Professional Documents
Culture Documents
Cloud Service
Cloud Service
(O)
A. On-demand self-service
B. broad network access methods
C. Resource pooling
D. fast and scalable
E. Measurable services
All
2) Which of the following is generally used to provide application development and running
environments?
A. IaaS
B. PaaS
C. SaaS
All
All
All
7) Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)
ABC
All
All
10) How many types of login users does HUAWEI CLOUD support?
A. 1
B. 2
C. 3
D. 4
11) Which of the following service is used by an ECS to store data? (O)
A. AS
B. IMS
C. EVS
D. DeC
All
13) ECSs can be charged in yearly/monthly or metered mode (pay per use).
A. True
B. False
ABC
All
21) AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False
23) An instance added to an AS group by an AS policy cannot be manually removed from the
group.
A. True
B. False
A
25) Which of the following policies can be configured to increase the number of instances in an
AS group at a predetermined time each week?
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above
ABC
ABC
32) Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Network Inbound/Outbound Rate
C. Disk Read/Write Requests
D. Memory Usage
E. Custom monitoring metrics
F. GPU Usage/GPU Memory Usage
G. EVS Disk Usage/EVS Disk I/O Read/Write
H. Performance Status
All
All
All
35) Which operations are required to use ECS to create a Windows image?
A. Configure the Windows ECS.
B. Install Cloudbase-Init.
C. Create a Windows private image.
D. Query and cleanup network rule files.
ABC
36) What is the type of the image converted based on an existing ECS?
A. Public image
B. Private image
C. Shared image
D. EulerOS image
All
38) Before creating a data disk image from a data disk, ensure that the ECS has a system disk
and the data disk is not empty.
A. True
B. False
ABD
ABC
41) If the ECS uses a static IP address, configure DHCP for the ECS, allowing it to dynamically
obtain an IP address.
A. True
B. False
42) When creating image Cloudbase-init should be installed on OS to ensure that configuration
of newly created ECSs from the image can be customized.
A. True
B. False
43) Image creation fails if entered System disk capacity is less than System disk capacity of
external image file.
A. True
B. False
45) EVS provides the scalable, virtual block storage service, and the backend of EVS is based
on a distributed architecture.
A. True
B. False
46) VBD EVS disks support only basic SCSI read/write commands.
A. True
B. False
47) Which of the followings are EVS disk types does ECS support?
A. Ultra-high I/O
B. High I/O
C. Common I/O
D. Latency optimized ultra-high I/O
All
48) How many servers can a shared EVS disk be attached to at most?
A. 5
B. 7
C. 8
D. 16
BC
AB
52) HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup
Service (VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults
All
B
54) On which of the following services does VBS depend?
A. Elastic Cloud Server
B. Elastic Volume Service
C. Object Storage Service
D. Image Management Service
BC
55) ( ) records operations of VBS resources, facilitating query, audit, and backtracking
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.
56) VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security.
A. True
B. False
57) VBS provides the data backup function for EVS disks. The created data backups can be
used to create EVS disks.
A. True
B. False
All
59) Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs
AB
60) Access requests to OBS can be controlled by,
A. ACLs
B. Bucket policies
C. User signature authentication
D. Server-side encryption
ABC
64) If you download an object of the Standard storage class through a HUAWEI CLOUD ECS
server, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity
65) If you download an object of the Archive storage class to your local computer over the
Internet, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration
66) If a customer has some data to store and the data will be downloaded for only 10 times in a
year, which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage
67) Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.
69) Which of the following items cannot be configured when creating a bucket?
A. Region where bucket resides
B. Storage class of a bucket
C. Bucket policy
D. Static website hosting
70) Which of the following items cannot be configured when uploading an object?
A. File path
B. Storage class of the object
C. KMS encryption
D. File size
D
ACD
ACD
76) SFS can be connected to the AD domain controller for permission control.
A. True
B. False
B
77) SFS (Capacity Oriented) allows ECSs in different VPCs to access the same file system.
A. True
B. False
78) What is the maximum size of a single file supported by SFS Capacity Oriented?
A. 32 TB
B. 64 TB
C. 128 TB
D. 240 TB
79) What is the maximum size of a single file supported by SFS Turbo?
A. 16 TB
B. 32 TB
C. 64 TB
D. 128 TB
80) SFS (Turbo) allows ECSs in different VPCs to access the same file system.
A. True
B. False
AB
83) Which of the following file protocol is supported by SFS Turbo?
A. NFS v3
B. NFS v4
C. SMB 2.0/2.1/3.0
D. EXT4
89) Which of the following are mainstream storage types in the industry?
A. Block storage
B. File storage
C. Object storage
D. Backup storage
ABC
90) Which of the following are HUAWEI CLOUD file storage services?
A. SFS
B. SFS Turbo
C. SFS Plus
D. All of the above
AB
ABC
AC
93) An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False
A
94) Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category?
A. ECS
B. BMS
C. IMS
D. SFS
95) GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops,
graphics rendering and engineering drawing run in virtualization environment.
A. True
B. False
96) Which of the following are the advantages of the VPC service?
A. Secure & Reliable
B. Flexible Configuration
C. High Speed Access/Dynamic BGP
D. Interconnection between VPCs
All
98) The Virtual Private Cloud (VPC) service enables you to provision logically isolated,
configurable, and manageable virtual networks, improving the cloud resource security and
simplifying network deployment.
A. True
B. False
99) Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?
A. Customizing CIDR blocks
B. Customizing access control policies
C. Accessing the Internet using EIPs
D. Connecting a local data center using a VPN or Direct Connect connection
All
100) Which of the Following CIDR blocks care available for VPC Service?
A. 10.0.0.0/8
B. 172.16.0.0/16
C. 192.168.0.0/16
All
102) To enable RDP access to a created Windows ECS, which port must be opened by an
inbound security group rule?
A. 37
B. 53
C. 3389
D. 80
103) Which of the following must be configured to enable an ECS without a bound EIP to access
the Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing
104) How many network interface cards (NICs) does an ECS functioning as a SNAT server
require?
A. 1
B. 2
C. 3
105) Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
106) Which of the following can enable an ECS in a VPC to communicate with a host in a private
data center?
A. Internet connection
B. VPN
C. VPC peering connection
108) If you have high requirements on network stability and availability, which of the following
EIP types must you choose:
A. Static BGP
B. Dynamic BGP
109) Which of the following CIDR blocks is not supported by the VPC service?
A. 10.0.0.0 – 10.255.255.255
B. 172.16.0.0 – 172.31.255.255
C. 192.168.0.0 – 192.168.255.255
D. 255.255.0.0 – 255.255.255.255
All
115) Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm
116) Which of the following load balancing algorithms are provided by ELB?
A. Weighted round robin
B. Weighted least connections
C. Source IP hash
D. Encryption algorithm
E. Weighted
ABC
All
120) Which of the following services can be used to view real-time monitoring data of load
balancers and listeners?
A.Cloud Container Engine
B.Cloud Eye
C.Auto Scaling
D.Virtual Private Cloud
B
122) To delete direct connection, you need to delete Virtual interface and the virtual GW bound
with the virtual interface first
A. True
B. False
124) Direct Connect enables a user to set up a dedicated network connection between a local
data center and the public cloud. Currently, which of the following connection type is supported
by Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN
126) To unsubscribe an operations connection, you need to delete the hosted connection
depends on it, and then delete the virtual gateway and virtual interface associated with it.
A. True
B. False
128) Direct Connect supports only duration based (Yearly/Monthly) billing mode?
A. True
B. False
A
131) Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both
132) Which of the following policies must be consistent between the local and remote sides of a
VPN that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec
CD
All
All
AD
139) With data security as its core, HUAWEI CLOUD builds a series of security services to meet
the particular needs. Security services include:
A. Data Security
B. Host Security
C. Application Security
D. Network Security
All
140) Which of the following security services can be used to protect websites?
A. WAF
B. VSS
C. SCM
D. Anti-DDoS
All
All
142) Which of the following statements about HTTPS site protection is incorrect?
A. When an HTTPS service is released to users, the HTTPS certificate needs to be uploaded
for using WAF.
