Download as pdf or txt
Download as pdf or txt
You are on page 1of 121

1) What are basic characteristics of cloud computing?

(O)
A. On-demand self-service
B. broad network access methods
C. Resource pooling
D. fast and scalable
E. Measurable services

All

2) Which of the following is generally used to provide application development and running
environments?
A. IaaS
B. PaaS
C. SaaS

3) Pain Points of Current Enterprise IT Infrastructure includes:


A. Slow Business Launch
B. Complicated Lifecycle Management
C. High TCO
D. I/O Bottleneck

All

4) Which of the following are deployment models of cloud computing?


A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community/Industry cloud

All

5) The development of Cloud Computing includes:


A. Virtualization
B. Private Cloud
C. Public Cloud
D. Hybrid Cloud

All

6) What is Huawei Cloud Positioning?


A. Focus on IaaS
B. Enable PaaS
C. Converge SaaS
All

7) Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)

ABC

8) Which are part of HUAWEI CLOUD ecosystem?


A. Huawei Cloud Marketplace
B. Huawei Cloud Academy
C. Partners
D. Developers

All

9) Which belongs to Huawei Cloud Developer Center Ecosystem Catalog?


A. Developer Contest
B. Cloud Expert
C. Sign-Up Platform
D. MVP
E. Student Innovation and Entrepreneurship Program
F. Yunzhi Club

All

10) How many types of login users does HUAWEI CLOUD support?
A. 1
B. 2
C. 3
D. 4

11) Which of the following service is used by an ECS to store data? (O)
A. AS
B. IMS
C. EVS
D. DeC

12) Which of the following are ECS types? (O)


A. General computing (General Computing, General Computing Plus)
B. Memory-optimized (Memory Optimized, Large Memory)
C. High Performance Computing (High & Ultra High Performance Computing)
D. Big Data (Ultra High I/O, Disk Intensive)
E. Computing-accelerated (GPU Accelerated, FGPA High Performance)

All

13) ECSs can be charged in yearly/monthly or metered mode (pay per use).
A. True
B. False

14) Is an ECS a physical server?


A. Yes
B. No

15) All OSs support key-authenticated ECS logins.


A. True
B. False

16) Which of the following policies does AS support?


A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy

ABC

17) Which is not an action of Bandwidth scaling policy?


A. Reduce
B. Double
C. Set to
D. Add

18) What is used by an ECS to store data?


A. Auto Scaling
B. Elastic Volume Service
C. Cloud Container Engine
D. Cloud Eye
B

19) Auto Scaling (AS) is charged.


A. True
B. False

20) AS supports the following instance removal policies:


A. Oldest instances created based on the oldest configuration
B. Newest instances created based on the oldest configuration
C. Oldest instances
D. Newest instances

All

21) AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False

22) Alarm policies support system monitoring and custom monitoring.


A. True
B. False

23) An instance added to an AS group by an AS policy cannot be manually removed from the
group.
A. True
B. False

24) AS can automatically adjust ECS and bandwidth resources.


A. True
B. False

A
25) Which of the following policies can be configured to increase the number of instances in an
AS group at a predetermined time each week?
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above

26) Which of the following statements about AS is incorrect?


A. AS can automatically adjust the number of instances in an AS group based on preset
policies.
B. AS can perform health checks on instances in an AS group.
C. Instance protection can be enabled on specified instances in an AS group.
D. AS does not allow users to view the status of instances in an AS group.

27) Which of the following statements about scaling actions is incorrect?


A. When the number of instances in an AS group is not the same as expected, a scaling
action is triggered.
B. After an AS group is disabled, changing the number of expected instances triggers a
scaling action.
C. When a trigger condition of an AS policy is met, a scaling action is triggered automatically.
D. Lifecycle hooks help users better manage scaling actions.

28) Which of the following statements about AS configuration is correct?


A. An AS configuration defines the specifications of ECSs to be added to an AS group.
B. An AS configuration that has been created can be modified as needed.
C. After an AS group is enabled, its AS configuration cannot be changed.
D. An unlimited number of AS configurations can be created.

29) How many types of policies does AS support?


A. 0
B. 1
C. 2
D. 3

30) Which of the following policies are supported by AS?


A. Alarm policy
B. Scheduled policy
C. Periodic Policy
D. Random policy

ABC

31) How can instances be added to an AS group?


A. By an AS policy
B. Manually
C. By a change to the number of expected instances
D. By AS configuration

ABC

32) Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Network Inbound/Outbound Rate
C. Disk Read/Write Requests
D. Memory Usage
E. Custom monitoring metrics
F. GPU Usage/GPU Memory Usage
G. EVS Disk Usage/EVS Disk I/O Read/Write
H. Performance Status

All

33) Which operations can be performed on an AS policy?


A. Manually Execute an AS Policy
B. Modify
C. Enable
D. Create/Delete
E. Disable

All

34) Which of the following services are associated with AS?


A. Cloud Eye
B. Virtual Private Cloud (VPC)
C. Elastic Load Balance (ELB)
D. Elastic Cloud Server (ECS)

All

35) Which operations are required to use ECS to create a Windows image?
A. Configure the Windows ECS.
B. Install Cloudbase-Init.
C. Create a Windows private image.
D. Query and cleanup network rule files.

ABC

36) What is the type of the image converted based on an existing ECS?
A. Public image
B. Private image
C. Shared image
D. EulerOS image

37) Which of the following components are included in an ECS?


A. vCPUs
B. Memory
C. Image
D. EVS disk

All

38) Before creating a data disk image from a data disk, ensure that the ECS has a system disk
and the data disk is not empty.
A. True
B. False

39) What image types does IMS support?


A. Public image
B. Private image
C. Encrypted image
D. Shared image

ABD

40) Private images can be classified into:


A. System disk image
B. Data disk image
C. Full-ECS image
D. Snapshot

ABC

41) If the ECS uses a static IP address, configure DHCP for the ECS, allowing it to dynamically
obtain an IP address.
A. True
B. False

42) When creating image Cloudbase-init should be installed on OS to ensure that configuration
of newly created ECSs from the image can be customized.
A. True
B. False

43) Image creation fails if entered System disk capacity is less than System disk capacity of
external image file.
A. True
B. False

44) Use to Create Private Image (single Choice)


Full ECS Image using ECS
System Disk using ECS
System Disk using OBS File-my answer
System Disk using external Image

45) EVS provides the scalable, virtual block storage service, and the backend of EVS is based
on a distributed architecture.
A. True
B. False

46) VBD EVS disks support only basic SCSI read/write commands.
A. True
B. False

47) Which of the followings are EVS disk types does ECS support?
A. Ultra-high I/O
B. High I/O
C. Common I/O
D. Latency optimized ultra-high I/O

All
48) How many servers can a shared EVS disk be attached to at most?
A. 5
B. 7
C. 8
D. 16

49) EVS can be attached to:


A. OBS
B. ECS
C. BMS
D. VPC

BC

50) An EVS disk can be backed up only when it is in the ( ) state.


A. Available
B. In-use
C. Error
D. Deletion failed

AB

51) Does VBS Support Cross-Region Backup and Restoration?


A. True
B. False

52) HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup
Service (VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults

All

53) VBS does not support backing up EVS disks in batches.


A. True
B. False

B
54) On which of the following services does VBS depend?
A. Elastic Cloud Server
B. Elastic Volume Service
C. Object Storage Service
D. Image Management Service

BC

55) ( ) records operations of VBS resources, facilitating query, audit, and backtracking
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.

56) VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security.
A. True
B. False

57) VBS provides the data backup function for EVS disks. The created data backups can be
used to create EVS disks.
A. True
B. False

58) Which of the following are OBS application scenarios?


A. Massive storage resource pool
B. Static web hosting
C. Big data storage
D. Backup
E. Archiving

All

59) Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs

AB
60) Access requests to OBS can be controlled by,
A. ACLs
B. Bucket policies
C. User signature authentication
D. Server-side encryption

ABC

61) What is the data durability of OBS?


A. 10 nines (99.99999999%)
B. 11 nines (99.999999999%)
C. 12 nines (99.9999999999%)

62) What is the basic storage unit in OBS?


A. File
B. Block
C. Object
D. Bucket

63) Which of the following operations on buckets is not available in OBS?


A. Creation
B. Formatting
C. Modification
D. Deletion

64) If you download an object of the Standard storage class through a HUAWEI CLOUD ECS
server, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity

65) If you download an object of the Archive storage class to your local computer over the
Internet, which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration

66) If a customer has some data to store and the data will be downloaded for only 10 times in a
year, which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage

67) Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.

68) Which of the following statements about lifecycle rules is correct?


A. Lifecycle rules support transition between storage classes by hour.
B. Lifecycle rules for objects of historical versions take effect only when versioning is enabled
for the bucket.
C. Lifecycle rules for objects of historical versions cannot be configured if versioning is not
enabled for the bucket.

69) Which of the following items cannot be configured when creating a bucket?
A. Region where bucket resides
B. Storage class of a bucket
C. Bucket policy
D. Static website hosting

70) Which of the following items cannot be configured when uploading an object?
A. File path
B. Storage class of the object
C. KMS encryption
D. File size
D

71) Which storage classes does OBS offer?


A. Archive storage class
B. Backup storage class
C. Infrequent Access storage class
D. Standard storage class

ACD

72) Which of the following are the application scenarios of SFS?


A. Media processing
B. Log management
C. Content management and web directories
D. High-performance computing (HPC)

ACD

73) SFS is charged in pay-per-use or monthly/yearly flat fee mode.


A. True
B. False

74) SFS includes the SFS and SFS Turbo products.


A. True
B. False

75) SFS supports the EXT4 and NTFS protocols.


A. True
B. False

76) SFS can be connected to the AD domain controller for permission control.
A. True
B. False

B
77) SFS (Capacity Oriented) allows ECSs in different VPCs to access the same file system.
A. True
B. False

78) What is the maximum size of a single file supported by SFS Capacity Oriented?
A. 32 TB
B. 64 TB
C. 128 TB
D. 240 TB

79) What is the maximum size of a single file supported by SFS Turbo?
A. 16 TB
B. 32 TB
C. 64 TB
D. 128 TB

80) SFS (Turbo) allows ECSs in different VPCs to access the same file system.
A. True
B. False

81) What is the maximum bandwidth supported by SFS?


A. 2 GB/s
B. 5 GB/s
C. 10 GB/s
D. 20 GB/s

82) What is the maximum bandwidth supported by SFS Turbo?


A. 150 MB/s for Turbo Standard
B. 350 MB/s for Turbo Performance
C. 150 GB/s for Turbo Standard
D. 350 GB/s for Turbo Performance

AB
83) Which of the following file protocol is supported by SFS Turbo?
A. NFS v3
B. NFS v4
C. SMB 2.0/2.1/3.0
D. EXT4

84) What is the minimum latency of SFS Turbo Performance?


A. 10 ms
B. 5 ms
C. 2 ms
D. 1 ms

85) What is the minimum latency of SFS Turbo Standard?


A. 10 ms
B. 5 ms
C. 2 ms
D. 1 ms

86) What is the minimum latency of SFS?


A. 20 ms
B. 3 ms
C. 2 ms
D. 1 ms

87) What is the maximum IOPS supported by SFS Turbo?


A. 5,000
B. 10,000
C. 20,000
D. 30,000

88) Which of the following protocols are supported by SFS?


A. NFS v3
B. NFS v4
C. FTP
D. EXT4

89) Which of the following are mainstream storage types in the industry?
A. Block storage
B. File storage
C. Object storage
D. Backup storage

ABC

90) Which of the following are HUAWEI CLOUD file storage services?
A. SFS
B. SFS Turbo
C. SFS Plus
D. All of the above

AB

91) Which scenarios does SFS suit?


A. HPC
B. Media
C. File sharing
D. Game

ABC

92) Which scenarios does SFS Turbo suit?


A. HPC
B. Media
C. High-performance websites
D. Software development

AC

93) An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False

A
94) Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category?
A. ECS
B. BMS
C. IMS
D. SFS

95) GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops,
graphics rendering and engineering drawing run in virtualization environment.
A. True
B. False

96) Which of the following are the advantages of the VPC service?
A. Secure & Reliable
B. Flexible Configuration
C. High Speed Access/Dynamic BGP
D. Interconnection between VPCs

All

97) Which of the following operation incurs charges?


A. Create an EIP
B. Create a subnet
C. Create a VPC
D. Create a security group

98) The Virtual Private Cloud (VPC) service enables you to provision logically isolated,
configurable, and manageable virtual networks, improving the cloud resource security and
simplifying network deployment.
A. True
B. False

99) Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?
A. Customizing CIDR blocks
B. Customizing access control policies
C. Accessing the Internet using EIPs
D. Connecting a local data center using a VPN or Direct Connect connection

All
100) Which of the Following CIDR blocks care available for VPC Service?
A. 10.0.0.0/8
B. 172.16.0.0/16
C. 192.168.0.0/16

All

101) Which of the following cannot be configured in a VPC?


A. Subnet
B. Security group
C. Elastic IP address
D. Bandwidth
E. Load balancing

102) To enable RDP access to a created Windows ECS, which port must be opened by an
inbound security group rule?
A. 37
B. 53
C. 3389
D. 80

103) Which of the following must be configured to enable an ECS without a bound EIP to access
the Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing

104) How many network interface cards (NICs) does an ECS functioning as a SNAT server
require?
A. 1
B. 2
C. 3

105) Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.

106) Which of the following can enable an ECS in a VPC to communicate with a host in a private
data center?
A. Internet connection
B. VPN
C. VPC peering connection

107) Which of the following is optional when you create a subnet?


A. Name
B. CIDR block
C. Gateway
D. Tag

108) If you have high requirements on network stability and availability, which of the following
EIP types must you choose:
A. Static BGP
B. Dynamic BGP

109) Which of the following CIDR blocks is not supported by the VPC service?
A. 10.0.0.0 – 10.255.255.255
B. 172.16.0.0 – 172.31.255.255
C. 192.168.0.0 – 192.168.255.255
D. 255.255.0.0 – 255.255.255.255

110) Which of the following are VPC features?


A. Secure isolation
B. Flexible deployment
C. Dynamic BGP
D. Hybrid deployment
All

111) Which of the following is NOT a component of the ELB service?


A. Firewall
B. Load Balancer
C. Listener
D. Instance (VM or application container)

112) Elastic Load Balance (ELB) can work independently.


A. True
B. False

113) AS must work with Elastic Load Balance (ELB).


A. True
B. False

114) Which of the following functions are supported by ELB?


A. Creating a load balancer
B. Deleting a load balancer
C. Querying a load balancer
D. Adjusting the bandwidth

All

115) Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm

116) Which of the following load balancing algorithms are provided by ELB?
A. Weighted round robin
B. Weighted least connections
C. Source IP hash
D. Encryption algorithm
E. Weighted
ABC

117) Which of the following protocols requires certificates?


A.TCP
B.UDP
C.HTTP
D.HTTPS

118) Which of the following protocols does ELB support?


A.TCP
B.UDP
C.HTTP
D.HTTPS

All

119) ELB supports servers running different OSs.


A. True
B. False

120) Which of the following services can be used to view real-time monitoring data of load
balancers and listeners?
A.Cloud Container Engine
B.Cloud Eye
C.Auto Scaling
D.Virtual Private Cloud

121) Which of the following statement about Direct Connect is incorrect?


A.Direct Connect is a high-speed, low-latency, stable, and secure dedicated network
connection that connects user's local data center to a VPC on a cloud.
B.Direct Connect uses the Internet tunneling technology on the public network.
C.To create a direct connection, users need to create a connection, a virtual gateway, and a
virtual interface.
D.Currently, only the yearly/monthly billing mode is supported.

B
122) To delete direct connection, you need to delete Virtual interface and the virtual GW bound
with the virtual interface first
A. True
B. False

123) Can I access multiple VPCs using a direct connection?


A. True
B. False

124) Direct Connect enables a user to set up a dedicated network connection between a local
data center and the public cloud. Currently, which of the following connection type is supported
by Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN

125) In Route Mode, Static Route & BGP are supported?


A. True
B. False

126) To unsubscribe an operations connection, you need to delete the hosted connection
depends on it, and then delete the virtual gateway and virtual interface associated with it.
A. True
B. False

127) In Huawei Cloud VPN, only IPsec is supported?


A. True
B. False

128) Direct Connect supports only duration based (Yearly/Monthly) billing mode?
A. True
B. False
A

129) Huawei Cloud VPN uses pay-per-use pricing?


A. True
B. False

130) Select incorrect related to VPN GW connection:


A. In VPN, local GW is HUAWEI CLOUD IP address
B. In VPN, Remote GW is the public IP address of the VPN connection in your DC
C. In VPN, Local Subnet specifies the VPC subnets that need to communicate with your DC
D. In VPN, Remote Subnet specifies the subnets of your DC

131) Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both

132) Which of the following policies must be consistent between the local and remote sides of a
VPN that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec

CD

133) Can VPN gateway have multiple connections?


A. True
B. False

134) Does the IPsec VPN Support Automatic Negotiation?


A. True
B. False
A

135) What are customer requirements for cloud security?


A.CSA Top Threats
B.National legal compliance requirements
C.Service continuity
D.Data confidentiality

All

136) Which of the following are CSA TOP threats?


A. Account hijacking
B. Malicious internal personnel
C. Data leakage and loss
D. Abuse and malicious use of cloud services
E. Insufficient management of identity, credentials, and access
F. Insecure ports and APIs

All

137) Data Security includes:


A. DEW (Data Encryption Workshop)
B. HSS (Host Security Service)
C. CGS (Container Guard Service)
D. DBSS (Database Security Service)

AD

138) Which of the following statements about AAD is incorrect?


