Pass the Huawei Huawei Certification H13-831_V2.0 Questions and answers with CertsForce

Viewing page 10 out of 15 pages
Viewing questions 91-100 out of questions
Questions # 91:

K8S occupies a dominant position in the container orchestration market, and more and more enterprises adopt K8S clusters as the operating environment of services, and cluster security has received more attention, such as image scanning of used container images, running business containers in privileged mode, and enabling role-based access control for K8S clusters (RBAC) and other behaviors are security risks.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 92:

Compared with cloud backup and disaster recovery from the purpose of use, cloud backup is mainly to avoid data loss, generally through snapshots, backup and other technologies to build data backup copies, in the event of primary site failure can take over the business, disaster recovery is to avoid business interruption, TS through technology to build business backup hosts and data in different places, failure through historical data copy to restore user data.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 93:

In the government cloud scenario, while ensuring business interconnection, it is also necessary to better ensure network security Single selection

Options:

A.

VRF isolation: Assign different tenant permissions to different IMS tenants for Layer 2 isolation


B.

VS isolation: Divide different VS logical switches ± core switches for logical isolation for different tenants


C.

Firewall isolation: assign different virtual systems (V S YS) for different tenants; Different users access the private network server and use the corresponding VSYS for access control and security identification


D.

VLAN isolation: Assign no VLAN for Layer 2 isolation for different tenants


Expert Solution
Questions # 94:

What is wrong with the description of CTS?

Options:

A.

You can search for the required event details by parameters in the event list on the Cloud Audit Service page


B.

Before you activate CTS, you must activate the Object Storage service, and you must have full access to the OBS bucket you want to use


C.

When the user uses anI-AM user (sub-account) to configure dumping in CTS, the operation of the OBS bucket must also be I Am user


D.

After the user activates the cloud audit service, CTS will record some specific key operations, and send notifications to relevant subscribers in real time through the message notification service SMN with these specific key operations, which is triggered by CTS, SMN Complete notification and forwarding


Expert Solution
Questions # 95:

To use Data Access Service (DSS) on HUAWEI CLOUD you must configure data dump to OBS, MapReduce KRS, and Data Lake Explorer Data warehouse service DVS or table storage service CooudT able, because DiSitself only has the ability to access datA. and cannot store user data.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 96:

After using the host migration service SM S to migrate services from the offline IDC computer room to online, the host SID and login passwo

The parameters change.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 97:

For a critical application, the customer requires the deployment of a fault-tolerant architecture that can achieve RTO=0. Plan to choose C6 2xlarge. 4 types of elastic ECSs, it is estimated that at least 6 ECSs are required for this service. From an architect's point of view, which of the following architectures can meet the above requirements and provide the best overall capabilities? Single selection

Options:

A.

Deploy 6 servers in each of the three zones, and use auto scaling to ensure that nodes can be replaced after damage


B.

Deploy three servers in each of the two zones and use auto scaling to ensure that nodes can be replaced after they are damaged


C.

Deploy 6 servers in each of the two zones and use auto scaling to ensure that nodes can be replaced after damage


D.

Deploy three servers in each of the three zones and use auto scaling to ensure that the can be replaced after the node is damaged


Expert Solution
Questions # 98:

After the Oday vulnerability appears, summarize the protection experience in a timely manner according to the Oday vulnerability POC. and serve the WAF through the Web Application Firewall Fine-grained protection policies restrict how vulnerabilities can be exploited and prohibit external IP addresses from accessing or probing vulnerability-related URLs, which is a web application security measure.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 99:

The following description of the namespace, which one is wrong? (Single).

Options:

A.

Kubernetes The cluster has three by default Namespace: kube-system、kube-node and kube-publicB. Kubernetes provides namespaces to organize and divide resources, and use multiple namespaces to divide systems containing many components into different groups


B.

When there are many users in the team or project, you can consider using namespaces to divide user resources


C.

Namespace can only be organized into divisions, and for running objects, it cannot do the real isolation


Expert Solution
Questions # 100:

When deploying services on HUAWEI CLOUD you often need to consider how to select the appropriate resources, which of the following is not a factor to consider when choosing an elastic cloud server? Single selection

Options:

A.

Format of data transmission


B.

Resource consumption


C.

Business scenario


D.

Cost control


Expert Solution
Viewing page 10 out of 15 pages
Viewing questions 91-100 out of questions