B. No matter whether the original website server provides HTTPS or HTTP services, users
can have HTTPS services when using WAF.
C. The basic edition does not support HTTPS protection.
D. A domain name can choose to use either HTTP or HTTPS protocols only.
ABC
ABD
145) Which of the following is NOT a capability of Web Application Firewall (WAF)?
A. Anti-SQL injection
B. Anti-Webshell uploading
C. Anti-leeching
D. Anti-traffic attack
146) WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False
ABC
All
All
All
All
161) Which of the following statements about Dedicated HSM are correct?
A. The key calculation of Dedicated HSM is performed on an exclusive encryption card. Services for
different tenants are isolated without affecting performance.
B. Dedicated HSM supports China-invented encryption algorithms such as SM1, SM2, SM3, and SM4.
C. Dedicated HSM is recommended for all data encryption requirements on the cloud to ensure
security.
D. Dedicated HSM is a hosting service that can automatically perform time-consuming tasks, such as
hardware presetting, software patching, high availability, and backup.
ABD
162) Which of the following problems does a website tenant not need to consider when selecting
a package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume
All
164) Which of the following domain name types does SCM support?
A. Single domain name
B. Wildcard domain name
C. Multiple domain names
All
AB
167) Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False
All
All
ABD
ABC
174) RDS does not support data backup or restoration.
A. True
B. False
175) To retrieve Alarm History for 7 days. What Service you will use? (Single Choice)
A. SMN
B. CTS
C. ECS
D. RDS
178) What are the advantages of HUAWEI CLOUD EI service ModelArts? (O)
A. Readily acquired
B. Fast training
C. Fast launch
D. One-stop
All
179) Which of the following Huawei Cloud EI APIs are vision related?
A. Face Recognition
B. Image Recognition
C. Content Moderation
D. Image search
All
180) DWS is the Enterprise - Class Data Warehouse.
A. True
B. False
181) Which EI service can implement large scale data analysis and query?
A. DLF
B. DWS
C. DIS
D. GES
All except J
184) You can enable API Gateway and create and manage APIs for free? You pay only for
the number of API calls received and the amount of data transmitted.
A. True
B. False
AD
ACD
AB
191) The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason?
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed
192) Cloud computing is a model that enables users to obtain resources (such as computing,
storage, network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers.
A. True
B. False
195) Traffic from internet will hit to the which device first?
A. Firewall
B. NGIX
C. ELB
196) If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new
disk?
A. True
B. False
B
197) Which scaling action is not performed on Bandwidth scalling policy?
A. Replicate
B. Add
C. Reduce
D. Set to
202) When creating ECS you can use File injection function to initialize it.
A. True
B. False
203) The server does not need to be stopped before restoring EVS disk data using VBS backup.
A. True
B. False
206) When compared with shared file systems what are the advantages of SFS:
A. Robust reliability
B. Seamless integration
C. File sharing
D. Easy operations, high cost- (wrong, should be low)
ABC
AB
All
A
210) Bucket A has been configured a policy not to allow any users to access it. Object B is inside
Bucket A. Object B has an ACL that allows any users to access it. Therefore, object B can be
access anonymously by any user.
A. True
B. False
All
216) After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False
B
218) Which of the following functions of NAT Gateway can be used to enable ECSs to share an
EIP to access the Internet?
A. SNAT
B. DNAT
222) Which of the following is not the component of Big Data Platform?
A. Map Reduce
B. Openstack
C. HDFS
D. Yarn
226) IMS provides comprehensive and flexible self-service image management capabilities.
Users can create a private image and use it to create an ECS or multiple ECSs?
A. True
B. False
227) All Huawei Cloud services can be viewed on the management console?
A. True
B. False
228) Which of the following component can be used to set an access control whitelist to allow
specific IP addresses to access load balancers?
A. Listener
B. Backend Server
C. Backend Server Group
D. Health Check
A
229) Which of the following is not an advantage of RDS compared with self-built databases?
A. Instant Availability
B. Easy Management
C. Elastic Scaling
D. Self-Installed Databases
231) Which of the following can isolate RDS network resources from other services?
A. ECS
B. VPC
C. CES
D. OBS
All
All
AB
248) If 10GE is used to connect using Direct Connect? What port is it?
A. Electrical
B. Optical
C. Ethernet
D. Serial
250) For Monitoring Metrics Data, the retention policy differs by roll up period. For how many
days the data is retained with one hour roll up period?
A. 10
B. 20
C. 155
D. 300
Which of the following is generally used to provide application development and running
environments? (AJ)
A. IaaS
B. PaaS
C. SaaS
Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category? (O)
A. ECS
B. BMS
C. IMS
D. SFS
An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False
GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops, graphics
rendering and engineering drawing run in virtualization environment. (S)
A. True
B. False
EVS provides the scalable, virtual block storage service, and the backend of EVS is based on a
distributed architecture. (S)
A. True
B. False
Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs
Direct Connect enables a user to set up a dedicated network connection between a local data
center and the public cloud. Currently, which of the following connection type is supported by
Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN
The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason (S)
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed
Cloud computing is a model that enables users to obtain resources (such as computing, storage,
network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers. (M)
A. True
B. False
What is the type of the image converted based on an existing ECS? (aj)
A. Public image
B. Private image
C. Shared image
D. EulerOS image
( ) records operations of VBS resources, facilitating query, audit, and backtracking) (AJ)
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.
VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security. (AJ)
A. True
B. False
VBS provides the data backup function for EVS disks. The created data backups can be used to
create EVS disks. (S)
A. True
B. False
Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm
Which of the following services can be used to view real-time monitoring data of load balancers
and listeners? (M)
A.Cloud Container Engine
B.Cloud Eye
C.Auto Scaling
D.Virtual Private Cloud
WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False
Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False
Server Monitoring includes:
A. Basic Monitoring
B. OS Monitoring
C. CPU Monitoring
D. Disk Monitoring
Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)
Before creating a data disk image from a data disk, ensure that the ECS has a system disk and
the data disk is not empty.
A. True
B. False
HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup Service
(VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults
Which of the following load balancing algorithms are provided by ELB? (AJ)
A. A. Weighted round robin
B. B. Weighted least connections
C. C. Source IP hash
D. D. Encryption algorithm
E. Weighted
If you download an object of the Standard storage class through a HUAWEI CLOUD ECS server,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity
If you download an object of the Archive storage class to your local computer over the Internet,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration
If a customer has some data to store and the data will be downloaded for only 10 times in a year,
which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage
Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.
The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable,
and manageable virtual networks, improving the cloud resource security and simplifying network
deployment. (S)
A. True
B. False
Which of the following must be configured to enable an ECS without a bound EIP to access the
Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing
How many network interface cards (NICs) does an ECS functioning as a SNAT server require?
A. 1
B. 2
C. 3
Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
Which of the following can enable an ECS in a VPC to communicate with a host in a private data
center?
A. Internet connection
B. VPN
C. VPC peering connection
To delete direct connection you need to delete Virtual GW and virtual interfaces first
True
False
Which of the following CIDR blocks is not supported by the VPC service? (S)
A. 10.0.0.0 – 10.255.255.255
B. 172.16.0.0 – 172.31.255.255
C. 192.168.0.0 – 192.168.255.255
D. 255.255.0.0 – 255.255.255.255
If you have high requirements on network stability and availability, which of the following EIP
types must you choose:
A. Static BGP
B. Dynamic BGP
Which of the following policies must be consistent between the local and remote sides of a VPN
that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec
SFS is charged in pay-per-use or monthly/yearly flat fee mode.
A. True
B. False
SFS allows ECSs in different VPCs to access the same file system.
A. True
B. False
Which of the following problems does a website tenant not need to consider when selecting a
package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume
AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False
An instance added to an AS group by an AS policy cannot be manually removed from the group.
A. True
B. False
Which of the following policies can be configured to increase the number of instances in an AS
group at a predetermined time each week? (M)
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above
Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Inband Incoming Rate
C. Disk Read Requests
D. Memory Usage
E. Custom monitoring metrics
Which operations are required for creating a Windows image using an ECS?
