Pre-Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H13-811_V3.0 Exam Dumps - HCIA-Cloud Service V3.0

Question # 4

If you want to keep multiple versions of an object, which of the following can be achieved?

A.

Modify storage category

B.

EnabledayBlog management

C.

Configure life cycle rules

D.

Enable multiple version control

Full Access
Question # 5

Cloud monitoring parameter configuration is in progress, Which of the following notification methods are included in the alarm notification?

A.

HTTPPOST

B.

HITPSPOST

C.

Email

D.

SMS notification

Full Access
Question # 6

The CIFS file system supports mounting on cloud servers using the Linux operating system.

A.

True

B.

mistake

Full Access
Question # 7

Statements about cloud hard disk backup and cloud server backup, Which of the following is correct?

A.

Cloud hard disk backup is to protect the entire cloud server

B.

The backup generated by the cloud server backup will also appear on the cloud hard disk backup interface

C.

The backup objects of cloud server backup are all cloud hard disks in the elastic cloud server

D.

The backup object of cloud hard disk backup is one or more specified cloud hard disks

Full Access
Question # 8

What is wrong with the statement about the removal of instances of the scaling group?

A.

When the number of expected instances of the scaling group is less than the current number of instances, the scaling group will remove redundant instances.

B.

You can configure the instance removal strategy as needed.

C.

Instances manually moved in will not follow"Instance removal strategy"Requirement and has the lowest priority when it is removed.

D.

When the scaling group is moved out of the instance, the balance of the availability zone will not be considered.

Full Access
Question # 9

Which of the following options is the role of the listener in elastic load balancing?

A.

Run business logic

B.

Check the progress of the connection request

C.

Receive access request

D.

Distribute traffic to the back-end server

Full Access
Question # 10

file systems can be mounted on cloud servers in different VPCs.

A.

True

B.

mistake

Full Access
Question # 11

What can't be achieved in the description of the use of elastic load balancing?

A.

Check the health of the service node

B.

Eliminate single points of failure

C.

Forwarding of Layer 2 and Layer 3 data

D.

Allocate service node pressure

Full Access
Question # 12

Which of the following options does a VPN consist of?

A.

VPN connection

B.

Subnet

C.

VPN gateway

D.

VPC

Full Access
Question # 13

by setting() Can filter and manage backup resources.

A.

Backup time

B.

Retention rules

C.

shared

D.

Label

Full Access
Question # 14

Anti-DD Which of the following options are included in the main protection types of os?

A.

Resistant to application attacks

B.

Anti-data attack

C.

Anti-brute force cracking

D.

Anti-traffic attacks

Full Access
Question # 15

Inter-Internet communication between two sites,IPSecVPN can be deployed on the firewalls at both ends to protect the mutual access traffic between the two intranets.

A.

True

B.

False

Full Access
Question # 16

What are the basic concepts of Huawei Cloud Network Service?

A.

VPN

B.

Subnet

C.

Security group

D.

EIP

Full Access
Question # 17

Regarding the process of opening a virtual private network, what is wrong in the following description?

A.

After purchasing a VPN connection, users do not need to do it on the router or firewall of their own data centerIPSec VPN tunnel configuration

B.

Users need to plan local data in advancemiddleThe VPC and its subnet that you need to connect to

C.

Users need to configure the security group rules of the VPC after purchasing the VPN gateway and the VPN connection

D.

User needswantBuy a VPN gateway first before buying a VPN connection

Full Access
Question # 18

For the created private image, What attributes can be modified?

A.

NIC multi-queue

B.

Minimum memory

C.

Start method

D.

Maximum memory

Full Access
Question # 19

Which of the following is not a basic concept of elastic load balancing?

A.

Instance (VM or application container)

B.

Listener

C.

Firewall

D.

LoadBalancer load balancer

Full Access
Question # 20

After the relational database is successfully created, Cannot replace the database engine, so, Choose carefully when creating a database instance.

A correct

B mistake

Full Access
Question # 21

There is no limit to the size of the exported image.

A.

True

B.

mistake

Full Access
Question # 22

Which of the following services does the Standard Edition Security Expert Service include?

A.

Host security checkup

B.

Website security checkup

C.

Safety monitoring

D.

Security reinforcement

Full Access
Question # 23

Which of the following functions does RDS provide?

A.

Users can set alarm rules for relational database

B.

Users can set automatic backup strategies and create manual backups, And use the backup to restore the database instance

C.

Cloud DBA can help you conduct a comprehensive analysis of the instance, Centralized reflection of the performance and operating status of the database instance. Via Cloud D

D.

BA diagnosis and diagnosis opinions, You can maximize the discovery of existing or potential health problems in the database, And deal with it in time

E.

Users can create and delete database instances, Modify the database port number

Full Access
Question # 24

What can I do if the disk capacity of the elastic cloud server is insufficient?

A.

Reinstall the operating system

B.

Expand the disk

C.

Unmount disk

D.

Switch operating system

Full Access
Question # 25

A disk can only be bound to one backup strategy.