A. AAD does not support high-defense IP address access for multiple lines.
B. The Anti-DDoS cluster provides Layer 4 DDoS attack cleansing and works with GameCC
for attack blocking.
C. The WAF cluster provides DDoS attack cleansing and web CC defense on Layer 7.
D. AAD supports various cloud services.

139) With data security as its core, HUAWEI CLOUD builds a series of security services to meet
the particular needs. Security services include:
A. Data Security
B. Host Security
C. Application Security
D. Network Security

All

140) Which of the following security services can be used to protect websites?
A. WAF
B. VSS
C. SCM
D. Anti-DDoS

All

141) What are the basic functions of HSS?


A. Asset management
B. Vulnerability management
C. Baseline inspection
D. Intrusion detection

All

142) Which of the following statements about HTTPS site protection is incorrect?
A. When an HTTPS service is released to users, the HTTPS certificate needs to be uploaded
for using WAF.
B. No matter whether the original website server provides HTTPS or HTTP services, users
can have HTTPS services when using WAF.
C. The basic edition does not support HTTPS protection.
D. A domain name can choose to use either HTTP or HTTPS protocols only.

143) Which of the following problems can WAF solve?


A. The service server of an e-commerce website cannot respond to normal requests because its order
interface is overly invoked.
B. Numerous exclusive and beautiful pictures on a website are crawled by competitors in batches.
C. A website faces threats such as SQL and command code injection.
D. The website server is infected with viruses and CPU usage remains high.

ABC

144) Which of the following scenarios can WAF apply to?


A. The official website of a university deployed on the education portal
B. An enterprise portal in a self-deployed data center
C. A testing website deployed in a LAN
D. An open website deployed on the platforms of other cloud vendors

ABD

145) Which of the following is NOT a capability of Web Application Firewall (WAF)?
A. Anti-SQL injection
B. Anti-Webshell uploading
C. Anti-leeching
D. Anti-traffic attack

146) WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False

147) Which of the following problems can VSS solve?


A. Help tenants detect web vulnerabilities.
B. Help users detect weak passwords of the host.
C. Guide tenants in fixing the root cause of security vulnerabilities.
D. Help tenants repair or intercept vulnerabilities.

ABC

148) Which of the following statements about VSS is incorrect?


A. VSS is installation and maintenance free, requiring no extra labor cost. The service is
offered in the basic (free of charge) and professional (additional fees) editions to meet the
requirements of users.
B. VSS is easy to use and can be enabled with one click.
C. VSS is able to dynamically adjust the scanning frequency to ensure service availability.
D. Users need to manually upgrade the vulnerability library before scanning to improve
scanning accuracy.

149) Which of the following statements about VSS is incorrect?


A. VSS has no industry restrictions and can be widely applied in industries such as finance,
government, and transportation.
B. Users should have obtained a HUAWEI CLOUD account before using VSS.
C. If a tenant's web site or applications can be accessed through the public network, VSS is
available.
D. The tenant needs to deploy services on VMs of HUAWEI CLOUD.

150) Which of the following domain name types is *.huaweicloud.com?


A. Single domain name
B. Wildcard domain name
C. Multiple domain names
B

151) What are the challenges of defending against DDoS attacks?


A. Limited performance of the protection device
B. Insufficient service capabilities
C. Low Internet bandwidth

All

152) Which of the following protocols does AAD support?


A. TCP
B. UDP
C. HTTPS
D. HTTP

All

153) Which of the following service is a data security service?


A. Host Intrusion Detection (HID)
B. Host Vulnerability Detection (HVD)
C. Key Management Service (KMS)
D. SSL/TLS Certificate Service (SCS)

154) EVS Disks are associated with one Back-up Policy?


A. True
B. False

155) OBS can access through OBS Console or OBS Browser


A. True
B. False

156) A file system can be mounted to ECSs in different VPCs?


A. True
B. False

157) AS can only dynamically add or reduce ECS in Specified interval?


A. True
B. False

158) Anti DDOS can mitigate which kind of attack:


A. Volume attack
B. Brute force

159) Which of the following statements about KMS are correct?


A. The key and random numbers are generated by the certified third-party hardware security
module.
B. The master key of a user is stored redundantly online.
C. KMS is deeply integrated with computing and storage services such as ECS, EVS, IMS, OBS, EVS,
and VBS. KMS is used to manage the keys of these services.
D. The number of keys can be dynamically adjusted based on service development.

All

160) Which of the following statements about KMS are correct?


A. KMS provides views for users to uniformly manage encryption keys so that the usage of all keys
can be visualized.
B. Users can control the key and manage the lifecycle covering key generation, rotation, and
destruction.
C. Users can easily manage the encryption key used for encrypting data stored in your applications by
invoking APIs.
D. With the built-in auditing capability, KMS logs provide detailed information about access keys to
help you meet regulatory compliance.

All

161) Which of the following statements about Dedicated HSM are correct?
A. The key calculation of Dedicated HSM is performed on an exclusive encryption card. Services for
different tenants are isolated without affecting performance.
B. Dedicated HSM supports China-invented encryption algorithms such as SM1, SM2, SM3, and SM4.
C. Dedicated HSM is recommended for all data encryption requirements on the cloud to ensure
security.
D. Dedicated HSM is a hosting service that can automatically perform time-consuming tasks, such as
hardware presetting, software patching, high availability, and backup.

ABD
162) Which of the following problems does a website tenant not need to consider when selecting
a package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume

163) Which of the following are the advantages of SCM?


A. Improved website security
B. Optimized website image
C. Higher search engine rankings

All

164) Which of the following domain name types does SCM support?
A. Single domain name
B. Wildcard domain name
C. Multiple domain names

All

165) What layer attacks Anti DDOS can withstand?


A. Layer 4 to Layer 7

166) Which of the following technologies does SA use?


A. Big Data
B. Web Crawlers
C. Encryption
D. ID Authentication

AB

167) Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False

168) Server Monitoring includes:


A. Basic Monitoring
B. OS Monitoring
C. CPU Monitoring
D. Disk Monitoring
AB

169) Which rollup methods does Cloud Eye support ( )?


A. Max.
B. Min.
C. Avg.
D. Sum
E. Variance

All

170) Cloud Eye can be used to:


A. monitor the utilization of service resources
B. track the running status of cloud services
C. configure alarm rules and notifications
D. respond to resource changes

All

171) Which tool monitors RDS DB.


A. ECS
B. VPC
C. OBS
D.Cloud Eye

172) Which of the following DB instances can RDS create? (O)


A. MySQL
B. SQL Server
C. MongoDB
D. PostgreSQL

ABD

173) The Key Features of RDS include:


A. High Availability
B. Backup and Restoration
C. DB Instance Monitoring
D. High security

ABC
174) RDS does not support data backup or restoration.
A. True
B. False

175) To retrieve Alarm History for 7 days. What Service you will use? (Single Choice)
A. SMN
B. CTS
C. ECS
D. RDS

176) Where to restore RDS instance from?


A. Xxx
B. ECS
C. VPC
D. OBS

177) HUAWEI CLOUD EI provides 45 services and 142 functions.


A. True
B. False

178) What are the advantages of HUAWEI CLOUD EI service ModelArts? (O)
A. Readily acquired
B. Fast training
C. Fast launch
D. One-stop

All

179) Which of the following Huawei Cloud EI APIs are vision related?
A. Face Recognition
B. Image Recognition
C. Content Moderation
D. Image search

All
180) DWS is the Enterprise - Class Data Warehouse.
A. True
B. False

181) Which EI service can implement large scale data analysis and query?
A. DLF
B. DWS
C. DIS
D. GES

182) Which of the following is NOT a security feature on API Gateway?


A. App authentication
B. Request throttling
C. IP address blacklist
D. Security sandbox

183) What SDK Languages Does API Gateway Support?


A. Java
B. Go
C. Python
D. C#
E. JavaScript
F. PHP
G. C
H. C++
I. Android
J. Delphi

All except J

184) You can enable API Gateway and create and manage APIs for free? You pay only for
the number of API calls received and the amount of data transmitted.
A. True
B. False

185) Do I Need to Publish an API Again After Modification?


A. True
B. False
A

186) By default, an API can be called up to 200 times per second?


A. True
B. False

187) ECS Login Modes?


A. Key pair
B. OTP Token
C. Fingerprint
D. Password

AD

188) What are Auto Scaling Policy Actions? (multiple choice)


A. Modify
B. Replicate
C. Enable
D. Delete

ACD

189) AS Policies that dynamically expand? (single Choice)


A. Random
B. Alarm
C. Schedule
D. Periodic

190) Which are VPC access control functions?


A. Security group
B. Network access list
C. Fingerprint
D. Password

AB

191) The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason?
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed

192) Cloud computing is a model that enables users to obtain resources (such as computing,
storage, network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers.
A. True
B. False

193) Which of the following statements about hybrid clouds is incorrect?


A.They centrally manage enterprises' resources on both public and private clouds.
B.They allow service applications to move seamlessly between public and private clouds.
C.They leverage both public and private cloud advantages to optimize resource configuration.
D.Applications can be deployed only on the public cloud.

194) How long does it take to obtain an ECS? (S)


A. Several seconds
B. Several minutes
C. Several hours
D. Several days

195) Traffic from internet will hit to the which device first?
A. Firewall
B. NGIX
C. ELB

196) If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new
disk?
A. True
B. False

B
197) Which scaling action is not performed on Bandwidth scalling policy?
A. Replicate
B. Add
C. Reduce
D. Set to

198) Which component is not deleted automatically when DB instance is deleted?


A. manual backup

199) You can change CPU or memory of a DB instance


A. True
B. False

200) The management console can be used without logging in.


A. True
B. False

201) After creating ECS, bandwidth cannot be changed.


A. True
B. False

202) When creating ECS you can use File injection function to initialize it.
A. True
B. False

203) The server does not need to be stopped before restoring EVS disk data using VBS backup.
A. True
B. False

204) How are regions divided?


A. Based on AZ
B. Geographic location and Network Latency
C. Cluster servers

205) Logging function of a bucket – where can log file be stored?


A. Any bucket
B. Enable logging
C. The bucket on which logging is enabled
D. All other buckets except the one which is logging

206) When compared with shared file systems what are the advantages of SFS:
A. Robust reliability
B. Seamless integration
C. File sharing
D. Easy operations, high cost- (wrong, should be low)

ABC

207) Primary DB instance can replicate data to secondary DB Instances in :


A. Asynchronous
B. Semi-synchronous
C. Synchronous

AB

208) What is ECS lifecycle?


A. Start
B. Stop
C. Restart
D. Delete

All

209) which of the following is not included in devcloud:


A. Data backup
B. Project Management
C. Code Check
D. Cloud build

A
210) Bucket A has been configured a policy not to allow any users to access it. Object B is inside
Bucket A. Object B has an ACL that allows any users to access it. Therefore, object B can be
access anonymously by any user.
A. True
B. False

211) “Faster Inclusive AI Development”?


A. DLS
B. MLS
C. ModelArts
D. GES

212) API lifecycle?


A. Create
B. Publish
C. Authorize
D. Remove

All

213) The NAT Gateway service is charged.


A. True
B. False

214) NAT Gateway supports smooth upgrade.


A. True
B. False

215) In one VPC, only one NAT gateway can be created.


A. True
B. False

216) After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False
B

217) NAT Gateway supports disaster recovery across AZs.


A. True
B. False

218) Which of the following functions of NAT Gateway can be used to enable ECSs to share an
EIP to access the Internet?
A. SNAT
B. DNAT

219) Which of the following statements about NAT Gateway is incorrect?


A. An SNAT server is more stable than the NAT Gateway service.
B. NAT Gateway supports security isolation.
C. NAT Gateway supports up to 1 million concurrent SNAT connections.
D. NAT Gateway supports up to 200 DNAT rules.

220) Which of the following statements about NAT Gateway is incorrect?


A. After the number of SNAT connections reaches the upper limit, new sessions cannot be
created.
B. Cloud Eye allows you to view the number of SNAT connections.
C. Cloud Eye allows you to view the IP addresses of top 10 VMs that occupy the largest
number of SNAT connections.
D. Cloud Eye does not support setting alarms for the number of connections.

221) Which of the following statements about NAT Gateway is correct?


A. DNAT provides services for external networks.
B. DNAT also has the concept of the number of connections.
C. DNAT supports TCP, UDP, and ICMP port mapping.
D. DNAT does not support mapping all ports.

222) Which of the following is not the component of Big Data Platform?
A. Map Reduce
B. Openstack
C. HDFS
D. Yarn

223) An ECS must be stopped before it is used to create an image?


A. True
B. False

224) An ECS can be attached to multiple EVS disks?


A. True
B. False

225) ELB provides only three types of load balancing algorithms?


A. True
B. False

226) IMS provides comprehensive and flexible self-service image management capabilities.
Users can create a private image and use it to create an ECS or multiple ECSs?
A. True
B. False

227) All Huawei Cloud services can be viewed on the management console?
A. True
B. False

228) Which of the following component can be used to set an access control whitelist to allow
specific IP addresses to access load balancers?
A. Listener
B. Backend Server
C. Backend Server Group
D. Health Check
A

229) Which of the following is not an advantage of RDS compared with self-built databases?
A. Instant Availability
B. Easy Management
C. Elastic Scaling
D. Self-Installed Databases

230) To which of the following scenario does OCR apply?


A. Image Processing
B. Image Recognition
C. Character Recognition
D. Speech Recognition

231) Which of the following can isolate RDS network resources from other services?
A. ECS
B. VPC
C. CES
D. OBS

232) Which of the following operations is not supported by EVS?


A. Attaching/Detaching
B. Capacity Expansion
C. Capacity Reduction
D. Backup

233) Which of the following are advantages of IAM?


A. Permission Management
B. Security Control
C. Agency management
D. Federated ID Authentication

All

234) Which of the following are advantages of Cloud Eye?


A. Automatic Provisioning
B. Real Time & Reliable Monitoring
C. Visualized Monitoring
D. Multiple Notification Types

All

235) A file system can be mounted to:


A. A Linux ECS
B. A Windows ECS
C. A Bare Metal Server
D. Dedicated Computing Cluster

AB

236) Which is true about instance removal:


-If number of instances is greater than in AS group, some are removed
-When removed, the balance between AZs is not taken into account
-
-

237) Does OBS support batch upload?

238) When EVS disk is detached; data will be lost?

239) After the subnet is created; CIDR block can be changed?

240) SFS can be mounted to Windows ECS?

241) CCE Auto Scaling Models?

242) What are disadvantages of building your own Database?


A. Out of the Box
B. Stable
C. Easy Manageability
D. High Investment

243) How many AS configurations can be set for AS Group?

244) What is required by a workspace user to access USB connected to a terminal?


A. Clipboard Redirection
B. USB Port Redirection
C. Printer Redirection
D. User cannot access

245) Incorrect about KMS?


A. manage cloud platform & tenants’ keys
B. uses HSM
C. uses multi-layer key protection
D. can be integrated with apps

246) How to make an app created in a container accessible externally?


A. Deploy more than 2 nodes in container cluster
B. Assign 2 GB memory to each node
C. Publish app as a service
D. Bind app to ELB

247) What is not a capability of Anti DDOS?


A. Defend against DDOS Attacks
B. Monitor Individual IP
C. Provide Interception reports for individual IP
D. Regularly scan ECS for vulnerabilities

248) If 10GE is used to connect using Direct Connect? What port is it?
A. Electrical
B. Optical
C. Ethernet
D. Serial

249) What is required on Workspace to support 3D applications?


A. CPU with Hardware Virtualization
B. GPU
C. iNIC
D. SSD

250) For Monitoring Metrics Data, the retention policy differs by roll up period. For how many
days the data is retained with one hour roll up period?
A. 10
B. 20
C. 155
D. 300

251) What is not an objective of cloud computing security services?


A. User Security
B. Cloud Platform Security
C. Data Security
D. Service Security

252) What are the issues with conventional PCs?


A. High Cost
B. Poor Video Playback
C. Poor Software Compatibility
D. PC User behavior cant be monitored

253) Not the advantage of Cloud Eye?


Can monitor 3rd party non-Huawei Cloud Services

254) Which are not the characteristics of RDS?


A. High DBA Cost
B. no need to purchase Hardware & software
C. Only need RDS Rental Fee
D. Low DBA Skill Requirment

255) Procedures to use CCE?

256) What are the pre requisites to create a container cluster?


A. ECS has been created.
B. VPC has been created
C. ELB has been created
D. AK/SK file has been uploaded to CCE
257) Stages of Lifecycle of RDS DB Instance?

258) Important protocols in IPSec framework?


A. IP B. IKE C. AH D. ESP

259) Which peripheral redirections are supported by workstation?


A. Printer
B. USB
C. File
D. Clipboard

260) Cloud Eye notification methods?

261) Capabilities of Host Intrusion Detection?


A. Delete Brute force crack attack
B. Warning of remote login attempts
C. Detect weak passwords
D. Detect permission of database process
E. Detect web backdoors

262) What are scenarios for image replication?