A. Configure the Windows ECS
B. Install Cloudbase-Init
C. Create a Windows private image
D. View and delete network rule files
After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False
Which of the following functions of NAT Gateway can be used to enable ECSs to share an EIP to
access the Internet?
A. SNAT
B. DNAT
Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both
Traffic from internet will hit to the which device first (AJ)
1. firewall
2. NGIX
3. ELB
4.
If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new disk.
True
False
Which scaling action is not performed on Bandwidth scalling policy
1. replicate
When creating ECS you can use File injection function to initialize it.
-True
-False
Server needs to be stopped before restoring EVS disk data using VBS backup.
-True
-False
When compared with shared file systems what are the advantages of SFS:
-Robust reliability
-Seamless integration
-File sharing
-Easy operations, high cost- (wrong, should be low)
Image creation fails if entered System disk capacity is less than System disk capacity of external
image file.
-True
-False
Which EI service can implement large scale data analysis and query ?
-DLF
-DWS
-DIS
-GES
ECS lifecycle?
Start-Stop-Restart-Delete
A. Data backup
B. Project Management
C. Code Check
D. Cloud buildup
Bucket A has been configured a policy not to allow any users to access it. Object B is inside Bucket A. Object B
has an ACL that allows any users to access it. Therefore, object B can be access anonymously by any users.
True
False
ECS Login
Key pair
OTP Token
Fingerprint
Password
37
53
3389
80
Retrieve Alarm History for 7 days. What Service you will use. (Single Choice)
SMN
CTS-my answer
ECS
RDS
5. Which of the following are the major defense types of Anti-DDoS? [Score: 1]
Your answer: (null) Correct answer: A. Traffic attack defense|D. Application attack defense
7. In the cloud computing environment, confidentiality, integrity, and availability are still the
fundamental security requirements of users. [Score: 1]
Your answer: (null) Correct answer: A. Correct
8. Which of the following port types is 10GE when you enable Direct Connect? [Score: 1]
Your answer: (empty) Correct answer: B. Optical port
10. Huawei provides capability openness for developers to integrate the capabilities opened
by Huawei products with upper-layer applications and build differentiated innovative
solutions. [Score: 1]
Your answer: (null) Correct answer: A. Correct
11. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer is: D. After the capacity of an EVS disk is expanded, you can use
this backup to restore data. After the data is restored, the size of the EVS disk remains unchanged.
12. Which of the following protocols is not supported when the load balancer is a private
network load balancer? [Score: 1]
Your answer: (null) Correct answer: B.UDP
14. The AS service can only dynamically add or reduce server resources based on the
specified time period. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
15. Which of the following scenarios does object storage apply to? [Score: 1]
Your answer: (null) Correct answer: A. Massive storage resource pool|B. Static website hosting|C. Big
data storage|D. Backup|E. Archiving
16. After creating an AS group by following the wizard, you need to manually enable the AS
group. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
18. Cloud Container Engine (CCE) is a high-performance and scalable container service. It
provides enterprises with Docker container lifecycle management capabilities, such as quick
application packaging and deployment and automatic O&M, helping you efficiently deploy
applications. [Score: 1]
Your answer: (null) Correct answer: A. Correct
24. Which of the following file access protocols is supported by SFS? [Score: 1]
Your answer: (null) Correct answer: D.NFS
25. If the system disk is faulty, you can use the backup of the system disk to create an EVS
disk and attach it to the ECS as the system disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
26. Unlike traditional servers, users cannot deploy service applications on ECSs. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
27. In which of the following states can an EVS disk be backed up? [Score: 1]
Your answer: (empty) The correct answer is A. Available.
28. After an application is created, the CPU, memory, and network usage of the container
cannot be monitored. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
29. What is the type of the image converted from an ECS? [Score: 1]
Your answer: (empty) Correct answer: B. Private image
30. Which of the following services can work with EVS? [Score: 1]
Your answer: (Null) Correct answer: A. Elastic Cloud Server (ECS)|C. Volume Backup Service (VBS)|D.
Cloud Eye
33. Which of the following statements about hybrid cloud is incorrect? [Score: 1]
Your answer: (Null) Correct answer: D. Applications can be deployed only in the public cloud.
34. How many buckets can be created for an OBS account at most? [Score: 1]
Your answer: (null) Correct answer: B.100
35. Which of the following methods is correct for a Workspace user to access a USB flash
drive on a terminal? [Score: 1]
Your answer: (null) Correct answer: B. USB port redirection
36.VPC. The subnet segment can be modified after being created. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
37. IAM - What are the key features of identity authentication? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Centralized control of users and security credentials |
B. Centralized control of user access | C. User group-based rights | D. Support for Huawei customer
service agent maintenance
38. Which of the following service resource metrics can be monitored by Cloud Eye? [Score:
1]
Your answer is as follows: (Null) Correct answer: A. Virtual Private Cloud (VPC)|B. Elastic Computing
Service (ECS)|C. Distributed Cache Service (DCS)|D. Elastic Load Balance
40. Which of the following services helps you monitor RDS resources in real time? [Score: 1]
Your answer: (null) Correct answer: D.CES
41. Which of the following is not the main reason why traditional IT infrastructure
architecture cannot support efficient operation of enterprises and urgently calls for
architecture transformation? [Score: 1]
Your answer is: (empty) The correct answer is: D. The network speed is too slow.
42. If no EIP is bound to a VM, you can configure a custom route for the VM to access the
Internet. [Score: 1]
Your answer: (null) Correct answer: A. Correct
43. The alarm threshold consists of the set mode (raw data, maximum value, minimum value,
average value, and variance), judgment condition (>, ≥, <, ≤, and =), and critical value. The
set mode is used to configure alarm conditions. [Score: 1]
Your answer: (null) Correct answer: A. Correct
44. What operations can the shared image provider perform? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Specifying an image to be shared | B. Deleting a
shared image | C. Adding a tenant who can share an image | D. Deleting a tenant who can share an image
45. The AS service must be used together with elastic load balancing. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
46. Compared with traditional file sharing storage, what are the advantages of SFS? [Score:
1]
Your answer: (null) The correct answer is: A. File sharing|B. Seamless integration|D. High reliability
47. VBS can create backups for EVS disks and use the backups to roll back EVS disks,
maximizing user data accuracy and security. [Score: 1]
Your answer: (null) Correct answer: A. Correct
48. To enable two sites to communicate with each other across the Internet, deploy
IPSeC.VPN on the firewalls at both sites to protect the mutual access traffic between the
intranets at the two sites. [Score: 1]
Your answer: (null) Correct answer: A. Correct
49. The cloud security service system consists of five parts: network security, data security,
application security, security evaluation, and security support. [Score: 1]
Your answer: (null) Correct answer: A. Correct
50. Which of the following are the main functions of HID? [Score: 1]
Your answer: (null) Correct answer: A. Brute force cracking detection | B. Remote login notification | C.
Weak password detection | D. Database process permission detection | E. Web page backdoor file
detection
53. Similar to traditional server disks, EVS disks allow you to format EVS disks attached to
ECSs, create file systems on the EVS disks, and store data persistently. [Score: 1]
Your answer: (null) Correct answer: A. Correct
54. Which of the following management functions are supported by ELB? [Score: 5]
Your answer is as follows: (null) Correct answer: A. Create a load balancer. |B. Delete a load balancer. |C.
Enable a load balancer. |D. Disable a load balancer.
55. What computing services does Huawei public cloud provide? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Auto Scaling|B. Elastic Cloud Server|C. Image
Management Service
56. SFS cannot be attached to an ECS running the Windows OS. [Score: 1]
Your answer: (null) Correct answer: A. Correct
58. What information needs to be configured before creating a file system? [Score: 1]
Your answer: (null) Correct answer: B.VPC
59. Which of the following statements about KMS is incorrect? [Score: 1]
Your answer: (Null) Correct answer: A. Managing the cloud platform and tenant keys
60. Identity and Access Management (IAM) refers to the identity and authentication service.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
61. Which of the following is not a Huawei computing cloud service? [Score: 1]
Your answer: (null) Correct answer: D. Scalable File Service
62. Which of the following are basic features of cloud computing? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. On-demand self-service|B. Wide network access|C.
