Weekend Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Huawei H13-811_V3.0 HCIA-Cloud Service V3.0 Exam Practice Test

Page: 1 / 45
Total 454 questions

HCIA-Cloud Service V3.0 Questions and Answers

Question 1

Which of the following are typical application scenarios of web application firewalls?

Options:

A.

Anti-tampering

B.

Key detection latest CVE Loopholes

C.

0Day vulnerability outbreak protection

D.

E-commerce snapped up spike protection

Question 2

Which of the following services can be used in conjunction with Elastic Scaling?

Options:

A.

Flexible file service

B.

Elastic Cloud Server

C.

Cloud monitoring

D.

Elastic load balancing

Question 3

Inter-Internet communication between two sites,IPSecVPN can be deployed on the firewalls at both ends to protect the mutual access traffic between the two intranets.

Options:

A.

True

B.

False

Question 4

VPC cannot connect to the local data center

Options:

A.

True

B.

mistake

Question 5

Which option below is Huawei's cloud A1 chip?

Options:

A.

Inferentia

B.

MLU100

C.

Cloud TPU

D.

Ascend 910

Question 6

Relational database service RDS does not have database backup and recovery functions.

Options:

A.

True

B.

mistake

Question 7

Which of the following file system types does Resilient File Service have?

Options:

A.

SFS

B.

SFS Turbo Standard

C.

SFS Turbo enhanced

D.

SFS Turbo Performance Type

Question 8

What is the full name of ECS?

Options:

A.

Elastic Cloud Server

B.

Elastic Scaling Service

C.

Object storage service

D.

Flexible file service

Question 9

Which of the following is wrong about the storage category provided by the object storage service?

Options:

A.

Backup storage

B.

Standard storage

C.

Low-frequency access storage

D.

Archive storage

Question 10

Which of the following parameters need to be configured for Cloud Monitoring to create an alarm rule?

Options:

A.

Monitoring indicators

B.

Alert strategy

C.

Monitoring time

D.

Alert level

Question 11

API What is included in the gateway's multiple security protection?

Options:

A.

Threat protection

B.

Access security

C.

Log audit

D.

Authentication service extension

Question 12

After the elastic cloud server is successfully created, If the size does not meet the demand, The specifications of the cloud server can be changed.

Options:

A.

True

B.

mistake

Question 13

Which of the following load methods are not supported by the listener?

Options:

A.

Maximum connection

B.

No weight

C.

Minimum connection

D.

polling

Question 14

What service is CloudTable based on?

Options:

A.

HDFS

B.

OBS

C.

MySQL

D.

HBase

Question 15

Which of the following methods can prevent the specified instance from being removed from the scaling group?

Options:

A.

Modify the scaling strategy

B.

Replacing the telescopic configuration

C.

Modify the scaling group to change the instance removal policy

D.

Enable instance protection

Question 16

cloud hard drives need to be used with elastic cloud servers or bare metal servers.

Options:

A.

True

B.

False

Question 17

Which of the following components does Elastic Load Balancing include?

Options:

A.

Client

B.

Listener

C.

Backend server group

D.

Load balancer

Question 18

How does the elastic cloud server construct a logically completely isolated network area?

Options:

A.

Elastic scaling

B.

Virtual private cloud

C.

Cloud audit

D.

Cloud container engine

Question 19

Which of the following are the basic characteristics of cloud computing?

Options:

A.

On-demand self-service

B.

Fast elastic scaling

C.

Resource pooling

D.

Broad network access

Question 20

elastic load balancing automatically distributes access traffic to multiple cloud servers, expands the external service capabilities of the application system, and achieves a higher level of application fault tolerance.

Options:

A.

True

B.

mistake

Question 21

users can use the management console (OBS Use the object storage service in two ways: Console) and client (OBS Browser).

Options:

A.

True

B.

mistake

Question 22

does not need to delete the virtual gateway and virtual interface bound to the physical leased line when unsubscribing from the physical leased line.

Options:

A.

True

B.

mistake

Question 23

Which of the following correspondences does the VPN gateway and remote gateway support?

Options:

A.

One to one

B.

-To many

C.

many to many

D.

many to one

Question 24

What are the login authentication methods for the elastic cloud server?

Options:

A.

fingerprint

B.

Dynamic mouth token OTP

C.

Key pair

D.

password

Question 25

The API gateway service currently supports API integration and API openness including the entire HUAWEI CLOUD.

Options:

A.

True

B.

