Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Huawei H13-531_V2.0 Practice Exam with Questions & Answers | Set: 13

Questions 181

The virtualization reuse ratio mainly refers to the conversion relationship between the VCPU and the physical CPU in the calculation virtualization. by

In the description of adjusting the multiplexing ratio below, which one is recommended? ( one)

Options:
A.

When the VCPU usage of the virtual machine is less than 20%, the reuse ratio is set to 200%~300%

B.

When the VCPU usage of the virtual machine is greater than 20% and less than 30%, the reuse ratio is set to 200%~300%

C.

The VCPU usage rate of the virtual machine is more than 30%, and the reuse ratio is set to 100%~200%

D.

When the VCPU usage of the virtual machine is greater than 10% and less than 20%: the reuse ratio is set to 300%~400%

Huawei H13-531_V2.0 Premium Access
Questions 182

In FusionStorage, each resource pool has a home MDC.

In case of failure, the master MDC designates another MDC to host this resource pool, and one MDC manages at most two resource pools

Options:
A.

TRUE

B.

FALSE

Questions 183

When deploying FusionAccess, the administrator needs to configure a backup server. The following about backup services description of the device, which one is wrong? ( one)

Options:
A.

In the scenario where multiple sets of FusionAccess are connected to one set of AD / DNS / DHCP, only one set is required Configuration Backup on FusionAccess

B.

If the user side is a newly created Windows AD / DNS / DHCP server, backup AD / DNS / DHCP , there is no need to install a monitoring agent on the corresponding server

C.

When Backup Server backs up the CNA node where the server is located, use Backup Server to back up. The data backed up by the server may be lost

D.

The backup server mainly backs up FusionAccess related system data, user data and certificates, etc.

Questions 184

[Multiple Choice] In the FusionCloud troubleshooting, which of the following paths are FusionCloud running?

What is the specific path of Nova log storage for logs? A. /var/log/fusionsphere/component/nova-api

B. /var/log/fusionsphere/component/novaControl

C. /var/log/fusionsphere/component/nova-conductor

D. /var/log/fusionsphere/component/nova-scheduler

Options:
Questions 185

[Judgment] eBackup only supports data backup in virtualization scenarios.

Physical machine, but also supports disaster recovery of virtual machine.

Options:
A.

TRUE

B.

FALSE

Questions 186

The Huawei Rainbow migration tool has automation, strong compatibility, migration feasibility detection, migration

Process stability and other characteristics. Which of the following descriptions about Rainbow's properties is incorrect? ( one)

Options:
A.

Rainbow provides one-click log collection function

B.

Rainbow can perform network disconnection detection, and try to reconnect after disconnection

C.

Rainbow is relatively dependent on the disk space of the source end, and the source end needs to have about 50GB of remaining space to enter

row migration

D.

Rainbow can identify in advance whether the source host meets the migration conditions, such as snapshot-related services whether to open

Questions 187

The FusionAccess system supports the function of backup and recovery. The following about FusionAccess recovery

Description of the policy, which items are correct? (many)

Options:
A.

If the operating system of the infrastructure server fails, you can create a new server and reinstall the software

And use the backup data on the backup server for data recovery

B.

If there is a failure caused by some or all software of the infrastructure server, it is necessary to reinstall the software and take advantage of it.

Data recovery using backup data on the backup server

C.

The recovery strategy includes software reinstallation recovery and system reinstallation recovery

D.

If you need to restore WI data, you must use the system reinstallation recovery method

Questions 188

A user needs to redeploy a set of Huawei private cloud. The following are the installation steps for FusionC1oud

Which item is in the correct order? ( one)

a. The Fusioncloud Deploy node network port communicates with the execution machine;

b. The execution machine installs FusionCloud Deploy by mounting the ISO image: c. Automatically install the basic management node;

d. Release the FusionCloud Deploy node to the KVM computing node pool;

e. Automated installation of KVM compute nodes:

f. The network port of the FusionCloud Deploy node communicates with the environment to be deployed;

g The executor uploads the software package to the FusionCloud Deploy node;

h. Automated installation of extended management nodes.