Resource pooling|D. Fast elastic scaling|E. Measurable service
64. Which of the following are the application scenarios of SFS? [Score: 5]
Your answer: (null) The correct answer is: A. Media processing|B. Log management|C. Content
management and home directory|D. High-performance computing
65. If a user wants to query historical alarms in the last seven days, which of the following
services needs to be enabled? [Score: 1]
Your answer: (Null) The correct answer is A. Cloud Trace Service.
66. Which of the following components receives traffic from the Internet first after the traffic
enters LoaD.balancer? [Score: 1]
Your answer: (null) The correct answer is C.LVS.
67. Penetration testing service (PTS) belongs to security evaluation service products. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect
68. Which of the following image types are supported by IMS? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Public image|B. Private image|C. Shared image
69. To use Cloud Eye to monitor Huawei ECSs, you need to install the plug-in on the ECSs.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect
70. If the capacity of the data disk attached to the ECS is insufficient, you must detach the
disk and purchase a new one. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
71. Which of the following statements about Anti-DDoS traffic cleaning is incorrect? [Score:
1]
Your answer: (Null) Correct answer: A. Web vulnerability detection
72. Attach the EVS disk to an ECS. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
75. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. Multiple EVS disks can be associated with a backup policy for
batch backup.
76. Which of the following operations cannot be performed by the recipient of a shared
image? [Score: 1]
Your answer: (null) The correct answer is: A. Sharing the specified mirror.
78. RDS can meet the ever-changing requirements of the gaming industry, effectively
shortening the R&D period and reducing R&D costs. [Score: 1]
Your answer: (null) Correct answer: A. Correct
79. If the status of an alarm rule remains unchanged, the system sends an alarm notification
to the user only when the alarm rule is in the status for the first time. [Score: 1]
Your answer: (null) Correct answer: A. Correct
80. Data in the file system is stored using erasure codes. [Score: 1]
Your answer: (null) Correct answer: A. Correct
81. Which of the following user authentication modes is supported by Workspace? [Score: 1]
Your answer: (null) The correct answer is B.Active Directory.
82. WAF detects anomalies of HTTP requests to prevent malicious network intrusions, such
as web page tampering, information leakage, and Trojan horse implantation. [Score: 1]
Your answer: (null) Correct answer: A. Correct
83. All types of HUAWEI CLOUD service products can be viewed on the management
console. [Score: 1]
Your answer: (null) Correct answer: A. Correct
84. If only one AS policy is enabled in the AS group and the action in the AS policy is to add
two instances, how many instances are there in the AS group? [Score: 1]
Your answer: (empty) Correct answer: D. Uncertain
87. Which of the following images is a standard image provided by the public cloud platform
and is visible to all users? [Score: 1]
Your answer: (blank) Correct answer: A. Public image
89. What Does an ECS Use to Build a Logical Zone That Is Logically Isolated? [Score: 1]
Your answer: (null) Correct answer: B. Virtual private cloud
90. When an EVS disk is detached from an ECS, the data on the EVS disk will be lost.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect
91. Which of the following EVS disks can be directly created on the EVS console? [Score: 1]
Your answer: (null) Correct answer: B. Data disk
93. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three
times, disable versioning for the bucket, and upload object aaa for three times. After the
preceding operations are complete, how many objects are displayed in the bucket basic
information? [Score: 1]
Your answer: (null) Correct answer: B.4
94. Workspace supports user authentication using Micrlslft Active Directory. [Score: 1]
Your answer: (null) Correct answer: A. Correct
95. Which of the following cloud products is a data security type? [Score: 1]
Your answer: (null) Correct answer: C.KMS (key management service)
Elastic Load Balance automatically distributes access traffic to multiple ECSs to balance
their service load. It enables you to achieve higher levels of fault tolerance in your
applications and expand application service capabilities. [Score: 1]
Your answer: (null) Correct answer: A. Correct
97. Network security, as an important part of cloud security services, implements network
isolation, responds to network attacks, and ensures network security. [Score: 1]
Your answer: (null) Correct answer: A. Correct
98. The AS service automatically adjusts service resources based on users' service
requirements and policies. [Score: 1]
Your answer: (null) Correct answer: A. Correct
101. Which of the following is not a major application scenario of VPC? [Score: 1]
Your answer: (None) The correct answer is B. The desktop cloud accesses Huawei Vmall.
103. If you use an ECS to create an image, the ECS must be stopped. [Score: 1]
Your answer: (null) Correct answer: A. Correct
108. Which of the following shared file systems can be directly deleted? [Score: 1]
Your answer: (null) Correct answer: B. Unavailable
109. GPU desktops can be used for CAD auxiliary design. [Score: 1]
Your answer: (null) Correct answer: A. Correct
110. Cloud Eye is a multi-dimensional monitoring platform for resources such as Elastic
Cloud Servers (ECSs) and bandwidth. You can monitor alarms, notifications, and
personalized report views in real time to accurately learn about the product resource status.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
112. After an ECS is created, you can change the ECS specifications if they do not meet your
requirements. [Score: 1]
Your answer: (null) Correct answer: A. Correct
Which of the following key technologies are used by situational awareness? [Score: 1]
Your answer: (null) The correct answer is: A. Big data technology | B. Crawler technology
114. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. After an EVS disk is deleted, you can use a backup to create an
EVS disk. |D. After an EVS disk is deleted, the backup data will not be deleted.
115. What applications and services are provided by HUAWEI CLOUD Marketplace?
[Score: 1]
Your answer: (null) Correct answer: A. Basic software|B. Business software|C. Developer tools|D.
Professional services
117. CCE allows you to view application logs and events. [Score: 1]
Your answer: (null) Correct answer: A. Correct
119. Which of the following belong to the life cycle management of database instances?
[Score: 1]
Your answer is as follows: (Null) Correct answer: A. Adding a read replica|B. Viewing DB instance
information|C. Expanding the storage space of the database|D. Deleting the database cluster|E. Rebooting
the database instance
120. The encrypted mirror cannot be changed to an unencrypted mirror. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
121. CCE allows you to directly use official Docker Hub images. [Score: 1]
Your answer: (null) Correct answer: A. Correct
122. Users can use OBS on OBS Console or OBS Browser. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
123. What Are the Steps for Creating a Windows Image Using an ECS? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Configure the Windows server. |B. Install Cloudbase-
Init. |C. Create a Windows private image.
125. Which of the following are the objectives of cloud computing security services? [Score:
1]
Your answer is as follows: (null) Correct answer: A. Data protection|B. Operation environment
protection|C. Service independence and linkage|D. Security evaluation
126. Relational Database Service (RDS) users can modify database configurations to achieve
optimal performance. [Score: 1]
Your answer: (null) Correct answer: A. Correct
127. How many common services can be added to My Favorites at most? [Score: 1]
Your answer: (empty) Correct answer: C.7
129. When creating a monitoring panel, you can add a maximum of () monitoring indicators
to a view. [Score: 1]
Your answer: (null) Correct answer: B.5
130. The time required for backing up an EVS disk depends only on the volume of data in the
EVS disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
132. What do I need to create for two VPCs to communicate with each other? [Score: 1]
Your answer: (null) Correct answer: B. Peering connection
134. The GPU is applicable to graphics rendering, engineering drawing, and desktop cloud
scenarios. [Score: 1]
Your answer: (null) Correct answer: A. Correct
135. Data security ensures confidentiality and integrity of user data applications and storage
in the cloud computing environment. [Score: 1]
Your answer: (null) Correct answer: A. Correct
138. Which of the following load balancing modes is not supported by listeners? [Score: 1]
Your answer: (null) Correct answer: A. Maximum connection|C. Set weight
139. What are the scenarios of user replication chain compensation? [Score: 1]
Your answer: (null) Correct answer: B. Replicate the unencrypted image as an encrypted image. |C.
Replicate the encrypted image as an encrypted image. |D. Replicate the encrypted image as an unencrypted
image.
