HCIA Mock Flashcards
Estudiar para la certificacion HCIA - Services
Which of the following statements about log groups in Log Tan Service (LTS) is incorrect?
A. Log group is the basic unit for reading and writing logs.
B. Log groups can be user-created, or created by other cloud services.
C. You can create log streams in a log group and set log retention duration for a log group.
D. Log group is the basic unit for LTS to manage logs.
A. Log group is the basic unit for reading and writing logs.
Which of the following statements is incorrect about HUAWEI CLOUD scalable file service (SFS)?
A. SFS file systems are NAS file storage.
B. SFS stores files, and sorts and displays data in the hierarchy of files and folders.
C. SFS supports data sharing.
D. SFS file systems cannot be used independently, and they must be mounted to cloud servers for use.
D. SFS file systems cannot be used independently, and they must be mounted to cloud servers for use.
Which of the following scenarios Elastic Volume Service (EVS) is not suitable for?
A. High performance computing
B. Development and testing
C. Massive video and image storage
D. Data warehouse
C. Massive video and image storage
Trace files of cloud Trace Service (CTS) can be transferred to object Storage Service (OBS) buckets for cloud resource security analysis and troubleshooting in the future. Which of the following OBS storage classes is suitable for storing trace files?
A. Infrequent Access
B. Archive
C. Standard
D. High I/O
C. Standard
The cloud service purchased by a user contains only the running environment of applications. Which of the following modes does this scenario use?
A. IaaS
B. PaaS
C. SaaS
D. NaaS
B. PaaS (Platform as a Service)
Which of the following is not typical application scenarios of Auto scaling (AS)?
A. Interactive forums
B. Live streaming websites
C. E-commerce platforms
D. Image processing
D. Image Processing
Which of the following is not major functions of Cloud Trace Service (CTS)?
A. Trace recording
B. Trace query
C. Trace transfer
D. OS monitoring
D. OS Monitoring
What is the basis on which HUAWEI CLOUD regions are divided?
A. Geographical location and network latency
B. Cluster server
C. AZ
D. POD
A. Geographical location and network latency
Cloud computing is a computing model that dynamically provides scalable and virtualized resources as services over the internet. which of the following statements about cloud computing is incorrect?
A. Cloud computing is a model rather than a piece of technology.
B. Users can use cloud computing resources anytime, anywhere as long as the network is reachable.
C. With cloud computing, users can use resources such as networks, servers, storage devices, applications, and services.
D. Cloud computing resources can be quickly provisioned and released, which reflects the on-demand self-service feature.
D. Cloud computing resources can be quickly provisioned and released, which reflects the on-demand self-service feature.
A user wants to change a service running on an Elastic Cloud Servers (ECS). This change requires the operating system (OS) of the ECS to be changed. Which of the following statements is incorrect about the OS change?
A. After a system disk is replaced, the ECS IP address will change.
B. After a system disk is replaced, the snapshot data on the existing system disk will be lost.
C. You can choose a private or public image during the OS change.
D. If an ECS contains data disks and the OS is changed from Windows to Linux, you need to install the software that can recognize NTFS because Linux cannot do this by default.
A. After a system disk is replaced, the ECS IP address will change.
On the same host, VM A can ping through VM B but VM B cannot ping through VM A. Which of the following may be cause?
A. Incorrect IP address of VM A
B. Incorrect NIC type of VM B
C. Incorrect firewall configuration on VM A
D. Incorrect gateway configuration on VM B
C. Incorrect firewall configuration on VM A
How do you multiple object versions on HUAWEI CLOUD Object storage Service (OBS)?
A. Enable versioning
B. Configure lifecycle rules
C. Change the storage classes
D. Enable logging
A. Enable versioning
Which of the following virtualization features can ensure that other VMs on the physical host are not affected, even if a VM on the physical host is faulty?
A. Partition
B. Isolation
C. Encapsulation
D. Independence
B. Isolation
Which of the following key performance metrics is not monitored for Relational Database Service (RDS) DB instances and DB engines?
A. Network bandwidth
B. QPS
C. TPS
D. Database connections
A. Network Bandwidth
Which of the following is not a main function of HUAWEI CLOUD Web Application Firewall (WAF)?
A. Web tamper protection
B. Defense against brute- force attacks on Elastic Cloud Servers (ECSs)
C. Anti-crawler protection
D. Information leakage prevention
B. Defense against brute- force attacks on Elastic Cloud Servers (ECSs)
Which of the following Elastic Volume Service (EVS) Disk types is not by Elastic Cloud Servers (ECSs)?
A. Common I/O
B. High I/O
C. Ultra-high I/O
D. Local I/O
D. Local I/O
If VM tools is not installed on an Elastic Clod Server (ECS), which pair of the following ECS metrics can be monitored by Cloud Eye?
A. Memory Usage and Disk Usage
B. Inband Incoming Rate and Inband Outgoing Rate
C. Outband Incoming Rate and Outband Outgoing Rate
D. Availability and Connectivity
C. Outband incoming Rate and Outband Outgoing Rate
Which of the following Auto Scaling (AS) policies can be used to implement dynamic resource scaling?
A. Scheduled
B. Periodic
C. Alarm
D. Random
C. Alarm
Which of the following is not required by Virtual Private Cloud (VPC) for network isolation?
A. Hardware firewall
B. Software firewall
C. Switch
D. Elastic IP (EIP)
D. Elastic (EIP)
IAM users created by an administrator do not have default permissions. Which of the following statements about permissions is incorrect?
A. To assign permissions to new users, add them to one or more groups, then attach permissions policies or roles to these groups. The users inherit permissions from their groups.
B. IAM users can perform operations on cloud services as specified by the assigned permissions.
C. Permissions are classified into roles and policies based on granularity.
D. FullAccess permissions provide read-only access to all services except IAM.
D. FullAccess permissions provide read-only access to all services except IAM
Which of the following statements about CCE are correct?
A. You can create a Kubernetes cluster by one click on the console.
B. CCE uses the bare metal NUMA architecture and high-speed InfiniBand NICs.
C. Compatible with Kubernetes APIs and Kubectl.
D. The cluster control plane supports HA of three masters.
A. You can create a Kubernetes cluster by one click on the console
B. CCE uses the bare metal NUMA architecture and high-speed InfiniBand NICs
C. Compatible With Kubernetes and Kubectl
D. The cluster control plane supports HA of three master.
What are the scenarios where OBject storage service (OBS) is used?
A. Massive storage resource pool
B. Static website hosting
C. Big Data Storage
D. Archive Storage
A. Massive storage resource pool
B. Static website hosting
C. Big Data Storage
D. Archive Storage
Which of the following statements are correct about the advantages of auto scaling (AS)?
A. It scales resources dynamically.
B. It improves fault tolerance.
C. It enhances system security.
D. It simplifies service operations.
A. It scales resources dynamically
B. It improves fault tolerance
C. It enhances system security
On HUAWEI CLOUD, what are possible reasons a file system may fail to be mounted?
A. The file system capacity is too large.
B. The file system has been deleted.
C. The shared path in the mount command is incorrect.
D. The DNS server used to access the file system is incorrect.
B. The file system has been deleted
C. The shared path in the mount command is incorrect
D.The DNS server used to access the file system is incorrect