Certbus > Huawei > HCIA-Cloud Computing > H13-511_V4.0 > H13-511_V4.0 Online Practice Questions and Answers

H13-511_V4.0 Online Practice Questions and Answers

Questions 4

Open source virtualization technologies are all type I virtualization, and closed source virtualization technologies are all type II virtualization

A. TRUE

B. FALSE

Browse 253 Q&As
Questions 5

Which device in the physical network is capable of routing and forwarding?

A. Hub

B. Layer 2 switch

C. Router

D. Physical server NIC

Browse 253 Q&As
Questions 6

Which of the following methods are generally supported by a physical switch for remote management (multiple selection)

A. Telnet

B. SSL

C. Web

D. SSH

Browse 253 Q&As
Questions 7

Virtual machines are generally composed of virtual machine configuration information and disk files. Users can move the two files to implement virtual machines running on different physical hosts. What are the characteristics of cloud computing described above? (Multiple choices)

A. Partition

B. isolation

C. independent

D. Encapsulation

Browse 253 Q&As
Questions 8

The following option is not an element of artificial intelligence is

A. Computing power

B. Perceptual analysis

C. Big data

D. Scenario

Browse 253 Q&As
Questions 9

As FusionSphere, the disk thin provisioning can be achieved is (multiple choice)

A. thin provisioning and virtual storage operating system, hardware has nothing to do, so as long as the use of virtual image management system, will be able to achieve disk thin provisioning

B. does not currently support NTFS formatted virtual machine disk recovery // NTFS does not support online recovery

C. providing virtual disk space monitoring and recovery features

D. to provide data storage capacity warning threshold may be set, generating a warning when the storage capacity exceeds the threshold value

Browse 253 Q&As
Questions 10

In Huawei FusionCompute, the following incorrect description of the security group rule is.

A. When a virtual machine has multiple network cards, you can configure a security group for each network card.

B. A virtual machine can communicate with the outside world only after a security group is created and rules are added.

C. All virtual machine NICs in the same security group will use the security group rules for access control

D. The essence of a security group is a collection of rules

Browse 253 Q&As
Questions 11

In Huawei FusionCompute, the resources of the cluster are composed of the host and its associated storage and network resources.

A. True

B. False

Browse 253 Q&As
Exam Code: H13-511_V4.0
Exam Name: HCIA Cloud Computing V4.0
Last Update:
Questions: 253 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99