A. Replicate unencrypted image to unencrypted image
B. Replicate unencrypted image to encrypted image
C. Replicate encrypted image to unencrypted image
D. Replicate encrypted image to encrypted image
What are basic characteristics of cloud computing? (O)
A. On-demand self-service
B. broad network access methods
C. Resource pooling
D. fast and scalable
E. Measurable services

Which of the following is generally used to provide application development and running
environments? (AJ)
A. IaaS
B. PaaS
C. SaaS

Of Huaweicloud's service list page, which of the following service does NOT belong to the
Computing category? (O)
A. ECS
B. BMS
C. IMS
D. SFS

An AZ contains one or multiple physical data centers. It has independent cooling, fire
extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network,
storage, and other resources are logically divided into multiple clusters.
A. True
B. False

GPU-optimized ECSs can be applied to the following scenarios: cloud-based desktops, graphics
rendering and engineering drawing run in virtualization environment. (S)
A. True
B. False

Which of the following are OBS application scenarios?


A. Massive storage resource pool
B. Static web hosting
C. Big data storage
D. Backup
E. Archiving

Which of the following components are included in an ECS? (O)


A. vCPUs
B. Memory
C. Image
D. EVS disk

ECSs can be charged in yearly/monthly or metered mode.


A. True
B. False

Which of the following service is used by an ECS to store data? (O)


A. AS
B. IMS
C. EVS
D. DeC
Which operations are required to use ECS to create a Windows image? (O)
A. Configure the Windows ECS.
B. Install Cloudbase-Init.
C. Create a Windows private image.
D. Query and cleanup network rule files.

EVS provides the scalable, virtual block storage service, and the backend of EVS is based on a
distributed architecture. (S)
A. True
B. False

Which of the following methods or tools can be used to access OBS? (O)
A. OBS Console
B. OBS Browser
C. obscmd
D. APIs and SDKs

Which of the following are the advantages of the VPC service?


A. Security isolation
B. Flexible deployment
C. Dynamic BGP
D. Hybrid cloud support

Which of the following operation incurs charges? (AJ)


A. Create an EIP
B. Create a subnet
C. Create a VPC
D. Create a security group

Can VPN gateway have multiple connections


True
false

Can I access multiple VPCs using a direct connection?


A. True
B. False

Which of the following is NOT a component of the ELB service?


A. Firewall
B. Load Balancer
C. Listener
D. Instance (VM or application container)

Direct Connect enables a user to set up a dedicated network connection between a local data
center and the public cloud. Currently, which of the following connection type is supported by
Direct Connect? (S)
A. MPLSVPN
B. IPSecVPN
C. SSL VPN
D. OSPF VPN

Which of the following service is a data security service? (O)


A. Host Intrusion Detection (HID)
B. Host Vulnerability Detection (HVD)
C. Key Management Service (KMS)
D. SSL/TLS Certificate Service (SCS)
Data Security includes:
A. DEW
B. HSS
C. CGS
D. DBSS

Which of the following is NOT a capability of Web Application Firewall (WAF)?


A. Anti-SQL injection
B. Anti-Webshell uploading
C. Anti-leeching
D. Anti-traffic attack

What are the advantages of HUAWEI CLOUD EI service ModelArts? (O)


A. Readily acquired
B. Fast training
C. Fast launch
D. One-stop

Which of the following is NOT a security feature on API Gateway?


A. App authentication
B. Request throttling
C. IP address blacklist
D. Security sandbox

Which of the following DB instances can RDS create? (O)


A. MySQL
B. SQL Server
C. MongoDB
D. PostgreSQL

The Key Features of RDS include:


A. High Availability
B. Backup and Restoration
C. DB Instance Monitoring
D. High security

The traditional IT infrastructure architecture cannot easily support enterprise operations, and
architecture transformation is required. Which of the following is not a main reason (S)
A. Slow service rollout and complex lifecycle management
B. High TCO
A. Key application performance is limited by I/O bottlenecks.
D. Slow network speed

Cloud computing is a model that enables users to obtain resources (such as computing, storage,
network, applications, and services) from a shared, configurable resource pool anytime,
anywhere. Resources can be quickly supplied and released, minimizing management workload
and interactions among service providers. (M)
A. True
B. False

Which of the following statements about hybrid clouds is incorrect?


A.They centrally manage enterprises' resources on both public and private clouds.
B.They allow service applications to move seamlessly between public and private clouds.
C.They leverage both public and private cloud advantages to optimize resource configuration.
D.Applications can be deployed only on the public cloud.

How long does it take to obtain an ECS? (S)


A. Several seconds
B. Several minutes
C. Several hours
D. Several days

What is the type of the image converted based on an existing ECS? (aj)
A. Public image
B. Private image
C. Shared image
D. EulerOS image

Which of the following policies does AS support? (O)


A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy

Elastic Load Balance (ELB) can work independently.


True
False

AS must work with Elastic Load Balance (ELB).


A. True
B. False

VBS does not support backing up EVS disks in batches. (O)


A. True
B. False

On which of the following services does VBS depend? (M)


A. Elastic Cloud Server
B. Elastic Volume Service
C. Object Storage Service
D. Image Management Service

( ) records operations of VBS resources, facilitating query, audit, and backtracking) (AJ)
A. Cloud Trace Service
B. Cloud Eye
C. Elastic Volume Service
D. Object Storage Service.

An EVS disk can be backed up only when it is in the ( ) state. (M)


A. Available
B. In-use
C. Error
D. Deletion failed

VBS backs up EVS disks and uses the backups to restore original EVS disks, protecting user
data accuracy and security. (AJ)
A. True
B. False

Does VBS Support Cross-Region Backup and Restoration? (S)


A. True
B. False

VBS provides the data backup function for EVS disks. The created data backups can be used to
create EVS disks. (S)
A. True
B. False

Which of the following functions are supported by ELB?


A. Creating a load balancer
B. Deleting a load balancer
C. Querying a load balancer
D. Adjusting the bandwidth

Which of the following items is not required for adding a listener to a load balancer?
A.A frontend protocol and port
B.A VPC
C.A certificate
D.A load balancing algorithm

API lifecycle? (AJ)


Create -publish- authorize -remove

Which of the following protocols requires certificates? (S)


A.TCP
B.UDP
C.HTTP
D.HTTPS

ELB supports servers running different OSs.


A. True
B. False

Which of the following protocols does ELB support?


A.TCP
B.UDP
C.HTTP
D.HTTPS

Which of the following services can be used to view real-time monitoring data of load balancers
and listeners? (M)
A.Cloud Container Engine
B.Cloud Eye
C.Auto Scaling
D.Virtual Private Cloud

Which of the following statement about Direct Connect is incorrect?


A.Direct Connect is a high-speed, low-latency, stable, and secure dedicated network
connection that connects user's local data center to a VPC on a cloud.
B.Direct Connect uses the Internet tunneling technology on the public network.
C.To create a direct connection, users need to create a connection, a virtual gateway, and a
virtual interface.
D.Currently, only the yearly/monthly billing mode is supported.

What are customer requirements for cloud security? (O)


A.CSA Top Threats
B.National legal compliance requirements
C.Service continuity
D.Data confidentiality

Anti DDOS can mitigate which kind of attack:


Volume attack
Brute force

WAF detects abnormal requests to prevent network intrusions such as webpage tampering,
information leak, and Trojan horse implantation.
A. True
B. False

Cloud Eye is a multi-dimensional resource monitoring platform. You can use Cloud Eye to
monitor the utilization of service resources, track the running status of cloud services, configure
alarm rules and notifications, and quickly respond to resource changes.
A. True
B. False
Server Monitoring includes:
A. Basic Monitoring
B. OS Monitoring
C. CPU Monitoring
D. Disk Monitoring

Which of the Following Compute Services Does HUAWEI CLOUD Provide? (O)
A. Elastic Cloud Server (ECS)
B. Auto Scaling (AS)
C. Image Management Service (IMS)
D. Elastic Volume Service (EVS)

How many types of login users does HUAWEI CLOUD support?


A. 1
B. 2
C. 3
D. 4

Is an ECS a physical server?


A. Yes
B. No

What is used by an ECS to store data? (aj)


A. Auto Scaling
B. Elastic Volume Service
C. Cloud Container Engine
D. Cloud Eye

Which of the following methods does AS use to expand resources? (S)


A. Dynamically expanding resources
B. Expanding resources as planned
C. Manually expanding resources
D. Automatically expanding resources

AS supports the following instance removal policies:


A. Oldest instances created based on the oldest configuration
B. Newest instances created based on the oldest configuration
C. Oldest instances
D. Newest instances

Which of the following policies does AS support? (O)


A. Alarm policies
B. Scheduled policies
C. Periodic policies
D. Monitoring policies

Before creating a data disk image from a data disk, ensure that the ECS has a system disk and
the data disk is not empty.
A. True
B. False

What image types does IMS support? (O)


A. Public image
B. Private image
C. Encrypted image
D. Shared image

Private images can be classified into:


A. System disk image
B. Data disk image
C. Full-ECS image
D. Snapshot

Which of the followings are EVS disk types? (O)


A. Ultra-high I/O
B. High I/O
C. Common I/O
D. Optimized I/O
E. Low Latency optimized I/O

How many servers can a shared EVS disk be attached to at most?


A. 5
B. 7
C. 8
D. 16

EVS can be attached to: (AJ)


A. OBS
B. ECS
C. BMS
D. VPC

VBD EVS disks support only basic SCSI read/write commands.


A. True
B. False

Access requests to OBS can be controlled by,


A. ACLs
B. Bucket policies
C. User signature authentication ?
D. Server-side encryption

Which of the following are the application scenarios of SFS?


A. Media processing
B. Log management ?
C. Content management and web directories
D. High-performance computing (HPC)

Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?


A. Customizing CIDR blocks
B. Customizing access control policies
C. Accessing the Internet using EIPs
D. Connecting a local data center using a VPN or Direct Connect connection

Which of the Following networks could be VPC subnet. (S)


/24
/24
/24
/23 ALL PRIVATE SUBNETS

HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume Backup Service
(VBS) to protect your data against:
A. viruses
B. unintentional deletions
C. software faults
D. hardware faults

Which of the following load balancing algorithms are provided by ELB? (AJ)
A. A. Weighted round robin
B. B. Weighted least connections
C. C. Source IP hash
D. D. Encryption algorithm
E. Weighted

Which of the following security services can be used to protect websites?


A. WAF
B. VSS
C. SCM
D. Anti-DDoS

Which rollup methods does Cloud Eye support ( )?


A. Max.
B. Min.
C. Avg.
D. Sum
E. Variance

Which of the following are deployment models of cloud computing?


A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community/Industry cloud
What is the data durability of OBS?
A. 10 nines (99.99999999%)
B. 11 nines (99.999999999%)
C. 12 nines (99.9999999999%)

What is the basic storage unit in OBS?


A. File
B. Block
C. Object
D. Bucket

Which of the following operations on buckets is not available in OBS?


A. Creation
B. Formatting
C. Modification
D. Deletion

If you download an object of the Standard storage class through a HUAWEI CLOUD ECS server,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Storage capacity

If you download an object of the Archive storage class to your local computer over the Internet,
which one of the following items is billed?
A. Traffic
B. Request
C. Data restoration
D. Traffic+Request+Data restoration

If a customer has some data to store and the data will be downloaded for only 10 times in a year,
which of the following storage class is recommended?
A. Standard storage class
B. Infrequent Access storage class
C. Archive storage class
D. Block storage

Which of the following statements about the data in the Archive storage class is correct?
A. Data in the Archive storage class can be directly downloaded by calling the API.
B. Data in the Archived storage class can be accessed directly.
C. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Standard storage class.
D. If you want to access data in the Archive storage class, you need to restore the data first.
Restored data is in the Infrequent Access storage class.

Which of the following statements about lifecycle rules is correct?


A. Lifecycle rules support transition between storage classes by hour.
B. Lifecycle rules for objects of historical versions take effect only when versioning is enabled
for the bucket.
C. Lifecycle rules for objects of historical versions cannot be configured if versioning is not
enabled for the bucket.

Which of the following items cannot be configured when creating a bucket?


A. Region where bucket resides
B. Storage class of a bucket
C. Bucket policy
D. Static website hosting

Which of the following items cannot be configured when uploading an object?


A. File path
B. Storage class of the object
C. KMS encryption
D. File size

Which storage classes does OBS offer? (O)


A. Archive storage class
B. Backup storage class
C. Infrequent Access storage class
D. Standard storage class

The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable,
and manageable virtual networks, improving the cloud resource security and simplifying network
deployment. (S)
A. True
B. False

Which tool monitors RDS DB.


ECS
VPC
OBS
And correct one

Which of the following cannot be configured in a VPC? (S)


A. Subnet
B. Security group
C. Elastic IP address
D. Bandwidth
C. Load balancing

Which of the following must be configured to enable an ECS without a bound EIP to access the
Internet through an ECS with a bound EIP?
A. Route table
B. Shared bandwidth
C. Load balancing

How many network interface cards (NICs) does an ECS functioning as a SNAT server require?
A. 1
B. 2
C. 3

Which of the following correctly describes the default security group rule?
A. All outbound traffic is allowed, and ECSs associated with the same security group can
access each other.
B. All inbound traffic is allowed, and ECSs associated with the same security group can
access each other.
C. All outbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
D. All inbound traffic is allowed, and ECSs associated with the same security group cannot
access each other.
Which of the following can enable an ECS in a VPC to communicate with a host in a private data
center?
A. Internet connection
B. VPN
C. VPC peering connection

To delete direct connection you need to delete Virtual GW and virtual interfaces first
True
False

Select incorrect related to VPN GW connection:


In VPN local GW is HUAWEI CLOUD IP address

Which of the following CIDR blocks is not supported by the VPC service? (S)
A. 10.0.0.0 – 10.255.255.255
B. 172.16.0.0 – 172.31.255.255
C. 192.168.0.0 – 192.168.255.255
D. 255.255.0.0 – 255.255.255.255

Which of the following is optional when you create a subnet?


A. Name
B. CIDR block
C. Gateway
D. Tag

If you have high requirements on network stability and availability, which of the following EIP
types must you choose:
A. Static BGP
B. Dynamic BGP

Which of the following policies must be consistent between the local and remote sides of a VPN
that connects HUAWEI CLOUD and a local data center?
A. SSL
B. IPv6
C. IKE
D. IPSec
SFS is charged in pay-per-use or monthly/yearly flat fee mode.
A. True
B. False

SFS includes the SFS and SFS Turbo products.


A. True
B. False

SFS supports the EXT4 and NTFS protocols.


A. True
B. False

SFS can be connected to the AD domain controller for permission control.


A. True
B. False

SFS allows ECSs in different VPCs to access the same file system.
A. True
B. False

What is the maximum size of a single file supported by SFS?


A. 32 TB
B. 64 TB
C. 128 TB
D. 240 TB

What is the maximum bandwidth supported by SFS?


A. 2 GB/s
B. 5 GB/s
C. 10 GB/s
D. 20 GB/s

Which of the following file protocol is supported by SFS Turbo? (O)


A. NFS v3
B. NFS v4
C. SMB 2.0/2.1/3.0
D. EXT4

What is the minimum latency of SFS Turbo?


A. 10 ms
B. 5 ms
C. 2 ms
D. 1 ms

What is the maximum IOPS supported by SFS Turbo?


A. 5,000
B. 10,000
C. 20,000
D. 30,000

Which of the following protocols are supported by SFS?


A. NFS v3
B. NFS v4
C. FTP
D. EXT4

Which of the following are mainstream storage types in the industry?


A. Block storage
B. File storage
C. Object storage
D. Backup storage

Which of the following are HUAWEI CLOUD file storage services?


A. SFS
B. SFS Turbo
C. SFS Plus
D. All of the above

Which scenarios does SFS suit?


A. HPC
B. Media
C. File sharing
D. Game

Which scenarios does SFS Turbo suit?


A. HPC
B. Media
C. High-performance websites
D. Software development

Which of the following statements about AAD is incorrect?


A. AAD does not support high-defense IP address access for multiple lines.
B. The Anti-DDoS cluster provides Layer 4 DDoS attack cleansing and works with GameCC
for attack blocking.
C. The WAF cluster provides DDoS attack cleansing and web CC defense on Layer 7.
D. AAD supports various cloud services.

What is the basic capability of HSS?


A. Risk analysis and prevention capability
B. Attack defense capability
C. Intrusion detection capability

Which of the following statements about HTTPS site protection is incorrect?


A. When an HTTPS service is released to users, the HTTPS certificate needs to be uploaded
for using WAF.
B. No matter whether the original website server provides HTTPS or HTTP services, users
can have HTTPS services when using WAF.
C. The basic edition does not support HTTPS protection.
D. A domain name can choose to use either HTTP or HTTPS protocols only.

Which of the following problems does a website tenant not need to consider when selecting a
package or edition?
A. Threat types concerning the service website
B. Web service framework and the system version of the server
C. Number of domain names and subdomain names that need protection
D. Service traffic volume

Which of the following statements about VSS is incorrect?


A. VSS is installation and maintenance free, requiring no extra labor cost. The service is
offered in the basic (free of charge) and professional (additional fees) editions to meet the
requirements of users.
B. VSS is easy to use and can be enabled with one click.
C. VSS is able to dynamically adjust the scanning frequency to ensure service availability.
D. Users need to manually upgrade the vulnerability library before scanning to improve
scanning accuracy.

Which of the following statements about VSS is incorrect?


A. VSS has no industry restrictions and can be widely applied in industries such as finance,
government, and transportation.
B. Users should have obtained a HUAWEI CLOUD account before using VSS.
C. If a tenant's web site or applications can be accessed through the public network, VSS is
available.
D. The tenant needs to deploy services on VMs of HUAWEI CLOUD.

Which of the following domain name types is *.huaweicloud.com?


