Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What are the login authentication methods for the elastic cloud server?

A.

fingerprint

B.

Dynamic mouth token OTP

C.

Key pair

D.

password

Full Access
Question # 5

Which item does not exist in the configuration of creating Listener?

A.

Load balancer protocol port

B.

Load method

C.

HTTPSE certificate

D.

Belonging VPC

Full Access
Question # 6

Mount the shared cloud hard disk to multiple cloud servers, Before the operating system has built a shared file system or similar cluster management system, Unable to realize the file sharing function.

A.

True

B.

False

Full Access
Question # 7

Install Cloudbase before creating a private image-init. The purpose of this tool is to ensure that new cloud servers created with private images can be customized.

A.

True

B.

False

Full Access
Question # 8

Cyber security as an important component of cloud security services, Achieve network isolation, Responding to cyber attacks,Ensure network security.

A.

True

B.

mistake

Full Access
Question # 9

Which of the following parameters need to be set when creating a backup strategy?

A.

Retention rules

B.

Backup time

C.

name

D.

Backup cycle

Full Access
Question # 10

Through private images in area B, elastic cloud servers can be deployed in area A.

A.

True

B.

mistake

Full Access
Question # 11

The API gateway service currently supports API integration and API openness including the entire HUAWEI CLOUD.

A.

True

B.

False

Full Access
Question # 12

Which of the following correspondences does the VPN gateway and remote gateway support?

A.

One to one

B.

-To many

C.

many to many

D.

many to one

Full Access
Question # 13

Generally, the cost of value-added services generated by cloud monitoring is very low, which can be used with value-added services such as dumping of monitoring data files and sending alarm notifications as needed.

A.

True

B.

False

Full Access
Question # 14

Regarding the creation of a private image, which of the following is correct?

A.

Create data disk image from OBS file

B.

Create system disk image through external image file

C.

Create a whole machine image through cloud server backup

D.

Create system disk image through cloud server

Full Access
Question # 15

Which statement about Anti-DDos traffic cleaning is wrong?

A.

Provides public IP protection against elastic cloud hosts and load balancing devices

B.

Provide monitoring capability to view a single public network IP,Including current protection status, current protection configuration parameters, traffic conditions from 24 hours ago to the present, 2 hours of abnormal events

C.

Possess Web vulnerability security detection capabilities

D.

Provide configuration and modification for public network IP Anti-DDosAbility to correlate parameters

Full Access
Question # 16

VPC itself does not charge fees, but users need to purchase according to the charging standards when using bandwidth or VPN.

A.

True

B.

False

Full Access
Question # 17

RDS can be used in combination with which of the following cloud services ,So as to ensure that the RDS instance is safely isolated from other services on the network?

A.

VPC

B.

OBS

C.

ECS

D.

CES

Full Access
Question # 18

The bandwidth of public network elastic load balancing can be adjusted.

A.

True

B.

mistake

Full Access
Question # 19

When configuring bucket logging, Which of the following statements about the storage location of the log file is correct?

A.

Can be stored in the current bucket or other buckets

B.

Can only be stored in other buckets

C.

Enable log management

D.

Can only be stored in the current bucket

Full Access
Question # 20

Which of the following options does a VPN consist of?

A.

VPN connection

B.

Subnet

C.

VPN gateway

D.

VPC

Full Access
Question # 21

About ELB configuration description, Which ones are incorrect?

A.

Optional session retention when configuring listener

B.

The listening strategy can be configured when creating the listener

C.

You can choose ip when adding an elastic load balancer

D.

Configurable health check timeout time

Full Access
Question # 22

can access file systems across VPCs.

A.

True

B.

mistake

Full Access
Question # 23

Description of health check, Which ones are correct?

A.

The protocol of the check path supports HTTPS

B.

When the number of failures exceeds the unhealthy threshold, Think the service is unavailable

C.

No reply was received after the timeout period expired, It is considered a failure

D.

When the number of failures exceeds the health threshold, Think the service is unavailable

Full Access
Question # 24

does not need to delete the virtual gateway and virtual interface bound to the physical leased line when unsubscribing from the physical leased line.

A.

True

B.

mistake

Full Access
Question # 25

When external traffic enters Loadbalancer, Which component to enter first?

A.

Linux Virtualserver

B.

nginx

C.

Healthcheck (health check)

D.

Firewall

Full Access
Question # 26

The cloud hard disk is like a traditional server hard disk. You can format and create a file system on the cloud hard disk mounted on the cloud server, and store the data persistently.

A.

True

B.

False

Full Access
Question # 27

After the elastic cloud server is successfully created, Once the bandwidth used is determined, Will not be able to modify.

A.

True

B.

mistake

Full Access
Question # 28

Which of the following addresses cannot be added to the authorized address of the VPC?

A.

224.0.0.1

B.

10.5.5.10

C.

10.0.1.32

D.

192.168.1.0

Full Access
Question # 29

After deleting the elastic scaling group, the elastic cloud server instance automatically created by elastic scaling will also be deleted automatically.

A.

True

B.

mistake

Full Access
Question # 30

by setting() Can filter and manage backup resources.

A.

Backup time

B.

Retention rules

C.

shared

D.

Label

Full Access
Question # 31

When the system disk fails, you can create a new cloud hard disk through the backup of the system disk and mount it to the cloud server as a system disk.

A.

True

B.

mistakenerror

Full Access
Question # 32

VPN connection onlysupportIPsecVPN

A.

True

B.

False

Full Access
Question # 33

Elastic Cloud Server is bound()Rear. Can be through the fixed public network IP The address provides external access.

A.

system disk

B.

Mirroring

C.

Data disk

D.

Elastic public network ip

Full Access
Question # 34

Which of the following is not a security detection source for situational awareness services?

A.

Vulnerability scanning, host security, flow probe

B.

DDoS,IDS

C.

ACL/Security Group

D.

Web firewall, database firewall

Full Access
Question # 35

Which of the following scenarios can the object storage service be applied to?

A.

Video on demand

B.

Enterprise Cloud Disk

C.

Backup archive

D.

Video Surveillance

Full Access
Question # 36

Which of the following are the basic characteristics of cloud computing?

A.

On-demand self-service

B.

Fast elastic scaling

C.

Resource pooling

D.

Broad network access

Full Access
Question # 37

Description of cloud server group, Which of the following is correct?

A.

There is no association between the cloud server group and the cloud server group

B.

Elastic cloud servers in the same cloud server group will try to be created on the same host

C.

Elastic cloud servers in the same cloud server group will be created on different hosts as dispersed as possible

D.

The elastic cloud servers in the cloud server group comply with the sameone Strategy

Full Access
Question # 38

Which of the following descriptions about public clouds is wrong?

A.

The public cloud is generally available via the Internet

B.

Public cloud is a cloud built by enterprises using their own infrastructure

C.

Public cloud can have many tenants at the same time

D.

Public cloud can optimize resources on a large scale

Full Access
Question # 39

Which SDK language does the API gateway support?

A.

C

B.

Java

C.

PHP

D.

delphi

Full Access
Question # 40

Which of the following courses in the Cloud Academy can be used for online learning to obtain scenario-based skills improvement?, And get a certification certificate through the online exam?

A.

Vocational Certification Course

B.

Foundation Course

C.

Q micro certification course

D.

Role course

Full Access
Question # 41

The use of the cloud hard disk is the same as that of the transfer hard disk. The cloud hard disk mounted on the cloud server can be formatted and file system created to realize the persistent storage of data.

A.

True

B.

False

Full Access
Question # 42

What key performance indicators of the relational database service support monitoring database instances and database engines?

A.

Buffer pool utilization

B.

Number of database connections

C.

TPS

D.

QPS

Full Access
Question # 43

Description of VPN gateway bandwidth is the following error?

A.

You can configure alarm rules in cloud monitoring to monitor bandwidth

B.

The sum of VPN connection bandwidth can exceed the bandwidth of the VPN gateway

C.

During the use of VPN, when the network traffic exceeds the VPN bandwidth, it may cause network congestion and cause the VPN connection to be interrupted.

D.

The bandwidth of the local VPN gateway is the bandwidth shared by all VPN connections created based on the gateway

Full Access
Question # 44

In which of the following scenarios can a elastic scaling group modify the availability zone and subnet of the scaling group?

A.

The current number of instances is0

B.

The scaling group is in an inactive state

C.

Scaling activity in progress

D.

The scaling group is enabled

Full Access
Question # 45

After the relational database instance is successfully created, the database port cannot be modified.

A.

True

B.

False

Full Access
Question # 46

What is the deduction period of API gateway?

A.

sky

B.

minute

C.

Hour

D.

Second

Full Access
Question # 47

To use shared cloud hard drives, a cluster must be set up.

A.

True

B.

mistake

Full Access
Question # 48

Which of the following components does Elastic Load Balancing include?

