C8c7c6e9ff285a742c8180f5b8517bbf PDF

Title C8c7c6e9ff285a742c8180f5b8517bbf
Author A G
Course IT Elective 3
Institution STI College
Pages 6
File Size 72.3 KB
File Type PDF
Total Downloads 29
Total Views 121

Summary

true or false The measurable service feature of cloud computing refers to charging based on time and usage. False When the VM is accessed using VNC, the network is no longer required. False The virtualization technology can be used to virtualize a physical server into multiple VMs, improving the har...


Description

true or false 1. The measurable service feature of cloud computing refers to charging based on time and usage. - False 2. When the VM is accessed using VNC, the network is no longer required. - False 3. The virtualization technology can be used to virtualize a physical server into multiple VMs, improving the hardware performance of the physical server. - False 4. Virtualization consists of computing virtualization, storage virtualization, and network virtualization, corresponding to cloud hosts, cloud hard disks, and cloud networks in cloud computing - False 5. Virtualization features include partitioning, isolation, encapsulation, and independence. - True 6. The Libvirt can connect to various Hypervisors to provide APIs in various languages. It is completely transparent to upper-layer users. - True 7. After the disks in an array form a RAID group, the server connected to the disk array cannot directly access the RAID group. Therefore, you need to divide the disk array into logical LUNs before allocating them to the server - True 8. On Huawei FusionCompute, a management IP address must be configured for each DVS to facilitate unified management. - False 9. Hybrid cloud is a deployment mode that integrates features of the public cloud and private cloud. The industry cloud is a form of hybrid cloud. - False 10. After the memory overcommitment technology is used, the physical memory of the 128G can provide 150G virtual memory. - True 11. In the KVM, the I/O virtualization performance is poor by using the QEMU. If the Virtio is introduced, the NIC rate can be improved. - True 12. In OpenStack, Ceilometer provides charging capabilities. - False 13. In Huawei FusionSphere, the memory and CPU resources used by a VM can only be provided by the same cluster. Therefore, a maximum of computing resources that can be used by a virtual machine cannot exceed a sum of resources available to all hosts in the cluster.

- False 14. Huawei FusionCompute is able to check the usage of global physical resources during VM running, calculate the optimal host for the VM based on the intelligent scheduling algorithm, and enable the VM to run on the optimal host by means of live migration, thereby improving the overall service experience. - True 15. The user cloud desktop cannot access the Internet normally. It must be that the northsouth traffic has failed. - False 16. The IMC policy supports hot migration of CPUs of different models from different vendors. This ensures that hosts in the cluster provide the same CPU function set for VMs. - False 17. The virtualization technology can improve hardware resource utilization and reduce O&M costs. Cloud computing also has these advantages. Therefore, cloud computing and virtualization technologies are inseparable from each other. - False 18. If a security group is deleted, the rules in the security group will be deleted as well. - False 19. A Docker image is a key component of Docker. It is used to create a Docker container. It can only be read and cannot be modified directly. - True Single-answer Question 20. Which of the following file formats does not support VM creation in FusionCompute? - .vmdk 21. What can I do if a disk is not involved in a snapshot of a VM on Huawei FusionCompute? - Set the disk mode to independent-persistent or independent-non-persistent. 22. In the following RAID types, there is no data redundancy protection for ( ). - RAID 0 23. Which of the following scenarios is not suitable for improving the memory overcommitment ratio? - In commercial scenarios, the memory overcommitment rate has reached 150%. 24. Which of the following technologies can be used to describe "Birds of a feather flock together"? - VLAN 25. Which of the following statements about big data and cloud computing are correct? - Big data can be used as a cloud computing service for users to select. 26. Which of the following statements about the relationship between VRM and CNA is correct? - Restart the CNA host on the Portal page provided by the VRM.