140. Which of the following is not the application scenario of Cloud Eye? [Score: 1]
Your answer: (null) Correct answer: D. Operation audit
141. Which of the following components is not included in the big data platform? [Score: 1]
Your answer: (null) Correct answer: B. OpenStack
142. Which of the following is not a main application scenario of KMS? [Score: 1]
Your answer: (Null) The correct answer is: A. Network transmission encryption
144. To implement dynamic resource expansion, which of the following policies is selected
when you create an AS policy? [Score: 1]
Your answer: (blank) Correct answer: C. Alarm policy
145. Which of the following is not a major function of HVD? [Score: 1]
Your answer: (Null) Correct answer: B. ECS brute-force cracking prevention
146. Alarm notification is the action taken when an alarm is triggered. You can set or disable
alarm notification when creating or modifying an alarm. [Score: 1]
Your answer: (null) Correct answer: A. Correct
148. Data outsourcing and service outsourcing are the main security challenges faced by
users in cloud computing. [Score: 1]
Your answer: (null) Correct answer: A. Correct
149. What Are the ECS Login Authentication Modes? .c\'\ [Score: 1]
Your answer: (empty) Correct answer: A. Password|D. Key pair
150. Which of the following is NOT true of the LEADS philosophy? [Score: 1]
Your answer: (null) Correct answer: E.S: Service
151. A policy is configured for bucket A to prevent any user from accessing objects in bucket
A. Bucket A contains object B, which is configured with an ACL to allow anonymous users
to access object B. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
152. Which of the following methods can be used to directly access a container from the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Elastic IP address
155. Which of the following statements about the ELB product functions is incorrect? [Score:
1]
Your answer is: (empty) The correct answer is: A. Provide a private line connection.
156. Which of the following services does VBS depend on? (Multiple-choice question)
[Score: 1]
Your answer: (Null) Correct answer: B. Cloud hard disk|C. Object storage
161. The next decade of IT infrastructure evolution in the cloud computing era is from
separation to convergence. No matter how spirally the IT architecture evolves, which of the
following statements about customer values and driving forces is incorrect? [Score: 1]
Your answer: (Null) Correct answer: B. Higher efficiency in service deployment and lifecycle
management
162. When IPSec VPN is used for communication, the encryption and decryption check is
performed on the firewalls at both ends. [Score: 1]
Your answer: (null) Correct answer: A. Correct
164. To enable the log management function of an OBS bucket, which permissions on the
target OBS bucket must be granted to the log delivery user group? [Score: 1]
Your answer: (null) Correct answer: B. Write permission|C. View ACL permission
165. Users can use terminals such as iPad to access Workspace. [Score: 1]
Your answer: (null) Correct answer: A. Correct
166. Which of the following methods can be used to set the access permission for anonymous
OBS object users? [Score: 1]
Your answer: (null) Correct answer: B. Setting the ACL for OBS objects|C. Setting the policy for OBS
objects
168. What are the types of VPNs based on service usage? [Score: 1]
Your answer: (null) Correct answer: A. Access VPN|B.lntranet VPN|C.Extranet VPN
172. After an ECS is created, the bandwidth used by the ECS cannot be changed. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
From which perspectives does situational awareness analyze security posture? [Score: 1]
Your answer: (null) Correct answer: A. Global perspective|B. User perspective|D. Attacker perspective
175. Which of the following is the procedure for using the CCE? [Score: 1]
Your answer is as follows: (Null) Correct answer: C.1. Create a cluster. 2. Upload an image. 3. Create an
application.
176. Which of the following is not an advantage of RDS compared with self-built databases?
[Score: 1]
Your answer: (null) Correct answer: D. Users install the database by themselves.
177. As an important part of the cloud security service, application security ensures the
security of elastic cloud computing servers and cloud computing applications running on
them from the perspective of operating system and application security protection. [Score: 1]
Your answer: (null) Correct answer: A. Correct
178. Which of the following devices needs to be configured for Workspace to support 3D
applications? [Score: 1]
Your answer: (null) Correct answer: B.GPU card
179. During VPC creation, which of the following parameters can be used to automatically
obtain an IP address? [Score: 1]
Your answer: (null) The correct answer is A.DHCP.
181. Which of the following functions are supported by the 0BS Console? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Static website hosting | B. Versioning | C. Cross-
domain resource sharing | D. Adding external buckets
184. Which of the following constitute the Huawei public cloud ecosystem? [Score: 1]
Your answer: (Null) Correct answer: A. Marketplace|B. Developer Community|C. Partner|D. Huawei
cloud service certification engineer
185. Containers and virtual machines have similar resource isolation and allocation
advantages, but have different functions because containers are more portable and efficient
due to the fact that containers are virtualized operating systems rather than hardware. [Score:
1]
Your answer: (null) Correct answer: A. Correct
186. Direct Connect is a private network service that connects your local data center to the
public cloud. Currently, which of the following private lines is supported by Direct Connect?
[Score: 1]
Your answer: (null) Correct answer: A.MPLS VPN
187. IPSec VPN is an encrypted tunneling technology. It uses encrypted security services to
establish secure and comprehensive communication tunnels between different networks.
Which of the following is not the feature that ensures the transmission of data packets on the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Timeliness
188. On the Dashboard page, you can add or delete monitoring graphs of key monitored
objects. The graphs can be used to compare multiple monitored objects. You can view the
graphs in a timely manner each time you log in to the Cloud Eye console. [Score: 1]
Your answer: (null) Correct answer: A. Correct
189. IMS provides flexible self-service and comprehensive image management capabilities.
Users can create private images and use images to create ECSs or replicate ECSs in batches.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
190. Which of the following management operations is not supported by EVS disks? [Score:
1]
Your answer: (null) The correct answer is C. Reduce the capacity.
191. What is the return value when a user-defined monitoring indicator is successfully
uploaded using the Open API? [Score: 1]
Your answer: (null) The correct answer is B.201.
193. VPCs can be connected to traditional data centers through private lines or VRNs to
flexibly integrate resources. [Score: 1]
Your answer: (null) Correct answer: A. Correct
194. Which of the following statements about the positioning of Huawei cloud services are
correct? [Score: 1]
Your answer: (null) The correct answer is: A. Focus on the IaaS layer, use the PaaS layer, and aggregate
the SaaS layer.
196. After an ECS is bound to a (), the ECS can be accessed through a fixed public IP
address. [Score: 1]
Your answer: (blank) Correct answer: D. Elastic IP address
198. When multiple VMs are created, you can bind multiple EIPs to enable multiple VMs to
access the Internet at the same time. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
199. When creating an ECS, you can use the file injection function provided by the system to
initialize the ECS. [Score: 1]
Your answer: (null) Correct answer: A. Correct
200. Which of the following layer is the cloud service that provides the application running
and development environment? [Score: 1]
Your answer: (null) Correct answer: B.PaaS
201. Certificates of the SCS can be used for trusted authentication of enterprise websites.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
205. An availability zone (AZ) is a collection of one or more physical data centers with
independent cooling, fire extinguishing, moisture-proof, and electricity facilities. Within an
AZ, computing, network, and storage resources are logically divided into multiple clusters.
[Score: 1]
Your answer: (null) Correct answer: A. Correct
206. Which of the following cloud services is not a computing cloud service? [Score: 1]
Your answer: (null) Correct answer: C. Virtual private cloud
207. How Many RDS DB Instances Can Each User Create by Default? [Score: 1]
Your answer: (null) Correct answer: B.20
208. Which of the following is not the target of cloud computing security services? [Score: 1]
Your answer: (null) Correct answer: B. Cloud platform security
209. Cloud Eye is an open resource monitoring platform that provides resource monitoring,
alarm reporting, and notification services. [Score: 1]
Your answer: (null) Correct answer: A. Correct
211. When the average value is selected as the collection mode, the peak values may be
different when users switch the data range. [Score: 1]
Your answer: (null) Correct answer: A. Correct
213. Which of the following containerized application management functions are provided by
CCE? [Score: 1]
Your answer: (null) Correct answer: A. Rolling upgrade|B. Elastic scaling|C. Application monitoring|D.