False

Question 26

Which of the following are the application scenarios of elastic load balancing? (Multiple choice)

Options:

A.

Suitable for web services with large traffic

B.

Realize more flexible service forwarding

C.

Host a web application or website in a VPC, you can use the VPC like a normal network

D.

Provide routing balancing capabilities based on domain names and URLs

Question 27

About ELB configuration description, Which ones are incorrect?

Options:

A.

Optional session retention when configuring listener

B.

The listening strategy can be configured when creating the listener

C.

You can choose ip when adding an elastic load balancer

D.

Configurable health check timeout time

Question 28

Description of Security Group, Which of the following is wrong? (Single choice)

Options:

A.

The system will create a security group for each user by default, The rule of the default security group is to pass all data packets on the outgoing room, Restricted access in the inbound direction, The elastic cloud servers in the security group can access each other without adding rules.

B.

Security group is a logical grouping, Provide access policies for mutually trusted elastic cloud servers in the same VPC that have the same family protection requirements.

C.

After the security group is created, Users can define various access rules in the security group, When the elastic goes to the server to join the group or the whole group, It is protected by these access rules.

D.

When configuring security group rules, The source and destination addresses can only be set as IP addresses, It cannot be a security group.

Question 29

Elastic cloud servers between different availability zones in the same area cannot communicate with each other.

Options:

A.

True

B.

mistake

Question 30

When creating a listener, Under which protocol is the server certificate configurable?

Options:

A.

HTTPS

B.

UDP

C.

HTTP

D.

TCP

Question 31

The object is the basic unit of data storage in OBS. Which of the following parts does it include?

Options:

A.

AK/SK

B.

Metadata

C.

Data

D.

Key

Question 32

Which of the following container exceptions can the Container Security Service monitor?

Options:

A.

High-risk system calls

B.

Escape vulnerability attack

C.

Escape file access

D.

Container abnormal process

Question 33

Elastic File Service does not support cloud servers running the Windows operating system for mounting.

Options:

A.

True

B.

mistake

Question 34

The description of the redundant physical leased line is the following error?

Options:

A.

Redundant physical dedicated lines are more reliable to prevent accidents and ensure smooth business operations

B.

Redundant leased lines require users to set the main physical leased line and standby physical leased line by themselves

C.

When two dedicated lines are connected to different access points in the same area, Then the two physical dedicated lines are redundant for each other

D.

When a physical dedicated line fails, The system will automatically switch to another physical dedicated line

Question 35

The main function of database security service does not include which of the following?

Options:

A.

Anti-reptile

B.

Database firewall

C.

Database audit

D.

Sensitive data discovery and desensitization

Question 36

Description of peer-to-peer connection, Which of the following is wrong?

Options:

A.

Two VPCs in the same area can communicate with each other through a peer-to-peer connection

B.

Two VPCs in different regions can establish intercommunication through a peer-to-peer connection

C.

In the same district, you can create a peering connection between your own vPc, or you can create a peering connection between your own VPC and the VCs of other tenants.

D.

Up to 5 can be created in a region0Peer-to-peer connection

Question 37

data access service provides a one-stop big data collaborative development platform, Help users easily complete multiple tasks such as data modeling, data integration, script development, job scheduling, etc.

Options:

A.

True

B.

mistake

Question 38

Which of the following security measures does the relational database service have?

Options:

A.

Use Security Group

B.

Use SSL channel

C.

Set up a virtual private cloud

D.

Bind elastic public network IP

Question 39

Which of the following cloud disks can be created directly through the cloud disk console?

Options:

A.

Data disk

B.

system disk

C.

Mirror disk

D.

Differential disk

Question 40

In order to use the ping program to test the communication status between elastic cloud servers, Which of the following protocols need to be added to the security group?

Options:

A.

HTTPS

B.

TCP

C.

HTTP

D.

ICMP

Question 41

Which of the following is not included in the function of Vulnerability Scanning Service?

Options:

A.

Mirror leakage management

B.

Emergency vulnerability management

C.

diversification testing

D.

Weak password detection

Question 42

Which of the following commands can be executed to verify whether the file system domain name can be resolved toIP address?

Options:

A.

nslookup

B.

scp

C.

wget

D.

ping

Question 43

What are the key features of LAM unified identity authentication?

Options:

A.

Centralized control of users and security credentials

B.

Centralized control of user access

C.

User group-based permissions

D.

Support Huawei customer service agent maintenance operation

Question 44

More than elastic cloud servers can share a key pair.

Options:

A.

