In the deployment of Huawei Cloud Stack in Layer 2 networking mode, which of the following descriptions about the management firewall-related routing configuration is wrong?

In the deployment of Huawei Cloud Stack in Layer 2 networking mode, which of the following descriptions about the management firewall-related routing configuration is wrong?A . Configure a route with the destination address as the DMZ_Service plane to access tenant DNS_NTP, Console of each cloud service, and other virtual machinesB...

January 30, 2025 No Comments READ MORE +

An enterprise uses Huawei Cloud Stack to carry private cloud services. It currently deploys an ARM architecture computing resource pool and uses IP-SAN to carry business storage. Due to the expansion of business scale, it needs to expand the corresponding resources. Which of the following analyses about the expansion of the enterprise's resources is correct?

An enterprise uses Huawei Cloud Stack to carry private cloud services. It currently deploys an ARM architecture computing resource pool and uses IP-SAN to carry business storage. Due to the expansion of business scale, it needs to expand the corresponding resources. Which of the following analyses about the expansion of...

January 30, 2025 No Comments READ MORE +

In Huawei Cloud Stack, which of the following descriptions of the design of various security services is wrong?

In Huawei Cloud Stack, which of the following descriptions of the design of various security services is wrong?A . The CBH service business plane is deployed in the Pod area and needs to occupy computing node resources.B . The CSP service management plane is connected to the External-OM plane, eliminating...

January 30, 2025 No Comments READ MORE +

In the Rainbow migration tool, which of the following descriptions about the source check result analysis is correct?

In the Rainbow migration tool, which of the following descriptions about the source check result analysis is correct?A . If the remote check result is "passed", it means that the source host can be migrated, but there may be migration risks or some configurations after migration may be inconsistent with...

January 28, 2025 No Comments READ MORE +

Which of the following is not a component of Kubarnetes?

Which of the following is not a component of Kubarnetes?A . kube-schedulerB . kube-conductorC . kube-controller-managerD . kube-apiserverView AnswerAnswer: B

January 26, 2025 No Comments READ MORE +

In the Huawei Cloud Stack solution, CSBS & VBS services can be deployed to support volume or host backup. When OceanStor5500V3/V5 is selected as the backup storage, which of the following analyses of the backup storage planning is correct?

In the Huawei Cloud Stack solution, CSBS & VBS services can be deployed to support volume or host backup. When OceanStor5500V3/V5 is selected as the backup storage, which of the following analyses of the backup storage planning is correct?A . The two network ports of the 10GE network cards on...

January 24, 2025 No Comments READ MORE +

Which of the following is not a component or service that needs to be installed when deploying Huawei Cloud Stack?

Which of the following is not a component or service that needs to be installed when deploying Huawei Cloud Stack?A . Common componentsB . ManageOneC . FusionSphere OpenStackD . FusionComputeView AnswerAnswer: D

January 24, 2025 No Comments READ MORE +

When expanding business storage resources in Huawei Cloud Stack, which of the following descriptions of the networking scenario is wrong?

When expanding business storage resources in Huawei Cloud Stack, which of the following descriptions of the networking scenario is wrong?A . When expanding the storage pool in the same Huawei distributed storage cluster, the networking type of the expanded storage node can be different from the original storage node networking...

January 24, 2025 No Comments READ MORE +

In Huawei Cloud Stack, which of the following descriptions of the concepts in Key Management Service (KMS) is wrong?

In Huawei Cloud Stack, which of the following descriptions of the concepts in Key Management Service (KMS) is wrong?A . Envelope encryption refers to sealing the data key of encrypted data into an envelope for storage, transmission and use. Data can be directly encrypted and decrypted without the user's master...

January 23, 2025 No Comments READ MORE +

When an enterprise engineer uses Cloud Container Engine (CCE) to create a business workload, the system reports an error as shown in the figure below. Which of the following descriptions of the cause of the error is correct?

When an enterprise engineer uses Cloud Container Engine (CCE) to create a business workload, the system reports an error as shown in the figure below. Which of the following descriptions of the cause of the error is correct?A . The remote image repository uses an unknown or insecure certificateB ....

January 23, 2025 No Comments READ MORE +