A.

True

B.

mistake

Full Access
Question # 26

In the process of VPC creation, which parameter realizes the function of automatically obtaining IP?

A.

DHCP

B.

Gateway

C.

Partition

D.

network segment

Full Access
Question # 27

Which of the following is a computing service?

A.

Mirroring service

B.

Dedicated cloud

C.

Elastic Cloud Server

D.

Virtual private cloud

Full Access
Question # 28

The description of the physical leased line created by the partner is the following error?

A.

One physical leased line for operation can be bound to multiple physical leased lines for tenants

B.

Partners can purchase and operate physical private lines without an administrator account.

C.

Partners create leased lines for ordinary users by creating tenant physical leased lines

D.

Partners can purchase and operate physical dedicated lines

Full Access
Question # 29

After purchasing a VPN gateway, the VP. The N gateway allocates a public network exit IP address.

A.

True

B.

mistake

Full Access
Question # 30

Which of the following is wrong about the description of purchasing a physical leased line?

A.

It is recommended that you consult with the operator about the access plan and pricing plan before purchasing a dedicated line for self-service.

B.

If you want to create a managed line, you can only choose the partner purchase method.

C.

Self-purchase method After purchasing a physical dedicated line, there is no need to contact the operator to construct access to equipment in the computer room.

D.

The physical dedicated line supports both partner purchase and self-service purchase.

Full Access
Question # 31

Which of the following statements about hybrid cloud is incorrect?

A.

Only deploy the application in the public cloud

B Unified management of enterprise resources in public and private clouds

B.

Realize optimal resource allocation through hybrid cloud

C.

Realize the flow of business resources between public and private clouds

Full Access
Question # 32

Call AP IWhich of the following security authentication methods are there?

A.

HuaweiI AM certification

B.

No certification

C.

APP authentication

D.

Micro authentication

Full Access
Question # 33

Which of the following services can be used to view the real-time data of various monitoring indicators of load balancing?

A.

Cloud Monitoring Service

B.

Cloud container engine

C.

Virtual private cloud

D.

Elastic scaling

Full Access
Question # 34

cloud hard disk backup support through()Record operations of backup service resources, So that users can query, audit and backtrack.

A.

Cloud Monitoring Service

B.

Cloud hard drive

C.

Cloud Audit Service

D.

Object storage service

Full Access
Question # 35

The fragments are junk data generated in the process of uploading objects.

A.

True

B.

mistake

Full Access
Question # 36

Which of the following options can be used to establish a connection between VPC and VPC?

A.

Cloud Dedicated Line

B.

VPN

C.

Cloud connection

D.

Peer-to-peer connection

Full Access
Question # 37

Which of the following operations can be performed on the cloud hard disk backup strategy?

A.

Delete backup strategy

B.

Edit backup strategy

C.

Bind or unbind cloud disks for backup policies

D.

Execute backup strategy immediately

Full Access
Question # 38

What are the alarm levels

A.

urgent

B.

secondary

C.

important

D.

hint

Full Access
Question # 39

Which of the following types of cloud hard disks are used by the ECS?

A.

Super highIO

B.

highIO

C.

Super highIO(Time delay optimization)

D.

ordinary

Full Access
Question # 40

VPN connection is a technology based on Internet tunnel, Can help you quickly build a secure and reliable encrypted channel between the VPN gateway and the user gateway

A.

True

B.

False

Full Access
Question # 41

Which of the following are the advantages of load balancing?

A.

Support cross-availability zone active-active disaster recovery

B.

Adopting cluster deployment to support intra-city active-active disaster recovery in multi-zones, Seamless real-time switching

C.

Automatically complete distribution based on application traffic, Seamless integration with elastic scaling services, Flexible expansion of external service capabilities of user applications

D.

Support monitoring performance indicators based on listener granularity, More suitable for customer business statistics

Full Access
Question # 42

What are the deployment modes of cloud computing?

A.

Private Cloud

B.

Hybrid cloud

C.

Community Cloud Industry Cloud

D.

Public cloud

Full Access
Question # 43

The alarm threshold is composed of three parts: aggregation method, single selection condition, and critical value, Used to configure alarm conditions.

A.

True

B.

False

Full Access
Question # 44

VPC itself does not charge fees, but users need to purchase according to the charging standards when using bandwidth or VPN.

A.

True

B.

False

Full Access
Question # 45

What concepts does network service include?

A.

Subnet

B.

EIP

C.

Security group

D.

VPN

Full Access
Question # 46

Which of the following parameters need to be set when creating a backup strategy?

A.

Retention rules

B.

Backup time

C.

name

D.

Backup cycle

Full Access
Question # 47

Which of the following belong to the life cycle management of database instance?

A.

Delete database cluster

B.

View the information of the database instance

C.

Restart the database instance

D.

Add read replica

Full Access
Question # 48

The data on the cloud hard disk will be lost when the cloud hard disk is uninstalled from the elastic cloud server.