Viewing events
214. Compared with self-built databases, RDS has more costs and O&M workloads. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect
215. Cloud computing is a model that enables the required resources (e.g., computing,
storage, network, applications, and services) to be obtained from the shared pool of
configurable resources anytime, anywhere, conveniently, and on demand. Resources can be
quickly provisioned and released, and the workload of managing resources and interaction
with service providers can be minimized. [Score: 1]
Your answer: (null) Correct answer: A. Correct
216. What operations do I need to perform to enable the created application to be accessed
from the outside? [Score: 1]
Your answer is: (Null) The correct answer is: C. When creating an application, publish the application as a
service.
217. Which of the following statements about the ELB function cannot be implemented?
[Score: 1]
Your answer: (null) Correct answer: D. Layer 2 and Layer 3 data forwarding
219. Which of the following cloud services can be used together with RDS to ensure network
security isolation between RDS instances and other services?
Your answer: (null) Correct answer: B.VPC
220. The retention period of monitoring data in different aggregation periods is different.
How long is the retention period of metric data in an aggregation period of 1 hour? [Score: 1]
Your answer: (null) The correct answer is C.155.
222. Which of the following commands is used to upload images from the Docker client to
the image repository? [Score: 1]
Your answer: (null) Correct answer: B.docker push
1, ELB provides three types of load balancing algorithms.
@ True
O False
© Tre
@ false
© Tre
© False
O Tne
@ False
5, IMS provides comprehensive and flexible self-service image management capabilities. Users can create a
private image and use it to create an ECS or multiple ECSs.
@ Twe
O False
© Tne
© False
@ Te
O False
© True
@ False
10, Currently, only IPsec VPNs are supported.
© Tne
© False
@ A. Capacity reduction
© B. Capacity expansion
© C.Backup
© D.Attaching/Detaching
12, To enable remote RDP access to a created Windows ECS, which ofthe following ports must be opened |
an inboundsecurity group rule?
A5S3
0
B. 33
0
C. 3389
®
D.80
o
13, Which ofthe following is not an advantage of RDS compared withself-built databases?
© Elastic scaling
@ 68.Self-installed databases
‘© D. Instantavailability
14, Which of the following can isolate RDS network resources from other services?
O AECS
© B.0BS
@ c.vec
© b.cES
15, Which SDKlanguage is NOT supported on API Gateway?
@ A Delphi
O BJava
© C.PHP
oO Dc
O A.Reduce
O BSetto
© C.Add
@ D.Double
@ Cloud Eye
O B. Auto Scaling
© C.CloudContainer Engine
© OD.VirtualPrivate Cloud
© A. Image ManagementService
O D.AutoSealing
19, Which ofthe following is NOT a componentofthe big data platform?
O A.Map Reduce
© 8.Yam
O C.HDFS
® D.Openstack
© A. Image
© ©. AutoScaling
@ D.EVS disk
21, Which of the following policies can be configured to increase the numberofinstances in an AS groupat
predetermined time each week?
O AAllofthe above
® B.Periodic policy
© C.Scheduled policy
© D.Alarm policy
© A. Image recognition
@ 8. Character recggnition
© C.Speech recognition
© A. Backendserver
@ C.Listener
R
O D.Health check
O A.Cloud Eye
© C.Cloud Tracefgrvice
@A nugps
O B.UDP
© c.TcP
O D.HTTP
© . To create a direct connection, users need to create a connection,a virtual gateway, and a virtual interface.
fo} D. Direct Connectis a high-speed, low-latency,stable, and secure dedicated network connection that connectsuser's
local data center to a VPC on a cloud.
27, Which ofthe following key technologies does SA use?
@ A.Bigdata
OB.Identity authentication
© .£ncryption
28, Which ofthe following CIDR blocks does the VPC service support?
G A.100.0.5/24
@ 8B. 10.0.25.0/24
@ Cc. 192.168.0.0/23
@ 0. 172.16.0.1/24
@ B. Visualized monitoring
@ A Public image
@ 8B.Private image
O C.Secret image
@ D.Shared image
@ C.alinux—cs
(@ Security control
(@ C. Agency management
@ D. Permission management
@ C.ImageSearch
34, Which of the following EVS disk types does ECS support?
@ A.Common /0
@ 8B.Ultra-high 1/0
@ C.High Oo
C. High TCO
8
D. 1/0 Bottleneck
1.Cloud Computing Characteristics include(multiple choices):
A. On-demand self-service
B. Broad networkaccess
8
C. Rapid scalability
8
D. Resource pooling
A.Private cloud
B. Industry cloud
a
C. Rapid cloud
oa
D, Public cloud
O true
@ falseeW
@ truev
© false
1
-Huawei Cloud Network Services includes:
A. VPC
O B.OBS
Cc. ELB
© D.SFS
. Which of the Following Compute Services Does HUAWEI CLOUD Provide?(multiple choices)
=
B. AutoScaling (AS)
AHCIA
B.HICP
CHCIE
OO D.HICM
Which belongs to HUAWEI CLOUD Developer Center Ecosystem Catalog? (multiple choices)
A, Developer Contest
B. Cloud Expert
C, Sign-up Platform
D. MVP
1, The ITUAWEI CLOUD Partner Network (I ICPN) is a global partner program for | IUAWCI CLOUD.
© truev
O false
1. You can view, purchase, use, and operate various HUAWEI CLOUD service products after you have logged in to
the management console.
@ truv
O false
2, The management console manages various services such as computing, storage, network, security, management
and deployment, application services, databases,data analysis, enterprise applications, and DevCloud.
@ truev
O false
© A.Auto Scaling
© D.Cloud Eye
1, High-performance computing ECSsprovide a large number of CPU cores, large memory size, and high
throughput.
@ truev
© false
@ truev
© false
1, Which of the following methods does AS use to expand resources?(multiple choice)
Quiz-2
1.AZ Specifies a physical region where resources use independent power supplies and networks. AZs are physically
isolated but interconnected throughan internal network.
@ truev
O false
1.AS supportsthe following instance removal policies:(multiple choices)
C.Oldestinstances
D.Newestinstances
AAlarm policies
B.Scheduledpolicies
C.Periodic policies
O D.Monitoringpolicies
1.Private images can heclassified into: (multiple choices)
C.Full-ECS image
a
© D.Snapshot
1.If the ECS uses a static IP address, configure DHCPforthe ECS,allowingit to dynamically obtain an IP address.
@ truev
O false
A. Public image
B. Private image
© C. Encrypted image
D. Shared image
@ truev
© false
© A.OBS
B.ECS
C.BMS
f) DPC
1.How many servers can a shared EVS disk be attached to at most?(single choice)
OAS
O B7
Oo C8
© D164
A.Ultra-high |/O
B.High /O
C.Common I/O
O D.Optimized I/O
1.HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume BackupService (VBS) to protect your
data against:(multiple choices)
A.viruses
B.unintentional deletions
Csoftwarefaults
D. hardwarefaults
@® truev
O false
1.VBS provides the data backup function for EVS disks. The created data backupscan beusedto create EVS disks.
@ truev
O false
1.Object Storage Service (OBS) is a stable, secure,efficient, and easy-to-use cloud storageservice.
@ truev
© false
A. Stable
B. Efficient
C. Secure
D. Easy to use
1.0BS supportsfine-grained permission control for buckets and objects through bucketpolicies.
© truev
© false
1.Users can collect OBS resource operation records through CTSservice to facilitate future query, audit and
backtracking.
@ ATrueY
O B. False
1.Advantagesof SFS include:(multiple choices)
A. File sharing
B, Elastic scalability
D. Durable
@® truev
© false
2. A file system provides users with shared file storage service through NFSor CIFS.
© truev
O false
A.Media processing
B.Log management
8
B, Flexible Configuration
C. High-Speed Access
D. Interconnection
@® truv
O false
1. Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?(multiple choices)
A. ECS
B. ELB
C. Cloud Eye
A, High availability
B, High flexibility
C. High performance
1,Which ofthe following load balancing algorithms are provided by ELB? (multiple chaices)
C, Source IP hash
A. TCP
B. UDP
Cc HTTP
D. HTTPS
© true
® falsew
© truev
© false
1.Cloud Eyeis a monitoringservice that can help you capturethe status of your Direct Connect connections.