A. Single domain name
B. Wildcard domain name
C. Multiple domain names

Which of the following are CSA TOP threats? (O)


A. Account hijacking
B. Malicious internal personnel
C. Data leakage and loss
D. Abuse and malicious use of cloud services
E. Insufficient management of identity, credentials, and access
F. Insecure ports and APIs

What are the challenges of defending against DDoS attacks?


A. Limited performance of the protection device
B. Insufficient service capabilities
C. Low Internet bandwidth

Which of the following protocols does AAD support?


A. TCP
B. UDP
C. HTTPS
D. HTTP

What are the basic functions of HSS? (S)


A. Asset management
B. Vulnerability management
C. Baseline inspection
D. Intrusion detection

What are the application scenarios of HSS?


A. Security risk management
B. Intrusion detection
C. Security compliance

Which of the following problems can WAF solve?


A. The service server of an e-commerce website cannot respond to normal requests because its order
interface is overly invoked.
B. Numerous exclusive and beautiful pictures on a website are crawled by competitors in batches.
C. A website faces threats such as SQL and command code injection.
D. The website server is infected with viruses and CPU usage remains high.

Which of the following scenarios can WAF apply to?


A. The official website of a university deployed on the education portal
B. An enterprise portal in a self-deployed data center
C. A testing website deployed in a LAN
D. An open website deployed on the platforms of other cloud vendors

Which of the following problems can VSS solve?


A. Help tenants detect web vulnerabilities.
B. Help users detect weak passwords of the host.
C. Guide tenants in fixing the root cause of security vulnerabilities.
D. Help tenants repair or intercept vulnerabilities.

Which of the following statements about KMS are correct?


A. The key and random numbers are generated by the certified third-party hardware security
module.
B. The master key of a user is stored redundantly online.
C. KMS is deeply integrated with computing and storage services such as ECS, EVS, IMS, OBS, EVS,
and VBS. KMS is used to manage the keys of these services.
D. The number of keys can be dynamically adjusted based on service development.
Which of the following statements about KMS are correct?
A. KMS provides views for users to uniformly manage encryption keys so that the usage of all keys
can be visualized.
B. Users can control the key and manage the lifecycle covering key generation, rotation, and
destruction.
C. Users can easily manage the encryption key used for encrypting data stored in your applications by
invoking APIs.
D. With the built-in auditing capability, KMS logs provide detailed information about access keys to
help you meet regulatory compliance.

Which of the following statements about Dedicated HSM are correct?


A. The key calculation of Dedicated HSM is performed on an exclusive encryption card. Services for
different tenants are isolated without affecting performance.
B. Dedicated HSM supports China-invented encryption algorithms such as SM1, SM2, SM3, and SM4.
C. Dedicated HSM is recommended for all data encryption requirements on the cloud to ensure
security.
D. Dedicated HSM is a hosting service that can automatically perform time-consuming tasks, such as
hardware presetting, software patching, high availability, and backup.

Which of the following are the advantages of SCM?


A. Improved website security
B. Optimized website image
C. Higher search engine rankings

Which of the following domain name types does SCM support?


A. Single domain name
B. Wildcard domain name
C. Multiple domain names

Auto Scaling (AS) is charged.


A. True
B. False

AS can work with Elastic Load Balance (ELB), which automatically distributes access traffic
across ECS instances in the AS group through the listener, improving system availability.
A. True
B. False

Alarm policies support system monitoring and custom monitoring.


A. True
B. False

An instance added to an AS group by an AS policy cannot be manually removed from the group.
A. True
B. False

AS can automatically adjust ECS and bandwidth resources. (O)


A. True
B. False

Which of the following policies can be configured to increase the number of instances in an AS
group at a predetermined time each week? (M)
A. Alarm policy
B. Scheduled policy
C. Periodic policy
D. All of the above

Which of the following statements about AS is incorrect?


A. AS can automatically adjust the number of instances in an AS group based on preset
policies.
B. AS can perform health checks on instances in an AS group.
C. Instance protection can be enabled on specified instances in an AS group.
D. AS does not allow users to view the status of instances in an AS group.

Which of the following statements about scaling actions is incorrect? (M)


A. When the number of instances in an AS group is not the same as expected, a scaling
action is triggered.
B. After an AS group is disabled, changing the number of expected instances triggers a
scaling action.
C. When a trigger condition of an AS policy is met, a scaling action is triggered automatically.
D. Lifecycle hooks help users better manage scaling actions.

Which of the following statements about AS configuration is correct?


A. An AS configuration defines the specifications of ECSs to be added to an AS group.
B. An AS configuration that has been created can be modified as needed.
C. After an AS group is enabled, its AS configuration cannot be changed.
D. An unlimited number of AS configurations can be created.

How many types of policies does AS support?


A. 0
B. 1
C. 2
D. 3

Which of the following policies are supported by AS? (AJ)


A. Alarm policy
B. Scheduled policy
C. Periodic Policy
D. Random policy

How can instances be added to an AS group? (M)


A. By an AS policy
B. Manually
C. By a change to the number of expected instances
D. By AS configuration

Which operations can be performed on an AS policy?


A. Execute now
B. Modify
C. Enable
D. Delete
E. Disable

Which of the following services are associated with AS?


A. Cloud Eye
B. Virtual Private Cloud (VPC)
C. Elastic Load Balance (ELB)
D. Elastic Cloud Server (ECS)

Which of the following monitoring metrics are supported by the alarm policy?
A. CPU Usage
B. Inband Incoming Rate
C. Disk Read Requests
D. Memory Usage
E. Custom monitoring metrics

Which of the following are ECS types? (O)


A. Storage-optimized
B. Computing-accelerated
C. Computing-optimized
D. Memory-optimized
E. General computing

Which of the following are VPC features?


A. Secure isolation
B. Flexible deployment
C. Dynamic BGP
D. Hybrid deployment

Advantages of VPC are:


A. Secure and Reliable
B. Flexible Configuration
C. High-Speed Access
D. Interconnection??

Which operations are required for creating a Windows image using an ECS?
A. Configure the Windows ECS
B. Install Cloudbase-Init
C. Create a Windows private image
D. View and delete network rule files

The NAT Gateway service is charged.


A. True
B. False

NAT Gateway supports smooth upgrade.


A. True
B. False

In one VPC, only one NAT gateway can be created.


A. True
B. False

After a NAT gateway is used, the EIP assigned to the original ECS becomes invalid.
A. True
B. False

NAT Gateway supports disaster recovery across AZs.


A. True
B. False

Which of the following functions of NAT Gateway can be used to enable ECSs to share an EIP to
access the Internet?
A. SNAT
B. DNAT

Which of the following statements about NAT Gateway is incorrect?


A. An SNAT server is more stable than the NAT Gateway service.
B. NAT Gateway supports security isolation.
C. NAT Gateway supports up to 1 million concurrent SNAT connections.
D. NAT Gateway supports up to 200 DNAT rules.

Which of the following statements about NAT Gateway is incorrect?


A. After the number of SNAT connections reaches the upper limit, new sessions cannot be
created.
B. Cloud Eye allows you to view the number of SNAT connections.
C. Cloud Eye allows you to view the IP addresses of top 10 VMs that occupy the largest
number of SNAT connections.
D. Cloud Eye does not support setting alarms for the number of connections.

Which of the following statements about NAT Gateway is correct?


A. DNAT provides services for external networks.
B. DNAT also has the concept of the number of connections.
C. DNAT supports TCP, UDP, and ICMP port mapping.
D. DNAT does not support mapping all ports.

Which of the following features can be used together with the Direct Connect/VPN/Cloud
Connect?
A. SNAT
B. DNAT
C. Both

Pain Points of Current Enterprise IT Infrastructure includes: (M)


A. Slow Business Launch
B. Complicated Lifecycle Management
C. High TCO
D. I/O Bottleneck

RDS can restore backup


-true

Traffic from internet will hit to the which device first (AJ)

1. firewall
2. NGIX
3. ELB
4.

If EVS disk capacity is not sufficient then you need to dettach disk from ECS and add new disk.
True
False
Which scaling action is not performed on Bandwidth scalling policy

1. replicate

API Gateway supports SDKs of:


Java
Go
Python
C#
JavaScript
PHP
C
C++
Android
Delphi

What are AI app in vision


Face Recognition
Image Recognition
Content Moderation
Image search

Which component is not deleted automatically when DB instance is deleted


manual backup

You can change CPU or memory of a DB instance


True
false

WHICH IS NOT THE PART OF AI BIG DATA


Openstack

How are regions divided


-Based on AZ
-Geographic location and Network Latency
-Cluster servers

Which are a part of HUAWEI CLOUD ecosystem


-Marketplace
-Academy
-Partners
-Developers

The management console can be used without logging in.


-True
-False

After creating ECS bandwidth cannot be changed/


-True
-False

When creating ECS you can use File injection function to initialize it.
-True
-False

Which is not an action of Bandwidth scaling policy:


-Reduce
-Double
-Set to
-Add

When creating image Cloudbase-init should be installed on OS to ensure that configuration of


newly created ECSs from the image can be customized.
-True
-False

Server needs to be stopped before restoring EVS disk data using VBS backup.
-True
-False

Logging function of a bucket – where can log file be stored?


-Any bucket
-Enable logging
-The bucket on which logging is enabled
-All other buckets except the one which is logging

When compared with shared file systems what are the advantages of SFS:
-Robust reliability
-Seamless integration
-File sharing
-Easy operations, high cost- (wrong, should be low)

In Huawei Cloud VPN only IPsec is supported


-True
-False

What is the use of SA?


-Identification authentication
-Encryption
-Web crawlers
-Big data

Which is true about instance removal:


-If number of instances is greater than in AS group, some are removed
-When removed, the balance between AZs is not taken into account
-
-

Image creation fails if entered System disk capacity is less than System disk capacity of external
image file.
-True
-False

Which are VPC access control functions?


-Security group
-Network access list
-Fingerprint
-Password

Which EI service can implement large scale data analysis and query ?
-DLF
-DWS
-DIS
-GES

ECS lifecycle?
Start-Stop-Restart-Delete

Primary DB instance can replicate data to secondary DB Instances in :


Asynchronous
Semi-synchronous

which of the following is not included in devcloud:

A. Data backup
B. Project Management
C. Code Check
D. Cloud buildup

Bucket A has been configured a policy not to allow any users to access it. Object B is inside Bucket A. Object B
has an ACL that allows any users to access it. Therefore, object B can be access anonymously by any users.
True
False

What layer Anti DDOS support


Layer 4 to Layer 7

“Faster Inclusive AI Development”


DLS
MLS
ModelArts
GES

Huawei Cloud Positioning


Focus on IaaS, Enable PaaS, Aggregates SaaS

ECS Login
Key pair
OTP Token
Fingerprint
Password

What are BW Scaling (multiple choice)


Modify
Replicate
Enable
Delete
AS Policies that dynamically expand? (single Choice)
Random
Alarm
Schedule
Periodic

Use to Create Private Image (single Choice)


Full ECS Image using ECS
System Disk using ECS
System Disk using OBS File-my answer
System Disk using external Image

RDP ports used for xxx. inbound traffic

37
53
3389
80

Retrieve Alarm History for 7 days. What Service you will use. (Single Choice)
SMN
CTS-my answer
ECS
RDS

Where to restore RDS instance


Xxx
ECS
VPC
OBS

ELB Algorithms not provided (single choice)


Least Connections
Maximum connections
Round Robin
Weight

Status of File system that can be deleted (single Choice)


Creating
Deleting
Disable
Deleting failed

Not feature of VPC………(single Choice)


Authenticity
XXX
Integrity
Timeliness-my answer

EVS Disks Associated one Back up Policy


True
False

OBS can access through OBS Console or OBS Browser


True
False

File System can be mounted to Multiple ECS?


True
False

AS can only dynamically added or reduces ECS in Specified interval?


True
False
1. Elastic Volume Service (EVS) is a scalable virtual block storage service based on the
distributed architecture. [Score: 1]
The correct answer is A. Right.

2. What is the payment mode of Workspace? [Score: 1]


Answer: D. Pay-per-use (score: 1)

3. VBS does not support batch backup of EVS disks. [Score: 1]


Your answer: B. False (score: 1)

4. Which of the following functions are supported by OBS Browser? [Score: 1]


Answer: A. Static website hosting B. Versioning C. Cross-domain resource sharing D. Mounting to an
external bucket C. Cross-domain resource sharing D. Mounting to an external bucket

5. Which of the following are the major defense types of Anti-DDoS? [Score: 1]
Your answer: (null) Correct answer: A. Traffic attack defense|D. Application attack defense

6. After RDS HA is enabled, which of the following primary/standby DB instance


synchronization modes are available? [Score: 1]
Your answer: (null) Correct answer: B. Semi-synchronous | C. Asynchronous

7. In the cloud computing environment, confidentiality, integrity, and availability are still the
fundamental security requirements of users. [Score: 1]
Your answer: (null) Correct answer: A. Correct

8. Which of the following port types is 10GE when you enable Direct Connect? [Score: 1]
Your answer: (empty) Correct answer: B. Optical port

9. Instances added using AS policies cannot be manually removed. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

10. Huawei provides capability openness for developers to integrate the capabilities opened
by Huawei products with upper-layer applications and build differentiated innovative
solutions. [Score: 1]
Your answer: (null) Correct answer: A. Correct

11. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer is: D. After the capacity of an EVS disk is expanded, you can use
this backup to restore data. After the data is restored, the size of the EVS disk remains unchanged.

12. Which of the following protocols is not supported when the load balancer is a private
network load balancer? [Score: 1]
Your answer: (null) Correct answer: B.UDP

13. How many types of AS policies can be configured? [Score: 1]


Your answer: (empty) Correct answer: B.3

14. The AS service can only dynamically add or reduce server resources based on the
specified time period. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

15. Which of the following scenarios does object storage apply to? [Score: 1]
Your answer: (null) Correct answer: A. Massive storage resource pool|B. Static website hosting|C. Big
data storage|D. Backup|E. Archiving
16. After creating an AS group by following the wizard, you need to manually enable the AS
group. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

17. What Can I Do If the Disk Capacity of an ECS Is Insufficient? [Score: 1]


Your answer: (null) Correct answer: C. Expanding the capacity of disks

18. Cloud Container Engine (CCE) is a high-performance and scalable container service. It
provides enterprises with Docker container lifecycle management capabilities, such as quick
application packaging and deployment and automatic O&M, helping you efficiently deploy
applications. [Score: 1]
Your answer: (null) Correct answer: A. Correct

19. What Is ECS Lifecycle Management? [Score: 1]


Your answer: (null) Correct answer: A. Delete ECS|C. Power off|D. Power on
20. Which of the following terminals can access Workspace? [Score: 1]
Your answer: (null) Correct answer: A.iOS|B.Android|C.Windows PC

21. ECSs are billed in yearly/monthly or pay-per-use mode. [Score: 1]


Your answer: (null) Correct answer: A. Correct

22. How Can I Create a Private Image? [Score: 1]


Your answer: (null) The correct answer is: A. Create from cloud server|C. Create from external image file

23. Cloud Eye is free of charge. [Score: 1]


Your answer: (null) Correct answer: A. Correct

24. Which of the following file access protocols is supported by SFS? [Score: 1]
Your answer: (null) Correct answer: D.NFS

25. If the system disk is faulty, you can use the backup of the system disk to create an EVS
disk and attach it to the ECS as the system disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

26. Unlike traditional servers, users cannot deploy service applications on ECSs. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

27. In which of the following states can an EVS disk be backed up? [Score: 1]
Your answer: (empty) The correct answer is A. Available.

28. After an application is created, the CPU, memory, and network usage of the container
cannot be monitored. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

29. What is the type of the image converted from an ECS? [Score: 1]
Your answer: (empty) Correct answer: B. Private image

30. Which of the following services can work with EVS? [Score: 1]
Your answer: (Null) Correct answer: A. Elastic Cloud Server (ECS)|C. Volume Backup Service (VBS)|D.
Cloud Eye

31. What is the full name of ECS? [Score: 1]


Your answer: (null) Correct answer: A. Elastic Cloud Server
32. The VPN supports interconnection between two VPCs. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

33. Which of the following statements about hybrid cloud is incorrect? [Score: 1]
Your answer: (Null) Correct answer: D. Applications can be deployed only in the public cloud.

34. How many buckets can be created for an OBS account at most? [Score: 1]
Your answer: (null) Correct answer: B.100

35. Which of the following methods is correct for a Workspace user to access a USB flash
drive on a terminal? [Score: 1]
Your answer: (null) Correct answer: B. USB port redirection

36.VPC. The subnet segment can be modified after being created. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

37. IAM - What are the key features of identity authentication? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Centralized control of users and security credentials |
B. Centralized control of user access | C. User group-based rights | D. Support for Huawei customer
service agent maintenance

38. Which of the following service resource metrics can be monitored by Cloud Eye? [Score:
1]
Your answer is as follows: (Null) Correct answer: A. Virtual Private Cloud (VPC)|B. Elastic Computing
Service (ECS)|C. Distributed Cache Service (DCS)|D. Elastic Load Balance

39. Which of the following is not the key of WAF? [Score: 1]


Your answer is: (Null) The correct answer is: D. Preventing excessive traffic.

40. Which of the following services helps you monitor RDS resources in real time? [Score: 1]
Your answer: (null) Correct answer: D.CES

41. Which of the following is not the main reason why traditional IT infrastructure
architecture cannot support efficient operation of enterprises and urgently calls for
architecture transformation? [Score: 1]
Your answer is: (empty) The correct answer is: D. The network speed is too slow.

