Open source virtualization technologies are all type I virtualization, and closed source virtualization technologies are all type II virtualization
A. TRUE
B. FALSE
Which device in the physical network is capable of routing and forwarding?
A. Hub
B. Layer 2 switch
C. Router
D. Physical server NIC
Which of the following methods are generally supported by a physical switch for remote management (multiple selection)
A. Telnet
B. SSL
C. Web
D. SSH
Virtual machines are generally composed of virtual machine configuration information and disk files. Users can move the two files to implement virtual machines running on different physical hosts. What are the characteristics of cloud computing described above? (Multiple choices)
A. Partition
B. isolation
C. independent
D. Encapsulation
The following option is not an element of artificial intelligence is
A. Computing power
B. Perceptual analysis
C. Big data
D. Scenario
As FusionSphere, the disk thin provisioning can be achieved is (multiple choice)
A. thin provisioning and virtual storage operating system, hardware has nothing to do, so as long as the use of virtual image management system, will be able to achieve disk thin provisioning
B. does not currently support NTFS formatted virtual machine disk recovery // NTFS does not support online recovery
C. providing virtual disk space monitoring and recovery features
D. to provide data storage capacity warning threshold may be set, generating a warning when the storage capacity exceeds the threshold value
In Huawei FusionCompute, the following incorrect description of the security group rule is.
A. When a virtual machine has multiple network cards, you can configure a security group for each network card.
B. A virtual machine can communicate with the outside world only after a security group is created and rules are added.
C. All virtual machine NICs in the same security group will use the security group rules for access control
D. The essence of a security group is a collection of rules
In Huawei FusionCompute, the resources of the cluster are composed of the host and its associated storage and network resources.
A. True
B. False