27. When creating a port group on FusionCompute, set VLAN ID to 0. Which of the following statements is true? - Do not modify the data packets that pass through the port group. 28. When creating a port group on FusionCompute, set VLAN ID to 10. Which of the following statements is incorrect? - The system will change the tag of data frames with a non-VLAN-10 tag that pass through the port group to VLAN 10 and then forward the data frames. 29. Which of the following operations for creating port groups in Huawei FusionCompute is false? - Set the VLAN ID to 5000. 30. On Huawei FusionCompute, you need to modify a disk of a VM. The following operations can be performed on ( ): - Change the disk mode from "Dependent" to "Independent & persistent" 31. Raid5 requires at least () hard disks. - 3 32. Which of the following modules is responsible for providing persistent block storage in the OpenStack solution? - Cinder 33. Which of the following statements about the FusionCompute cluster is correct? - A complete cluster should contain computing, storage, and network resources. 34. Which of the following statements about creating a VM template is incorrect? - Converting a snapshot into a template 35. Which of the following technologies is used to prevent phone harassment and add the phones marked as sales to the blacklist? - Security group 36. There are many milestone events in the development of the Internet. Which of the following is true about the time sequence of the milestone events? - Birth of ARPANET ---> Establishment of the TCP/IP protocol ---> Birth of DNS ---> "www" officially open to the public 37. What is the function of memory limit in Huawei FusionCompute? - Limit the upper limit of the VM memory when memory resources are preempted. 38. In the development history of the Internet, which of the following key milestone events is not related to the emergence and development of cloud computing? - Reconciliation between American network music service providers and media companies 39. In Huawei FusionCompute, which of the following statements about the IMC function is false? - You are advised to enable the IMC function when the memory sizes of CNA hosts in the cluster are inconsistent. 40. Which of the following statements is correct? ()

-

The method of processing the frames sent by the trunk interface is as follows: If the VLAN ID is the same as the default ID and the VLAN ID is allowed to pass through the interface, remove the Tag, and send the packet. 41. Which of the following technologies on the switch can improve the link rate? - LACP 42. The KVM virtualization architecture includes the KVM module, QEMU, and Libvirt. Which of the following statements about these modules is false? - Libvirt+QEMU can form a virtualization solution. 43. Which of the following is true about the on-demand self-service feature of cloud computing? - After determining the required cloud computing services, users can apply for cloud computing resources by themselves. Multi-answer Question 44. In Huawei FusionCompute, which of the following statements about the IMC function is false? - You are advised to enable the IMC function when the memory sizes of CNA hosts in the cluster are inconsistent. 45. Which of the following technologies on the switch can improve the link rate? - LACP 46. Which of the following methods can be used to create VMs on Huawei FusionCompute? - Use the VM to clone - Use the template to deploy - To import the VM. - Manually create 47. Which of the following devices have the routing function? - Layer 3 switch - Router 48. Which of the following are features of FusionSphere? - Automatic scheduling - Various O&M management - On-demand resource allocation - Compatible with various software and hardware 49. Which of the following statements about Virt-manager are correct? - Virt-manager is a graphical management tool for KVM VMs - Virt-manager is an open-source KVM VM management tool. 50. Which of the following storage resources need to be added? - IP SAN - NAS 51. Which of the following statements about RAID are correct?

-

RAID improves the I/O performance of a storage system by concurrently reading and writing data on multiple disks. - Compared with RAID 5, RAID 6 has stronger data recovery capability, but weaker read/write capability of disks. 52. What are the functions that take effect at the cluster level on Huawei FusionCompute? - Memory overcommitment - DRS 53. Which of the following methods are used to implement memory overcommitment? - Memory Swapping - Memory sharing - Memory Ballooning 54. Which of the following statements about the relationship between port groups and VLANs on Huawei FusionCompute is correct? - In the trunk type, one port group can correspond to multiple VLANs. - In the trunk type, one port group can correspond to one VLAN. - In a common type, one port group can correspond to one VLAN. 55. Which of the following operations are correct when you add shared storage to multiple hosts on Huawei FusionCompute? - Select the corresponding host when adding data storage. - When the shared storage is IP SAN, make sure that the storage network of the host is connected to the service ports of storage. 56. In Huawei FusionCompute, if a VM is bound to a host, () is affected. - Hot migration - DRS 57. Which of the following statements about KVM virtualization are correct? - Host OS can be Linux - Guest OS can be Windows. - Guest OS can be Linux. 58. How can a VM obtain a MAC address on Huawei FusionCompute? - The administrator manually configures the MAC address for the VM based on the site requirements. - VRM Allocate MAC addresses based on the MAC address segment. 59. Which of the following statements about the relationship between port groups and VLANs on Huawei FusionCompute is correct? - In a common type, one port group can correspond to one VLAN. - In the trunk type, one port group can correspond to multiple VLANs. - In the trunk type, one port group can correspond to one VLAN. 60. Which of the following parameters can be configured for Huawei FusionCompute CPU QoS feature?

- Limit - Quota - Reserved 61. Which of the following statements about the mapping between VMs and DVSs are correct on Huawei FusionCompute? - If a VM has multiple NICs, each NIC can be associated with a DVS. - If a VM has multiple NICs, multiple NICs can be associated with the same DVS. - If a VM has one NIC, the NIC can be associated with only one DVS....


Similar Free PDFs