42. If no EIP is bound to a VM, you can configure a custom route for the VM to access the
Internet. [Score: 1]
Your answer: (null) Correct answer: A. Correct

43. The alarm threshold consists of the set mode (raw data, maximum value, minimum value,
average value, and variance), judgment condition (>, ≥, <, ≤, and =), and critical value. The
set mode is used to configure alarm conditions. [Score: 1]
Your answer: (null) Correct answer: A. Correct

44. What operations can the shared image provider perform? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Specifying an image to be shared | B. Deleting a
shared image | C. Adding a tenant who can share an image | D. Deleting a tenant who can share an image

45. The AS service must be used together with elastic load balancing. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect
46. Compared with traditional file sharing storage, what are the advantages of SFS? [Score:
1]
Your answer: (null) The correct answer is: A. File sharing|B. Seamless integration|D. High reliability

47. VBS can create backups for EVS disks and use the backups to roll back EVS disks,
maximizing user data accuracy and security. [Score: 1]
Your answer: (null) Correct answer: A. Correct

48. To enable two sites to communicate with each other across the Internet, deploy
IPSeC.VPN on the firewalls at both sites to protect the mutual access traffic between the
intranets at the two sites. [Score: 1]
Your answer: (null) Correct answer: A. Correct

49. The cloud security service system consists of five parts: network security, data security,
application security, security evaluation, and security support. [Score: 1]
Your answer: (null) Correct answer: A. Correct

50. Which of the following are the main functions of HID? [Score: 1]
Your answer: (null) Correct answer: A. Brute force cracking detection | B. Remote login notification | C.
Weak password detection | D. Database process permission detection | E. Web page backdoor file
detection

51. Which of the following is not an RDS DB instance category? [Score: 1]


Your answer: (null) The correct answer is D. Disk.

52. What are the alarm statuses of Cloud Eye? [Score: 5]


Your answer: (null) Correct answer: A. Alarm|B. Normal|C. Insufficient data|D. Close

53. Similar to traditional server disks, EVS disks allow you to format EVS disks attached to
ECSs, create file systems on the EVS disks, and store data persistently. [Score: 1]
Your answer: (null) Correct answer: A. Correct

54. Which of the following management functions are supported by ELB? [Score: 5]
Your answer is as follows: (null) Correct answer: A. Create a load balancer. |B. Delete a load balancer. |C.
Enable a load balancer. |D. Disable a load balancer.

55. What computing services does Huawei public cloud provide? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Auto Scaling|B. Elastic Cloud Server|C. Image
Management Service

56. SFS cannot be attached to an ECS running the Windows OS. [Score: 1]
Your answer: (null) Correct answer: A. Correct

57. What are the prerequisites for creating a cluster? [Score: 1]


Your answer: (Null) Correct answer: B. A VPC has been created.|C.AK/SK certificate has been uploaded
to CCE.

58. What information needs to be configured before creating a file system? [Score: 1]
Your answer: (null) Correct answer: B.VPC
59. Which of the following statements about KMS is incorrect? [Score: 1]
Your answer: (Null) Correct answer: A. Managing the cloud platform and tenant keys

60. Identity and Access Management (IAM) refers to the identity and authentication service.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

61. Which of the following is not a Huawei computing cloud service? [Score: 1]
Your answer: (null) Correct answer: D. Scalable File Service

62. Which of the following are basic features of cloud computing? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. On-demand self-service|B. Wide network access|C.
Resource pooling|D. Fast elastic scaling|E. Measurable service

63. Which of the following is not a major function of Anti-DDoS? [Score: 1]


Your answer: (Null) Correct answer: D. Periodically scan ECS vulnerabilities.

64. Which of the following are the application scenarios of SFS? [Score: 5]
Your answer: (null) The correct answer is: A. Media processing|B. Log management|C. Content
management and home directory|D. High-performance computing

65. If a user wants to query historical alarms in the last seven days, which of the following
services needs to be enabled? [Score: 1]
Your answer: (Null) The correct answer is A. Cloud Trace Service.

66. Which of the following components receives traffic from the Internet first after the traffic
enters LoaD.balancer? [Score: 1]
Your answer: (null) The correct answer is C.LVS.

67. Penetration testing service (PTS) belongs to security evaluation service products. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect

68. Which of the following image types are supported by IMS? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Public image|B. Private image|C. Shared image

69. To use Cloud Eye to monitor Huawei ECSs, you need to install the plug-in on the ECSs.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect

70. If the capacity of the data disk attached to the ECS is insufficient, you must detach the
disk and purchase a new one. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

71. Which of the following statements about Anti-DDoS traffic cleaning is incorrect? [Score:
1]
Your answer: (Null) Correct answer: A. Web vulnerability detection
72. Attach the EVS disk to an ECS. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

73. Which of the following operations will incur fees? [Score: 1]


Your answer: (blank) The correct answer is A. Create an EIP.

74. What are the types of EVS disks? [Score: 1]


Your answer: (null) Correct answer: A. Ultra-high I/O|B. High I/O|C. Common I/O|D. Optimized I/O

75. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. Multiple EVS disks can be associated with a backup policy for
batch backup.
76. Which of the following operations cannot be performed by the recipient of a shared
image? [Score: 1]
Your answer: (null) The correct answer is: A. Sharing the specified mirror.

77. The size of the exported image is not limited. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

78. RDS can meet the ever-changing requirements of the gaming industry, effectively
shortening the R&D period and reducing R&D costs. [Score: 1]
Your answer: (null) Correct answer: A. Correct

79. If the status of an alarm rule remains unchanged, the system sends an alarm notification
to the user only when the alarm rule is in the status for the first time. [Score: 1]
Your answer: (null) Correct answer: A. Correct

80. Data in the file system is stored using erasure codes. [Score: 1]
Your answer: (null) Correct answer: A. Correct

81. Which of the following user authentication modes is supported by Workspace? [Score: 1]
Your answer: (null) The correct answer is B.Active Directory.

82. WAF detects anomalies of HTTP requests to prevent malicious network intrusions, such
as web page tampering, information leakage, and Trojan horse implantation. [Score: 1]
Your answer: (null) Correct answer: A. Correct

83. All types of HUAWEI CLOUD service products can be viewed on the management
console. [Score: 1]
Your answer: (null) Correct answer: A. Correct

84. If only one AS policy is enabled in the AS group and the action in the AS policy is to add
two instances, how many instances are there in the AS group? [Score: 1]
Your answer: (empty) Correct answer: D. Uncertain

85. High availability is not a key feature of RDS. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

The CCE does not support Elastic Load Balance. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

87. Which of the following images is a standard image provided by the public cloud platform
and is visible to all users? [Score: 1]
Your answer: (blank) Correct answer: A. Public image

88. The management console can be used without login. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

89. What Does an ECS Use to Build a Logical Zone That Is Logically Isolated? [Score: 1]
Your answer: (null) Correct answer: B. Virtual private cloud

90. When an EVS disk is detached from an ECS, the data on the EVS disk will be lost.
[Score: 1]
Your answer: (null) Correct answer: B. Incorrect
91. Which of the following EVS disks can be directly created on the EVS console? [Score: 1]
Your answer: (null) Correct answer: B. Data disk

92. What are the methods of adding instances to an AS group? [Score: 1]


Your answer: (null) Correct answer: A. Scaling action|B. Manually adding instances|C. Changing the
expected number of instances

93. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three
times, disable versioning for the bucket, and upload object aaa for three times. After the
preceding operations are complete, how many objects are displayed in the bucket basic
information? [Score: 1]
Your answer: (null) Correct answer: B.4

94. Workspace supports user authentication using Micrlslft Active Directory. [Score: 1]
Your answer: (null) Correct answer: A. Correct

95. Which of the following cloud products is a data security type? [Score: 1]
Your answer: (null) Correct answer: C.KMS (key management service)

Elastic Load Balance automatically distributes access traffic to multiple ECSs to balance
their service load. It enables you to achieve higher levels of fault tolerance in your
applications and expand application service capabilities. [Score: 1]
Your answer: (null) Correct answer: A. Correct

97. Network security, as an important part of cloud security services, implements network
isolation, responds to network attacks, and ensures network security. [Score: 1]
Your answer: (null) Correct answer: A. Correct

98. The AS service automatically adjusts service resources based on users' service
requirements and policies. [Score: 1]
Your answer: (null) Correct answer: A. Correct

99. The 0BS supports the batch upload function. [Score: 1]


Your answer: (null) Correct answer: A. Correct

100. What CIDR Blocks Does a VPC Support? [Score: 1]


Your answer: (null) Correct answer: A.192.168.0.0/23|B.172.16.0.1/24|C.10.0.0.5/24|D.10.0.25.0/24

101. Which of the following is not a major application scenario of VPC? [Score: 1]
Your answer: (None) The correct answer is B. The desktop cloud accesses Huawei Vmall.

102. Images can be uploaded to the container image repository. [Score: 1]


Your answer: (null) Correct answer: A. Correct

103. If you use an ECS to create an image, the ECS must be stopped. [Score: 1]
Your answer: (null) Correct answer: A. Correct

104. What are the benefits of Workspace to customers? [Score: 1]


Your answer: (null) The correct answer is: B. Quick access | C. Pay-per-use | D. Simplified O&M

105. Which of the following statements are correct? [Score: 1]


Your answer is: (Null) Correct answer is: B. The parameters of the created file system cannot be modified.
|C. The file system can access different AZs of the same VCP. |D. The performance of the SFS file system
increases with the capacity increase.
106. How Many Monitoring Panels Can I Create at Most on the Dashboard Page? [Score: 1]
Your answer: (empty) Correct answer: B.2.

107. How Long Does It Take to Apply for an ECS? [Score: 1]


Your answer: (empty) Correct answer: B. Minutes

108. Which of the following shared file systems can be directly deleted? [Score: 1]
Your answer: (null) Correct answer: B. Unavailable

109. GPU desktops can be used for CAD auxiliary design. [Score: 1]
Your answer: (null) Correct answer: A. Correct

110. Cloud Eye is a multi-dimensional monitoring platform for resources such as Elastic
Cloud Servers (ECSs) and bandwidth. You can monitor alarms, notifications, and
personalized report views in real time to accurately learn about the product resource status.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

111. Which of the following statements is incorrect? [Score: 1]


Answer: (null) Correct answer: A. Create a folder named br..ra/1 in the OBS bucket. |B. OBS Cosole
supports batch deletion of buckets. |D. You have created 101 buckets using OBS Cnsole.

112. After an ECS is created, you can change the ECS specifications if they do not meet your
requirements. [Score: 1]
Your answer: (null) Correct answer: A. Correct

Which of the following key technologies are used by situational awareness? [Score: 1]
Your answer: (null) The correct answer is: A. Big data technology | B. Crawler technology

114. Which of the following statements about VBS are correct? [Score: 1]
Your answer is: (Null) Correct answer: C. After an EVS disk is deleted, you can use a backup to create an
EVS disk. |D. After an EVS disk is deleted, the backup data will not be deleted.

115. What applications and services are provided by HUAWEI CLOUD Marketplace?
[Score: 1]
Your answer: (null) Correct answer: A. Basic software|B. Business software|C. Developer tools|D.
Professional services

116. Which of the following is not a major function of WTP? [Score: 1]


Your answer: (null) Correct answer: D. SQL injection prevention

117. CCE allows you to view application logs and events. [Score: 1]
Your answer: (null) Correct answer: A. Correct

118. Which of the following is not a capability of DevCloud? [Score: 1]


Your answer: (null) Correct answer: D. Data backup

119. Which of the following belong to the life cycle management of database instances?
[Score: 1]
Your answer is as follows: (Null) Correct answer: A. Adding a read replica|B. Viewing DB instance
information|C. Expanding the storage space of the database|D. Deleting the database cluster|E. Rebooting
the database instance
120. The encrypted mirror cannot be changed to an unencrypted mirror. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

121. CCE allows you to directly use official Docker Hub images. [Score: 1]
Your answer: (null) Correct answer: A. Correct

122. Users can use OBS on OBS Console or OBS Browser. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

123. What Are the Steps for Creating a Windows Image Using an ECS? [Score: 1]
Your answer is as follows: (Null) Correct answer: A. Configure the Windows server. |B. Install Cloudbase-
Init. |C. Create a Windows private image.

124. How many alarm rules can be created at most? [Score: 1]


Your answer: (null) Correct answer: B.50

125. Which of the following are the objectives of cloud computing security services? [Score:
1]
Your answer is as follows: (null) Correct answer: A. Data protection|B. Operation environment
protection|C. Service independence and linkage|D. Security evaluation

126. Relational Database Service (RDS) users can modify database configurations to achieve
optimal performance. [Score: 1]
Your answer: (null) Correct answer: A. Correct

127. How many common services can be added to My Favorites at most? [Score: 1]
Your answer: (empty) Correct answer: C.7

128. SFS can set read-only permissions for users. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

129. When creating a monitoring panel, you can add a maximum of () monitoring indicators
to a view. [Score: 1]
Your answer: (null) Correct answer: B.5

130. The time required for backing up an EVS disk depends only on the volume of data in the
EVS disk. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

131. Which of the following can be used to monitor ECSs? [Score: 1]


Your answer: (null) Correct answer: B. Cloud Eye

132. What do I need to create for two VPCs to communicate with each other? [Score: 1]
Your answer: (null) Correct answer: B. Peering connection

133. Multiple EVS disks can be attached to an ECS. [Score: 1]


Your answer: (null) Correct answer: A. Correct

134. The GPU is applicable to graphics rendering, engineering drawing, and desktop cloud
scenarios. [Score: 1]
Your answer: (null) Correct answer: A. Correct

135. Data security ensures confidentiality and integrity of user data applications and storage
in the cloud computing environment. [Score: 1]
Your answer: (null) Correct answer: A. Correct

136. What is the basis for the division of Regions? [Score: 1]


Your answer: (empty) Correct answer: A. Geographical location and network latency

137. What are the deployment modes of cloud computing?' [Score: 1]


Your answer: (Null) Correct answer: A. Private cloud|B. Public cloud|C. Hybrid cloud|D. Community
cloud/Industry cloud

138. Which of the following load balancing modes is not supported by listeners? [Score: 1]
Your answer: (null) Correct answer: A. Maximum connection|C. Set weight

139. What are the scenarios of user replication chain compensation? [Score: 1]
Your answer: (null) Correct answer: B. Replicate the unencrypted image as an encrypted image. |C.
Replicate the encrypted image as an encrypted image. |D. Replicate the encrypted image as an unencrypted
image.

140. Which of the following is not the application scenario of Cloud Eye? [Score: 1]
Your answer: (null) Correct answer: D. Operation audit

141. Which of the following components is not included in the big data platform? [Score: 1]
Your answer: (null) Correct answer: B. OpenStack

142. Which of the following is not a main application scenario of KMS? [Score: 1]
Your answer: (Null) The correct answer is: A. Network transmission encryption

143. What are the benefits of containers? [Score: 1]


Your answer is as follows: (Null) The correct answer is: A. More efficient virtualization | B. More secure
running applications | C. Faster delivery and deployment | D. Easier migration and expansion | E. Simpler
management

144. To implement dynamic resource expansion, which of the following policies is selected
when you create an AS policy? [Score: 1]
Your answer: (blank) Correct answer: C. Alarm policy
145. Which of the following is not a major function of HVD? [Score: 1]
Your answer: (Null) Correct answer: B. ECS brute-force cracking prevention

146. Alarm notification is the action taken when an alarm is triggered. You can set or disable
alarm notification when creating or modifying an alarm. [Score: 1]
Your answer: (null) Correct answer: A. Correct

147. What are the problems of traditional VDI? [Score: 1]


Your answer: (empty) Correct answer: D. High fixed investment cost

148. Data outsourcing and service outsourcing are the main security challenges faced by
users in cloud computing. [Score: 1]
Your answer: (null) Correct answer: A. Correct

149. What Are the ECS Login Authentication Modes? .c\'\ [Score: 1]
Your answer: (empty) Correct answer: A. Password|D. Key pair

150. Which of the following is NOT true of the LEADS philosophy? [Score: 1]
Your answer: (null) Correct answer: E.S: Service
151. A policy is configured for bucket A to prevent any user from accessing objects in bucket
A. Bucket A contains object B, which is configured with an ACL to allow anonymous users
to access object B. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

152. Which of the following methods can be used to directly access a container from the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Elastic IP address

153. What are the advantages of VPC? [Score: 1]


Your answer is: (empty) The correct answer is: A. Security isolation|B. Soul deployment|C. Dynamic
BGP|D. Hybrid cloud deployment is supported.

154. Which of the following is a disadvantage of self-built databases? [Score: 1]


Your answer: (empty) The correct answer is D. High investment.

155. Which of the following statements about the ELB product functions is incorrect? [Score:
1]
Your answer is: (empty) The correct answer is: A. Provide a private line connection.

156. Which of the following services does VBS depend on? (Multiple-choice question)
[Score: 1]
Your answer: (Null) Correct answer: B. Cloud hard disk|C. Object storage

157. Workspace data is encrypted using TLS during transmission. [Score: 1]


Your answer: (null) Correct answer: A. Correct

158. How Many AS Configurations Can Be Configured in an AS Group? [Score: 1]


Your answer: (empty) Correct answer: A.1

159. EVS disks must be used with ECSs. [Score: 1]


Your answer: (null) Correct answer: A. Correct

160. Which of the following is incorrect about ELB configuration? [Score: 1]


Your answer: (null) Correct answer: B. You can select an IP address when adding an Elastic Load
Balance.

