Pass the Huawei HCIE-Cloud Computing H13-531_V2.0 Questions and answers with CertsForce

Viewing page 3 out of 16 pages
Viewing questions 31-45 out of questions
Questions # 31:

In the failover process of the cloud server disaster recovery service CSDR of FusionCloud R6, there are mainly Next few steps, which of the following is the correct failover sequence? ( one)

1. Through BCManager, one-click completion (the storage layer LUN configuration can be read and mounted to the disaster recovery side computing node

Pull up the disaster recovery cloud host and access the disaster recovery VPC) related configuration.

2. Switch the access authentication component Keystone.

3. Switch the Host domain name record of ManageOne SC to resolve the IP address and switch the external DNS record.

4. Switch the service delivery system to ManageOne SC.

5. The tenant logs in to the disaster recovery virtual machine, and checks and starts the business system.

Options:

A.

2-4-3-1-5


B.

3-4-2-1-5

C 3-2-4-1-5


C.

4-2-3-1-5


Expert Solution
Questions # 32:

Authentication-related services in OpenStack are provided by the keystone project, and keystone’s own back-end storage

The storage is driven by SQL by default, and it also provides the docking capability of other heterogeneous storages, such as Connecting to LDAP is convenient for unified management and maintenance of identity information data within the enterprise.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 33:

In Huawei FusionAccess, which of the following components are access and access control components?

Options:

A.

UNS


B.

WI


C.

ITA


D.

VLB/VAG


Expert Solution
Questions # 34:

Which of the following descriptions about disaster recovery backup are correct? ( many)

Options:

A.

The backup system not only protects data, but also ensures business continuity


B.

Backup is mainly aimed at factors such as human misoperation, virus infection, logic errors, etc.

Data recovery, data backup is generally carried out in the same data center


C.

The disaster recovery system only protects the recoverable version data at different time points


D.

Disaster recovery is mainly aimed at major natural disasters such as fires and earthquakes. Therefore, there must be a connection between the production site and the disaster recovery site.

A certain safety distance must be maintained


Expert Solution
Questions # 35:

The user enables the HA function on Fusioncompute. Which of the following descriptions about this function is correct an item? ( one)

Options:

A.

Configuring the cluster HA strategy is to automatically adjust the resource load balancing on different hosts


B.

Dedicated failover hosts refer to: setting a specified number of hosts in the cluster to fail, the system

Periodically check that there are enough resources left in the cluster to fail over the virtual machines on these hosts


C.

To allow host failure in the cluster refers to: Reserving a designated host as a dedicated failover host, when the host is used as a failover host, ordinary virtual machines are prohibited from starting, migrating, waking up, and snapshot recovery on the host


D.

HA resource reservation is to reserve CPU and memory resources according to the configured values ​​in the entire cluster


Expert Solution
Questions # 36:

A company plans to use the Rainbow tool to migrate the virtual machines of the existing FusionSphere platform to when the FusionCloud administrator adds the source virtual machine host in the Rainbow tool, the

The tool cannot communicate with the host of the source virtual machine. After testing, the administrator found that the source host network was reachable and protected against the firewall is closed, so it is judged that the terminal state is abnormal, and the Rainbow host should be restarted.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 37:

In the following description of the relationship between IMS and ECS.BMS in Fusioncloud, which options are correct?

Exactly? (many)

Options:

A.

IMS is an independent service and has no relationship with other services.


B.

The BMS needs the IMS to provide an available image in order to create it normally


C.

ECS promises to provide a usable image from IMS before it can be created.


D.

Users can convert ECS into a private image.


Expert Solution
Questions # 38:

Which of the following descriptions about the rapid encapsulation of virtual desktops is wrong? ( one)

Options:

A.

Compared with the complete copy template, using the fast encapsulation template to issue virtual machines is faster and more efficient


B.

There is no essential difference between full reproduction and rapid distribution


C.

using sysprep package


D.

Rename and add domain by the application in the virtual machine


Expert Solution
Questions # 39:

Which of the following descriptions about FusionAccess maintenance tasks is wrong? (one)

Options:

A.

Through routine monitoring, find the running status, login status, allocation status, and performance consumption of the current user's virtual machine. Abnormal registration situation


B.

By routinely monitoring the status of the gateway, monitor the CPU, memory and traffic of the gateway and its users within a period of time

Whether the number of used resources matches


C.

The risk of slow operation of the operating system can be ignored, and it is recommended that the user's virtual machine be kept powered on all the time


D.

In order to ensure that backup data is available when the system is abnormal, it is necessary to regularly check the availability of backup functions and data


Expert Solution
Questions # 40:

After restarting FusionCompute, the status of the service virtual machine is abnormal, which cannot be caused by which of the following reasons made? ( one)

Options:

A.

The disk has bad sectors, resulting in the loss of the virtual machine xml file.


B.

There are too many service virtual machines on FusionCompute and insufficient CPU resources.


C.

When the FusionCompute is restarted, the virtual machine is in the process of full-machine backup, but the task is not completed.


D.

Power on the CNA host first, and then power on the IP-SAN storage, resulting in abnormal data storage.


Expert Solution
Questions # 41:

Which of the following items may cause the OpenStack Cinder-volume component to be abnormal? (many)

Options:

A.

DNS configuration error


B.

Cinder-volume node time is inconsistent


C.

The back-end storage network configuration is incorrect


D.

The network of the storage management plane is abnormal


Expert Solution
Questions # 42:

FusionCloud provides three-dimensional panoramic monitoring capabilities, monitoring objects cover multiple dimensions, and actively monitoring Control the operation status of cloud data center, help enterprises reduce TCO cost and improve operation and maintenance efficiency. the following about In the description of the FusionCloud monitoring dimension, which one is wrong? (one)

Options:

A.

Support VDC monitoring, provide comprehensive analysis and evaluation capabilities based on VDC, help users use resources reasonably, Ultimately achieve the purpose of improving resource utilization


B.

Support resource pool monitoring, which can perform unified monitoring and monitoring of computing, storage, network and big data resource pools

Analyze, help users use resources efficiently and reasonably, discover potential risks and problems, and propose improvement measures or Guidance


C.

Support physical equipment monitoring, and can monitor hardware equipment such as data center servers, storage, and network equipment.

Unified monitoring and management, providing all-round monitoring capabilities such as alarms, resources, topology and performance, helping users to Quickly locate and troubleshoot hardware problems


D.

Tenant application monitoring is not supported. The application belongs to the user business level, and users need to deploy relevant monitoring by themselves.

The cloud platform itself cannot support tenant application monitoring


Expert Solution
Questions # 43:

A user cannot view the monitoring data of the host or virtual machine when using FusionCompute, the following

Which of the descriptions of the possible causes of this phenomenon and corresponding measures are correct? (many)

Options:

A.

The user does not configure the NTP clock source, the user can check whether the

If there is any related alarm, follow the alarm handling help to configure the NTP clock source and clear the alarm


B.

This phenomenon is caused by the inconsistency between the time of the NTP clock source and the local PC. The user can modify the time of the local PC.

time, consistent with the NTP clock source


C.

When the key is updated, the business process on the node will be restarted, which will cause abnormal monitoring of the virtual machine.


D.

The phenomenon is caused by the abnormal monitoring process. The user can use "PuTTY" to log in to the main machine as the gandalf user

VRM, restart monitoring process


Expert Solution
Questions # 44:

【Single choice】 During the operation and maintenance phase of Fusion Compute, the operator

You should pay attention to related high-risk operations to avoid business losses. The following descriptions about Fusioncompute related operations:

Which one is wrong?

Options:

A.

Modifying the IP address of the clock source server 1 will automatically restart the business process of the VRM and the host, affecting the current business operate


B.

Manually restarting the VRM node database will cause the database to be lost and cause the task to become unresponsive


C.

Modifying the password of the internal docking account will not affect the business operation but will cause all accounts to be unable to log in


D.

Enabling the IP and MAC binding function in the port group will cause some 1P addresses of the network card to communicate abnormally


Expert Solution
Questions # 45:

The virtualization reuse ratio mainly refers to the conversion relationship between the VCPU and the physical CPU in the calculation virtualization. by

In the description of adjusting the multiplexing ratio below, which one is recommended? ( one)

Options:

A.

When the VCPU usage of the virtual machine is less than 20%, the reuse ratio is set to 200%~300%


B.

When the VCPU usage of the virtual machine is greater than 20% and less than 30%, the reuse ratio is set to 200%~300%


C.

The VCPU usage rate of the virtual machine is more than 30%, and the reuse ratio is set to 100%~200%


D.

When the VCPU usage of the virtual machine is greater than 10% and less than 20%: the reuse ratio is set to 300%~400%


Expert Solution
Viewing page 3 out of 16 pages
Viewing questions 31-45 out of questions