True

B.

mistake

Question 45

The network segment of the subnet must be within the range of the VPC network segment.

Options:

A.

True

B.

mistake

Question 46

Which of the following options is the cloud private line self-service activation process?

Options:

A.

Physical leased line access>Create virtual gateway>Create virtual interface

B.

Create virtual interface>Create virtual gateway>Physical private line access

C.

Create virtual gateway>Create virtual interface>Physical private line access

D.

Physical leased line access>Create virtual interface>Create virtual gateway

Question 47

The management console can view all types of Huawei cloud service products.

Options:

A.

True

B.

False

Question 48

Which of the following services does cloud hard disk backup service depend on?

Options:

A.

Cloud hard drive

B.

Elastic Cloud Server

C.

Object storage

D.

Mirroring

Question 49

Which of the following aggregation methods does the instance monitoring in the cloud monitoring service support?

Options:

A.

average value

B.

Standard deviation

C.

Max

D.

Variance value

Question 50

Generally, the cost of value-added services generated by cloud monitoring is very low, which can be used with value-added services such as dumping of monitoring data files and sending alarm notifications as needed.

Options:

A.

True

B.

False

Question 51

What are the application scenarios of real-time streaming computing service?

Options:

A.

real-time file transfer

B.

Log online analysis

C.

Network traffic monitoring

D.

Online graph calculation

Question 52

Alarm notification is the action taken when a certain alarm state is triggered. Users can set notifications when creating or modifying alarms, or turn off notifications.

Options:

A.

True

B.

False

Question 53

Which of the following is a computing service?

Options:

A.

Mirroring service

B.

Dedicated cloud

C.

Elastic Cloud Server

D.

Virtual private cloud

Question 54

What advantages does the gateway play to realize the digital transformation of enterprises?

Options:

A.

Improve system performance

B.

Ensuring the security of information assets

C.

Accelerate business agility

D.

Stimulate application innovation

Question 55

The alarm threshold is composed of three parts: aggregation method, single selection condition, and critical value, Used to configure alarm conditions.

Options:

A.

True

B.

False

Question 56

Call AP IWhich of the following security authentication methods are there?

Options:

A.

HuaweiI AM certification

B.

No certification

C.

APP authentication

D.

Micro authentication

Question 57

Which of the following may be the reasons why you cannot log in to the windows virtual machine through mstsc?

Options:

A.

No binding elastic ip

B.

DNS address is incorrectly configured

C.

The remote setting check does not allow connection to the computer

D.

The corresponding port is not released in the security group

Question 58

What is the deduction period of API gateway?

Options:

A.

sky

B.

minute

C.

Hour

D.

Second

Question 59

Shared path of the file system, What is the correct format of the NFS type?

Options:

A.

\\File system domain name:/path

B.

File system domain name:/path

C.

\\File system domain name:,path

D.

File system domain name:, path

Question 60

After deleting the elastic scaling group, the elastic cloud server instance automatically created by elastic scaling will also be deleted automatically.

Options:

A.

True

B.

mistake

Question 61

file systems can be mounted on cloud servers in different VPCs.

Options:

A.

True

B.

mistake

Question 62

Model What are the steps involved in the automatic learning function in Arts?

Options:

A.

Data standard

B.

Write code

C.

Deploy online

D.

Model training

Question 63

Enterprise Host Security provides functions such as account cracking protection, malicious program detection, critical file change detection, Web directory management, container escape detection, and software vulnerability detection.

Options:

A.

True

B.

False

Question 64

Which of the following cloud services can be used with elastic load balancing to ensure protection from external attacks and improve security and reliability?

Options:

A.

Cloud monitoring

B.

DDos prevention

C.

Cloud audit

D.

Elastic scaling

Question 65

On the cloud hard disk backup interface, you can delete the backup whose source is "Cloud Server Backup".

Options:

A.

True

B.

mistake

Question 66

Cloud monitoring parameter configuration is in progress, Which of the following notification methods are included in the alarm notification?

Options:

A.

HTTPPOST

B.

HITPSPOST

C.

Email

D.

SMS notification

Question 67

Which of the following standard bucket strategies does OBS have? Multiple choice)

Options:

A.

Public writing

B.

private

C.

Public reading

D.

Public read and write

Question 68

What operations can the shared mirror provider do?

Options:

A.

Delete shared image

B.

Share specified mirror

C.

Delete the shared tenant of the mirror

D.

Add the shared tenant of the mirror

Page: 1 / 45
Total 454 questions