New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Huawei H13-511_V5.5 Dumps Questions Answers

HCIA-Cloud Computing V5.5 Exam Questions and Answers

Question 1

Which of the following statements is false about centralized storage and distributed storage?

Options:

A.

Distributed storage stores data on multiple independent devices. During data reading, data is read from these devices at the same time, affecting read efficiency.

B.

Centralized storage has a simple deployment structure. It can leverage the redundant array of independent disks (RAID) technology to ensure data security and reliability.

C.

In terms of technical architectures, centralized storage can be classified into network attached storage (NAS) and storage area network (SAN). SANs are further divided into Fibre Channel storage area networks (FC SANs) and IP storage area networks (IP SANs).

D.

Distributed storage adopts a scalable system architecture and enables multiple storage servers to share the storage load, improving scalability, reliability, availability, and access efficiency.

Buy Now
Question 2

Generally, a subnet mask is used together with an IP address. The 0s in the binary value represent the network portion of an IP address, and the 1s represent the host portion.

Options:

A.

TRUE

B.

FALSE

Question 3

Which of the following statements is false about concepts of virtualization?

Options:

A.

A guest OS is the OS running on a virtual machine (VM).

B.

A host machine is a physical machine.

C.

A host OS is the virtualization software layer.

D.

A guest machine is a VM.

Question 4

Which of the following statements aretrueabout deploying Compute Node Agent (CNA) and Virtual Resource Management (VRM) in Huawei FusionCompute?

Options:

A.

CNA can be deployed on virtual machines or physical servers.

B.

If the VRM nodes are deployed on physical servers, the active and standby VRM nodes must be deployed on two physical servers.

C.

If the VRM nodes are deployed on virtual machines, you need to select two hosts in the management cluster and deploy the active and standby VRM VMs on these hosts.

D.

VRM can be deployed on virtual machines or physical servers.

Question 5

In FusionCompute, the user can set the priority for each member port in a port group.

Options:

A.

TRUE

B.

FALSE

Question 6

Desktop users on the same FusionAccess can be authenticated using different domains.

Options:

A.

TRUE

B.

FALSE

Question 7

Which of the following statements isfalseabout High Availability (HA) in Huawei FusionCompute?

Options:

A.

Administrators can set different HA policies for VMs based on their importance.

B.

When data is stored in shared storage, if a VM is faulty, no data will be lost.

C.

This function enables a VM to reboot if the VM encounters a failure.

D.

The system periodically detects VM status. If a VM fault caused by a CNA host failure is detected, the system automatically migrates the VM to another CNA host in the same cluster and restarts the VM, thereby quickly restoring VM services.

Question 8

Which of the following statements is false about virtualized storage?

Options:

A.

LUNs allocated by Huawei Distributed Block Storage can be encapsulated as data stores.

B.

Storage virtualization abstracts storage devices to a data store so that each VM can be stored as a group of files in a directory on the data store.

C.

A data store is a logical repository that is similar to a file system. It combines storage devices of different types and provides a unified model to store VM files.

D.

Storage virtualization greatly improves storage resource utilization.

Question 9

The application scenarios of FusionAccess include secure offices, public terminals, general offices, and GPU graphics. Which of the following desktop types ismost suitable for new media operations?

Options:

A.

Secure office cloud desktops

B.

Personalized cloud desktops for general offices

C.

Design-oriented GPU graphics cloud desktops

D.

Standard public terminal cloud desktops

Question 10

When an administrator uses alinked clone templateto quickly provision virtual machines (VMs) on FusionAccess, which of the following are thesteps of the quick provision process?

Options:

A.

Create a VM.

B.

Add the VM to a domain.

C.

Rename the VM.

D.

Associate the VM with a user group.

Question 11

During FusionAccess virtual desktop provisioning, which of the following components receives the registration request sent by the desktop VM?

Options:

A.

HDC

B.

GaussDB

C.

ITA

D.

HDA

Question 12

In virtualization, KVM and Xen are typical hardware-assisted virtualization technologies. They implement virtualization based on kernel modules in the operating system.

Options:

A.

TRUE

B.

FALSE

Question 13

In FusionCompute, the security auditor in role-based access control (RBAC) mode is only permitted to view and export logs.

Options:

A.

TRUE

B.

FALSE

Question 14

The following table lists the FusionAccess environment plan. Which of the following network segments is the most suitable for deploying FusionAccess Linux infrastructure VMs?

Options:

A.

192.168.108.0/22

B.

192.168.10.0/24

C.

192.168.30.0/24

D.

192.168.20.0/24

Question 15

Which of the following statements are true about system encapsulation and Sysprep (system encapsulation tool) for creating a full copy template on FusionAccess?

Options:

A.

Sysprep can delete specific system information from an installed Windows image.

B.

Sysprep can be used to reset Windows product activation.

C.

System encapsulation can complete system installation in minutes.

D.

During system encapsulation, you cannot add software to the system.

