Pass the Huawei No Cert Assigned H13-831_V.20 Questions and answers with CertsForce

Viewing page 10 out of 15 pages
Viewing questions 91-100 out of questions
Questions # 91:

Cloud Monitor CES supports monitoring ECS through the Agent plug-in Description of the status of the piece, which one is wrong? Single selection

Options:

A.

Fault status: When the server does not receive the plug-in dagger for 1 minute, the plug-in status is displayed as "fault"


B.

B. Stopped state, it may be that the agent was manually stopped


C.

The status of not starting may be that the agent is not installed in the ECS or the agent is manually stopped


D.

The configuration is abnormal, which may be the default NIC security group rule of the ECS is caused by a configuration error


Questions # 92:

Virtual Private Network Service VPN is used to establish a secure and encrypted public network communication tunnel between remote users and the virtual private cloud When creating a VPN gateway, you need to create an EIP as the gateway IP of the VPN.

Options:

A.

TRUE


B.

FALSE


Questions # 93:

What is wrong with the following description of Doke?

Options:

A.

The Docke image contains the packaged application and the environment it depends on


B.

B. You can package the image through the docker save command


C.

C. You can build container images through the docker build command


D.

D. Container images are a series of hierarchical read-only files managed by storage-driven technology when container images run as containers

A writable layer is added to the top layer of the image


Questions # 94:

In the verification and acceptance stage of application cloud services, which of the following tasks is the responsibility of the customer and HUAWEI CLOUD needs to cooperate with the verification? Single).

Options:

A.

Verify that the data is available


B.

Ensure that HUAWEI CLOUD service systems and databases are normal


C.

Map to the test environment as required


D.

D. Ensure that the link between the test environment and HUAWEI CLOUD service system is normal


Questions # 95:

The telemarketing channel system of an insurance has completed the cloud-native containerization transformation, and the channel front-end system has completed the stateless transformation—item? (Single).

Options:

A.

B. The channel front-end container is deployed across AZ, and the business POD anti-affinity is set through CCE


B.

C. Single AZ deployment on the front-end of the channel, set the anti-affinity of the host


C.

D. Cross-region mirroring using the IMS image management service to achieve service disaster recovery


Questions # 96:

A game company recently released a new online game product, which was warmly welcomed by users after its launch. However, recently, it is often the case that the service connection is not connected. the server CPU is heavily occupied. and the bandwidth usage rate has increased suddenly. Which of the following is the most likely cause of this happening? Single selection

Options:

A.

B. Caused by DDoS attack


B.

Caused by server hardware failure


C.

D. Network access policy misconfiguration leads to


Questions # 97:

Which of the following items is not a performance bottleneck for services in low-latency scenarios? Single-select

Options:

A.

delay caused by long execution time of SQL statements


B.

Unreasonable selection of resource specifications, resulting in wasted resources and inter-process calls leading to performance bottlenecks


C.

Network latency caused by too many forwarding nodes in the network link


D.

D. The return result of data reading and writing takes too long


Questions # 98:

A customer's business flow is as follows: E I P->ELB-> ECS-> Middleware (REE DI s&Kafk a)->RDS, cloud services and applications are deployed with a single AZ high availability, and customers have certain requirements (RTO<3 Ring). Now that the customer needs to plan application-level disaster recovery scenarios, which of the following solutions cannot meet the requirements? Single selection

Options:

A.

The intelligent DNS service is used to control the traffic of business access, and 100% of the user traffic is diverted to the production center under normal hours, so 100% of the user traffic during the defect period is switched to the disaster recovery center


B.

C. Customers regularly conduct disaster recovery drills through manual/scripted methods


C.

Database primary and standby disaster recovery, one end is the main and the other end is the backup, and the corresponding digital technology can be used for active standby for different database types. It can be done through third-party tools


Questions # 99:

To use Data Access Service (DSS) on HUAWEI CLOUD you must configure data dump to OBS, MapReduce KRS, and Data Lake Explorer Data warehouse service DVS or table storage service CooudT able, because DiSitself only has the ability to access data, and cannot store user data.

Options:

A.

TRUE


B.

FALSE


Questions # 100:

DynaSky smart card (including intelligent network, storage, security and other chips) deep collaboration, in order to achieve ultra-high performance release, and the construction of security iron wall, which of the following functions is not supported to enhance and uninstall?

Options:

A.

Security


B.

B. Network


C.

Orchestration


D.

D. Storage


Viewing page 10 out of 15 pages
Viewing questions 91-100 out of questions