Options:
A.

a-f-h-c-g-b-e-d

B.

a-f-b-g-c-h-e-d

C.

a-f-c-b-g-h-e-d

D.

a-f-h-b-g--c-e-d

Questions 189

Database Security Service (DBSS) is an intelligent data

The library security protection service is used to ensure the security of the database on the cloud. The following description about DBSS is wrong. Which one is it? (one)

Options:
A.

In terms of database auditing, it can provide database column-level management and access activity monitoring. Senior Event Supervisor

Control includes front-to-back views of sensitive database tables and columns, allowing independent monitoring and analysis of database activity and

Right activity alert

B.

In terms of sensitive data protection, sensitive data can be automatically located and classified according to rules, and desensitization can be easily created

and audit rules to ensure users do not expose sensitive information

C.

DBSS can support multiple types of databases, including: SQL Server, MySQL, PostgreSQL, etc.

D.

In terms of database security, based on the characteristics of database firewall and separation of rights and responsibilities, it can provide detection and reporting

Alarm capability, does not support real-time intrusion prevention and fault repair functions

Questions 190

In the exclusive type mode, is the process of allocating user virtual machines correct? ◎ ITA according to the IP of the virtual machine address, send a Ping request to the virtual machine; ②ITA sends a request to allocate a virtual machine to HDC; ③ITA sends a request to the virtual machine

The virtual machine sends a request to format the data disk and modify the computer name; ④ITA sends a query message to the DB for the virtual machine

request for information (single)

Options:
A.

4131

B.

1423

C.

1432

D.

4123

Questions 191

the user has built a database on the FusionCompute virtual machine, and once the virtual machine is connected with other virtual machines.The communication between the virtual machine is in a layer 2 network, because the data forwarding efficiency is very high, the virtual machine uses the DPDK technology, which of the following options has the best data forwarding efficiency? (one)

Options:
A.

Stacking mode

B.

Active and standby mode

C.

LACP horizontal based on source and destination MAC

D.

Polling-based load sharing

Questions 192

FusionAccess fails to issue a virtual machine. Which of the following methods can be used to locate the fault? (many)

Options:
A.

Look at the FusionAccess system error message

B.

View the FusionAccess log

C.

View system alarms

D.

Check whether the AccessAgent version of the virtual machine matches the version of the FusionAccess system

Questions 193

In the FusionCloud private cloud scenario, the following descriptions about NAT gateway related concepts are correct. What are the items? ( many)

Options:
A.

There are four types of NAT gateways: small, medium, large and extra large

B.

To create a NAT gateway, you must specify the VPC, subnet, and NAT gateway specifications where the NAT gateway is located

C.

The specifications of the NAT gateway will affect the maximum number of connections and the number of new connections per second of the SNAT function, and the data throughput

The amount is determined by the bandwidth of the Elastic IP

D.

The set composed of five elements: destination IP address, destination port, and transport layer protocol is regarded as a DNAT connect

Questions 194

【Multiple choices】 The following 3D graphics about the Huawei Desktop Protocol HDP (Huawei Desktop Protocol)

Which of the descriptions of the display technology is correct?

Options:
A.

The GPU hardware virtualization technology virtualizes the graphics card into several VCPUs, and each VGPU is bound to a virtual machine.

The virtual machine directly accesses the VGPU as it accesses the GPU

B.

GPU hardware virtualization supports up to 64 users sharing one GPU card

C.

Through the management of graphical workstations, the graphical workstation can be imported into the desktop cloud solution, and sent to the desktop cloud solution.

End users provide the HDP protocol to access the graphics red workstation to obtain the 3D acceleration capability of the GPU

D.

GPU pass-through technology binds each physical GPU to a small number of virtual machines, and the virtual machines directly access to GPU

Questions 195

The cloud architecture of Huawei FusionAccess desktop is a ____ architecture, and the computing and data of this architecture are in the cloud.

It has the characteristics of centralized management, centralized operation, high data security, simple terminal maintenance, and high system reliability.

(Please fill in the English abbreviation).

Options: