Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

1.

Virtualization features include partitioning, isolation, encapsulation, and


independence.
True
False

2. The measurable service feature of cloud computing refers to charging based


on time and usage.
True
False

3. Hybrid cloud is a deployment mode that integrates features of the public


cloud and private cloud. The industry cloud is a form of hybrid cloud.
True
False

4. A Docker image is a key component of Docker. It is used to create a Docker


container. It can only be read and cannot be modified directly.
True
False

5. The IMC policy supports hot migration of CPUs of different models from
different vendors. This ensures that hosts in the cluster provide the same
CPU function set for VMs.
True
False

6. The virtualization technology can improve hardware resource utilization and


reduce O&M costs. Cloud computing also has these advantages. Therefore,
cloud computing and virtualization technologies are inseparable from each
other.
True
False

7. After the disks in an array form a RAID group, the server connected to the
disk array cannot directly access the RAID group. Therefore, you need to
divide the disk array into logical LUNs before allocating them to the server
True
False

8. If a security group is deleted, the rules in the security group will be deleted
as well.
True
False

9. On Huawei FusionCompute, a management IP address must be configured


for each DVS to facilitate unified management.
True
False

10. In Huawei FusionSphere, the memory and CPU resources used by a VM


can only be provided by the same cluster. Therefore, a maximum of
computing resources that can be used by a virtual machine cannot exceed a
sum of resources available to all hosts in the cluster.
True
False

11. The virtualization technology can be used to virtualize a physical server


into multiple VMs, improving the hardware performance of the physical
server.
True
False

12. In OpenStack, Ceilometer provides charging capabilities.


True
False

13. Virtualization consists of computing virtualization, storage virtualization,


and network virtualization, corresponding to cloud hosts, cloud hard disks,
and cloud networks in cloud computing
True
False

14. After the memory overcommitment technology is used, the physical


memory of the 128G can provide 150G virtual memory.
True
False

15. The Libvirt can connect to various Hypervisors to provide APIs in various
languages. It is completely transparent to upper-layer users.
True
False

16. Huawei FusionCompute is able to check the usage of global physical


resources during VM running, calculate the optimal host for the VM based
on the intelligent scheduling algorithm, and enable the VM to run on the
optimal host by means of live migration, thereby improving the overall
service experience.
True
False

17. The user cloud desktop cannot access the Internet normally. It must be that
the north-south traffic has failed.
True
False
18. When the VM is accessed using VNC, the network is no longer required.
True
False

19. In the KVM, the I/O virtualization performance is poor by using the
QEMU. If the Virtio is introduced, the NIC rate can be improved.
True
False

20. Which of the following statements about creating a VM template is


incorrect?
A. Converting a snapshot into a template

B. Clone the template as a template.

C. Clone a VM as a template.

D. The VM is converted to a template.

21. Which of the following statements about big data and cloud computing are
correct?
A. Cloud computing refers to a collection of data that cannot be captured, managed, or
processed using common software tools within a certain period of time.

B. Big data can be used as a cloud computing service for users to select.

C. Cloud computing cannot be used as the underlying computing resource for big data
processing.

D. Big Data is a pay-per-use model that provides available, convenient, and on-demand
network access.

22. In Huawei FusionCompute, which of the following statements about the


IMC function is false?
A. You are advised to enable the IMC function when the CPU models of CNA hosts in the
cluster are inconsistent.

B. If the IMC function is enabled, VMs cannot be migrated between hosts with different CPU
models. Determine whether to enable the IMC function based on the site requirements..

C. You are advised to enable the IMC function when the memory sizes of CNA hosts in the
cluster are inconsistent.

D. IMC only supports the VM migration from an earlier CPU generation to a later CPU
generation.

23. Which of the following technologies is used to prevent phone harassment


and add the phones marked as sales to the blacklist?
A. Port aggregation
B. Default gateway

C. Security group

D. Port group

24. In the development history of the Internet, which of the following key
milestone events is not related to the emergence and development of cloud
computing?
A. The University of California, Los Angeles, uses computers to send "lo" to another
calculation at the Stanford Institute.

B. Reconciliation between American network music service providers and media companies

C. www open to the public

D. TCP/IP protocol standard establishment

25. Which of the following statements about the FusionCompute cluster is


correct?
A. A cluster can have only one type of data store.

B. The cluster cannot be deleted when it is created.

C. All VMs in the cluster can share one MAC address.

D. A complete cluster should contain computing, storage, and network resources.

26. In the following RAID types, there is no data redundancy protection for ().
A. RAID 0

B. RAID 10

C. RAID 1

D. RAID 5

27. Which of the following operations for creating port groups in Huawei
FusionCompute is false?
A. Set the name of the port group to "test".