® truev
© false
@ truev
© false
1.VPN is used to establish a secure and encrypted public network communication tunnel between the remote user
and the VPC.
@ truev
O false
1.Whatbilling modes does VPN support?(multiple choices)
A. pay by bandwidth
B. pay by networktraffic
@® truev
© false
1. With data security as its core, HUAWEI CLOUD builds a series of security services to meet the particular
needs.security services include:(multiple choices)
A. Data Security
B. Host Security
C. Application Security
D. Network Security
A. DEW
OB. HSS
O ccGs
D. DBSS
1.You can use Cloud Eye to:(multiple choices)
. Which of the following security services can be usedto protect websites? (Multiple choices)
A.WAF
B.VSS
C.SCM
D.Anti-DDoS
8
A. Automatic provisioning
C.Visualized monitoring
3
A. Basic Monitoring
B. OS Monitoring
A,InstantAvailability
B. High Reliability
C, High Security
D, Elastic Scaling
A. Max
B. Min
C. Avg
D. Sum
A, High Availability
C. DB Instance Monitoring
D. High security
1. You can reboota DB instance only whenits status is Available.
@® truev
© false
1.Among HUAWEI CLOUD EI services, ModelArtsusesthe self-developed Moxing deep learning framework to
accelerate algorithm developmentandtraining.
@ truev
O false
A. Face Recognition
B. Image Recognition
C. Content Moderation
D. ImageSearch
© truev
© false
© truevd
O false
1, Opening APIs greatly promotes service innovation and standardization of existing services.
@ truv
O false
2. API Gateway doesn't supportall API integration and opening on HUAWEI CLOUD.
O true
@ falseW
1.You can enable API Gateway and create and manageAPIs for free.
@® truevd
O false
1. The minimum managementunit of RDSis an instance.
Yeah. Wrong
2. ECS refers to the Auto Scaling (AS) service.
Yeah. Wrong
3. Whatare the key features of IAM?
A. Centralized control of users and security credentials
B. Centralized user access control
C. User group-basedrights
D. Huawei customer service agent maintenance
4. The VPC subnet segment can be modified after being created.
Yeah. Wrong
5. VBS can create backups for EVS disks and use the backupstoroll back EVS
disks, ensuring user data accuracy and security to the maximum extent.
\Yeah. Wrong
6. Which of the following statements about KMS is incorrect?
A. Management cloud platform and tenant key
B. HSM (hardware security module)
C. Multi-layer key protection technology
D. Support for application combination
7. Which of the following doesnot exist in the listener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode
8. On the Dashboard page, you can add or delete monitoring icons of concerned
instances. Supports multi-indicator comparison so that users can view the
Yeah. Wrong
9. Relational Database Service (RDS) users can modify database configurations to achieve optimal performance.
Yeah. Wrong
10. The size of the exported imageis not limited.
Yeah. Wrong
11. The ASservice can only dynamically add or reduce server resources based on the specified time period.
Yeah. Wrong
12. Which of the following statements aboutSFSis correct?
A. A file system can be mountedto an ECS and canbelongtodifferent VPCs.
B. Parameters cannot be modified forthe file system that is successfully created.
C. The file system can access different AZs in the same VPC.
D. The performanceofthe SFS file system improveswith the increase of capacity.
13. Which of the following imagesis a standard image provided by the public cloud platform andisvisible to all users?
A. Public image
B. Private images
C. Shared image
D. Market image
14. The GPUis applicable to graphics rendering and engineering drawingin virtualization environments and desktop cloud scenarios.
Yeah. Wrong
15. Whatare the typesof AS policies?
A. Scheduled policy
B. Periodic policy
C. Alarm policy
|p. Randompolicy
16. Which of the following scenarios are involved in image replication?
A. Copying an unencrypted image to another unencrypted image
B. Replicating an unencrypted image as an encrypted image
C. Replicating an encrypted image as an encrypted image
D. Replicate an encrypted image to an unencrypted one.
17. Allowsusers to set read-only permissions for SFS.
Yeah. Wrong
18. Which of the following load balancing modesare not supportedbylisteners?
A. Maximum number oflinks
B. Polling
C. Set weights.
D. Minimum connection
19. Which of the following methods can be usedto set the access permission for anonymous users of OBS objects?
A. Set an ACL for the OBS bucket.
B. Set the ACL for OBS objects.
C. Set a policy for OBS objects.
D. Set a policy for the OBS bucket.
20. OBS supports batch upload.
Yeah. Wrong
21. WhatAre the Steps for Creating a Windows Image Using an ECS?
A. Configure the Windowsserver.
B. Install Cloudbase-Init.
C. Creating a Windowsprivate image
D. View and clear networkrule files.
A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy
25. Which of the following parameters is used to automatically obtain an IP address during VPC creation?
A.DHCP
B. Network segment
C. Partitioning
D. Gateway
26. Which of the following is not the application scenario of Cloud Eye?
A. Daily resource management
B. Issue notification
C. Capacity adjustment
D. Operation audit
27. Which of the following is not a capability of DevCloud?
A. Project management
B. Code check
C. Compile and build
D. Data backup
28. Cross-VPCaccessto file system is supported.
Yeah. Wrong
29. WhatAre the ECS Login Authentication Modes?
A. PasswordB. PasswiC.Fingerprint D. Key pair
30. Huawei provides developers with functional development, which will help
developers integrate the functions developed by Huaweiwith their upper-layer
applications to build differentiated and innovative solutions.
Yeah. Wrong
31. Which of the following are RDS functions?
A. Create a databasecluster.
B. Expand the disk capacity.
C. Adding a read replica
D. Creating or restoring a snapshot
E. Restore the backup to a specified time point.
32. Whichof the following functions are provided by OBS Console?
A. Static website hosting
B. Multi-version control
C. Cross-domain resource sharing
D. Mounting external buckets
33. Attach the EVS disk to an ECS so thatthe disk can be used directly.
Yeah. Wrong
34. Which of the following statements about VBS are correct?
A. After an EVS disk is deleted, its backup datais also deleted.
B. After an EVS disk is deleted, you can use the backup to restore the EVS disk.
C. After an EVSdisk is deleted, you can still use the backup to create the EVSdisk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
35. How Can | Add Instances to an AS Group?
A.Scaling action
B. Manually add instances.
C. Change the number of expected instances.
D. AS configuration
36. Alarm ni ication is the action taken whenan alarmis triggered. Users can
set or disable alarm notification when creating or modifying an alarm.
Yeah. Wrong
From which aspects doessituational awarenessanalyze security posture?
A. Global perspective
B. User perspective
C. Managementperspective
D. Attacker perspective
38. After an application is created, you can change the application by replacing the image of the application.
Yeah. Wrong
39. ECSsare billed in yearly/monthly or pay-per-use mode.
Yeah. Wrong
40.A policy is configured for OBS bucketA to prevent any user from accessing
objects in the bucket. Bucket A contains object B, which is configured with the
ACL permission to allow anonymous usersto access object B. In this way, users
can access object B anonymously.
Yeah. Wrong
41. Which of the following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and home directory
D. High-performance computing
Yeah. Wrong
43. WhenIPSec VPNis used for communication, the encryption and decryption
check is performed onthe firewalls at both ends.
Yeah. Wrong
44. VBS doesnot support batch backup of EVS disks.
\Yeah. Wrong
A. Read permission
B. Write permission
C. ACL permission
D. Modify the ACL permission.
47. Which of the following is the image type converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
48. What are the concepts of VPC?
A. Subnet B.EIP C. Security group D. VPN
1. After an ECSis created, the bandwidth used bythe ECS cannotbe changed.
Yeah. Wrong
2. Which ofthe following operations is charged?
A. Create an EIP.
B. Create a subnet.
C. Create a VPC.
D. Create a security group.
3. Which of the following doesnotexistin thelistener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode
4. Whichof the followingis not the target of the cloud computing security service?
A.Usersecurity
B. Cloud platform security
C. Data security
D. Service security
5. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and homedirectory
D. High-performance computing
6. Which of the following EVSdisks can be directly created on the EVS console?
A. System disk B. Data disk C. Delta disk D. Mirror disk
The ASservice must be used with Elastic Load Balance.
