HCIA v.3.5 _ Compute_Cloud_Services Flashcards
Pass and thrive
Cloud Computing
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources.
EVS disk types
Common I/O, high I/O, ultra-high I/O, general purpose SSD, and extreme SSD
To back up ECSs and EVS disks periodically or at a specified time you can
configure backup policies on the management console or use an API.
yearly/monthly, pay-per-use, and spot price
Billing modes for ECS
ECSs are deployed in multiple Availability Zones (AZs) connected with each other through an __________.
intranet
You can use Cloud Eye to monitor ECS resource usage.
true
The central processing unit (CPU) is mainly composed of three parts:
calculator, controller and register
Complex instruction set computer (CISC) is used by and Reduced instruction set computer (RISC)
x86 based CPUS and Kunpeg
_______has strong compatibility, a variety of instructions, variable length, and is implemented by microprogramming. _______, on the other hand, has few instructions and similar frequency, and is mainly implemented by hardware (general-purpose registers, hard-wired logic control).
CISC, RISC
Regions are classified into
A universal region provides universal cloud services for common tenants. A dedicated region provides specific services for specific tenants.
A ________can have multiple AZs, and an ____can belong to only one region.
region, AZ
AZs in each region can communicate with each other
they can communicate with each other at the network layer.
If an ECS is associated with an anti-affinity policy
ECSs added to the ECS group are deployed on different hosts for higher reliability.
You can access ECSs
through the ___________________ or _______________.
Management console or HTTPS-based REST APIs. Use an API if you need to integrate the ECSs into a
third-party system for secondary development.
When Selecting a login method and log in to the Windows ECS, which of the following methods does not have a binded EIP? -Through the management console (VNC)
- RDP file
- Using MSTSC
- mobile terminal
- From a Mac
Through the management console (VNC)
To log in to Linux ECS using a password for the first time, you can log in as root:
- Through the management console (VNC).
▫ Using an SSH password, as long as the ECS has an EIP bound.
▫ From a mobile terminal, as long as the ECS has an EIP bound.
True or false:
Only the original image of the ECS can be used to reinstall the OS.
True
True or false:
Changing the OS won’t change the system disk of the ECS. After the change, there wont be a new system disk ID, and the original system
disk wont be gone.
False:
* Changing the OS will change the system disk of the ECS. After the change, there will be a new system disk ID, and the original system
disk will be gone.
True or false:
Source/destination check is not used for existing NICs. It is only used for NICs created together with the ECS.
True
An image is a server or disk template that contains
an operating system (OS), service data, and necessary application software, such as database software.
Private images can be transferred between accounts, regions, or cloud platforms through
image sharing, replication, and export.
True or false:
IMS allows you to batch deploy and upgrade application systems, improving O&M efficiency and ensuring consistency.
True
A _______________contains an OS and pre-installed software for various services. You can use a _____________to create ECSs and migrate your services to the cloud.
system disk image
contains only service data.
data disk image
An ______ image is created from an external _____ image file. It is a special image that is not available on the ECS console.
ISO
A full ECS image contains
pre-installed os software and service data.
Marketplace image
It has an OS, application environment, and software pre-installed. You can use these images to deploy websites and application development environments in just a few clicks
You can use an ECS or external image file to create an ECS private image. You can also:
▫ Use an ISO file to create an ECS system disk image.
▫ Use a CBR backup to create a full-ECS image.
▫ Use a BMS to create a system disk image.
You can modify the following information of an image:
name, description, minimum memory, maximum memory, NIC multi-queue, and SR-IOV driver.
Talk about in-region and cross-region replication
In region: is used for conversion between encrypted and unencrypted images or for enabling advanced features (such as fast ECS creation) for images.
cross-region: is used for replicating a private image in the current region to the same account in another region.
Encrypted images can be shared with other users or published in the
Marketplace.
False: Encrypted images cannot be shared with other users or published in the
Marketplace.
________________________ provides tenants with dedicated servers featuring excellent computing performance equivalent to physical servers as well as high security and reliability.
BMS
_____________ provides tenants with dedicated servers featuring excellent computing performance equivalent to physical servers as well as high security and reliability.