B. Set the port type to Common.

C. Set the VLAN ID to 5000.

D. Enter "This is a test port." in the description.


28. There are many milestone events in the development of the Internet. Which
of the following is true about the time sequence of the milestone events?
A. Establishment of the TCP/IP protocol ---> Birth of ARPANET ---> "www" officially open
to the public ---> Birth of DNS

B. Birth of ARPANET ---> Establishment of the TCP/IP protocol ---> Birth of DNS --->
"www" officially open to the public

C. "www" officially open to the public ---> Birth of DNS ---> Establishment of the TCP/IP
protocol ---> Birth of ARPANET

D. Birth of DNS ---> Establishment of the TCP/IP protocol ---> Birth of ARPANET --->
"www" officially open to the public

29. The KVM virtualization architecture includes the KVM module, QEMU,
and Libvirt. Which of the following statements about these modules is false?
A. QEMU is responsible for I/O operation simulation.

B. Libvirt+QEMU can form a virtualization solution.

C. KVM module is responsible for creating vCPUs and allocating virtual memory

D. KVM+QEMU can form a virtualization solution.

30. When creating a port group on FusionCompute, set VLAN ID to 10. Which
of the following statements is incorrect?
A. The system will discard the data frames with a tag other than VLAN 10 that pass through
the port group.

B. The system will untag the data frames with the VLAN 10 tag that pass through the port
group and then forward the data frames.

C. The system will add the VLAN 10 tag to the data frames without a VLAN tag that pass
through the port group and then forward the data frames.

D. The system will change the tag of data frames with a non-VLAN-10 tag that pass through
the port group to VLAN 10 and then forward the data frames.

31. Which of the following statements is correct? ()


A. The Ethernet frames sent from the Access interface to the peer device can be labeled.

B. The data transmission on the network is carried out in the form of broadcast.

C. VLAN can be divided only based on switch ports.

D. The method of processing the frames sent by the trunk interface is as follows: If the
VLAN ID is the same as the default ID and the VLAN ID is allowed to pass through the
interface, remove the Tag, and send the packet.
32. When creating a port group on FusionCompute, set VLAN ID to 0. Which
of the following statements is true?
A. Allows only data packets with VLAN0 labels to pass through the local port group.

B. Allow 0 packets with VLAN tags to pass through the local port group.

C. Do not modify the data packets that pass through the port group.

D. Set the VLAN tag of the packets that pass through the port group to 0.

33. What is the function of memory limit in Huawei FusionCompute?


A. When the memory resources are sufficient, ensure the upper limit of the VM memory.

B. Ensure the lower limit of the VM memory when memory resources are preempted.

C. Limit the upper limit of the VM memory when memory resources are preempted.

D. Ensure that the lower limit of the VM memory is sufficient when memory resources are
sufficient.

34. Which of the following technologies can be used to describe "Birds of a


feather flock together"?
A. Snapshot

B. VLAN

C. HA

D. Security group

35. Which of the following technologies on the switch can improve the link
rate?
A. VxLAN

B. LACP

C. VLAN

D. LDAP

36. Which of the following statements about the relationship between VRM
and CNA is correct?
A. The VRM can be installed only after the CNA is installed.

B. CNA must be a Huawei server.

C. VRM is a VM running on the CNA.

D. Restart the CNA host on the Portal page provided by the VRM.
37. On Huawei FusionCompute, you need to modify a disk of a VM. The
following operations can be performed on ( ):
A. Change the disk status from Available to Unavailable.

B. Change the disk mode from "Dependent" to "Independent & persistent"

C. Change the disk configuration mode from thin to common.

D. Change the disk capacity from 80 GB to 8 GB.

38. Which of the following scenarios is not suitable for improving the memory
overcommitment ratio?
A. Reduce the customer's hardware procurement cost.

B. The VM memory usage is low.

C. When the performance is ensured, the customer requires that the maximum number of
VMs be deployed on a single host.

D. In commercial scenarios, the memory overcommitment rate has reached 150%.

39. Which of the following file formats does not support VM creation in
FusionCompute?
A. .qcow2

B. .ova

C. .ovf

D. .vmdk

40. When creating a port group on FusionCompute, set VLAN ID to 0. Which


of the following statements is true?
A. Do not modify the data packets that pass through the port group.

B. Allow 0 packets with VLAN tags to pass through the local port group.

C. Allows only data packets with VLAN0 labels to pass through the local port group.

D. Set the VLAN tag of the packets that pass through the port group to 0.

41. Which of the following modules is responsible for providing persistent


block storage in the OpenStack solution?
A. Nova

B. Cinder

C. Glance
D. Swift

42. Which of the following is true about the on-demand self-service feature of
cloud computing?
A. The cloud computing service providers only need to prepare the cloud services and users
will complete the remaining process all by themselves.