Yeah. Wrong
8. Which ofthe following statements about VBSare correct?
A. VBS has no quota limit.
B. If the capacity of an EVS disk is expandedafter the disk is backed up, the disk capacity remains unchangedafter the disk is restored using the backup data.
C. If you back up an EVS disk and then expandits capacity, you cannot use the backupto restore the disk
data. This is because the disk spacewill be restored to theoriginal size after the restoration.
D. After the capacity of an EVS disk is expanded,the disk space remains unchangedif the EVS disk is backed up and the backup is usedto restore data.
9. Whatis the full name of ECS?
Elastic Cloud Server
42. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three times, disable
versioning for the bucket, and upload object aaa for three times. After the preceding operations are
complete, how manyobjectsare displayed in the bucket basic information?
Quantity: 4
43. Whichofthe following statements about Anti-DDoS traffic awarenessis incorrect?
A. Web vulnerability security detection
B. Configures and modifies anti-DDoS parameters for public IP addresses.
C. Provides protection for public IP addresses of ECSs and load balancing devices.
D. Monitors a single public IP addressin the obstetrics department, including the current defense status,
current defense configuration parameters,traffic since 24 hours ago, and one event within 24 hours.
1. If two sites communicate with each otheracross the Internet, IPSec VPN can be deployed on
the firewalls at both sites to protect the mutual accesstraffic betweenthe intranets at the two
sites.
Yeah. Wrong
2. Which ofthefollowing statements about hybrid cloudis incorrect?
‘A. Unified management ofpublic and private cloud resources
B. Service resourcesare migrated betweenthe public cloud and private cloud.
C. Optimal resourceallocationthrough hybrid cloud
D. Applications can only be deployedonthe public cloud.
3. Cloud computing is a modelthatenables users to obtain required resources from the shared
pool of configurable resources anytime, anywhere, and on demand.
Yeah. Wrong
4. All types of HUAWEI CLOUDproducts can be viewed on the managementconsole.
Yeah. Wrong
5. Whichofthefollowing doesnotexist in the configuration for creatinga listener?
A. Load balancer protocol/port
B. VPC
C. HTTPScertificate
D. Load mode
6. Whichofthefollowingis not a major function of WTP?
A. Websitefile protection
B. Alarm information recording
C. Protection details stati S
D. SQLinjection prevention
7. Which of the followingare the main functions of HID?
A.Bruteforce cracking detection
B. Remotelogin notification
C. Weak password detection
D. Checkthe database processpermission.
E. Webpage file detection
8. Whentheaveragevalueis selected as the aggregation mode, the peak values may be inconsistent when users switch the data range.
Yeah. Wrong
9. Which of the following statementsis incorrect?
A. Create a folder named br..ra/1 in the OBS bucket.
B. OBS Console supportsbatch deletion of buckets.
C. OBS Console supports batch deletion of objects.
D. A user has created 101 buckets using OBS Console.
10. Whichofthefollowing functionsare provided by the ECS service?
‘A. Users can create and delete VMs, modify VM specifications, andstart and shut down VMs.
B. Users can add and uninstall extension NICs, add EIPs, and attach and detach disks.
C. Users can view information about their ECSs on the management console.
D. Users can set ECS alarm rules.
11. RDS meets the ever-changing requirementsof the gaming industry, shortens the R&D period, and reduces R&D costs.
Yeah. Wrong
12. Which of the following services can work with EVS?
A. Elastic Cloud Server
B. Image ManagementService (IMS)
C. Volume Backup Service (VBS)
D. Cloud monitoring service
13. Application security is an importantpart of the cloud security service. It ensures the
security of elastic cloud computing servers and cloud computing applications running on them
from the perspective of operating system and application security protection.
Yeah. Wrong
14. Which of the following statements about VBS is incorrect?
A. VBS is based on the snapshot technology and supports online backup.
B. VBS supportsfull backup and incremental backup.
C. You do not needto stop the server whenusing a backup to restore an EVSdisk.
D. When backing up EVS disks, you do not need to stop the server.
15. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content managementand home directory
D. High-performance computing
16. Whatare the application scenarios of VBS?
A. Hackerattacks orvirus attacks
B. Data is deleted by mistake.
C. Dataarchiving andretention
D. The application program is faulty.
21. An availability zone (AZ) is a collection of one or more physical data centers with
independentcooling, fire extinguishing, moisture-proof, andelectricity facilities. Within an AZ,
computing, network, storage, and other resourcesare logically divided into multiple clusters.
Yeah. Wrong
22. Which type of image is converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
23. Which of the following operations can be performed by a shared image provider?
A. Sharing a specified image
B. Delete the shared image.
C. Add a tenant to whom an image is shared.
D. Delete the tenant who shares the image.
24. Which of the following statements about the ELB function cannot be implemented?
A. Eliminate single points offailure.
B. Sharing service node pressure
C. Check the health status of service nodes.
D. Layer 2 and Layer 3 data forwarding
25. When enabling Direct Connect, whatis the port type if the port type is 10GE?
Optical port
26. How long doesit take to apply for an ECS?
A few minutes.
27. OBS supports batch upload.
Yeah. Wrong
28. What are the types of EVS disks?
A. More than I/O B. High I/O C. Common |/C D. Optimized 1/0
29. The VPC subnet segment can be modified after being created.
Yeah. Wrong
30. Data security ensures confidentiality and integrity of user data applications and storagein the cloud computing environment.
Yeah. Wrong
31. Before creating an imageusing an ECS, ensurethat the ECS has been stopped.
Yeah. Wrong
32. Users cannotdeployservice applications on ECSsasif they wereusingtraditional servers.
Yeah. Wrong
33. Whichofthefollowingis not a basic concept of ELB?
A.Firewall
B. Load balancer
C. Listener
D.Instance (VM orapplication container)
34. Whichofthefollowingis not the main application scenario of KMS?
A.Data transmission encryption
B. Personal data encryption
C. Coreservice data encryption
D. Key information asset encryption
35. Which of the following statements aboutVBS are correct?
A. After an EVSdisk is deleted, its backup data is also deleted.
B. After an EVSdiskis deleted, it can be restored using a backup.
C. After an EVSdisk is deleted, you can still use the backup to create the EVS disk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
36. Which of the following componentsis not included in the big data platform?
A.MapReduce
B.OpenStack
C.HDFS.
D.Yarn
41. VPCs can be connected totraditional data centers through private lines or VPNstoflexibly integrate resources.
Yeah. Wrong
42. After an ECSis created,its bandwidth cannot be modified onceit is determined.
Yeah. Wrong
43. The webapplicationfirewall performs anomaly detection on HTTPrequeststo effectively
prevent malicious network intrusion behaviors such as web page tampering, information
leakage, and Trojan horse implantation.
Yeah. Wrong
44, Whatare the advantagesof SFS over traditional file sharing storage?
A.File sharing
B. Seamlessintegration
C. The operationis simple butthe cost is high.
D. High reliability
45. When multiple VMsare created, you can bind an EIP to multiple VMsto enable the VMsto accessthe Internetat the sametime.
Yeah. Wrong
46. IMSprovidesflexible self-service and comprehensive image managementcapabilities.
Users can create private images and use the imagesto create ECSsor load ECSsin batches.
Yeah. Wrong
47. RDSusers can modify database configurationsto achieve optimal performance.
Yeah. Wrong
48. A policyis configured for OBS bucketA to prevent any userfrom accessingobjectsin the
bucket. Bucket A contains object B, which has an ACLthat allows anonymoususers to access.
Then,users can access object B anonymously.
Yeah. Wrong
49. Alarm notificationis the action taken whenan alarm is triggered. Users can setor disable
alarm notification when creating or modifying an alarm.
Yeah. Wrong