Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

In the FusionSpheref server virtualization backup scenario, which of the following items can be used as eBackup

protection set in ? (many)

A.

Virtual machines in FusionCompute

B.

Clusters in FusionCompute

C.

Virtual machine disks in FusionCompute

D.

Data storage in FusionCompute

In Fusioncloud, which of the following cannot be the possible reason for the failure of elastic cloud server provisioning?

A.

VDC configures resource authorization for salespersons

B.

VDC quota limit

C.

The resource pool of the ManageOne operation and maintenance plane cannot obtain data storage resources.

In the Huawei FusionCloud 6.3 solution, which of the following are the disaster recovery services that tenants can apply for?

work? (many)

A.

CSDR

B.

VBS

C.

VHA

D.

CSBS

Which of the following descriptions about disaster recovery backup are correct? ( many)

A.

The backup system not only protects data, but also ensures business continuity

B.

Backup is mainly aimed at factors such as human misoperation, virus infection, logic errors, etc.

Data recovery, data backup is generally carried out in the same data center

C.

The disaster recovery system only protects the recoverable version data at different time points

D.

Disaster recovery is mainly aimed at major natural disasters such as fires and earthquakes. Therefore, there must be a connection between the production site and the disaster recovery site.

A certain safety distance must be maintained

When Fusioncloud is deployed, at least 2 servers are required for its management node deployment, which can use AA (active-active-active) mode to improve the high availability of system management nodes

A.

TRUE

B.

FALSE

A company plans to use the Rainbow tool to migrate the virtual machines of the existing FusionSphere platform to when the FusionCloud administrator adds the source virtual machine host in the Rainbow tool, the

The tool cannot communicate with the host of the source virtual machine. After testing, the administrator found that the source host network was reachable and protected against the firewall is closed, so it is judged that the terminal state is abnormal, and the Rainbow host should be restarted.

A.

TRUE

B.

FALSE

The Huawei Rainbow migration tool has automation, strong compatibility, migration feasibility detection, migration

Process stability and other characteristics. Which of the following descriptions about Rainbow's properties is incorrect? ( one)

A.

Rainbow provides one-click log collection function

B.

Rainbow can perform network disconnection detection, and try to reconnect after disconnection

C.

Rainbow is relatively dependent on the disk space of the source end, and the source end needs to have about 50GB of remaining space to enter

row migration

D.

Rainbow can identify in advance whether the source host meets the migration conditions, such as snapshot-related services whether to open

FusionNetDoctor, also known as network traffic diagnosis, is for operation and maintenance personnel to detect the network field.

Which can detect traffic in which of the following scenarios? ( many)

A.

East-west traffic detection between the tenant's two virtual machines

B.

Tenant's VM-to-VM Elastic IP (EIP) traffic inspection

C.

Access traffic detection from the client computer to the ELB on the cloud

D.

Inspection of access traffic from client computers to virtual private network services (VPNs) on the cloud

The desktop cloud FusionAccess administrator can forcefully restore the system disk of the virtual machine to the initial state, using

It is used to restore virtual machines with abnormal system. Which of the following descriptions about system disk restoration is correct?

A.

Only virtual machines whose allocation status is "allocated" can restore the system disk

B.

The FusionAccess system supports multiple virtual machines of the same virtual machine type to restore the system disk at the same time

C.

After restoring the system disk, the linked clone virtual machine only retains the data of the data disk, and the data of the system disk will be lost

D.

Only the virtual machine whose running status is "running" can restore the system secret

In the process of operation and maintenance management, the relevant functional components of the data center can be accurately identified, and the

Design capabilities, define monitoring indicators that match the technical characteristics of the component, and through active and passive management,

Ensure the normal operation of each management component of the data center to the greatest extent. The above describes the four operation and maintenance objectives of the data center.

______ in the bid

In the ManageOne operation and maintenance plane, when the administrator performs routine maintenance or handles user requests, the

Tenant resource page, query resources according to requirements. After querying the required resources, click the required query

The resource name of , which of the following can be seen on the resource details page? ( many)

A.

Basic information about the resource

B.

alarm

C.

Components

D.

Topology

【Fill in the blanks】 During the use of the Huawei desktop cloud system, one virtual machine needs to be assigned to multiple users

When using it, the administrator needs to add virtual machine users to the virtual desktop. When the "distribution method" is -----

The virtual machine can only perform additional user operations.

The administrator analyzes the capacity and historical data reports through ManageOne operation and maintenance, and quickly grasps the network elements

As well as business KPIs and health, support operation and maintenance decisions, cloud platform follow-up planning, etc., FusionCloud

Which of the following report types are supported? ( many)

A.

Periodic reports, the administrator generates corresponding periodic report data by defining periodic tasks, and supports

Notify those who need attention by email to assist in business analysis and evaluation

B.

Customized reports, administrators can arbitrarily combine multiple dimensions and measures to achieve self-service simply and quickly

analysis and calculation to obtain effective business data information

C.

Intelligent report, the administrator can set the monitoring threshold, when the resource pool capacity is higher than the threshold, the report will be automatically generated

Tables to aid in business decision making

D.

Preset reports, including multi-dimensional analysis reports and detailed reports

Which of the following reasons will cause the user virtual machine to fail to start, and the status of the virtualized local disk becomes read only? (many)

A.

File metadata corruption

B.

Super block corruption

C.

The access control module is damaged

D.

The auxiliary distribution module is damaged

Which of the following descriptions about the image service/MS in the FusionCloud private cloud scenario is wrong? (one)

A.

The public image is a common standard operating system image, visible to all users, and the public image includes operations

The system and pre-installed public applications need to self-configure the application environment or related software according to the actual situation of the user.

piece B.

Support customers to complete the custom management of images through the console or API

B.

Users can accept private images shared by other users, but cannot use them as their own images

C.

According to the creation method, private images are divided into the following two types: those created through the elastic cloud server and those created through external images. like file creation