Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The cloud computing platform involves a variety of software and hardware components that require operation and maintenance. Which of the following methods can be used for operation and maintenance? (name selection)

A.

web interface

B.

command line

C.

Equipment operation panel

D.

Unified management of tools

Data center overview, resource pool overview, and multi-level cloud resources are preset in the operation and maintenance plane of ManageOne

Four Dashboards for overview and VDC resource details. Which of the following descriptions about the 4 Dashboards are correct?

Exactly? ( many)

A.

The resource pool overview shows the number of physical devices on the entire network in the data center, the number of devices in each region, the number of servers

Status, cloud service provisioning statistics, resource allocation and other information.

B.

The data center overview shows the number of network resources of the data center, the number of resources in each region, and the allocation of resources and other information.

C.

The overview of multi-level cloud resources shows the number of resources in the entire network of the data center, the number of resources in each region, and the allocation of resources other information

D.

VDC resource details show the total number of data centers and VDCs, as well as the scale and resource distribution of VDCs.

matching information.

RainbowAdd the destination cloud platform, which can be customized

A.

CNA IP

B.

version number

C.

VRMIP

D.

Cloud platform name

The following description of the storage data consistency guarantee technology in the FusionCloud private cloud disaster recovery solution,

Which one is wrong?

A.

The local cache and the remote cache return the write I/0 result to the active-active management module

B.

After the active-active management module writes the write I/0 to the local cache, it returns the write success

C.

The storage system will record the archive Log

D.

The host sends the write I/0 to the active-active management module

HDP is a new-generation cloud access desktop protocol developed by Huawei. Compared with traditional desktop protocols it has. Which of the following features are available?

A.

Support 64 virtual channels, each virtual channel can carry different upper-layer application protocols

B.

Rich protocol management strategies

C.

Different compression algorithms can be used according to different application types, flexible use of server rendering and local Fast rendering

D.

Support lossless compression algorithm

When installing FusionCloud 6.3, if the step installation fails, which of the following is the correct method?

A.

Check the log for troubleshooting, and retry the entire task after completion

B.

View the specific error log. If manual configuration is required, skip this step after the configuration is complete.

C.

Check the logs for troubleshooting, then skip this step

D.

skip directly

VLB is an indispensable component in the Fusion access system

A.

TRUE

B.

FALSE

When using FusionCompute to modify the system management plane VLAN fails, when the VRN is deployed on the physical server.

When the management plane VLAN of the VRM node and host can be modified manually, the administrator needs to

What are the prerequisites? (multiple choice)

A.

The login user name and password of the VRMI node or host BNC system of the VLAN to be modified have been obtained.

B.

The "root" user password of the VRM node or host of the VLAN to be modified has been obtained.

C.

The VRM node or host version to be modified has been obtained.

D.

The BMC IP address of the VRM node or host of the VLAN to be modified has been obtained.

When planning and designing a cloud disaster recovery solution, if two data center computer rooms are For two cities with a distance of 800KM, it is recommended to adopt the synchronous remote replication scheme, which can ensure both security and disaster recovery.

The reliability of the scheme, achieving RTO = 0 and RPO = 0.

A.

TRUE

B.

FALSE

The correct option for the agentless feature description of ebackup is

A.

No need to install agent on VRM

B.

No need to install the agent on the backup storage

C.

No agent needs to be installed on the protected virtual machine

D.

No need to install an agent on the CNA

FA virtual machine desktop must have HDA installed before it can be accessed by TC/SC

A.

Correct

B.

False

In the face of regional failures or disasters, enterprises can use the cloud server disaster recovery service CSDR to

business continuity, which of the following descriptions about CSDR is wrong? (one)

A.

When planning to use CSDR, it is necessary to evaluate in advance the data volume and replication cycle of the disaster-tolerant virtual machines that need to be supported.

period, data change rate, and calculate replication bandwidth to ensure sufficient replication bandwidth

B.

CSDR is a cross-region disaster recovery service. When using this service, at least two regions need to be planned

C.

Tenants can create their production services in any Region and create placeholders in another Region

For virtual machines, it is recommended to separate the private IP address of the virtual machine from the production virtual machine to reduce the time of application switching.

mutual influence

D.

There are two ways of CSDR data backup: synchronous replication and asynchronous replication

Virtualization technology can virtualize one server into multiple virtual machines, thereby improving performance

A.

True

B.

False

Fusioncloudprivate inVPC, including which of the following objects?

A.

subnet

B.

network

C.

port

D.

elasticityIP

The security management mechanism of the desktop cloud FusionAccess system includes access security, user information security and

And desktop management component security. Which of the following is about user information security? (one)

A.

FusionAccess adopts the mechanism of SSL and certificate authentication for terminals to ensure that only secure terminals are

to access the desktop cloud

B.

FusionAccess supports fingerprint login authentication, dynamic password authentication, USBKey authentication, and fixed terminal

Authentication and other login methods C. The information transmission from the desktop cloud system client to the server, and the information transmission between the internal components of the system are all

Based on SSL encryption mechanism to ensure the security of information transmission

C.

FusionAccess reinforces the operating system and management system of the management server to ensure that the entire

Security of desktop cloud management system