New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H13-811_V3.0 Questions and Answers

Question # 6

Which of the following parameters can the user modify when modifying the physical leased line?

A.

name

B.

bandwidth

C.

area

D.

Peer address

Full Access
Question # 7

When creating a whole machine image, Which mirror sources can be selected?

A.

Bare metal server

B.

Cloud server backup

C.

Mirror file

D.

Cloud Server

Full Access
Question # 8

In the Huawei Cloud E1 service, which scenario can the OCR service solve?

A.

Image Processing

B.

Text recognition

C.

Speech Recognition

D.

Image Identification

Full Access
Question # 9

What are the advantages of the shared service system architecture?

A.

Services must be developed using the same programming language and tools

B.

Allows to frequently publish different services at the same time,Maintain the availability and stability of other parts of the system

C.

Low complexity

D.

Each service can be independently developed by different teams, Do not affect each other, Accelerate time to market

Full Access
Question # 10

GPU is suitable for application scenarios such as graphics rendering, engineering drawing and desktop cloud scenarios running in a virtualized environment?

A.

True

B.

mistake

Full Access
Question # 11

Use mirroring to create a cloud server, Can not specify the size of the system disk

A.

is correct

B.

mistake

Full Access
Question # 12

Which of the following parameters need to be configured when purchasing a VPN connection?

A.

VPN gateway

B.

Remote gateway

C.

This terminal network

D.

Remote subnet

Full Access
Question # 13

What are the scheduling algorithms for elastic load balancing?

A.

Weighted polling algorithm

B.

Source ip algorithm

C.

Weighted random method

D.

Weighted least connection

Full Access
Question # 14

How many layers of attacks can the Anti-DDos traffic cleaning service resist?

A.

2-4 layers

B.

4-7 floors

C.

1-3Floor

D.

3-5 layers

Full Access
Question # 15

What service is CloudTable based on?

A.

HDFS

B.

OBS

C.

MySQL

D.

HBase

Full Access
Question # 16

In case of disk data loss, you can use the pre-created backup()Perform data recovery.

A.

createNew disk

B.

delete

C.

Restore data to the original disk

D.

Unmount disk

Full Access
Question # 17

Elastic File Service does not support cloud servers running the Windows operating system for mounting.

A.

True

B.

mistake

Full Access
Question # 18

About ELB configuration description, Which ones are incorrect?

A.

Optional session retention when configuring listener

B.

The listening strategy can be configured when creating the listener

C.

You can choose ip when adding an elastic load balancer

D.

Configurable health check timeout time

Full Access
Question # 19

Which of the following are the advantages of load balancing?

A.

Support cross-availability zone active-active disaster recovery

B.

Adopting cluster deployment to support intra-city active-active disaster recovery in multi-zones, Seamless real-time switching

C.

Automatically complete distribution based on application traffic, Seamless integration with elastic scaling services, Flexible expansion of external service capabilities of user applications

D.

Support monitoring performance indicators based on listener granularity, More suitable for customer business statistics

Full Access
Question # 20

Which of the following commands can be used to view the final mounting result in the Linux system?

A.

pwd

B.

mount

C.

df-TH

D.

touch

Full Access
Question # 21

The fragments are junk data generated in the process of uploading objects.

A.

True

B.

mistake

Full Access
Question # 22

VBS Supports simultaneous backup of all cloud hard drives in the server.

A.

True

B.

mistake

Full Access
Question # 23

Which computing cloud service does not belong to Huawei?

A.

Bare Metal Service

B.

Mirroring service

C.

Elastic scaling

D.

Flexible file service

Full Access
Question # 24

twenty one0The elastic scaling service is billable.

A.

True

B.

mistake

Full Access
Question # 25

Which of the following operations will incur charges?

A.

Create subnet

B.

Create EIP

C.

Create VPC

D.

Create a security group

Full Access
Question # 26

When the capacity of the cloud hard disk is insufficient, which of the following solutions are available?

A.

Set the cloud disk as a shared disk

B.

Purchase a new cloud hard disk and mount it to the cloud server

C.

Clear the space of the cloud hard drive

D.

Expand the original cloud hard disk capacity

Full Access
Question # 27

What is the usual division of Regions?

A.

Geographical location and network latency dimensions

B.

Availability zone (AZ)

C.

Cluster server

Full Access
Question # 28

Generally, the cost of value-added services generated by cloud monitoring is very low, which can be used with value-added services such as dumping of monitoring data files and sending alarm notifications as needed.

