Summer Goodies - 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av5rz84q

Exact2Pass Menu

Question # 4

What is the usual division of Regions?

A.

Geographical location and network latency dimensions

B.

Availability zone (AZ)

C.

Cluster server

Full Access
Question # 5

API What is included in the gateway's multiple security protection?

A.

Threat protection

B.

Access security

C.

Log audit

D.

Authentication service extension

Full Access
Question # 6

The access control strategy is one of the security protection components provided by the API gateway.

A.

True

B.

False

Full Access
Question # 7

What scenes are included in user copy mirroring?

A.

Copy non-encrypted images across regions

B.

Copy encrypted image to non-encrypted image

C.

Copy encrypted images across regions

D.

Copy non-encrypted image to encrypted image

Full Access
Question # 8

What are the login authentication methods for the elastic cloud server?

A.

fingerprint

B.

Dynamic mouth token OTP

C.

Key pair

D.

password

Full Access
Question # 9

Regarding the scaling configuration, which of the following is correct?

A.

you An infinite number of scaling configurations can be created.

B.

The scaling configuration defines the specification data of the cloud server to be added in the scaling group.

C.

You can modify the created scaling configuration as needed.

D.

After the scaling group is enabled, the scaling configuration cannot be changed.

Full Access
Question # 10

Which of the following is wrong about the description of the elastic public network IP?

A.

It can be flexibly bound and unbound with resources such as elastic cloud servers, virtual IP, elastic load balancing, and NAT gateways.

B.

EIP can add shared bandwidth to reduce bandwidth usage costs.

C.

Elastic public IP (ElasticIP) provides independent public IP resources, including public IP addresses and public network export bandwidth services.

D.

Only support billing on demand.

Full Access
Question # 11

users can use the management console (OBS Use the object storage service in two ways: Console) and client (OBS Browser).

A.

True

B.

mistake

Full Access
Question # 12

Model What are the steps involved in the automatic learning function in Arts?

A.

Data standard

B.

Write code

C.

Deploy online

D.

Model training

Full Access
Question # 13

Which of the following cloud products belong to the data security type?

A.

Security Expert Service SES

B.

Container Security Service GS

C.

Data encryption service DEW

D.

Enterprise Host Security HSS

Full Access
Question # 14

Regarding the description of object storage service billing, which of the following is correct?

A.

There is no charge for retrieving data

B.

Every data stored in OBS needs to be charged

C.

Public network outgoing traffic needs to be billed

D.

Intranet outgoing traffic will not incur costs

Full Access
Question # 15

After creating a backup strategy, you can change()The state of the cloud disk is bound to the backup strategy.

A.

Available

B.

Recovery failed

C.

transfer

D.

mistake

Full Access
Question # 16

Which of the following services can be used in conjunction with Elastic Scaling?

A.

Flexible file service

B.

Elastic Cloud Server

C.

Cloud monitoring

D.

Elastic load balancing

Full Access
Question # 17

What are the advantages of the shared service system architecture?

A.

Services must be developed using the same programming language and tools

B.

Allows to frequently publish different services at the same time,Maintain the availability and stability of other parts of the system

C.

Low complexity

D.

Each service can be independently developed by different teams, Do not affect each other, Accelerate time to market

Full Access
Question # 18

Which SDK language does the API gateway support?

A.

C

B.

Java

C.

PHP

D.

delphi

Full Access
Question # 19

Which of the following options is the cloud private line self-service activation process?

A.

Physical leased line access>Create virtual gateway>Create virtual interface

B.

Create virtual interface>Create virtual gateway>Physical private line access

C.

Create virtual gateway>Create virtual interface>Physical private line access

D.

Physical leased line access>Create virtual interface>Create virtual gateway

Full Access
Question # 20

The main function of situational awareness does not include which of the following?

A.

data encryption

B.

Focus on

C.

Security Orchestration

D.

Threat discovery and analysis

Full Access
Question # 21

The API gateway service is a booster for the digital transformation of enterprises.

A.

True

B.

mistake

Full Access
Question # 22

Which of the following types of certificates are in elastic load balancing?

A.

Sub-certificate

B.

Root certificate

C.

CA certificate

D.

Server certificate

Full Access
Question # 23

When the system disk fails, you can create a new cloud hard disk through the backup of the system disk and mount it to the cloud server as a system disk.

A.

True

B.

mistakenerror

Full Access
Question # 24

The applications running in the elastically scalable cloud server can be stateful.

A.

True

B.

False

Full Access
Question # 25

The CIFS file system supports mounting on cloud servers using the Linux operating system.

A.