Bare Metal Server (BMS)
_______________ service offers both the stability of traditional hosted servers and the high scalability of cloud-based services.
The BMS
True or false : physical servers do not have performance loss due to no virtualization overhead.
true
An _______ disk can be attached to multiple BMSs, enabling
cluster-based application deployment.
EVS
: A BMS can have multiple EVS disks attached, each as large as _____ TB. EVS disk capacity can be expanded as needed and you only pay for what you use.
32
key aspect of BMS
No virtualization overhead
Database scenario - BMS
Key database services for government, enterprise, and financial services must be carried on physical servers with dedicated resources, isolated networks, and guaranteed performance.
Container scenario- BMS
Internet elastic service load. Compared with VMs, BMS containers provide higher deployment density, lower resource overhead, and more agile deployment efficiency.
_____________ are a kernel virtualization technology originating with Linux. They
provide lightweight virtualization to isolate processes and resources.
Containers
__________ is the first system that allows containers to be portable in different machines. It simplifies both the
application packaging and the application library and dependency packaging.
Docker
Why are Docker containers called like that?
Because an isolated process is independent of the host and other isolated processes
provides functions such as service discovery, scaling, load balancing, self-healing, and even leader election, freeing developers from infrastructure-related configurations
Kubernetes
is a highly scalable, high-performance, enterprise-
class Kubernetes service for you to run containers and applications.
Cloud Container Engine (CCE)
The ______________NUMA architecture and high-speed InfiniBand network cards yield a three- to five-fold improvement in computing performance
Bare Metal
You can create ______master nodes for your cluster control plane to avoid single points of failure.
3
CCE supports heterogeneous computing architectures such as _____,_______, and______.
GPU, NPU, Arm
CCE can use various heterogeneous infrastructures, such as:
high-performance ECSs, bare metal server, and GPU-accelerated ECSs.
Supporting multi-AZ and multi-region disaster recovery, _____ ensures high availability of Kubernetes clusters.
CCE
A _______ is a group of one or more cloud servers (also known as nodes) in the same subnet. It has all the cloud resources (including VPCs and compute resources) required for running containers.
cluster
A _____ is the smallest and simplest unit in the Kubernetes object model that you create or deploy. A _____ encapsulates an application container (or, in some cases, multiple containers), storage resources, a unique network IP address, and options that govern how the containers should run.
pod
A ______ is a cloud server (virtual or physical machine) running an instance of the Docker Engine. Containers are deployed, run, and managed on _______. The _____ agent (kubelet) runs on each node to manage container instances on the _______. The number of ______ in a cluster can be scaled.
node
A ________ is an abstract method that exposes a group of applications running on
a pod as network services.
service
A __________ is a running instance of a Docker image. Multiple ________ can run on one node. ___________ are actually software processes. Unlike traditional software processes, _______ have separate namespace and do not run directly on a host.
container
________ become containers at runtime, that is, containers are created from images. Containers can be created, started, stopped, deleted, and suspended..
Images
Whats a workload?
an application running on Kubernetes.
Workloads classified in Kubernetes include
Deployments, StatefulSets, DaemonSets, jobs, and cron jobs.
Deployment
Pods are completely independent of each other and functionally identical. They feature auto
scaling and rolling upgrade. Typical examples include Nginx and WordPress.
StatefulSet
Pods are not completely independent of each other. They have stable persistent storage, and feature orderly deployment and deletion. Typical examples include MySQL-HA and etcd.
A __________________ ensures that all or some nodes run a pod. It is applicable to pods running on every node. Typical examples include Ceph, Fluentd, and Prometheus Node Exporter.
DaemonSet
It is a one-time task that runs to completion. It can be executed immediately after being created. Before creating a workload, you can execute a _____ to upload an image to the image repository.
Job
It runs a job periodically on a given schedule.
CronJob
ClusterIP
ClusterIP Service, as the default Service type, is exposed through the internal IP
address of the cluster. If this mode is selected, Services can be accessed only within the cluster.
how are nodeport services exposed?
through the IP address and static port of each node. A ClusterIP Service, to which a NodePort Service will route, is automatically created.
______ automatically completes code compilation, image build, grayscale release, and container-based deployment based on code sources.
CCE