A.

True

B.

False

Full Access
Question # 29

Which of the following courses in the Cloud Academy can be used for online learning to obtain scenario-based skills improvement?, And get a certification certificate through the online exam?

A.

Vocational Certification Course

B.

Foundation Course

C.

Q micro certification course

D.

Role course

Full Access
Question # 30

Which of the following is wrong about the description of the planning subnet?

A.

The subnet segment under the same VPC can be repeated

B.

The network segment cannot be modified after the VPC is successfully created

C.

The subnet is the IP address block in the VPC. All cloud resources in the VPC must be deployed in the subnet.

D.

The network segment of the subnet must be within the range of the VPC network segment

Full Access
Question # 31

security expert services can provide one-stop security professional services including website security physical examination, host security physical examination, security reinforcement, security monitoring, emergency response and security product hosting.

A.

True

B.

mistake

Full Access
Question # 32

Which of the following options is the cloud private line self-service activation process?

A.

Physical leased line access>Create virtual gateway>Create virtual interface

B.

Create virtual interface>Create virtual gateway>Physical private line access

C.

Create virtual gateway>Create virtual interface>Physical private line access

D.

Physical leased line access>Create virtual interface>Create virtual gateway

Full Access
Question # 33

What are the product advantages of VPC?

A.

Flexible deployment

B.

dynamicBGP

C.

Safe isolation

D.

Support hybrid cloud deployment

Full Access
Question # 34

The bandwidth of public network elastic load balancing can be adjusted.

A.

True

B.

mistake

Full Access
Question # 35

Which of the following functions does RDS provide?

A.

Users can set alarm rules for relational database

B.

Users can set automatic backup strategies and create manual backups, And use the backup to restore the database instance

C.

Cloud DBA can help you conduct a comprehensive analysis of the instance, Centralized reflection of the performance and operating status of the database instance. Via Cloud D

D.

BA diagnosis and diagnosis opinions, You can maximize the discovery of existing or potential health problems in the database, And deal with it in time

E.

Users can create and delete database instances, Modify the database port number

Full Access
Question # 36

Which of the following security measures does the relational database service have?

A.

Use Security Group

B.

Use SSL channel

C.

Set up a virtual private cloud

D.

Bind elastic public network IP

Full Access
Question # 37

Which of the following cloud disks can be created directly through the cloud disk console?

A.

Data disk

B.

system disk

C.

Mirror disk

D.

Differential disk

Full Access
Question # 38

By modifying the IP or city name that provides services to the outside world, Direct traffic to the high-defense machine room, All traffic is cleaned in the high-defense machine room, and the cleaned business traffic is returned to()

A.

High-defense machine room

B.

DNS service

C.

User origin site

D.

Client side

Full Access
Question # 39

HUAWEI CLOUD E1 AI API, What are the visual APIs?

A.

Image search

B.

Image Identification

C.

Face recognition

D.

Content review

Full Access
Question # 40

What kinds of private images can be created?

A.

System disk mirroring

B.

Market mirroring

C.

Data disk mirroring

D.

Whole machine mirror

Full Access
Question # 41

HUAWEI CLOUD EIserving ,Model Arts, machine learning, and graph engines are AI platform services.

A.

True

B.

False

Full Access
Question # 42

API Which of the following calling methods are there?

A.

GET

B.

OPTIONS

C.

ANY

D.

POST

Full Access
Question # 43

What management functions does Elastic Load Balance support?

A.

Create a load balancer

B.

Delete load balancer

C.

Adjust bandwidth

D.

Query load balancer

Full Access
Question # 44

twenty one OSBrowser is an object storage service client running on Linux systems.

A.

True

B.

mistaken

Full Access
Question # 45

Inter-Internet communication between two sites,IPSecVPN can be deployed on the firewalls at both ends to protect the mutual access traffic between the two intranets.

A.

True

B.

False

Full Access
Question # 46

Cloud service operation log can be queried in which service?

A.

Security Expert Service

B.

Cloud Audit Service

C.

Cloud Monitoring Service

D.

Cloud Analysis Service

Full Access
Question # 47

Which of the following options is the most reasonable virtual private cloud configuration process?

A.

Create Virtual Private Cloud and Default Subnet>Create New Subnet>Add Security Group Policy>Create Security Group

B.

Create virtual private cloud and default subnet>Create new subnet>Create security group>Add security group rules

C.