True

B.

mistake

Full Access
Question # 26

After the elastic cloud server is successfully created, If the size does not meet the demand, The specifications of the cloud server can be changed.

A.

True

B.

mistake

Full Access
Question # 27

What can't be achieved in the description of the use of elastic load balancing?

A.

Check the health of the service node

B.

Eliminate single points of failure

C.

Forwarding of Layer 2 and Layer 3 data

D.

Allocate service node pressure

Full Access
Question # 28

Which of the following types of cloud hard disks are used by the ECS?

A.

Super highIO

B.

highIO

C.

Super highIO(Time delay optimization)

D.

ordinary

Full Access
Question # 29

Regarding the creation of a private image, which of the following is correct?

A.

Create data disk image from OBS file

B.

Create system disk image through external image file

C.

Create a whole machine image through cloud server backup

D.

Create system disk image through cloud server

Full Access
Question # 30

In which of the following situations, the network delay between the deployed elastic cloud servers must be the shortest?

A.

In the same security group

B.

In the same VPC

C.

In the same district

D.

Same zone

Full Access
Question # 31

Which of the following Huawei Cloud services belong to the laaS layer service?

A.

Elastic File Service SFS

B.

Relational database RDS

C.

Cloud Container Engine CCE

D.

Cloud Desktop Service Workspace

Full Access
Question # 32

Which of the following parameters need to be set when creating a backup strategy?

A.

Retention rules

B.

Backup time

C.

name

D.

Backup cycle

Full Access
Question # 33

cloud hard disk backup support through()Record operations of backup service resources, So that users can query, audit and backtrack.

A.

Cloud Monitoring Service

B.

Cloud hard drive

C.

Cloud Audit Service

D.

Object storage service

Full Access
Question # 34

What are the alarm levels of cloud monitoring?

A.

urgent

B.

hint

C.

secondary

D.

important

Full Access
Question # 35

uses IP Encryption and decryption verification during Sec VPN communication is performed on the firewalls at both ends.

A.

True

B.

False

Full Access
Question # 36

More than elastic cloud servers cannot use the same RDS database.

A.

is correct

B.

mistake

Full Access
Question # 37

When the load balancer uses the seven-layer protocol HTTP/HTTPS, which of the following options is the network traffic path?

A.

LVS cluster>Nginx cluster>ECS

B.

Nginx cluster>LVS cluster>ECS

C.

LVS cluster>ECS

D.

Neinx cluster>ECS

Full Access
Question # 38

Which of the following services can be used to view the real-time data of various monitoring indicators of load balancing?

A.

Cloud Monitoring Service

B.

Cloud container engine

C.

Virtual private cloud

D.

Elastic scaling

Full Access
Question # 39

When it is necessary to increase the number of instances in the scaling group at a fixed time each week, Which of the following scaling strategies can I implement?

A.

Alert strategy

B.

Timing strategy

C.

Cycle strategy

D.

All of the above

Full Access
Question # 40

After purchasing a VPN gateway, the VP. The N gateway allocates a public network exit IP address.

A.

True

B.

mistake

Full Access
Question # 41

After the relational database is successfully created, Cannot replace the database engine, so, Choose carefully when creating a database instance.

A correct

B mistake

Full Access
Question # 42

relational database services can meet the changing needs of the game industry, effectively shorten the research and development cycle, and reduce research and development costs.

A.

True

B.

mistake

Full Access
Question # 43

twenty one0The elastic scaling service is billable.

A.

True

B.

mistake

Full Access
Question # 44

When mounting a file system in a Linux system, In which file do I need to configure DNS?

A.

/etc/resolv.conf

B.

/usr/local

C.

/sbin/service

D.

/dev/tty

Full Access
Question # 45

VPC itself does not charge fees, but users need to purchase according to the charging standards when using bandwidth or VPN.

A.

True

B.

False

Full Access
Question # 46

Which of the following types of attacks can be prevented by the Anti-DDos traffic cleaning service?

A.

SYN Flood attack

B.

HTTP Get/Post Flood attack

C.

TCP connection exhaustion attack

D.

Malformed package

Full Access
Question # 47

What is wrong about the API statement?

A.

Use open API to greatly improve R&D efficiency

B.

Support exporting APs purchased in the cloud market

C.

API Will become an important way of presenting and using digital assets such as data and software in the future

D.

The API includes basic information, request paths and parameters of the front and back ends, and request related protocols

Full Access
Question # 48

Which of the following services is not related to the Elastic File Service?

A.

Virtual Private Cloud VPC

B.

Control Service Cloud Eye

C.

Elastic Cloud Server ECS

D.

Elastic Scaling AS

Full Access
Question # 49

flexible file service supports standard()protocol.