Question 16

The Central Processing Unit (CPU) is the computer's computing and control core. Mainly composed of an arithmetic logic unit (ALU) and a controller, it reads and executes data according to instructions.

Options:

A.

TRUE

B.

FALSE

Question 17

Which of the following statements isfalseabout virtualization concepts?

Options:

A.

A guest OS is the operating system running on a virtual machine (VM).

B.

A guest machine is a virtual machine (VM).

C.

A host machine is a physical machine.

D.

A host OS is the virtualization software layer.

Question 18

Two virtual machines run on the same host and are in the same network segment, but they cannot communicate with each other. Which of the following isnota possible cause?

Options:

A.

VM firewalls deny access to each other.

B.

The NICs of the two VMs are added to the same port group.

C.

The VMs are isolated by security groups.

D.

The VM NICs are faulty.

Question 19

Which of the following statements istrueabout the FusionCompute storage architecture?

Options:

A.

Physical storage media that deliver storage space for virtualization are called storage devices.

B.

LUNs allocated by Huawei Distributed Storage can be encapsulated as datastores.

C.

After storage resources are converted to datastores and associated with hosts, virtual disks can be created for VMs.

D.

FusionCompute uniformly encapsulates storage units of storage resources into datastores.

Question 20

Which of the following statements isfalseabout host requirements during FusionCompute installation?

Options:

A.

The location where the host OS is booted first must be the location where the host OS is installed.

B.

The disk requirements of the host where the VRM is located are the same as those of other compute nodes.

C.

If CPU virtualization is not enabled for a host, virtual machines cannot be created on the host.

D.

FusionCompute can be installed even if there is only one host network port.

Question 21

At which layer of the TCP/IP reference model does a router work?

Options:

A.

Data link layer

B.

Network layer

C.

Application layer

D.

Transport layer

Question 22

A bare VM is required when creating a virtual desktop template on FusionAccess. Which of the following statements aretrueabout creating a bare VM?

Options:

A.

TheConfiguration Modeof the system disk must be set toCommon.

B.

NICs cannot be added when creating a linked-clone bare VM, but NICs can be added when the linked-clone template is used for quick provisioning.

C.

The NIC can be the service-plane distributed virtual switch (DVS) and port group of the user VM.

D.

TheConfiguration Modeof the system disk must be set toThin provisioning.

Question 23

Which of the following operations must be performed on FusionAccess when you create a Windows template?

Options:

A.

Mounting a template tool

B.

Converting a VM into a template

C.

Configuring a template

D.

Encapsulating a template

Question 24

Which of the following statements arefalseabout the network shown in the figure?

Options:

A.

The next-hop address of the packet sent from RTA to RTC is20.1.1.2.

B.

If RTA needs to communicate with RTC, a route needs to be configured onRTC.

C.

RTB can communicate with RTA and RTCwithout any configuration modification.

D.

If RTA needs to communicate with RTC, a route needs to be configured onRTB.

Question 25

A router manages path information by managing its___

Options:

Question 26

Enterprise administrators provision virtual desktops and perform routine maintenance through virtual desktop service management. Which of the following are the provisioning proportion modes of preset virtual desktops in desktop provisioning management?

Options:

A.

1:1

B.

1:N

C.

1+1

D.

M:N

Question 27

On FusionAccess software deployment, if multiple FusionAccess systems share a License, the License component should be deployed independently.

Options:

A.

TRUE

B.

FALSE

Question 28

TAP is a virtual network device independently maintained in Linux.

Options:

A.

TRUE

B.

FALSE

Question 29

When a VM template is created on FusionAccess, select“Configure user login”if the_____group members want to log in to the VM.

(Enter the correct word on the GUI)

Options:

Question 30

The essence of ___ technology is to convert physical devices into logical ones, thereby decoupling software from hardware.

Options:

Question 31

Which of the following statements are true about high-fidelity audio and video based on Huawei Desktop Protocol (HDP)?

Options:

A.

Video playback scenarios can be automatically identified and efficient algorithms are used for encoding.7

B.

Video frame rate is dynamically adjusted based on network quality to ensure smooth playback.

C.

Video decoding on the server and client is supported.

D.

Supports automatic reconnection and playback upon disconnection, dynamic traffic adjustment, and playback of a maximum of 2K videos.

Question 32

TAP is a virtual network device independently maintained in Linux.1

Options:

A.

TRUE

B.

FALSE

Question 33

Which of the following commands are used to view common files on Linux?

Options:

A.

less

B.

more

C.

vim

D.

cat

Question 34

Complete the following configuration file for a network interface card (NIC) in theopenEuleroperating system to set astatic IP addressand enable the NIC toautomatically start upon system boot.

TYPE=Ethernet

BOOTPROTO=_____

NAME=enp0s4

DEVICE=enp0s4

ONBOOT=_____

IPADDR=172.28.100.100

NETMASK=255.255.255.0

Options: