Nothing Special   »   [go: up one dir, main page]

Huawei Datacenter Dump2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

1.

Positioned on Huawei's high end storage, the OceanStor 18800 V5 features high performance, high
capacity, and high scalability. It is suitable for high-performance applications in large enterprises.

False

True

2. Huawei RH2285 VS and RH2288 VS servers are 2U 2-socket servers.

False

True

3. in Huawei KVM virtualization, the I/O requests from a VM are directly mapped to the BIO of the
host to effectively reduce I/O execution on the VM

True

False

4. KVM memory virtualization aims to allow the guest memory address to start from the physical
address 0.

False

True

5. Huawei FusionModule2000 smart modular data centers include large data centers and a medium-
sized data centers. A FusionModule2000 can serve as an independent equipment room for network
services, or a local equipment room of a large modular data center for partial or services.

True

False

6. Agile Controller-DCN provides application-based network automation to simply network


deployment. It supports seamlessly interconnect with mainstream cloud platforms and computing
management platforms. In addition, it supports a highly-reliable distributed cluster

False

True
7. In Huawei KVM virtualization, QEMU and Libvirtd trigger the kernel module through the pseudo-
character device /dev/kernel.

True

False

8. For Huawei CE series Ethernet switches, CE is the abbreviation of Customer Edge.

True

False

9. FusionSphere is developed based on the open-source cloud computing software CloudStack,


avoiding vendor lock-in

False

True

10. Services in ManageOne ServiceCenter are created by system administrators or organization


administrators.

False

True hay dudas

11. File storage is a storage mode that uses a file as the basic unit. File storage devices are connected
to servers through the Ethernet. The server can access data by using multiple protocols. Which of the
following protocols cannot be used to access file storage?

A TELNET

B FTP

C NFS

D. HTTP

12. VXLAN is a Network Virtualization over Layer 3 (NVO3) technology that uses MAC-in-UDP
encapsulation. Which of the following is not a concept of VXLAN?

A BD
B VNI

C VTEP

D VLANIF

13. Which of the following is not a policy of the eSight infrastructure management service?

A Power supply reliability assurance

B. Separation between the control plane and forwarding plane

C. Simple O&M

D. Resource usage maximization

14. Which of the following statements is false about the application scenarios of Huawei NGFW
products?

A The products can be used for secure interconnection between subnets and branches.

B. The products can be used for egress border protection on the Internet.

C. The products can be used for access security management and control for various objects from
terminals to applications on access networks

D. The products cannot be used for border protection of data centers.

15. The next-generation Huawei data center uses a typical SDN four-layer architecture. Which of the
following is not a part of the SDN four layer architecture?

A. Network control layer

B Service orchestration layer

C. Fabric network layer

D. Data warehouse layer

16. Which of the following statements about characteristics of software-defined networking (SDN) is
false?

A Network capability openness and programmability

B. Separate control and forwarding planes

C. Independent control planes


D Centralized control logic

17. Which of the following statements about the KVM architecture is incorrect?

A. After being intercepted by KVM, the guest's I/O is handed over to Libvirt for processing.

B. QEMU can emulate network devices and disks and affect their performance.

C User-mode programs can access /dev/kvm through the ioctl function,

D. The guest OS (including the CPU, memory, and driver) is running in restricted CPU mode in KVM
virtualization.

18. Which of the following statements about computing virtualization is correct?

A. KVM and FusionSphere are open source projects.

B. Encapsulation stores all VM data into a group of files that are independent of physical hardware.

C. Computing virtualization consists of CPU virtualization, memory virtualization, I/O virtualization, and
disk virtualization.

D. For Type I virtualization the VMM layer is located in the kernel of host OS.

19. Which of the following statements about Huawei's SDN controller is false?

A. It can perform service orchestration, cooperation, and policy delivery for network services.

B. It can process network control protocols.

C. It can provide network O&M, monitoring, and management functions.

D. It can control the cloud platform to deliver VMs.

20. Which of the following is not a southbound protocol used by Agile Controller-DCN?

A SNMP

B. NETCONF

C. OSPF

D OpenFlow

21. The total cost of ownership (TCO) of a data center consists of two parts: capital expenditure
(CAPEX) and operational expenditure (OPEX) Which of the following expenses belongs to OPEX?
A Software investment

B. System integration cost

C Hardware investment

D. Electricity fee

22. Which component does not belong to Nova in FusionSphere OpenStack?

A Nova-conducter

B. Nova-scheduler

C Nova-api

D. Nova-volume

23. Which of the following hard disk types is not supported by Huawei OceanStor V5?

A NL-SAS

B. SAS

C. SSD

D. IDE

24. Virtual local area network (VLAN) technology logically divides a physical LAN into multiple
broadcast domains (multiple VLANs). What is the link between two switches?

A. Aggregation link

B. Trunk link

C Access link

D. Core link

25. Based on the characteristics of cloud computing, the architecture of a Cloud DC can be divided into
five layers. Which of the following is not a Cloud DC architecture?

