Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements is incorrect about the working principles of the VM migration technology?

A.

File-level migration applies to migrating the desired file-level objects.

B.

Block-level migration applies to the scenario where the partition structure of the target end must be the same as that of the source end.

C.

Block-level migration applies to the hosts that carry a large number of small files.

D.

Block-level migration applies to capacity expansion or reduction of the planned destination VM disk space based on the source end capacity.

Which of the following users should be used for using PuTTY to log in to OperationCenter?

A.

root

B.

appuser

C.

oracle

D.

admin

Which of the following statements about the INTEL hardware virtualization is incorrect?

A.

VT-x refers to the hardware-assisted virtualization technology of INTEL.

B.

VT-d refers to the I/O assisted virtualization technology.

C.

VT-d refers to the network-assisted virtualization technology.

D.

SR-IOV refers to the VMDq technology.

The memory capacity in the specifications must be greater than or equal the minimum memory of the image.

A.

TRUE

B.

FALSE

When a user configures the mapping between physical networks and ports, which of the following mapping modes need high-performance iNICs? (Multiple Choice)

A.

User-mode EVS

B.

OVS

C.

Hard passthrough

D.

DVS

Which of the following features can enable different components in the cloud ecosystem to collaborate for achieving the expected result?

A.

Portability

B.

Scalability

C.

Compatibility

D.

Interoperability

To allow users to use the storage resource allocation feature, eSight designs specific templates for configuring and retrieving resources in batches.

A.

TRUE

B.

FALSE

Which of the following are the user authentication methods for accessing security systems in the terminal?

(Multiple Choice)

A.

Web-based identity authentication

B.

WebAgent-based identity authentication and security authentication

C.

Agent-based identity authentication and security authentication

D.

Not authentication

Which of the following methods can be used to create VMs in FusionCompute? (Multiple Choice)

A.

Create a bare VM.

B.

Create a VM using an image file.

C.

Create a VM using a template.

D.

Use an existing VM to clone a VM.

The centralized and cloudified IT system has demanding requirements on business continuity, including the requirements on networks, data security, and service reliability.

A.

TRUE

B.

FALSE