A.

is correct

B.

mistake

Full Access
Question # 49

Which of the following options is the most reasonable virtual private cloud configuration process?

A.

Create Virtual Private Cloud and Default Subnet>Create New Subnet>Add Security Group Policy>Create Security Group

B.

Create virtual private cloud and default subnet>Create new subnet>Create security group>Add security group rules

C.

Create Virtual Private Cloud and Default Subnet>Create Security Group>Create New Subnet>Add Security Group Rules

D.

Create Virtual Private Cloud and Default Subnet>Create Security Group>Add Security Group Rules>Create New Subnet

Full Access
Question # 50

What are the VPC access rights control?

A.

fingerprint

B.

password

C.

Network ACL

D.

Security group

Full Access
Question # 51

What types of protocols does the elastic load balancing system support?

A.

HTTPS

B.

TCP

C.

UDP

D.

HTTP

Full Access
Question # 52

Regarding the constraints of the whole machine mirroring, which of the following are correct?

A.

The whole machine image is not allowed to be exported.

B.

The mirror of the whole machine cannot be shared with other tenants.

C.

The whole machine mirror cannot be published as a market mirror.

D.

The whole machine mirror only supports cross-region replication.

Full Access
Question # 53

VBS Supports simultaneous backup of all cloud hard drives in the server.

A.

True

B.

mistake

Full Access
Question # 54

API Which of the following product advantages does the gateway have?

A.

flow control

B.

Simple and easy to use monitoring

C.

Easy to deploy

D.

Unified market

Full Access
Question # 55

According to the classification of Huawei cloud services, which cloud service is not a computing cloud service?

A.

Bare Metal Service

B.

Elastic Cloud Service

C.

Elastically scalable cloud services

D.

Virtual private cloud

Full Access
Question # 56

The VPC subnet segment can be modified after it is created.

A.

True

B.

mistake

Full Access
Question # 57

relational database services can meet the changing needs of the game industry, effectively shorten the research and development cycle, and reduce research and development costs.

A.

True

B.

mistake

Full Access
Question # 58

Which of the following is not included in the main functions of the Web Application Firewall WAF?

A.

Prevent sensitive information leakage

B.

Anti-crawler website

C.

Web page tamper-proof

D.

Brute force cracking protection for elastic cloud servers

Full Access
Question # 59

Which of the following parameters need to be configured for the health check in elastic load balancing?

A.

Health check port

B.

inspection cycle

C.

Check the progress of the connection request

D.

Health Check Agreement

Full Access
Question # 60

In which of the following situations, the network delay between the deployed elastic cloud servers must be the shortest?

A.

In the same security group

B.

In the same VPC

C.

In the same district

D.

Same zone

Full Access
Question # 61

Which of the following services does cloud hard disk backup service depend on?

A.

Cloud hard drive

B.

Elastic Cloud Server

C.

Object storage

D.

Mirroring

Full Access
Question # 62

Cloud Monitoring is an open resource monitoring platform, It can provide resource monitoring, alarm, notification and other services.

A.

True

B.

False

Full Access
Question # 63

Description of Security Group, Which of the following is wrong? (Single choice)

A.

The system will create a security group for each user by default, The rule of the default security group is to pass all data packets on the outgoing room, Restricted access in the inbound direction, The elastic cloud servers in the security group can access each other without adding rules.

B.

Security group is a logical grouping, Provide access policies for mutually trusted elastic cloud servers in the same VPC that have the same family protection requirements.

C.

After the security group is created, Users can define various access rules in the security group, When the elastic goes to the server to join the group or the whole group, It is protected by these access rules.

D.

When configuring security group rules, The source and destination addresses can only be set as IP addresses, It cannot be a security group.

Full Access
Question # 64

Which of the following load methods are not supported by the listener?

A.

Maximum connection

B.

No weight

C.

Minimum connection

D.

polling

Full Access
Question # 65

Which statement about Anti-DDos traffic cleaning is wrong?

A.

Provides public IP protection against elastic cloud hosts and load balancing devices

B.

Provide monitoring capability to view a single public network IP,Including current protection status, current protection configuration parameters, traffic conditions from 24 hours ago to the present, 2 hours of abnormal events

C.

Possess Web vulnerability security detection capabilities

D.

Provide configuration and modification for public network IP Anti-DDosAbility to correlate parameters

Full Access
Question # 66

Which of the following parameters need to be configured for Cloud Monitoring to create an alarm rule?

A.

Monitoring indicators

B.

Alert strategy

C.

Monitoring time

D.

Alert level

Full Access
Question # 67

What are the following restrictions on cloud server instances manually moved into a scaling group? (Multiple choice)

A.

This instance is the same as the scaling group VPC

B.

The instance has been bound to an elastic public IP

C.

The scaling group AZ contains the AZ where the instance is located

D.

This instance is not used by other scaling groups

Full Access
Question # 68

What are the login authentication methods for the elastic cloud server?

A.

fingerprint

B.

Dynamic mouth token OTP

C.

Key pair

D.

password

Full Access