161. The next decade of IT infrastructure evolution in the cloud computing era is from
separation to convergence. No matter how spirally the IT architecture evolves, which of the
following statements about customer values and driving forces is incorrect? [Score: 1]
Your answer: (Null) Correct answer: B. Higher efficiency in service deployment and lifecycle
management

162. When IPSec VPN is used for communication, the encryption and decryption check is
performed on the firewalls at both ends. [Score: 1]
Your answer: (null) Correct answer: A. Correct

163. Which of the following statements are correct? [Score: 1]


Your answer is: (Null) The correct answer is: A. VBS provides data protection for EVS disks. |B. VBS can
be used to quickly restore data when an EVS disk is faulty. |C. VBS is implemented based on the snapshot
technology. |D. VBS supports online backup.

164. To enable the log management function of an OBS bucket, which permissions on the
target OBS bucket must be granted to the log delivery user group? [Score: 1]
Your answer: (null) Correct answer: B. Write permission|C. View ACL permission
165. Users can use terminals such as iPad to access Workspace. [Score: 1]
Your answer: (null) Correct answer: A. Correct

166. Which of the following methods can be used to set the access permission for anonymous
OBS object users? [Score: 1]
Your answer: (null) Correct answer: B. Setting the ACL for OBS objects|C. Setting the policy for OBS
objects

167. The minimum management unit of RDS is an instance. [Score: 1]


Your answer: (null) Correct answer: A. Correct

168. What are the types of VPNs based on service usage? [Score: 1]
Your answer: (null) Correct answer: A. Access VPN|B.lntranet VPN|C.Extranet VPN

169. Which of the following functions are provided by ECS? [Score: 1]


Your answer is: (Null) Correct answer: A. Users can create and delete VMs, modify VM specifications,
and start and stop VMs. B. Users can add and uninstall extension NICs, and add EIPs, attach and detach
disks. |C. Users can view information about their ECSs on the management console. |D. Users can set ECS
alarm rules.

170. The file system can be accessed across VPCs. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

171. What are the important functions of IKE? [Score: 1]


Your answer: (null) Correct answer: A. Negotiation protocol parameters|C. Negotiation key and key
management|D. Peer identity authentication

172. After an ECS is created, the bandwidth used by the ECS cannot be changed. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

173. What Are the AS Policy Types? [Score: 1]


Your answer: (null) Correct answer: A. Scheduled policy|B. Periodic policy|C. Alarm policy

From which perspectives does situational awareness analyze security posture? [Score: 1]
Your answer: (null) Correct answer: A. Global perspective|B. User perspective|D. Attacker perspective

175. Which of the following is the procedure for using the CCE? [Score: 1]
Your answer is as follows: (Null) Correct answer: C.1. Create a cluster. 2. Upload an image. 3. Create an
application.

176. Which of the following is not an advantage of RDS compared with self-built databases?
[Score: 1]
Your answer: (null) Correct answer: D. Users install the database by themselves.

177. As an important part of the cloud security service, application security ensures the
security of elastic cloud computing servers and cloud computing applications running on
them from the perspective of operating system and application security protection. [Score: 1]
Your answer: (null) Correct answer: A. Correct

178. Which of the following devices needs to be configured for Workspace to support 3D
applications? [Score: 1]
Your answer: (null) Correct answer: B.GPU card
179. During VPC creation, which of the following parameters can be used to automatically
obtain an IP address? [Score: 1]
Your answer: (null) The correct answer is A.DHCP.

180. Workspace has the following security protection mechanisms: [Score: 1]


Your answer is as follows: (Null) Correct answer: A. Data is separated from terminals, and data is not
stored on terminals. |B. Data is encrypted using TLS during transmission. |C. Data is isolated from other
tenants using VPCs. |D. Peripheral channels can be managed and controlled. Read-only redirection is
supported. Data cannot be copied to peripheral storage.

181. Which of the following functions are supported by the 0BS Console? [Score: 1]
Your answer is as follows: (null) Correct answer: A. Static website hosting | B. Versioning | C. Cross-
domain resource sharing | D. Adding external buckets

182. What are the application scenarios of VBS? [Score: 1]


Your answer: (null) Correct answer: A. Hacker attack or virus attack|B. Data deleted by mistake|D.
Application error

183. What is the audio sampling rate in Workspace? [Score: 1]


Your answer: (null) The correct answer is C.44.1 kHz.

184. Which of the following constitute the Huawei public cloud ecosystem? [Score: 1]
Your answer: (Null) Correct answer: A. Marketplace|B. Developer Community|C. Partner|D. Huawei
cloud service certification engineer

185. Containers and virtual machines have similar resource isolation and allocation
advantages, but have different functions because containers are more portable and efficient
due to the fact that containers are virtualized operating systems rather than hardware. [Score:
1]
Your answer: (null) Correct answer: A. Correct

186. Direct Connect is a private network service that connects your local data center to the
public cloud. Currently, which of the following private lines is supported by Direct Connect?
[Score: 1]
Your answer: (null) Correct answer: A.MPLS VPN

187. IPSec VPN is an encrypted tunneling technology. It uses encrypted security services to
establish secure and comprehensive communication tunnels between different networks.
Which of the following is not the feature that ensures the transmission of data packets on the
public network? [Score: 1]
Your answer: (null) Correct answer: A. Timeliness

188. On the Dashboard page, you can add or delete monitoring graphs of key monitored
objects. The graphs can be used to compare multiple monitored objects. You can view the
graphs in a timely manner each time you log in to the Cloud Eye console. [Score: 1]
Your answer: (null) Correct answer: A. Correct

189. IMS provides flexible self-service and comprehensive image management capabilities.
Users can create private images and use images to create ECSs or replicate ECSs in batches.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

190. Which of the following management operations is not supported by EVS disks? [Score:
1]
Your answer: (null) The correct answer is C. Reduce the capacity.

191. What is the return value when a user-defined monitoring indicator is successfully
uploaded using the Open API? [Score: 1]
Your answer: (null) The correct answer is B.201.

192. What are the concepts of VPC? [Score: 1]


Your answer: (null) Correct answer: A. Subnet|B.EIP|C. Security group|D.VPN

193. VPCs can be connected to traditional data centers through private lines or VRNs to
flexibly integrate resources. [Score: 1]
Your answer: (null) Correct answer: A. Correct

194. Which of the following statements about the positioning of Huawei cloud services are
correct? [Score: 1]
Your answer: (null) The correct answer is: A. Focus on the IaaS layer, use the PaaS layer, and aggregate
the SaaS layer.

195. What Are the Advantages of CCE? [Score: 1]


Your answer is: (Null) The correct answer is: A. Microservice governance: Decouple a single architecture
into multiple containers, making the system more flexible. |B. Provide a continuous container delivery
platform. Container images are used throughout the development and O&M phases, and the environment
configuration is unified, fast service provisioning|C. VMs are isolated into multiple containers (with fine-
grained containers) and applications are built on containers to improve resource utilization.|D. The system
automatically and elastically expands the capacity to quickly respond to concurrent peaks

196. After an ECS is bound to a (), the ECS can be accessed through a fixed public IP
address. [Score: 1]
Your answer: (blank) Correct answer: D. Elastic IP address

197. ECS indicates the Auto Scaling (AS) service. [Score: 1]


Your answer: (null) Correct answer: B. Incorrect

198. When multiple VMs are created, you can bind multiple EIPs to enable multiple VMs to
access the Internet at the same time. [Score: 1]
Your answer: (null) Correct answer: B. Incorrect

199. When creating an ECS, you can use the file injection function provided by the system to
initialize the ECS. [Score: 1]
Your answer: (null) Correct answer: A. Correct

200. Which of the following layer is the cloud service that provides the application running
and development environment? [Score: 1]
Your answer: (null) Correct answer: B.PaaS

201. Certificates of the SCS can be used for trusted authentication of enterprise websites.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

202. What data does an ECS use for storage? [Score: 1]


Your answer: (null) Correct answer: C. Cloud hard disk

203. Which of the following are RDS functions? [Score: 1]


Your answer is as follows: (Null) Correct answer: A. Creating a database cluster |B. Expanding the disk |C.
Adding a read-only version |D. Creating/Restoring a snapshot |E. Restoring a backup to a specified time
point

204. How Many EVS Disks Can Be Attached to an ECS? [Score: 1]


Your answer: (empty) Correct answer: D.11

205. An availability zone (AZ) is a collection of one or more physical data centers with
independent cooling, fire extinguishing, moisture-proof, and electricity facilities. Within an
AZ, computing, network, and storage resources are logically divided into multiple clusters.
[Score: 1]
Your answer: (null) Correct answer: A. Correct

206. Which of the following cloud services is not a computing cloud service? [Score: 1]
Your answer: (null) Correct answer: C. Virtual private cloud

207. How Many RDS DB Instances Can Each User Create by Default? [Score: 1]
Your answer: (null) Correct answer: B.20

208. Which of the following is not the target of cloud computing security services? [Score: 1]
Your answer: (null) Correct answer: B. Cloud platform security

209. Cloud Eye is an open resource monitoring platform that provides resource monitoring,
alarm reporting, and notification services. [Score: 1]
Your answer: (null) Correct answer: A. Correct

210. Which of the following commands is used to tag an image? [Score: 1]


Your answer: (null) The correct answer is A.docker tag.

211. When the average value is selected as the collection mode, the peak values may be
different when users switch the data range. [Score: 1]
Your answer: (null) Correct answer: A. Correct

212. What are the disadvantages of traditional PC office? [Score: 1]


Your answer is (empty) Correct answer: A. High O&M costs

213. Which of the following containerized application management functions are provided by
CCE? [Score: 1]
Your answer: (null) Correct answer: A. Rolling upgrade|B. Elastic scaling|C. Application monitoring|D.
Viewing events

214. Compared with self-built databases, RDS has more costs and O&M workloads. [Score:
1]
Your answer: (null) Correct answer: B. Incorrect

215. Cloud computing is a model that enables the required resources (e.g., computing,
storage, network, applications, and services) to be obtained from the shared pool of
configurable resources anytime, anywhere, conveniently, and on demand. Resources can be
quickly provisioned and released, and the workload of managing resources and interaction
with service providers can be minimized. [Score: 1]
Your answer: (null) Correct answer: A. Correct

216. What operations do I need to perform to enable the created application to be accessed
from the outside? [Score: 1]
Your answer is: (Null) The correct answer is: C. When creating an application, publish the application as a
service.

217. Which of the following statements about the ELB function cannot be implemented?
[Score: 1]
Your answer: (null) Correct answer: D. Layer 2 and Layer 3 data forwarding

218. Which of the following is not a feature of RDS? [Score: 1]


Your answer is: (empty) The correct answer is: A. Expensive OBA costs

219. Which of the following cloud services can be used together with RDS to ensure network
security isolation between RDS instances and other services?
Your answer: (null) Correct answer: B.VPC

220. The retention period of monitoring data in different aggregation periods is different.
How long is the retention period of metric data in an aggregation period of 1 hour? [Score: 1]
Your answer: (null) The correct answer is C.155.

221. Which of the following is not an advantage of CES? [Score: 1]


Correct answer: D. Monitoring third-party non-HUAWEI CLOUD services

222. Which of the following commands is used to upload images from the Docker client to
the image repository? [Score: 1]
Your answer: (null) Correct answer: B.docker push
1, ELB provides three types of load balancing algorithms.

@ True

O False

An ECS must be stopped beforeit is used to create an image.


KX

© Tre

@ false

3, RDS does not support data backup orrestoration.

© Tre

© False

6, The ECS have to be stopped when do EVS backup.

O Tne

@ False

5, IMS provides comprehensive and flexible self-service image management capabilities. Users can create a
private image and use it to create an ECS or multiple ECSs.

@ Twe
O False

7, An ECS can be attached with multiple EVS disks.

© Tne

© False

8, WAF detects abnormal requests to prevent networkintrusions such as webpage tampering,information le


and Trojan horse implantation.

@ Te
O False

9. file system can be mounted to ECSsin different VPCs.

© True

@ False
10, Currently, only IPsec VPNs are supported.

© Tne

© False

11, Which of the following operationsis not supported by EVS?

@ A. Capacity reduction

© B. Capacity expansion

© C.Backup

© D.Attaching/Detaching
12, To enable remote RDP access to a created Windows ECS, which ofthe following ports must be opened |
an inboundsecurity group rule?

A5S3
0

B. 33
0

C. 3389
®

D.80
o

13, Which ofthe following is not an advantage of RDS compared withself-built databases?

© Elastic scaling

@ 68.Self-installed databases

‘OC. Easy management

‘© D. Instantavailability

14, Which of the following can isolate RDS network resources from other services?

O AECS

© B.0BS

@ c.vec

© b.cES
15, Which SDKlanguage is NOT supported on API Gateway?

@ A Delphi

O BJava

© C.PHP

oO Dc

16, Which of the following is not an action of the bandwidthscaling policy?

O A.Reduce

O BSetto

© C.Add

@ D.Double

17, Whichof the following can monitor SFS performance indicators?

@ Cloud Eye

O B. Auto Scaling

© C.CloudContainer Engine

© OD.VirtualPrivate Cloud

18, Which ofthe following is not a HUAWEI CLOUD computing service?

© A. Image ManagementService

®@ 8B.Scalable File Service

© C.Bare Metal Service

O D.AutoSealing
19, Which ofthe following is NOT a componentofthe big data platform?

O A.Map Reduce

© 8.Yam

O C.HDFS

® D.Openstack

20. Which ofthe following is used by ECSto store data?

© A. Image

© 8B. Dedicated Cloud

© ©. AutoScaling

@ D.EVS disk

21, Which of the following policies can be configured to increase the numberofinstances in an AS groupat
predetermined time each week?

O AAllofthe above

® B.Periodic policy

© C.Scheduled policy

© D.Alarm policy

22, To whichofthe following scenarios does OCRapply?

© A. Image recognition

@ 8. Character recggnition

© C.Speech recognition

OD. Image processing


23, Which of the following components can be used to set an access controlwhitelist to allow specific IP
addresses to access load balancers?

© A. Backendserver

© 8B. Backend server group

@ C.Listener
R
O D.Health check

24, () records operations of VBS resources,facilitating query, audit, and backtracking.

O A.Cloud Eye

O 8.Elastic Volume Service

© C.Cloud Tracefgrvice

O D. Object Storage Service

25, Which ofthe following protocols requirescertificates?

@A nugps

O B.UDP

© c.TcP

O D.HTTP

26, Which of the following statementabout Direct Connect is incorrect?

O A.Currently, only the yearly/monthly billing mode is supported.

® B. Direct Connect usestheInternet tunneling technology on the public network.

© . To create a direct connection, users need to create a connection,a virtual gateway, and a virtual interface.

fo} D. Direct Connectis a high-speed, low-latency,stable, and secure dedicated network connection that connectsuser's
local data center to a VPC on a cloud.
27, Which ofthe following key technologies does SA use?

@ A.Bigdata

OB.Identity authentication

© .£ncryption

@ OD. Web crawlers

28, Which ofthe following CIDR blocks does the VPC service support?

G A.100.0.5/24

@ 8B. 10.0.25.0/24

@ Cc. 192.168.0.0/23

@ 0. 172.16.0.1/24

29. Which ofthe following are advantages of Cloud Eye?

©@ A. Multiple notification types

@ B. Visualized monitoring

@ C. Real-timeand reliable monitoring

@_D. Automatic provisioning

30, Which of the following types of images does IMS support?

@ A Public image

@ 8B.Private image

O C.Secret image

@ D.Shared image

31, A file system can be mounted to ().

© Aa Dedicated Computing Cluster (OCC)

OB. Bare Metal Server (BMS)

@ C.alinux—cs

@ D.a Windows ECS


32, Which of the following are advantages of Identity and Access Management(|AM)?

(@ Security control

@ 8. Federated identity authentication

(@ C. Agency management

@ D. Permission management

33, Which of the following HUAWEI CLOUD EI APIs are vision-related?

& A. Image recognition

@ 8B. Content Moderation

@ C.ImageSearch

@ OD. Face Recognition

34, Which of the following EVS disk types does ECS support?

@ A.Common /0

@ 8B.Ultra-high 1/0

@ C.High Oo

@ OD.Latency-optimized ultra-high 1/0.

1.Pain Points of Current Enterprise IT Infrastructure includes(multiple choices):

A. Slow Business Launch

B. Complicated Lifecycle Management


8

C. High TCO
8

D. 1/0 Bottleneck
1.Cloud Computing Characteristics include(multiple choices):

A. On-demand self-service

B. Broad networkaccess
8

C. Rapid scalability
8

D. Resource pooling

. Cloud Computing Deployment Models can be(multiple choices):

A.Private cloud

B. Industry cloud
a

C. Rapid cloud
oa

D, Public cloud

1.A regionis a distinct logical area.

O true

@ falseeW

2. An availability zone (AZ) contains one or multiple physical data centers.

@ truev

© false
1
-Huawei Cloud Network Services includes:

A. VPC

O B.OBS

Cc. ELB

© D.SFS

. Which of the Following Compute Services Does HUAWEI CLOUD Provide?(multiple choices)
=

A.Elastic Cloud Server(ECS)

B. AutoScaling (AS)

C, Image ManagementService (IMS)

©) D.Elastic Volume Service (EVS)

-Huawei Cloud Career Certifications includes: (multiple choices)


=

AHCIA

B.HICP

CHCIE

OO D.HICM

Which belongs to HUAWEI CLOUD Developer Center Ecosystem Catalog? (multiple choices)

A, Developer Contest

B. Cloud Expert

C, Sign-up Platform

D. MVP
1, The ITUAWEI CLOUD Partner Network (I ICPN) is a global partner program for | IUAWCI CLOUD.

© truev

O false

1. You can view, purchase, use, and operate various HUAWEI CLOUD service products after you have logged in to
the management console.

@ truv

O false

2, The management console manages various services such as computing, storage, network, security, management
and deployment, application services, databases,data analysis, enterprise applications, and DevCloud.

@ truev

O false

1.What is used by an ECSto store data?(single chaice)

© A.Auto Scaling

© B.Elastic Volume Service #

O C.Cloud Container Engine

© D.Cloud Eye

1, High-performance computing ECSsprovide a large number of CPU cores, large memory size, and high
throughput.

@ truev

© false

1. Linux OS support key-authenticated ECS logins.

@ truev

© false
1, Which of the following methods does AS use to expand resources?(multiple choice)

A. Dynamically expanding resources

B. Expanding resources as planned

@ C. Manually expanding resources


&

D. Automatically expanding resources

Quiz-2

0 points possible (ungraded)

1.AZ Specifies a physical region where resources use independent power supplies and networks. AZs are physically
isolated but interconnected throughan internal network.

@ truev

O false
1.AS supportsthe following instance removal policies:(multiple choices)

A.Oldestinstances created based onthe oldest configuration

B.Newestinstancescreated based onthe oldest configuration

C.Oldestinstances

D.Newestinstances

1.Which ofthe following policies does AS support?(multiple choices)

AAlarm policies

B.Scheduledpolicies

C.Periodic policies

O D.Monitoringpolicies
1.Private images can heclassified into: (multiple choices)

A.System disk image


a

B.Data disk image


a

C.Full-ECS image
a

© D.Snapshot

1.If the ECS uses a static IP address, configure DHCPforthe ECS,allowingit to dynamically obtain an IP address.

@ truev

O false

1. What image types does IMS support?(multiple choices)

A. Public image

B. Private image

© C. Encrypted image

D. Shared image

1.VBD EVSdisks support only basic SCSI read/write commands.

@ truev

© false

1.EVS can be attached to:(multiple choices)

© A.OBS

B.ECS

C.BMS

f) DPC
1.How many servers can a shared EVS disk be attached to at most?(single choice)

OAS

O B7

Oo C8

© D164

2.Which ofthe followings are EVS disk types?(multiple choices)

A.Ultra-high |/O

B.High /O

C.Common I/O

O D.Optimized I/O

1.HUAWEI CLOUD provides Cloud Server Backup Service (CSBS) and Volume BackupService (VBS) to protect your
data against:(multiple choices)

A.viruses

B.unintentional deletions

Csoftwarefaults

D. hardwarefaults

1.OBSis relatively inexpensive, reducing customers’ costs.

@® truev

O false

1.VBS provides the data backup function for EVS disks. The created data backupscan beusedto create EVS disks.

@ truev

O false
1.Object Storage Service (OBS) is a stable, secure,efficient, and easy-to-use cloud storageservice.

@ truev

© false

2. The Advantages of Product OBS are:(multiple choices)

A. Stable

B. Efficient

C. Secure

D. Easy to use

1.0BS supportsfine-grained permission control for buckets and objects through bucketpolicies.

© truev

© false

1.Users can collect OBS resource operation records through CTSservice to facilitate future query, audit and
backtracking.

@ ATrueY

O B. False
1.Advantagesof SFS include:(multiple choices)

A. File sharing

B, Elastic scalability

C. Superior performance andreliability

D. Durable

. CIFS is a protocol used for networkfile access.


=

@® truev

© false

2. A file system provides users with shared file storage service through NFSor CIFS.

© truev

O false

1.Which ofthe following are the application scenarios of SFS?(multiple choices)

A.Media processing

B.Log management
8

C.Content managementand webdirectories

D.High-performance computing (HPC)


1.Advantages of VPC are:(multiple choices)

A. Secure and Reliable

B, Flexible Configuration

C. High-Speed Access

D. Interconnection

1.A VPC providesanisolated virtual network for ECSs.

@® truv

O false

1. Which of the Following Functions Are Provided by HUAWEI CLOUD VPC?(multiple choices)

Customizing CIDR blocks

Customizing access control policies

Accessing the Internet using EIPs

Connecting a local data center using a VPN or Direct Connect connection


2.The related service includes: (multiple choices)

A. ECS

B. ELB

C. Cloud Eye

D. Cloud Trace Service

1.Advantages of ELB include: (multiple choices)

A, High availability

B, High flexibility

C. High performance

OD. High I/O speed

2.Basic Operations include:(multiple choices)

A, Create, delete, or query load balancers.

B. Add, modify, or deletelisteners.

C. Add or remove backend servers.

D. Create, modify, or delete certificates,

1,Which ofthe following load balancing algorithms are provided by ELB? (multiple chaices)

A. Weighted round robin

B, Weighted least connections

C, Source IP hash

OD, Encryption algorithm


2.Whichof the following protocols are supported by ELB? (multiple choices)

A. TCP

B. UDP

Cc HTTP

D. HTTPS

1.DC does not support BGP dynamic routing.

© true

® falsew

.In Route Mode, Static route and BGP are supported.

© truev

© false

1.Cloud Eyeis a monitoringservice that can help you capturethe status of your Direct Connect connections.

® truev

© false

1,Multiple Connections can access One VPC.

@ truev

© false

1.VPN is used to establish a secure and encrypted public network communication tunnel between the remote user
and the VPC.

@ truev

O false
1.Whatbilling modes does VPN support?(multiple choices)

A. pay by bandwidth

B. pay by networktraffic

OC. Pay by year/month

OD, Pay per use

1.Current VPN connection supports IPsec VPN protocol.

@® truev

© false

1. With data security as its core, HUAWEI CLOUD builds a series of security services to meet the particular
needs.security services include:(multiple choices)

A. Data Security

B. Host Security

C. Application Security

D. Network Security

2. Data Security includes:(multiple choices)

A. DEW

OB. HSS

O ccGs

D. DBSS
1.You can use Cloud Eye to:(multiple choices)

A.monitortheutilization of service resources

B.track the runningstatus of cloud services

C.configure alarm rules and notifications

D.respondto resource changes

. Which of the following security services can be usedto protect websites? (Multiple choices)

A.WAF

B.VSS

C.SCM

D.Anti-DDoS
8

2.Cloud Eye Advantagesinclude:(multiple choices)

A. Automatic provisioning

B.Real-time and reliable monitoring


8

C.Visualized monitoring
3

D. Multiple notification methods


8

1. Server Monitoring includes:(multiple choices)

A. Basic Monitoring

B. OS Monitoring

OC. CPU Monitoring

OD. Disk Monitoring


1. Advantages ofRelational Database Service include:(multiple choices)

A,InstantAvailability

B. High Reliability

C, High Security

D, Elastic Scaling

Which aggregation methods does Cloud Eye support?(multiple choices)

A. Max

B. Min

C. Avg

D. Sum

1. The Key Features of RDS include:(multiple choices)

A, High Availability

B. Backup and Restoration

C. DB Instance Monitoring

D. High security
1. You can reboota DB instance only whenits status is Available.

@® truev

© false

1.Among HUAWEI CLOUD EI services, ModelArtsusesthe self-developed Moxing deep learning framework to
accelerate algorithm developmentandtraining.

@ truev

O false

1.Al Applications in Vision include:(multiple choices)

A. Face Recognition

B. Image Recognition

C. Content Moderation

D. ImageSearch

1,DWSis the Enterprise - Class Data Warehouse.

© truev

© false

1, Massive Repetition Scenario makes you facus on high-valuedservices.

© truevd

O false

1, Opening APIs greatly promotes service innovation and standardization of existing services.

@ truv

O false
2. API Gateway doesn't supportall API integration and opening on HUAWEI CLOUD.

O true

@ falseW

1.You can enable API Gateway and create and manageAPIs for free.

@® truevd

O false
1. The minimum managementunit of RDSis an instance.
Yeah. Wrong
2. ECS refers to the Auto Scaling (AS) service.
Yeah. Wrong
3. Whatare the key features of IAM?
A. Centralized control of users and security credentials
B. Centralized user access control
C. User group-basedrights
D. Huawei customer service agent maintenance
4. The VPC subnet segment can be modified after being created.
Yeah. Wrong
5. VBS can create backups for EVS disks and use the backupstoroll back EVS
disks, ensuring user data accuracy and security to the maximum extent.
\Yeah. Wrong
6. Which of the following statements about KMS is incorrect?
A. Management cloud platform and tenant key
B. HSM (hardware security module)
C. Multi-layer key protection technology
D. Support for application combination
7. Which of the following doesnot exist in the listener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode

8. On the Dashboard page, you can add or delete monitoring icons of concerned
instances. Supports multi-indicator comparison so that users can view the
Yeah. Wrong
9. Relational Database Service (RDS) users can modify database configurations to achieve optimal performance.
Yeah. Wrong
10. The size of the exported imageis not limited.
Yeah. Wrong
11. The ASservice can only dynamically add or reduce server resources based on the specified time period.
Yeah. Wrong
12. Which of the following statements aboutSFSis correct?
A. A file system can be mountedto an ECS and canbelongtodifferent VPCs.
B. Parameters cannot be modified forthe file system that is successfully created.
C. The file system can access different AZs in the same VPC.
D. The performanceofthe SFS file system improveswith the increase of capacity.
13. Which of the following imagesis a standard image provided by the public cloud platform andisvisible to all users?
A. Public image
B. Private images
C. Shared image
D. Market image
14. The GPUis applicable to graphics rendering and engineering drawingin virtualization environments and desktop cloud scenarios.
Yeah. Wrong
15. Whatare the typesof AS policies?
A. Scheduled policy
B. Periodic policy
C. Alarm policy
|p. Randompolicy
16. Which of the following scenarios are involved in image replication?
A. Copying an unencrypted image to another unencrypted image
B. Replicating an unencrypted image as an encrypted image
C. Replicating an encrypted image as an encrypted image
D. Replicate an encrypted image to an unencrypted one.
17. Allowsusers to set read-only permissions for SFS.
Yeah. Wrong
18. Which of the following load balancing modesare not supportedbylisteners?
A. Maximum number oflinks
B. Polling
C. Set weights.
D. Minimum connection
19. Which of the following methods can be usedto set the access permission for anonymous users of OBS objects?
A. Set an ACL for the OBS bucket.
B. Set the ACL for OBS objects.
C. Set a policy for OBS objects.
D. Set a policy for the OBS bucket.
20. OBS supports batch upload.
Yeah. Wrong
21. WhatAre the Steps for Creating a Windows Image Using an ECS?
A. Configure the Windowsserver.
B. Install Cloudbase-Init.
C. Creating a Windowsprivate image
D. View and clear networkrule files.

22. You must stop the ECS beforeusing it to create an image.


Yeah. Wrong
23. Which of the following is not a major application scenario of VPC?
A. VMs access each other.
B. Desktop cloud access to Huawei Vmall
C. The VM accesses the external network.
D. VPN access to VMs

24. To implement dynamic resource expansion, which of the following policies is


selected when youcreate an AS policy?

A. Scheduled policy
B. Periodic policy
C. Alarm policy
D. Random policy
25. Which of the following parameters is used to automatically obtain an IP address during VPC creation?
A.DHCP
B. Network segment
C. Partitioning
D. Gateway
26. Which of the following is not the application scenario of Cloud Eye?
A. Daily resource management
B. Issue notification
C. Capacity adjustment
D. Operation audit
27. Which of the following is not a capability of DevCloud?
A. Project management
B. Code check
C. Compile and build
D. Data backup
28. Cross-VPCaccessto file system is supported.
Yeah. Wrong
29. WhatAre the ECS Login Authentication Modes?
A. PasswordB. PasswiC.Fingerprint D. Key pair
30. Huawei provides developers with functional development, which will help
developers integrate the functions developed by Huaweiwith their upper-layer
applications to build differentiated and innovative solutions.

Yeah. Wrong
31. Which of the following are RDS functions?
A. Create a databasecluster.
B. Expand the disk capacity.
C. Adding a read replica
D. Creating or restoring a snapshot
E. Restore the backup to a specified time point.
32. Whichof the following functions are provided by OBS Console?
A. Static website hosting
B. Multi-version control
C. Cross-domain resource sharing
D. Mounting external buckets

33. Attach the EVS disk to an ECS so thatthe disk can be used directly.
Yeah. Wrong
34. Which of the following statements about VBS are correct?
A. After an EVS disk is deleted, its backup datais also deleted.
B. After an EVS disk is deleted, you can use the backup to restore the EVS disk.
C. After an EVSdisk is deleted, you can still use the backup to create the EVSdisk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
35. How Can | Add Instances to an AS Group?
A.Scaling action
B. Manually add instances.
C. Change the number of expected instances.
D. AS configuration
36. Alarm ni ication is the action taken whenan alarmis triggered. Users can
set or disable alarm notification when creating or modifying an alarm.
Yeah. Wrong
From which aspects doessituational awarenessanalyze security posture?
A. Global perspective
B. User perspective
C. Managementperspective
D. Attacker perspective
38. After an application is created, you can change the application by replacing the image of the application.
Yeah. Wrong
39. ECSsare billed in yearly/monthly or pay-per-use mode.
Yeah. Wrong
40.A policy is configured for OBS bucketA to prevent any user from accessing
objects in the bucket. Bucket A contains object B, which is configured with the
ACL permission to allow anonymous usersto access object B. In this way, users
can access object B anonymously.
Yeah. Wrong
41. Which of the following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and home directory
D. High-performance computing

42. IMS providesflexible self-service and comprehensive image capabilities.


Users can create private images and use imagesto create ECSs in batches or
replicate ECSsin batches.

Yeah. Wrong
43. WhenIPSec VPNis used for communication, the encryption and decryption
check is performed onthe firewalls at both ends.
Yeah. Wrong
44. VBS doesnot support batch backup of EVS disks.
\Yeah. Wrong

45. Identity and Access Management(IAM)


Yeah. Wrong

A. Read permission
B. Write permission
C. ACL permission
D. Modify the ACL permission.
47. Which of the following is the image type converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
48. What are the concepts of VPC?
A. Subnet B.EIP C. Security group D. VPN

1. After an ECSis created, the bandwidth used bythe ECS cannotbe changed.
Yeah. Wrong
2. Which ofthe following operations is charged?
A. Create an EIP.
B. Create a subnet.
C. Create a VPC.
D. Create a security group.
3. Which of the following doesnotexistin thelistener creation configuration?
A. Load balancer protocol/port
B. VPC
C. HTTPS certificate
D. Load mode
4. Whichof the followingis not the target of the cloud computing security service?
A.Usersecurity
B. Cloud platform security
C. Data security
D. Service security
5. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content management and homedirectory
D. High-performance computing
6. Which of the following EVSdisks can be directly created on the EVS console?
A. System disk B. Data disk C. Delta disk D. Mirror disk
The ASservice must be used with Elastic Load Balance.
Yeah. Wrong
8. Which ofthe following statements about VBSare correct?
A. VBS has no quota limit.
B. If the capacity of an EVS disk is expandedafter the disk is backed up, the disk capacity remains unchangedafter the disk is restored using the backup data.
C. If you back up an EVS disk and then expandits capacity, you cannot use the backupto restore the disk
data. This is because the disk spacewill be restored to theoriginal size after the restoration.
D. After the capacity of an EVS disk is expanded,the disk space remains unchangedif the EVS disk is backed up and the backup is usedto restore data.
9. Whatis the full name of ECS?
Elastic Cloud Server

10. WhatArethe Stepsfor Creating a WindowsImageUsing an ECS?


A. Configure the Windowsserver.
B.Install Cloudbase-Init.
C. Creating a Windowsprivate image
D. View andclear networkrulefiles.
11. Which type ofimageis converted from theelastic and server images?
A. Public image
B. Private images
C. Shared image
D. Market image
12. To enable the log management function of an OBS bucket, which ofthe following permissions of the target OBS bucket must be granted to the log delivery user group?
A. Read permission
B. Write permission
C. ACL permission
D. Modify the ACL permission.
13. VPCs can be connected to traditional data centers throughprivate lines or VPNsto flexibly integrate resources.
Yeah. Wrong
14.If the capacity of the data disk attached to the ECSis insufficient, you must detachthe disk and purchase a new one.
Yeah. Wrong
15. The size of the exported imageis notlimited.
Yeah. Wrong
16. Whichof the following imagesis a standard image provided bythe public cloud platform andisvisible to all users?
A. Public image
B. Private images
C. Shared image
D. Market image

17. The VPC subnet segmentcan be modified after being created.


Yeah. Wrong
18. Which of the following componentsis not a componentofthe big data platform?
A.MapReduce
B.OpenStack
C.HDFS
DYarn
19. Attach the EVSdisk to an ECS so thatthe disk can be used directly.
Yeah. Wrong
20. The AS service can only dynamically increase or decrease server resources based on a specified period.
Yeah. Wrong
21. SFS cannotbe attached to an ECS running the WindowsOS.
Yeah. Wrong
22. After an ECSis created, you can changeits specifications if they do not meet your requirements.
Yeah. Wrong
23. Whatare the key features of IAM?
A. Centralized control of users and security credentials
B. Centralized user access control
C. User group-based rights
D. Huawei customer service agent maintenance
24. What are the important functions of IKE?
A. Negotiation protocol parameters
B. Protecting traffic security
C. Key negotiation and management
D. Peer identity authentication
25. The managementconsole can be used without login.
Yeah. Wrong
26. Whichofthe following statements aboutVBSis incorrect?
A. VBS is based on the snapshot technology and supports online backup.
B. VBS supportsfull backup and incremental backup.
C. You do not need to stop the server when using a backup to restore an EVSdisk.
D. When backing up EVSdisks, you do not needto stop the server.
27. Whatarethe alarm statuses of Cloud Eye?
A. Alarms B. Normal C. Insufficient dat D. Close
28. What Data Doesan ECS Use?
EVSdisk
29. After the external networktraffic reaches the load balancer, which of the following componentsis the first componentto receive the traffic?
AFirewall B.nginx CLVS D.Health Check
30. Whatis the return value whena user-defined monitoring indicator is successfully uploaded using the Open API?
Return value: 201
31. Before creating an imageusingan ECS,ensure that the ECS has been stopped.
Yeah. Wrong
32. The cloud security service system consists offive parts: networksecurity, data security, application security, security evaluation, and security support.
Yeah. Wrong
33. Database Service RDS Users Can Modify Database Configurations to Achieve Optimal Performance
Yeah. Wrong
34. Which ofthe following functions are supported by OBS Browser?
A.Static website hosting
B. Multi-version control
C. Cross-domain resource sharing