B. When using cloud computing resources, users need to solve all problems by themselves.

C. After determining the required cloud computing services, users can apply for cloud
computing resources by themselves.

D. Users do not need to communicate with service providers at all when using cloud
computing resources.

43. What can I do if a disk is not involved in a snapshot of a VM on Huawei


FusionCompute?
A. Set the disk mode to independent-persistent or independent-non-persistent.

B. Set the configuration mode to normal delay zeroed.

C. Set the capacity to 10G.

D. Set Type to Share.

44. Raid5 requires at least () hard disks.


A. 3

B. 4

C. 5

D. 2

45. Which of the following storage resources need to be added?


A. FC SAN

B. NAS

C. Advanced SAN

D. IP SAN

46. Which of the following statements about the relationship between port
groups and VLANs on Huawei FusionCompute is correct?
A. In the trunk type, one port group can correspond to one VLAN.

B. In the trunk type, one port group can correspond to multiple VLANs.
C. In a common type, one port group can correspond to one VLAN.

D. In a common type, a port group can correspond to multiple VLANs.

47. Which of the following statements about KVM virtualization are correct?
A. Guest OS can be Linux.

B. Guest OS can be Windows.

C. Host OS can be Linux

D. Host OS can be Windows.

48. Which of the following methods are used to implement memory


overcommitment?
A. Memory Cache

B. Memory Ballooning

C. Memory Swapping

D. Memory sharing

49. Which of the following parameters can be configured for Huawei


FusionCompute CPU QoS feature?
A. Average

B. Quota

C. Reserved

D. Limit

50.Which of the following methods can be used to create VMs on Huawei


FusionCompute?
A. Manually create

B. Use the VM to clone

C. Use the template to deploy

D. To import the VM.

51. Which of the following statements about the mapping between VMs and
DVSs are correct on Huawei FusionCompute?
A. If a VM has multiple NICs, each NIC can be associated with a DVS.

B. If a VM has multiple NICs, multiple NICs can be associated with the same DVS.
C. If a VM has one NIC, the NIC can be associated with multiple DVSs.

D. If a VM has one NIC, the NIC can be associated with only one DVS.

52. What are the functions that take effect at the cluster level on Huawei
FusionCompute?
A. Memory overcommitment

B. DRS

C. Security group

D. CPU Quota

53. Which of the following statements about RAID are correct?


A. A RAID group can be regarded as storage space consisting of two or more disks. The
available capacity of a RAID group is the sum of the capacity of disks in the group.

B. RAID improves the I/O performance of a storage system by concurrently reading and
writing data on multiple disks.

C. Compared with RAID 5, RAID 6 has stronger data recovery capability, but weaker
read/write capability of disks.

D. When a disk is damaged, other disks in RAID 5 can still work properly, and the disk I/O
performance is not affected.

54. Which of the following operations are correct when you add shared storage
to multiple hosts on Huawei FusionCompute?
A. Select all hosts when associating storage devices.

B. Select the corresponding host when adding data storage.

C. Select all hosts when initializing storage resources.

D. When the shared storage is IP SAN, make sure that the storage network of the host is
connected to the service ports of storage.

55. Which of the following statements about Virt-manager are correct?


A. Virt-manager is an open-source KVM VM management tool.

B. Virt-manager is a KVM VM management command set.

C. Virt-manager is a commercial KVM VM management tool.

D. Virt-manager is a graphical management tool for KVM VMs

56. In Huawei FusionCompute, if a VM is bound to a host, () is affected.


A. Hot migration

B. Snapshot

C. DRS

D. Memory hot-add

57. Which of the following devices have the routing function?


A. Router

B. Layer 2 switch

C. Distributed virtual switch

D. Layer 3 switch

58. Which of the following are features of FusionSphere?


A. Various O&M management

B. Automatic scheduling

C. Compatible with various software and hardware

D. On-demand resource allocationz

59. How can a VM obtain a MAC address on Huawei FusionCompute?


A. The VM obtains the MAC address after requesting it from the CNA host.

B. VRM Allocate MAC addresses based on the MAC address segment.

C. The administrator manually configures the MAC address for the VM based on the site
requirements.

D. MAC address used for copying a template

1. In Huawei FusionComputer, Dynamic Power Management (DPM) depends on DRS.

Answer: True

2. Huawei FusionCompute DRS rules do not take effect for VMs with USB devices attached.

Answer: True

3. In computing virtualization, the operating system running in a VM is referred to as the host


OS.

Answer: False
4. In Huawei FusionCompute, a DVS can be configured with static routes and multiple types of
dynamic routes.

Answer: False

5. In a NAS environment, data inconsistency may occur when multiple hosts write data to one
file at the same time.

Answer: True

6. The function of loT is only to collect the data generated by everything.

Answer: FALSE

7. In computing virtualization, the hypervisor is an intermediate software layer running


between the physical server and the OS. It monitors the status of the host OS.

Answer: True

8. Some virtualization technologies are open-source and some are closed-source. So does the
cloud computing management platform. The open-source cloud computing management
platform needs to be implemented by open-source virtualization technologies.

Answer: False

9. SATA disks use parallel posts and SAS disks use serial posts.

Answer: False

10. loT devices may be connected to the internet and can be controlled through the internet.

Answer: True

11. In Huawei FusionCompute, users can create VMs by importing a VM template file. Which of
the following file format is not.

Answer: vmdk

12. In Huawei FusionCompute, the VLAND ID of port group is set to 0, which indicates ( ).

Answer: The data frames that pass through the port group will not be modified.

13. Which of the following operating systems allows users to format disks in New Technology
File System (NTFS) format?

Answer: Windows

14. Which of the following statements about live migration and cold migration is false?

Answer: Memory data and disk data are migrated during live migration and cold migration.

15. The KVM virtualization architecture includes the KVM module, QEMU, and Libvirt. Which of
the following statements about these modules is false?

Answer: Libvirt and QEMU can form a virtualization solution.

16. Which of the following does not reflect the self-service feature of cloud computing?
Answer: Engineer D receives and SMS notification from the cloud services provider one week
before the ECS experes.

17. The universal storage space unit mapped to the host in the disk array is ( ), which is the
logical space created based on RAID.

Answer: LUN

18. Which of the following scenarios are snapshots inapplicable to?

Answer: Long-term storage of service data.

19. Which of the following is false about the VIMS file system?

Answer: VIMS is a universal storage virtualization file system in the industry

20. In Huawei FusionComputing, which of the following is false about the host storage ports?

Answer: Local disks and FC SAN devices can be interconnected with storage devices without
adding storage ports.

21. Which of the following statements about CPU resource QoS and memory resource QoS is
false?

Answer: Memory QoS can be used only when memory overcommitment is enabled.

22. In Huawei FusionCompute, which of the following statements about memory


overcommitment is false?

Answer: After memory overcommitment is disabled, the total memory size of all VMs is less than
or equal to the total available physical memory size.

23. Which of the following RAID levels has the highest disk space usage?

Answer: RAID 0

24. When the FusionCompute uses Internet Protocol storage area network (IP SAN) storage, the
steps for creating disks include:

Answer: Add storage ports on the host – Create storage resources-Add datastores – Create
disks

25. Which of the following s false about iSCSI and Fibre Channel?

Answer: The transmission distance of FC is longer than that of the TCP/IP.

26. In Huawei FusionCompute, if VMs need to be migrated between CAN hosts with different
CPU modules, which of the following functions must be enabled?

Answer: Cluster IMC policy


27. If a VM needs to communicate with other VMs, which of the following operations is
mandatory?

Answer: Add at least one NIC for the VM.

28. Which of the following statements about the cluster, host, and VM in Huawei Fusincompute
is false?

Answer: Whether multiple hosts belong to the same cluster depends on whether they use the
same shared storage.

29. In Huawei FusionCompute, the uplink is used to ( ).

Answer: Connect a virtual network to a physical network.

30. Which of the following is not included in snapshot management functions?

Answer: Modifying a snapshot

31. In Huawei FusionCompute, which of the following statements about live migration is false?

Answer: Storage live migration can be performed only in the same storage device under storage
virtualization management.

32. Fog compute is a distributed computing model that extents cloud computing concepts to
network edges to support Low-latency and distributed applications in mobile and Intrnet of
Things (IoT) fields. Which of the following statements about fog computing is false?

Answer: Fog computing delivers higher network reliability and physical device security than
cloud computing.

33. Artificial intelligence (AI)is a new science of researching and developing theories, method,
technologies, and application systems to imitate and enhance human intelligence. Which of
the following statements about AI is false?

Answer: AI is a technology in which objects are interconnected through the network to


exchange information.

34. In Huawei FusionCompute, the default alarm levels do not include ( ).

Answer: Moderate

35. Which of the following statements about relationship between cloud computing and IoT is
false?
Answer: Data transmission in IoT depends on cloud computing.

36. Which of the following is false about difference between SAN and NAS?

Answer: NAS has its own file system, but SAN does not.

37. The cloud services purchased by a user include an application running environment, but do
not contain any application or related date. This mode is ( ).

Answer: PaaS

38. Cloud computing is a product of a parallel computing, grid computing, and distributed
computing. Which of the following is true about their relationship?

Answer: Parallel computing, grid computing, and distributed computing all belong to cloud
computing

39. Which of the following requirements can be met by using Huawei FusionCompute DRS rule?

Answer: A VM runs on specified host.

40. Which of the following is the difference between the public cloud and private cloud?

Answer: The public cloud is open to public, while the private cloud is only open to specific users.

41. Which of the following are true about the relationship between virtualization and cloud
computing?

Answer: -Virtualization is one of the technologies to implement cloud computing.

- Virtualization is a technology. Cloud computing is a service mode. Virtualization


promotes the development of cloud computing.

- without virtualization, cloud computing has no value

42. In Hauwei FusionSphere, which of the following functions are supported by thin
provisioning?

Answer: - Virtualization thin-provisioning is irrelevant to the OS and hardware. Disk thin-


provisioning can be provided as long as the virtual image management system is used.

- The function enables alarms over datastore usage. If the data usage exceeds the preset
threshold, an alarm will be reported.
- This function enables disk space monitoring and reclaiming.
43. Storage virtualization can be classified into ( ).
Answer: - Block-level virtualization

- File-level virtualization
44. Which of the following statements about Virtual Network Computing (VNC) are true?

Answer: - VNC is a lightweight remote-control computer software.

- A controlled computer can function as a VNC server only when the corresponding
software is installed on it.
45. In Huawei FusionCompute, which of the following are not supported by the VMs that use
raw device mapping (RDM) storage?

Answer: - Snapshot

- Thin provisioning
- Storage live migration
46. Which of the following are true about type I (bare metal) computing virtualization?

Answer: - the hypervisor directly runs on physical hardware.

- Applications cannot directly run on the host machine.


47. Which of the following are true about the cloud computing deployment modes?

Answer: - The private cloud is deployed on the premises of enterprises and used by internal
employees.

- The public cloud is generally constructed by carries or cloud service providers. It sells or
releases services to the public.
- The hybrid cloud is generally constructed by carries or cloud service providers. It
integrates the features of the public cloud and private cloud.
- The industry cloud generally have attributes of a certain industry, which is a “large
private cloud” or ‘small public cloud”.
48. Which of the following belong to Kernel-based virtual Machine (KVM) architecture?

Answer: - Libvirt

- QEMU
49. In Huawei FusionCompute, users can manage VMS in which of the following modes?

Answer: - Long in to the CNA and run commands for management.

- Long in to the VM for management.


- Long in to the VRM and use the GUI for management.
50. In Huawei FusionCompute, which of the following storage virtualization features are
supported?

Answer: - Thin provisioning

- Storage live migration


- Snapshot
51. Which of the following statements about port groups in Huawei FusionCompute are true?

Answer: - All virtual ports in a port group have the same attributes.

- There are two types of port groups: common port and trunk port groups.
52. Which of the following belong to computing virtualization?

Answer: - CPU virtualization

- Memory virtualization
- I/O virtualization
53. Virtualization is applicable to which of the following scenarios?

Answer: - A company has 10 services systems. The resource usage rate of the hosts, running the
service systems is less than 20%.

- All employees in a company almost use the same office desktop applications.
- An enterprise requires a high-load and compute-intensive environment.
54. In Huawei FusionCompute, which of the following are the methods for creating VM?

Answer: - Deploying a VM using a template

- Cloning a VM from an existing VM


- Creating a new VM
55. Which of the following statements about Virt-manager are true?

Answer: - Virt-manager is a graphical management tool for KVM VMs.

- Virt-manager is an open-source KVM VM management tool.


56. In Huawei FussionCompute, the Dynamic Resource (DRS) migrates VMs based on the
following factors: ( )

Answer: - CPU

- Memory
57. Which of the following storage resource types are supported by Huawei FusionCompute?

Answer: - FC SAN

- IP SAN
- NAS
- Advanced SAN
- FusionStorage
58. Which of the following are true about RAID?

Answer: - RAID improves the I/O performance of a storage system by concurrently reading and
writing data on multiple disks

- When a disk is damaged, other disks in RAID 5 can still work properly, and the disk I/O
performance is not affected.
59. Which of the following can implement computing virtualization and improve resource
utilization in the era of cloud computing 1.0?

Answer: - Xem

60. Which of the following are used to allocate CPU and memory resources to VMs in computing
virtualization?

Answer: - VMM

- Hypervisor

You might also like