A laas layer

B. Cloud management layer

C. Physical layer
D. Logic layer

26. Which of the following statements about Agile Controller-DCN and eSight is false?

A The O&M of Agile Controller-DCN is based on deployment of underlay and overlay networks. The
O&M of eSight is based on the O&M of network devices

B. eSight provides device upgrade and traps.

C. The O&M functions of Agile Controller-DCN cannot replace those of eSight.

D. Agile Controller-DCN provides visualized forwarding paths for VMs and intelligent loop prevention at
the access side.

27. Which of the following statements is false about Huawei NE series routers?

A NE series routers support firewall, application awareness, IPS, URL filtering, and WLAN functions, but
support only the distributed AC control function

B NE series routers support the enhanced network address translation (NAT) functions, including no-
port address translation (No-PAT), PAT, and NAT for internal servers

C IPsec VPN 12VPN and L3VPN can be deployed together on the NE series routers based on networking
requirements. Such routers support the TE function at the same time.

D NE series routers provide abundant routing protocols including RIP OSPF, IS-IS, BGP4, and multicast
routing

28. Object-Based Storage (OBS) is a storage mode that uses an object as the basic unit. Which of the
following statements about OBS is false?

A Network connection is an important part of the OBS system. It connects each component of the OBS
system to form an entirety.

B. OBS is being eliminated because it fails to meet the increasing requirements of data scalability and
security.

C. OBS is based on file systems and stores access data using file systems.

D. The OBS system mainly consists of objects, object-based storage devices, metadata servers, and file
systems.

29. Which of the following statements about cloud compute value is incorrect?

A Resource consolidation for improved resource utilization


B. Information is more secure and stable than traditional systems

C. Automatic scheduling for energy conservation and emission reduction

D. Quick deployment and elastic capacity expansion

30. Which of the following statements is true about the stack feature of Huawei CE series Ethernet
switches?

A. A maximum of four CE12800 series switches can set up a cluster switch system (CSS).

B. CE12800 series switches of different models cannot set up a CSS.

C. CE12800 and CE128005 series switches can set up a CSS.

D. CE12800 series switches of the same model can set up a CSS.

31. Which of the following cloud resource pools can be managed by ManageOne?

A. SCVMM resource pool

B. HDFS resource pool

C. VMware resource pool

D. Power resource pool

32. Which of the following statements about VXLAN is false? Según examen

A Except for VXLAN network edge devices, other devices on the network do not need to identify MAC
addresses of VMs.

B. Physical and virtual networks are decoupled. Tenants can plan their own virtual networks.

C. A Layer 2 VXLAN gateway enables communication between VXLAN segments and access to external
networks.

D 24-bit VNIs can be used to isolate a maximum of 16M VXLAN segments, allowing a data center to
accommodate a large number of tenants.

33. Link aggregation bundles multiple physical Ethernet links into a logical link to increase link
bandwidth. Which of the following statements about operations that can be performed before
configuring link aggregation is true?
A When two devices are connected through an Eth-Trunk link, the link aggregation modes on the two
devices can be different.

B. Devices at both ends of an Eth-Trunk link must use the same number of physical interfaces, interface
rate, duplex mode, and flow control mode.

C An Eth-Trunk can be added to another Eth-Trunk.

D. A member interface can be configured with some services and a static MAC address.

34. Which of the following is not a part of the SAN network?

A. Router

B. FC switch

C. Server

D. Back-end storage system

35. In the data protection solution, which of the following is not an important concept in data
protection?

A COD

B. IOPS

C. RTO

D. RPO

36. Which of the following statements about KVM CPU virtualization is incorrect?

A In CPU sharing mechanism, when VMs use vCPUs, the hypervisor schedules the VCPUs to PCPUs to
implement time-division multiplexing of PCPU resources

B. KVM virtualization uses VMCS, VMEntry and VMExit to quickly perform VCPU context switches.

C All X86 instructions can be executed in non-root mode, while only privileged instructions can be
executed in root mode.

D. Most instructions of the guest OS can run directly on the hardware except that only privileged
instructions are trapped in the VM for emulated execution

37. The application system data growth of some services cannot be accurately evaluated. To prevent
waste of the storage capacity, which of the following advanced features of OceanStor V5 can be used?
A SmartCache

B. Smart Thin

C. SmartTier

D SmartQoS

38. Which of the following is not a logic of a Cloud DC?

A. Available zone (AZ)

B. Tenant

C. Virtual data center (VDC)

D. Performance-optimized data center (POD)

39. Which of the following services is used to store and restore VM disk images?

A mongodb

B. glance

O C. log

D. cinder

40. Which of the following technologies is most commonly used to construct a large Layer 2 data
center network?

A. VXLAN

B. OSPF

C. TRILL

D. CSS/SVF

Multiple choice multiple answer 41/60Question

41. In the following AC-DCN networking architecture, what is the correct interpretation of the
network plane?
A Management network plane: used for northbound communication and Linux management

B. Internal communication network plane: used for communication with SNC nodes

C Service network plane used for communication between the southbound plane of Agile Controller-
DCN and network devices

D. Internal management network plane: used for internal communication of a cluster

42. Which of the following functions does the Unified Operation feature of ManageOne include?

A Unified Product Catalog

B. Unified Topology Management

C. Unified Quota Management

D. Unified Order Management

43. ManageOne OperationCenter is the operation platform for data center O&M management. Which
of the following functions does OperationCenter provide?

A. Health analysis.

B. Unified management of cloud and non-cloud resources

C. Unified monitoring platform

D. Unified analysis and locating platform

44. Server virtualization virtualizes physical server resources into logical resources, enabling one
server to function as multiple virtual servers isolated with each other. Which of the following are
server virtualization?

A I/O virtualization

B. CPU virtualization

C. Memory virtualization

D. Disk virtualization

45. What are the essences of virtualization?

A. Independent of hardware

B. Isolation
C. Encapsulation

D. Partition

46. Which of the following functions does the Unified Configuration Center feature of ManageOne
include?

A O&M Maps

B. VDC Monitoring

C Scenario-based Configuration

D. Unified O&M

47. FusionStorage provides industry standard interfaces for upper-layer applications and Virtual
Machines (VMs) in non-virtual environments. These industry-standard interfaces include:

A NFS, CIFS, FTP, and HDFS interfaces

B. SCSI and iSCSI interfaces

C OpenStack Swift interfaces

D. All of the above

48. Which of the following are features of Huawei SDN controller Agile Controller-DCN?

A. Zero-touch deployment: Agile Controller-DCN supports zero-touch deployment of all network devices.
When a device connects to the network, Agile Controller-DCN automatically delivers configurations to
implement automatic deployment.

B. Open and integrated: Agile Controller-DCN uses standard northbound APIs to interconnect with
mainstream OpenStack cloud platforms. It can also collaborate with computing management platform
VMware vCenter.

C. Refined O&M: Agile Controller-DCN can display physical, logical, and application network topologies
and their mappings. It can display the overall network status and network quality, facilitating network
O&M.

D. Simple and flexible: Agile Controller-DCN provides application-based network automation, so that
customers can use customized application templates to flexbly select network models and quickly
provision data center network resources.
49. Which of the following is hardware equipment in a data center?

A Network equipment

B. Server

C. Cabinet and auxiliary facilities

D. Storage equipment

50. What is a data center composed of?

A Basic environment

B. Basic software

C Application support platform

D. Hardware

51. Which of the following are basic management functions of eSight?

A. Asset management

B. Alarm management

C. Resource management

D Topology management

52. Which of the following are typical application scenarios of the CloudFabric DCN solution?

A Network virtualization - Hosting

B. Cloud-Network Integration - FusionSphere

C. Network Virtualization - Computing

D Cloud-Network Integration - OpenStack

53. Which of the following statements are true about Huawei USG6000 firewalls?

A Huawei USG6000 firewalls integrate multiple services including security, routing, and VPN.
B. Huawei USG6000 firewalls use professional content security defense technologies.

C. Huawei USG6000 firewalls are stable and efficient new 10-Gigabit multi-core hardware platforms.

D. Huawei USG6000 firewalls provide refined management based on applications and users

54. What are the deployment modes of ManageOne?

A. Remote disaster recovery

B. Cross-AZ HA deployment

C. Single-server deployment

D. Local cluster deployment

55. Which of the following statements about the Application and Automation feature of ManageOne
are true?

A The VAPP service can be used for rapid and automatic deployment of compute, storage, network,
application, and other resources.

B. The vAPP service allows users to customize Auto Scaling (AS) policies to automatically scale ECSS,
achieving load balance and improving resource utilization.

C. ManageOne supports service customization, helping customers to migrate offline services to the
cloud and providing unified application approval and provisioning for various offline services.

D. Cloud services establish channels with ManageOne certificate management through unified
authentication and implements service interaction through

56. What are the functions of the Metadata Controller (MDC) in the FusionStorage logical
architecture?

A. Controls data distributed rules

B. Controls data rebuilding rules

C. Controls the status of the distributed cluster

D. Performs I/O operations

57. Which of the following functions are supported by the network service layer of Agile Controller-
DCN?
A Active-active VXLAN gateway

B. Device stacking

C. L4-17 service automation

D. M-LAG networking

58. Which of the following belong to storage device management of eSight?

A Display the status and attributes of devices and their components.

B. Manage device alarms.

C. Set the login access control policy.

O. Maintain discovery parameters

59. Which of the following are the advantages of IP SAN?

A. High maintainability

B. Standard access

C. Long transmission distance

D. Ease of bandwidth expansion

60. Which of the following technologies are used in Huawei KVM CPU virtualization?

A. VT-x

B. MMU virtualization

C. Permission management

D. CPU sharing

You might also like