Create Virtual Private Cloud and Default Subnet>Create Security Group>Create New Subnet>Add Security Group Rules

D.

Create Virtual Private Cloud and Default Subnet>Create Security Group>Add Security Group Rules>Create New Subnet

Full Access
Question # 48

Which of the following Huawei Cloud services belong to the laaS layer service?

A.

Elastic File Service SFS

B.

Relational database RDS

C.

Cloud Container Engine CCE

D.

Cloud Desktop Service Workspace

Full Access
Question # 49

Which SDK language does the API gateway support?

A.

Java

B.

C

C.

РHР

D.

delphi

Full Access
Question # 50

cloud traditional file sharing storage compared, What are the advantages of SFS?

A.

File Sharing

B.

High reliability

C.

Seamless integration

D.

Simple operation but high cost

Full Access
Question # 51

Which of the following descriptions about public clouds is wrong?

A.

The public cloud is generally available via the Internet

B.

Public cloud is a cloud built by enterprises using their own infrastructure

C.

Public cloud can have many tenants at the same time

D.

Public cloud can optimize resources on a large scale

Full Access
Question # 52

What are the VPC access rights control?

A.

fingerprint

B.

password

C.

Network ACL

D.

Security group

Full Access
Question # 53

After the relational database is successfully created, if the size of the specifications (CPU and memory) does not meet the requirements, the specifications can be changed.

A.

True

B.

mistake

Full Access
Question # 54

Elastic load balancing can add cloud servers with different operating systems.

A.

True

B.

False

Full Access
Question # 55

What are the basic concepts of Huawei Cloud Network Service?

A.

VPN

B.

Subnet

C.

Security group

D.

EIP

Full Access
Question # 56

What parameters should be selected or set when copying images across regions?

A.

IAM support

B.

Purpose item

C.

Destination zone

D.

Destination area

Full Access
Question # 57

Internet vendors host their software on the cloud, Users no longer need to buy software, Instead, get services by renting software on the cloud, Which cloud service model is described above?

A.

Saas

B.

DBass

C.

Paas

D.

laas

Full Access
Question # 58

There is no limit to the size of the exported image.

A.

True

B.

mistake

Full Access
Question # 59

Huawei provides developers with open capabilities, which will help developers integrate the open capabilities of Huawei products with their upper-layer applications, Build differentiated innovative solutions.

A.

True

B.

False

Full Access
Question # 60

Which of the following services does not belong to security management

A.

SSL certificate management

B.

Container Security Service

C.

Security Expert Service

D.

Situational awareness

Full Access
Question # 61

by default, The elastic cloud servers in all subnets of the same virtual private cloud can communicate, but the elastic cloud servers of different virtual private clouds cannot communicate.

A.

True

B.

False

Full Access
Question # 62

What operations can the shared mirror provider do?

A.

Delete shared image

B.

Share specified mirror

C.

Delete the shared tenant of the mirror

D.

Add the shared tenant of the mirror

Full Access
Question # 63

Cloud monitoring parameter configuration is in progress, Which of the following notification methods are included in the alarm notification?

A.

HTTPPOST

B.

HITPSPOST

C.

Email

D.

SMS notification

Full Access
Question # 64

What are the following ways to access the flexible file service?

A.

Client mode

B.

Local way

C.

API way

D.

Management console mode

Full Access
Question # 65

On which service is the backup and snapshot data of the RDS database instance stored?

A.

CES

B.

OBS

C.

ECS

D.

VPC

Full Access
Question # 66

Description of Security Group, Which of the following is wrong? (Single choice)

A.

The system will create a security group for each user by default, The rule of the default security group is to pass all data packets on the outgoing room, Restricted access in the inbound direction, The elastic cloud servers in the security group can access each other without adding rules.

B.

Security group is a logical grouping, Provide access policies for mutually trusted elastic cloud servers in the same VPC that have the same family protection requirements.

C.

After the security group is created, Users can define various access rules in the security group, When the elastic goes to the server to join the group or the whole group, It is protected by these access rules.

D.

When configuring security group rules, The source and destination addresses can only be set as IP addresses, It cannot be a security group.

Full Access
Question # 67

The object storage server provides account-based ACLs. Which of the following access rights are not supported by ACLs?

A.

Public read and write permissions

B.

View ACL permissions

C.

Modify ACL permissions

D.

Read permission

Full Access
Question # 68

users cannot deploy business applications on elastic cloud servers arbitrarily like using traditional servers.

A.

True

B.

mistake

Full Access