A.

Client

B.

Listener

C.

Backend server group

D.

Load balancer

Full Access
Question # 49

Which of the following factors need to be considered in the early stage of cloud dedicated line access?

A.

Number of Cloud Dedicated Lines

B.

Virtual interface configuration parameters

C.

Cloud dedicated line bandwidth rate

D.

Port type for cloud private line access

Full Access
Question # 50

The cloud dedicated line supports dynamic routing protocols.

A.

True

B.

False

Full Access
Question # 51

What is the storage capacity unit of cloud hard drives?

A.

PB

B.

KB

C.

GB

D.

TB

Full Access
Question # 52

The scalable bandwidth supports the setting of three types of scalable bandwidth strategies, which are alarm strategy, timing strategy and periodic strategy.

A.

True

B.

mistake

Full Access
Question # 53

Which of the following is not included in the function of Vulnerability Scanning Service?

A.

Mirror leakage management

B.

Emergency vulnerability management

C.

diversification testing

D.

Weak password detection

Full Access
Question # 54

The two sites communicate across the Internet, and IP can be deployed on the firewalls at both ends Sec VPN thus protects the mutual access traffic between the two intranets.

A.

True

B.

mistake

Full Access
Question # 55

HUAWEI CLOUD Elastic Cloud Server connects to the public network(Internet) What are the ways?

A.

Cloud monitoring

B.

NAT gateway

C.

Elastic public network ip

D.

Elastic load balancing

Full Access
Question # 56

Adopt IP During Sec VPN communication, Encryption and decryption verification is carried out on the firewalls at both ends

A.

True

B.

False

Full Access
Question # 57

Cloud computing is a model, It can obtain the required resources from the configurable resource sharing pool anytime, anywhere, conveniently and on-demand (e.g.,Computing, storage, network, applications, and services),Resources can be quickly supplied and released,Minimize the workload of managing resources and interaction with service providers

A.

True

B.

mistake

Full Access
Question # 58

Which of the following descriptions about the cloud dedicated line is wrong?

A.

Cloud Dedicated Line (Direct Connect) is to build a high-speed, low-latency, stable and secure dedicated connection channel between the user's local data center and the virtual private cloud on the cloud

B.

The cloud dedicated line uses the Internet tunnel technology of the public network

C.

To open a cloud dedicated line, you need to purchase a physical dedicated line first, Then create a virtual gateway, Finally create the virtual interface

D.

Cloud dedicated line supports annual and monthly payment methods

Full Access
Question # 59

There is no limit to the size of the exported image.

A.

True

B.

mistake

Full Access
Question # 60

In the Huawei Cloud E1 service, which scenario can the OCR service solve?

A.

Image Processing

B.

Text recognition

C.

Speech Recognition

D.

Image Identification

Full Access
Question # 61

In the process of VPC creation, which parameter realizes the function of automatically obtaining IP?

A.

DHCP

B.

Gateway

C.

Partition

D.

network segment

Full Access
Question # 62

HUAWEI CLOUD E1 service is called "Faster Pratt & Whitney AI Which service is "Development Platform"?

A.

Model Arts

B.

MLS machine learning service

C.

DLS deep learning service

D.

GES Graph Engine Service

Full Access
Question # 63

IP Sec VPN is an encrypted tunnel technology, Establish confidential and secure communication tunnels between different networks by using encrypted security services. Which of the following is not the guaranteed data packet transmission characteristics on the public network?

A.

Authenticity

B.

Completeness

C.

Timeliness

D.

Confidentiality

Full Access
Question # 64

Which of the following database instance types does the relational database service have?

A.

Active and standby instance

B.

Financial version example

C.

Write-only example

D.

Single instance

Full Access
Question # 65

users can add or delete the monitoring charts of the instance resources of key concern on the homepage of the cloud monitoring overview. As the object of the important instance of concern, it can support the multi-index comparison function., It is convenient to check in time every time you log in to the cloud monitoring platform.

A.

True

B.

mistake

Full Access
Question # 66

When creating an elastic cloud server, The elastic cloud server can be initialized through the "file injection" function provided by the system.

A.

True

B.

mistake

Full Access
Question # 67

Which of the following key technologies does SA (Security Situation Awareness Service) use?

A.

encryption

B.

Big data technology

C.

Identity authentication technology

D.

Crawler technology

Full Access
Question # 68

Vulnerability Scanning Service can repair the vulnerabilities scanned

A.

is correct

B.

mistake

Full Access