New Year Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Huawei H13-511_V5.5 HCIA-Cloud Computing V5.5 Exam Exam Practice Test

HCIA-Cloud Computing V5.5 Exam Questions and Answers

Question 1

Which of the following statements is false about concepts of virtualization?

Options:

A.

A guest OS is the OS running on a virtual machine (VM).

B.

A host machine is a physical machine.

C.

A host OS is the virtualization software layer.

D.

A guest machine is a VM.

Question 2

Match the emerging technologies with their respective features or application scenarios

Question # 2

Options:

Question 3

Which of the following statements aboutservice adjustmentin FusionAccess aretrue?

Options:

A.

A computer whose assignment type isAssign a Computer to Multiple UsersorAssign Computers to a Desktop Groupcannot be assigned again after being unassigned.

B.

If a computer whose assignment type isAssign a Computer to a Useris unassigned and then assigned again, the computer automatically starts. After the virtual desktop icon on the WI turns on, wait about three minutes and then log in.

C.

If a computer whose assignment type isAssign a Computer to a Useris unassigned and then assigned again, the computer can only be assigned to the original user and cannot be assigned to other users.

D.

A computer whose assignment type isAssign a Computer to a Useris automatically shut down after being unassigned.

Question 4

On FusionAccess, modifying or deleting a full copy template will affect the virtual machines created using the template.

Options:

A.

TRUE

B.

FALSE

Question 5

Common storage networks include direct attached storage (DAS), network attached storage (NAS), and storage area network (SAN). SANs are divided into Fibre Channel storage area networks (FC SANs) and IP storage area networks (IP SANs).

Options:

A.

TRUE

B.

FALSE

Question 6

When an administrator uses alinked clone templateto quickly provision virtual machines (VMs) on FusionAccess, which of the following are thesteps of the quick provision process?

Options:

A.

Create a VM.

B.

Add the VM to a domain.

C.

Rename the VM.

D.

Associate the VM with a user group.

Question 7

In Huawei FusionAccess, Huawei Desktop Protocol (HDP) classifies displayed bitmaps. It uses a lossless compression algorithm for text and a lossy compression algorithm for nonsensitive data, saving bandwidth without compromising user experience.

Options:

A.

TRUE

B.

FALSE

Question 8

Which of the following statements about FusionAccess for office automation (OA) isfalse?

Options:

A.

FusionAccess can be interconnected with existing enterprise IT systems to use existing IT applications.

B.

FusionAccess has three zones (red, yellow, and green). These zones are isolated from each other and have their own FusionAccess systems. Data can be transmitted between them.

C.

Zone-based security is high, easy to deploy, and meets the security management requirements of most enterprises.

D.

Enterprise Active Directory (AD) is an important component of FusionAccess, and users must be authenticated by AD before logging in to virtual desktops.

Question 9

In FusionCompute, the security auditor in role-based access control (RBAC) mode is only permitted to view and export logs.

Options:

A.

TRUE

B.

FALSE

Question 10

On FusionAccess, if a full copy VM cannot be re-assigned after being unassigned, which of the following assignment types does the full copy VM use?

Options:

A.

Assign a Computer to Dynamic Multiple Users

B.

Assign a Computer to Pooled Users

C.

Assign a Computer to a User

D.

Assign a Computer to Multiple Users

Question 11

Which of the following statements is false about the graphical user interface (GUI) and the command-line interface (CLI) of Linux?

Options:

A.

The CLI is more suitable for routine maintenance than the GUI.

B.

The GUI consumes more system resources than the CLI.

C.

It is more efficient to operate the Linux CLI using the keyboard than to operate the GUI using the mouse.

D.

The GUI has higher permissions than the CLI, allowing it to modify the kernel and hide files.

Question 12

In FusionCompute, the user can set the priority for each member port in a port group.

Options:

A.

TRUE

B.

FALSE

Question 13

The kernel is an essential part of the operating system (OS). It is used to manage computer hardware resources and provide a system call interface to run upper-layer application programs.

Options:

A.

TRUE

B.

FALSE

Question 14

To enhance the security of user desktops, FusionAccess supports diverse access management policies. Which of the following statements about access management policies are true?

Options:

A.

MAC address-based access control. This policy can be applied only to users or user groups.

B.

Time-based access control. This policy implements only whitelist control. Users can log in to desktops only in the specified time segment.

C.

IP address-based access control. This policy implements blacklist and whitelist control and allows configuring a single IP address or IP address segment.

D.

Certificate-based access control. This policy is applied globally.

Question 15

On FusionAccess, when creating afull copy, QuickPrep, or linked clone template, the template must be added to a domain.

Options:

A.

TRUE

B.

FALSE

Question 16

KVM is a type of paravirtualization. It can implement CPU and memory virtualization, but not device I/O virtualization.

Options:

A.

TRUE

B.

FALSE

Question 17

Which of the following statements aretrueabout the features and functions of the FusionCompute virtualization suite?

Options:

A.

Allowing users to add or reduce VM resources on demand without interrupting applications.

