Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following technologies is used by Open vSwitch (OVS) for remote access and traffic control?

A.

OpenFlow

B.

Open vSwitch database (OVSDB)

C.

Bidirectional forwarding detection (BFD)

D.

Network quality analysis (NQA)

In Huawei FusionCompute, which of the following resources cannot be reduced?

A.

NIC quantities

B.

Disk capacity

C.

CPU resources

D.

Memory resources

To enhance the security of user desktops, FusionAccess supports diverse access management policies. Which of the following statements about access management policies are true?

A.

MAC address-based access control. This policy can be applied only to users or user groups.

B.

Time-based access control. This policy implements only whitelist control. Users can log in to desktops only in the specified time segment.

C.

IP address-based access control. This policy implements blacklist and whitelist control and allows configuring a single IP address or IP address segment.

D.

Certificate-based access control. This policy is applied globally.

Virtualization is the fundamental technology powering cloud computing. It is the act of creating a virtual version of something and a logical representation of physical resources. It allows resource simulation, isolation, and sharing.

A.

TRUE

B.

FALSE

In Huawei FusionCompute, which of the following functions enables virtual machines (VMs) to be migrated between CNA hosts with different CPU models?

A.

Cluster I/O ring adaptation

B.

Cluster HANA optimization

C.

Cluster Guest NUMA policy

D.

Cluster IMC policy

Which of the following statements is false about CPU virtualization?

A.

CPU virtualization includes full virtualization, paravirtualization, and hardware-assisted virtualization.

B.

Full virtualization does not modify the guest OS. Virtual machines are highly portable and compatible and support a wide range of operating systems.

C.

The host OS in paravirtualization supports only open-source operating systems.

D.

Hardware-assisted virtualization does not require the CPUs to support it.

Which of the following statements arefalseabout VLAN technology?

A.

A trunk link allows untagged packets from multiple VLANs to pass through.

B.

A hybrid interface cannot be used to connect a switch and a server.

C.

A trunk interface is used to connect switches.

D.

An access interface is used to connect switches.

Which of the following statements is false about the graphical user interface (GUI) and the command-line interface (CLI) of Linux?

A.

The CLI is more suitable for routine maintenance than the GUI.

B.

The GUI consumes more system resources than the CLI.

C.

It is more efficient to operate the Linux CLI using the keyboard than to operate the GUI using the mouse.

D.

The GUI has higher permissions than the CLI, allowing it to modify the kernel and hide files.

Match the following virtualization technologies with their descriptions.

Which of the following statements about FusionAccess for office automation (OA) isfalse?

A.

FusionAccess can be interconnected with existing enterprise IT systems to use existing IT applications.

B.

FusionAccess has three zones (red, yellow, and green). These zones are isolated from each other and have their own FusionAccess systems. Data can be transmitted between them.

C.

Zone-based security is high, easy to deploy, and meets the security management requirements of most enterprises.

D.

Enterprise Active Directory (AD) is an important component of FusionAccess, and users must be authenticated by AD before logging in to virtual desktops.