A.

HTTI

B.

CIFS

C.

FТP

D.

NFSv3

Full Access
Question # 50

What is wrong with the statement about the removal of instances of the scaling group?

A.

When the number of expected instances of the scaling group is less than the current number of instances, the scaling group will remove redundant instances.

B.

You can configure the instance removal strategy as needed.

C.

Instances manually moved in will not follow"Instance removal strategy"Requirement and has the lowest priority when it is removed.

D.

When the scaling group is moved out of the instance, the balance of the availability zone will not be considered.

Full Access
Question # 51

The traditional IT infrastructure architecture of enterprises is no longer capable of supporting the efficient operation of enterprises, Urgently calling for the arrival of structural changes, Which is not the main reason?

A.

TCO remains high

B.

Critical application performance is limited byIO bottleneck

C.

Slow business launch and complicated life cycle management

D.

Internet speed is too slow

Full Access
Question # 52

Statements about cloud hard disk backup and cloud server backup, Which of the following is correct?

A.

Cloud hard disk backup is to protect the entire cloud server

B.

The backup generated by the cloud server backup will also appear on the cloud hard disk backup interface

C.

The backup objects of cloud server backup are all cloud hard disks in the elastic cloud server

D.

The backup object of cloud hard disk backup is one or more specified cloud hard disks

Full Access
Question # 53

The cloud hard drive backup service can create backups for cloud hard drives, and use the backup data to roll back the cloud hard drives to maximize the accuracy and safety of user data and ensure your data security.

A.

True

B.

mistake

Full Access
Question # 54

When the health check is abnormal, First, check whether the rules of the security group where the back-end cloud server is located are valid.()IP network segment?

A.

100.125.0.0/14

B.

100.125.0.0/12

C.

100.125.0.0/16

D.

100.125.0.0/10

Full Access
Question # 55

Map What are the advantages of Reduce service?

A.

Stablize

B.

open

C.

Easy to use

D.

low cost

Full Access
Question # 56

Connecting to the local data center (ID)What are the ways? (Multiple choice)

A.

Virtual private network

B.

Cloud Dedicated Line

C.

Elastic load balancing

D.

Elastic public network ip

Full Access
Question # 57

Shared path of the file system, What is the correct format of the NFS type?

A.

\\File system domain name:/path

B.

File system domain name:/path

C.

\\File system domain name:,path

D.

File system domain name:, path

Full Access
Question # 58

Huawei Cloud VPN service configuration, Supported by peer VPN configuration

A.

What equipment does it include?

B.

Cisco ASAB firewall

C.

Hillstone Network Technology Firewall

D.

USG9 series firewall

E.

Huawei USG6 series firewall

Full Access
Question # 59

Which of the following file system types does Resilient File Service have?

A.

SFS

B.

SFS Turbo Standard

C.

SFS Turbo enhanced

D.

SFS Turbo Performance Type

Full Access
Question # 60

can access file systems across VPCs.

A.

True

B.

mistake

Full Access
Question # 61

When the average value is selected as the aggregation method, when the user switches to view the data range according to the period, the peak inconsistency may occur.

A.

True

B.

mistake

Full Access
Question # 62

file systems can be mounted on cloud servers in different VPCs.

A.

True

B.

mistake

Full Access
Question # 63

file system can be mounted to()superior.

A.

Elastic cloud server for Linux system

B.

Dedicated computing cluster

C.

Bare metal server

D.

Elastic cloud server for Windows system

Full Access
Question # 64

KMS which of the following is not included in the main application scenarios of (Key Management Service)?

A.

Key information asset encryption and decryption

B.

Network transmission data encryption

C.

Business core data encryption and decryption

D.

User personal data encryption and decryption

Full Access
Question # 65

Which of the following is wrong about the description of the planning subnet?

A.

The subnet segment under the same VPC can be repeated

B.

The network segment cannot be modified after the VPC is successfully created

C.

The subnet is the IP address block in the VPC. All cloud resources in the VPC must be deployed in the subnet.

D.

The network segment of the subnet must be within the range of the VPC network segment

Full Access
Question # 66

When the state of the alarm rule has not changed, the system will only send an alarm notification to the user when the state occurs for the first time.

A.

True

B.

mistake

Full Access
Question # 67

by default, The elastic cloud servers in all subnets of the same virtual private cloud can communicate, but the elastic cloud servers of different virtual private clouds cannot communicate.

A.

True

B.

False

Full Access
Question # 68

Which of the following database instance types does the relational database service have?

A.

Active and standby instance

B.

Financial version example

C.

Write-only example

D.

Single instance

Full Access