B.

Supporting x86- or Arm-based servers, various storage devices, and mainstream Linux/Windows operating systems, thereby allowing mainstream applications to run on virtualization platforms.

C.

Allowing users to define service level agreement (SLA) policies to control VM resources, thereby allocating physical resources based on application priority.

D.

Automatically migrating workloads based on preset policies, thereby optimizing resource allocation, system response efficiency, and user experience.

Question 18

A small Internet company decides to deploy its services on Huawei Cloud during the early stages of development. Which of the following isNOTan advantage of deploying services on Huawei Cloud?

Options:

A.

Quick service deployment and rollout

B.

Flexible resource scaling

C.

Higher hardware performance with the same configuration

D.

Reduced hardware costs

Question 19

When FusionAccess is running properly, you are advised to restart infrastructure VMs once every quarter during off-peak hours. You can run the reboot command to restart Linux infrastructure VMs at the same time.

Options:

A.

TRUE

B.

FALSE

Question 20

On FusionAccess, which of the following operations isnot requiredfor VM creation during thequick provision process?

Options:

A.

Select a VM template.

B.

Select a VM group to which the VM belongs.

C.

Select a desktop group to which the VM belongs.

D.

Enter the number of VMs to be provisioned.

Question 21

When deploying vLB, you can usually deploy vAG and vLB on the same VM, but you cannot deploy vLB and WI on the same VM.

Options:

A.

TRUE

B.

FALSE

Question 22

In FusionCompute, which of the following isnota prerequisite for VM live migration?

Options:

A.

The VM must be in the running state.

B.

The uplink of the distributed virtual switch (DVS) where the VM NIC resides must be associated with both the source and target hosts.

C.

The IMC policy of the cluster must be configured.

D.

The datastore to which the VM disk belongs must be associated with both the source and target hosts.

Question 23

Which of the following statements about the differences between adomainand anorganizational unit (OU)aretrue?

Options:

A.

Both OUs and domains can contain Active Directory (AD) objects.

B.

Users can log in to a domain but not to an OU.

C.

Group policies can be configured for both OUs and domains.

D.

An OU can exist in a domain, and a domain can also exist in an OU.

Question 24

During FusionAccess virtual desktop provisioning, which of the following components receives the registration request sent by the desktop VM?

Options:

A.

HDC

B.

GaussDB

C.

ITA

D.

HDA

Question 25

The essence of ___ technology is to convert physical devices into logical ones, thereby decoupling software from hardware.

Options:

Question 26

Which of the following statements about the differences betweenuser groupsandorganizational units (OUs)aretrue?

Options:

A.

OUs and user groups are Active Directory objects.

B.

An OU can contain objects such as accounts, computers, printers, and shared folders.

C.

Group policies can be configured for both OUs and user groups.

D.

A user group can only contain accounts.

Question 27

Match the following virtualization technologies with their descriptions.

Question # 27

Options:

Question 28

Which of the following are functions of FusionCompute?

Options:

A.

Datastores support file system formats VIMS, NFS, and EXT4.

B.

Users can expand or reduce the memory capacity for online or offline VMs as needed.

C.

Storage live migration is to migrate data within a storage device or between different storage devices.

D.

VM live migration only allows VMs to migrate among hosts that share the same storage.

Question 29

When a VM template is created on FusionAccess, select“Configure user login”if the_____group members want to log in to the VM.

(Enter the correct word on the GUI)

Options:

Question 30

In virtualization, KVM and Xen are typical hardware-assisted virtualization technologies. They implement virtualization based on kernel modules in the operating system.

Options:

A.

TRUE

B.

FALSE

Question 31

At which layer of the TCP/IP reference model does a switch work?

Options:

A.

Transport layer

B.

Data link layer

C.

Network layer

D.

Application layer

Question 32

Which of the following statements is false about centralized storage and distributed storage?

Options:

A.

Distributed storage stores data on multiple independent devices. During data reading, data is read from these devices at the same time, affecting read efficiency.

B.

Centralized storage has a simple deployment structure. It can leverage the redundant array of independent disks (RAID) technology to ensure data security and reliability.

C.

In terms of technical architectures, centralized storage can be classified into network attached storage (NAS) and storage area network (SAN). SANs are further divided into Fibre Channel storage area networks (FC SANs) and IP storage area networks (IP SANs).

D.

Distributed storage adopts a scalable system architecture and enables multiple storage servers to share the storage load, improving scalability, reliability, availability, and access efficiency.

Question 33

Question # 33

Options:

Question 34

Which of the following statements isfalseabout High Availability (HA) in Huawei FusionCompute?

Options:

A.

Administrators can set different HA policies for VMs based on their importance.

B.

When data is stored in shared storage, if a VM is faulty, no data will be lost.

C.

This function enables a VM to reboot if the VM encounters a failure.

D.

The system periodically detects VM status. If a VM fault caused by a CNA host failure is detected, the system automatically migrates the VM to another CNA host in the same cluster and restarts the VM, thereby quickly restoring VM services.