35. Whatare the application scenarios of VBS?


A. Hackerattacksorvirus attacks
B. Data is deleted by mistake.
C. Data archiving and retention
D. The application program is faulty.
36. In the cloud computing environment, confidentiality, integrity, and availability are still the fundamental security requirementsof users.
Yeah. Wrong
37. RDS can meet the ever-changing requirementsof the gaming industry, shorten the R&D period, and reduce R&Dcosts.
Yeah. Wrong
38. Multiple EVS disks can be attached to an ECS.
Yeah. Wrong
39. Which of the following statements about SFSare correct?
A.A file system can be mountedto an ECS and can belong to different VPCs.
B. Parametersof created file systems cannot be modified.
C. The file system can access different AZs in the same VPC.
D. The performance of the SFS file system improves with the increase of capacity.
40. Which ofthe following are RDS functions?
A. Create a databasecluster.
B. Expandthe disk capacity.
C. Adding a read replica
D. Creating or restoring a snapshot
E. Restore the backup to a specified time point.
41. Which ofthe following load balancing modesis not supported bylisteners?
A. Maximum nun B. Polling C. Set weights. D. Minimum connection

42. Create an OBS bucket, enable versioning for the bucket, upload object aaa for three times, disable
versioning for the bucket, and upload object aaa for three times. After the preceding operations are
complete, how manyobjectsare displayed in the bucket basic information?
Quantity: 4
43. Whichofthe following statements about Anti-DDoS traffic awarenessis incorrect?
A. Web vulnerability security detection
B. Configures and modifies anti-DDoS parameters for public IP addresses.
C. Provides protection for public IP addresses of ECSs and load balancing devices.
D. Monitors a single public IP addressin the obstetrics department, including the current defense status,
current defense configuration parameters,traffic since 24 hours ago, and one event within 24 hours.

1. If two sites communicate with each otheracross the Internet, IPSec VPN can be deployed on
the firewalls at both sites to protect the mutual accesstraffic betweenthe intranets at the two
sites.
Yeah. Wrong
2. Which ofthefollowing statements about hybrid cloudis incorrect?
‘A. Unified management ofpublic and private cloud resources
B. Service resourcesare migrated betweenthe public cloud and private cloud.
C. Optimal resourceallocationthrough hybrid cloud
D. Applications can only be deployedonthe public cloud.
3. Cloud computing is a modelthatenables users to obtain required resources from the shared
pool of configurable resources anytime, anywhere, and on demand.
Yeah. Wrong
4. All types of HUAWEI CLOUDproducts can be viewed on the managementconsole.
Yeah. Wrong
5. Whichofthefollowing doesnotexist in the configuration for creatinga listener?
A. Load balancer protocol/port
B. VPC
C. HTTPScertificate
D. Load mode
6. Whichofthefollowingis not a major function of WTP?
A. Websitefile protection
B. Alarm information recording
C. Protection details stati S
D. SQLinjection prevention
7. Which of the followingare the main functions of HID?
A.Bruteforce cracking detection
B. Remotelogin notification
C. Weak password detection
D. Checkthe database processpermission.
E. Webpage file detection
8. Whentheaveragevalueis selected as the aggregation mode, the peak values may be inconsistent when users switch the data range.
Yeah. Wrong
9. Which of the following statementsis incorrect?
A. Create a folder named br..ra/1 in the OBS bucket.
B. OBS Console supportsbatch deletion of buckets.
C. OBS Console supports batch deletion of objects.
D. A user has created 101 buckets using OBS Console.
10. Whichofthefollowing functionsare provided by the ECS service?
‘A. Users can create and delete VMs, modify VM specifications, andstart and shut down VMs.
B. Users can add and uninstall extension NICs, add EIPs, and attach and detach disks.
C. Users can view information about their ECSs on the management console.
D. Users can set ECS alarm rules.

11. RDS meets the ever-changing requirementsof the gaming industry, shortens the R&D period, and reduces R&D costs.
Yeah. Wrong
12. Which of the following services can work with EVS?
A. Elastic Cloud Server
B. Image ManagementService (IMS)
C. Volume Backup Service (VBS)
D. Cloud monitoring service
13. Application security is an importantpart of the cloud security service. It ensures the
security of elastic cloud computing servers and cloud computing applications running on them
from the perspective of operating system and application security protection.
Yeah. Wrong
14. Which of the following statements about VBS is incorrect?
A. VBS is based on the snapshot technology and supports online backup.
B. VBS supportsfull backup and incremental backup.
C. You do not needto stop the server whenusing a backup to restore an EVSdisk.
D. When backing up EVS disks, you do not need to stop the server.
15. Which ofthe following are the main application scenarios of SFS?
A. Media processing
B. Log management
C. Content managementand home directory
D. High-performance computing
16. Whatare the application scenarios of VBS?
A. Hackerattacks orvirus attacks
B. Data is deleted by mistake.
C. Dataarchiving andretention
D. The application program is faulty.
21. An availability zone (AZ) is a collection of one or more physical data centers with
independentcooling, fire extinguishing, moisture-proof, andelectricity facilities. Within an AZ,
computing, network, storage, and other resourcesare logically divided into multiple clusters.

Yeah. Wrong
22. Which type of image is converted from an ECS?
A. Public image
B. Private images
C. Shared image
D. Market image
23. Which of the following operations can be performed by a shared image provider?
A. Sharing a specified image
B. Delete the shared image.
C. Add a tenant to whom an image is shared.
D. Delete the tenant who shares the image.
24. Which of the following statements about the ELB function cannot be implemented?
A. Eliminate single points offailure.
B. Sharing service node pressure
C. Check the health status of service nodes.
D. Layer 2 and Layer 3 data forwarding
25. When enabling Direct Connect, whatis the port type if the port type is 10GE?
Optical port
26. How long doesit take to apply for an ECS?
A few minutes.
27. OBS supports batch upload.
Yeah. Wrong
28. What are the types of EVS disks?
A. More than I/O B. High I/O C. Common |/C D. Optimized 1/0
29. The VPC subnet segment can be modified after being created.
Yeah. Wrong

30. Data security ensures confidentiality and integrity of user data applications and storagein the cloud computing environment.
Yeah. Wrong
31. Before creating an imageusing an ECS, ensurethat the ECS has been stopped.
Yeah. Wrong
32. Users cannotdeployservice applications on ECSsasif they wereusingtraditional servers.
Yeah. Wrong
33. Whichofthefollowingis not a basic concept of ELB?
A.Firewall
B. Load balancer
C. Listener
D.Instance (VM orapplication container)
34. Whichofthefollowingis not the main application scenario of KMS?
A.Data transmission encryption
B. Personal data encryption
C. Coreservice data encryption
D. Key information asset encryption
35. Which of the following statements aboutVBS are correct?
A. After an EVSdisk is deleted, its backup data is also deleted.
B. After an EVSdiskis deleted, it can be restored using a backup.
C. After an EVSdisk is deleted, you can still use the backup to create the EVS disk.
D. After an EVSdisk is deleted, its backup data will not be deleted.
36. Which of the following componentsis not included in the big data platform?
A.MapReduce
B.OpenStack
C.HDFS.
D.Yarn
41. VPCs can be connected totraditional data centers through private lines or VPNstoflexibly integrate resources.
Yeah. Wrong
42. After an ECSis created,its bandwidth cannot be modified onceit is determined.
Yeah. Wrong
43. The webapplicationfirewall performs anomaly detection on HTTPrequeststo effectively
prevent malicious network intrusion behaviors such as web page tampering, information
leakage, and Trojan horse implantation.
Yeah. Wrong
44, Whatare the advantagesof SFS over traditional file sharing storage?
A.File sharing
B. Seamlessintegration
C. The operationis simple butthe cost is high.
D. High reliability
45. When multiple VMsare created, you can bind an EIP to multiple VMsto enable the VMsto accessthe Internetat the sametime.
Yeah. Wrong
46. IMSprovidesflexible self-service and comprehensive image managementcapabilities.
Users can create private images and use the imagesto create ECSsor load ECSsin batches.
Yeah. Wrong
47. RDSusers can modify database configurationsto achieve optimal performance.
Yeah. Wrong
48. A policyis configured for OBS bucketA to prevent any userfrom accessingobjectsin the
bucket. Bucket A contains object B, which has an ACLthat allows anonymoususers to access.
Then,users can access object B anonymously.
Yeah. Wrong
49. Alarm notificationis the action taken whenan alarm is triggered. Users can setor disable
alarm notification when creating or modifying an alarm.
Yeah. Wrong

1, Whatare the componentsof an ECS?


A.CPU B. Memory C. MirrorinD. Elastic Volume Service
2. What operations do | need to perform to enable the created application to be accessed from the external network?
A. The numberof nodesin the cluster exceeds 2.
B. The memory of each node exceeds 2 GB.
C. Release an application as a service when creating the application.
D. The Elastic Load Balance must be bound.
3. How Long DoesIt Take to Apply for an ECS?
A few minutes.
A. Which ofthe following protocols are important in the IPSec framework?
AIP B.IKE CAH D.ESP.
5. Whatare the types of VPNs based onservice usage?
A.Access VPN
B.Intranet VPN
C.Extranet VPN
D.Lay2 and Lay3 tunnel VPN
6. Attach the EVS disk to an ECS.
Yeah. Wrong
7. Which ofthe following statements about VBSis incorrect?
A. VBS is based on the snapshot technology and supportsonline backup.
B. VBS supportsfull backup and incremental backup.
C. You do not need to stop the server when using a backup to restore an EVS disk.
D. Whenbacking up EVSdisks, you do not need to stopthe server.
8. EVS disks can be used only with ECSs.
Yeah. Wrong
9. Whencreating multiple VMs, you can bind oneEIP to multiple VMsto enable them to accessthe Internet at the sametime.
Yeah. Wrong
10. Whencreating an ECS, youcan use thefile injection function provided by the system toinitialize the ECS.
Yeah. Wrong

11. Which ofthe following statements about Anti-DDoStraffic cleaning is incorrect?


A. Webvulnerability security detection
B. Configures and modifies anti-DDoS parameters for public IP addresses.
C. Provides protection for public IP addresses of ECSs andload balancing devices.
D. View the monitoring capability of a single public IP address.
12. Which ofthe following are the main functions of HID?
A. Brute force cracking detection
B. Remote login notification
C. Weak password detection
D. Check the database process permission.
E. Web pagefile detection
13. What computing services does Huawei public cloud provide?
A.Autoscalingservice
B. Elastic Cloud Server
C. Image ManagementService(IMS)
D. Elastic Volume Service
14. The webapplicationfirewall performs anomaly detection on HTTP requeststo effectively prevent mal us network intrusion behaviors such as web page
tampering, information leakage, and Trojan horse implantation.
Yeah. Wrong
15. Which of the following statementsaboutthe positioning of Huaweicloud servicesare correct?
Focus onthelaaSlayer, enable the PaaS layer, and aggregate the SaaSlayer.
16. To enable the log managementfunction of an OBS bucket, whichof the following permissionsof the target OBS bucket must be granted to the log delivery user group?
A. Read permission
B. Write permission
C. ACLpermission
D. Modify the ACL permission.
17. VBScan create backups for EVS disks and use the backupstoroll back EVSdisks, maxi \g user data accuracy andsecurity.
Yeah. Wrong
18. Which of thefollowing statements aboutthe ELBfunction cannot be implemented?
A. Eliminatesinglepointsoffailure.
B, Sharing service nodepressure
C. Health checkfor service nodes
D.Layer 2 andLayer 3 data forwarding
19. Cloud computing is a modelthat enables users to obtain required resourcesfrom the shared pool ofconfigurable resources anytime, anywhere,and on demand.
Yeah. Wrong
20. Which ofthefollowingis not a majorfunction of Anti-DDoS?
A. DDoSattack protection
B. Monitoring a single IP address
C. Report on interceptionof a single IP address
D.Periodically scan ECS vulnerabilities.

21. How Can I Add Instances to an AS Group?


A. Scaling action
B. Manually add instances.
C. Modify the expectedinstance
D. ASconfiguration
22. The SFScan controlthe read-only permission ofusers.
Yeah. Wrong
23. Which ofthe following statements about health check are correct?
A.If no recovery is received within the timeoutperiod,a failure is considered.
B. Check whetherthe path protocol supports HTTPS.
C. Whenthe numberoffailures exceeds the health threshold, the service is unavailable.
D. When the number offailures exceeds the unhealthy threshold, the service is unavailable.

The ASservice must be used with Elastic Load Balance.


Yeah. Wrong
25. Whichofthe following service resource metrics can be monitored by Cloud Eye?
A.Virtual private cloud
B. Elastic computing service
C. Distributed cache service
D. Elastic Load Balance
26. IPSec VPNis an encrypted tunnelcalculation. It uses encrypted security services to establish confidential and secure communication tunnels betweendifferent
networks. Whichof the following is not the feature that ensures packet transmission on the public network?
A. Timelines B. Integrity C. AuthentiD. Confidentiality
27. How Can| Monitor ECSs?
A. Cloud Container Engine
B. Cloud Eye
C. Elastic scaling
D.Virtual private cloud
28. Whichofthe following aggregation modesis supported by instance monitoring in Cloud Eye?
A. Maximun B.Square dif C. Standarc D. Average
29. Whatis the maximum numberof alarm rules thatcan be configured?
1000 records
30. Whichofthe followingload balancing modesare not supported bylisteners?
A. MaximunB.Polling _C. Set weig D. Minimum connection
31. Whichofthe followingis not a major function of SIS?
A.Security level assessment
B. Active and passive security concepts
C.Security configuration evaluation
D.Securityintelligence collection
32. Whatare thetypes of ASpolicies that can be configured for AS?
3 types
33. VPCscanbe interconnected withtraditional data centers throughprivate lines or VPNs to flexibly integrate resources.
Yeah. Wrong
34, Which of the following services can be used together with RDS to ensure network security isolation between RDSinstances andotherservices?
A.ECS B.VPC C.CES, D.OBS
35. Which of the following shared file systems can be directly deleted?
A.Creating B. Unavailabl C. Deleting D. Deletionfailed.

36. Which of the following statements about SFS are correct?


A. A file system can be mountedto an ECS and can belongto different VPCs.
B. Parameters of created file systems cannot be modified.
C. The file system can access different AZs in the same VPC.
D. The performance of the SFSfile system improves with the increase of capacity.
37. Which of the following constitute the Huawei public cloud ecosystem?
A. Application market
B. Developer community
C. Partners
D. Huawei and service certification engineers
38. Which ofthe following imagetypes are supported by IMS?
A. Public image
B.Private images
C. Shared image
D.Secret mirroring
39. Multiple EVS disks can be attached to an ECS.
Yeah. Wrong
40. The GPUis applicable to graphics rendering and engineering drawingin the virtualization environment and desktopcloud scenarios.
Yeah. Wrong
41. Whichofthe followingfunctions are supported by OBS Browser?
A. Static website hosting
B. Multi-version control
C. Cross-domain resourcesharing
D. Mounting external buckets
42. Networksecurity, as an importantpart of cloud security services, implementsnetworkisolation to cope with network attacks and ensure network security.
Yeah. Wrong
43. Whichofthe following statements is incorrect?
A. Create a file named br..ra/1 in the OBS bucket.
B. OBS Console supports batch deletion of buckets.
C. OBS Consolesupportsbatch deletion of objects.
D. A userhas created 101 buckets using OBS Console.
44, How manytypesofusers canlog in to Huawei Enterprise Cloud?
2 types
45. How Many EVSDisks Can Be Attached to an ECS?
10 PCS
46. Whenan EVSdiskis detached from an ECS, the data on the EVS disk will be lost.
Yeah. Wrong
47. Whichofthe following parameters is used to automatically obtain an IP address during VPC creation?
A.DHCP B. Network C. Partition D. Gateway
48. If the capacity of the data disk attached to the ECSis insufficient, you must detach the disk and purchase a new one.
Yeah. Wrong
49. Whichofthe following EVSdisks can be directly created on the EVS console?
A. System d B. Data disk C. Delta dis D. Mirrordisk
50. Which ofthe following is not an advantage of CES?
A. Real-time
B. Save money
C. Multiple notification modes
D. Monitoring third-party non-HUAWEI CLOUDservices
51. Relational Database Service (RDS) users can modify database configurations to achieve optimal performance.
Yeah, Wrong
52. The AS service automatically adjusts service resources based on service requirementsand policies.
Yeah. Wrong
53. What CanI Do If the Disk Capacity of an ECSIs Insufficient?
A. Detachinga disk
B. Reinstall the operating system.
C. Expandthedisk capacity.
D. Changethe operating system.

You might also like