through the testkey key pair. The name is instance_test. Which of the following commands can meet the user's requirements?

A user needs to start a new instance using the cirrus_test image. The instance uses the test.nano specification and is accessed through the testkey key pair. The name is instance_test. Which of the following commands can meet the user's requirements?A . nova create instance_test --image cirrus_test --flavor test.nano --key-name test_keyB...

February 26, 2025 No Comments READ MORE +

In Huawei Cloud Stack, operational process governance can be divided into five stages: resource application, compliance check, resource distribution, resource management, and application-centric. To which of the following stages does quota control belong?

In Huawei Cloud Stack, operational process governance can be divided into five stages: resource application, compliance check, resource distribution, resource management, and application-centric. To which of the following stages does quota control belong?A . Resource ApplicationB . Resource DistributionC . Resource ManagementD . Compliance CheckView AnswerAnswer: A

February 25, 2025 No Comments READ MORE +

During the OpenStack virtual machine instance provisioning process, which of the following descriptions of the status change process of the provisioning task is correct?

During the OpenStack virtual machine instance provisioning process, which of the following descriptions of the status change process of the provisioning task is correct?A . Scheduling - Block Device Mapping - Spawning - Networking - NoneB . Scheduling - Block Device Mapping - Networking - Spawning - NoneC . Scheduling...

February 16, 2025 No Comments READ MORE +

In OpenStack, Keystone supports multiple authentication methods. Which of the following operations can enable OpenStack to use different authentication methods to meet different security requirements?

In OpenStack, Keystone supports multiple authentication methods. Which of the following operations can enable OpenStack to use different authentication methods to meet different security requirements?A . Create different projects and configure multiple authentication methods by modifying the configuration filesB . Create different roles and configure multiple authentication methods by modifying...

February 15, 2025 No Comments READ MORE +