HCIA v.3.5 _ Compute_Cloud_Services Flashcards

Pass and thrive

1
Q

Cloud Computing

A

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EVS disk types

A

Common I/O, high I/O, ultra-high I/O, general purpose SSD, and extreme SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To back up ECSs and EVS disks periodically or at a specified time you can

A

configure backup policies on the management console or use an API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

yearly/monthly, pay-per-use, and spot price

A

Billing modes for ECS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECSs are deployed in multiple Availability Zones (AZs) connected with each other through an __________.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You can use Cloud Eye to monitor ECS resource usage.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The central processing unit (CPU) is mainly composed of three parts:

A

calculator, controller and register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Complex instruction set computer (CISC) is used by and Reduced instruction set computer (RISC)

A

x86 based CPUS and Kunpeg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______has strong compatibility, a variety of instructions, variable length, and is implemented by microprogramming. _______, on the other hand, has few instructions and similar frequency, and is mainly implemented by hardware (general-purpose registers, hard-wired logic control).

A

CISC, RISC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Regions are classified into

A

A universal region provides universal cloud services for common tenants. A dedicated region provides specific services for specific tenants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ________can have multiple AZs, and an ____can belong to only one region.

A

region, AZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AZs in each region can communicate with each other

A

they can communicate with each other at the network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If an ECS is associated with an anti-affinity policy

A

ECSs added to the ECS group are deployed on different hosts for higher reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You can access ECSs
through the ___________________ or _______________.

A

Management console or HTTPS-based REST APIs. Use an API if you need to integrate the ECSs into a
third-party system for secondary development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When Selecting a login method and log in to the Windows ECS, which of the following methods does not have a binded EIP? -Through the management console (VNC)
- RDP file
- Using MSTSC
- mobile terminal
- From a Mac

A

Through the management console (VNC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To log in to Linux ECS using a password for the first time, you can log in as root:

A
  • Through the management console (VNC).
    ▫ Using an SSH password, as long as the ECS has an EIP bound.
    ▫ From a mobile terminal, as long as the ECS has an EIP bound.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false:
Only the original image of the ECS can be used to reinstall the OS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or false:
Changing the OS won’t change the system disk of the ECS. After the change, there wont be a new system disk ID, and the original system
disk wont be gone.

A

False:
* Changing the OS will change the system disk of the ECS. After the change, there will be a new system disk ID, and the original system
disk will be gone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or false:

Source/destination check is not used for existing NICs. It is only used for NICs created together with the ECS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An image is a server or disk template that contains

A

an operating system (OS), service data, and necessary application software, such as database software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Private images can be transferred between accounts, regions, or cloud platforms through

A

image sharing, replication, and export.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or false:
IMS allows you to batch deploy and upgrade application systems, improving O&M efficiency and ensuring consistency.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A _______________contains an OS and pre-installed software for various services. You can use a _____________to create ECSs and migrate your services to the cloud.

A

system disk image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

contains only service data.

A

data disk image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An ______ image is created from an external _____ image file. It is a special image that is not available on the ECS console.

A

ISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A full ECS image contains

A

pre-installed os software and service data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Marketplace image

A

It has an OS, application environment, and software pre-installed. You can use these images to deploy websites and application development environments in just a few clicks

27
Q

You can use an ECS or external image file to create an ECS private image. You can also:

A

▫ Use an ISO file to create an ECS system disk image.
▫ Use a CBR backup to create a full-ECS image.
▫ Use a BMS to create a system disk image.

28
Q

You can modify the following information of an image:

A

name, description, minimum memory, maximum memory, NIC multi-queue, and SR-IOV driver.

29
Q

Talk about in-region and cross-region replication

A

In region: is used for conversion between encrypted and unencrypted images or for enabling advanced features (such as fast ECS creation) for images.

cross-region: is used for replicating a private image in the current region to the same account in another region.

30
Q

Encrypted images can be shared with other users or published in the
Marketplace.

A

False: Encrypted images cannot be shared with other users or published in the
Marketplace.

31
Q

________________________ provides tenants with dedicated servers featuring excellent computing performance equivalent to physical servers as well as high security and reliability.

A

BMS

32
Q

_____________ provides tenants with dedicated servers featuring excellent computing performance equivalent to physical servers as well as high security and reliability.

A

Bare Metal Server (BMS)

33
Q

_______________ service offers both the stability of traditional hosted servers and the high scalability of cloud-based services.

A

The BMS

34
Q

True or false : physical servers do not have performance loss due to no virtualization overhead.

A

true

35
Q

An _______ disk can be attached to multiple BMSs, enabling
cluster-based application deployment.

A

EVS

36
Q

: A BMS can have multiple EVS disks attached, each as large as _____ TB. EVS disk capacity can be expanded as needed and you only pay for what you use.

A

32

37
Q

key aspect of BMS

A

No virtualization overhead

38
Q

Database scenario - BMS

A

Key database services for government, enterprise, and financial services must be carried on physical servers with dedicated resources, isolated networks, and guaranteed performance.

39
Q

Container scenario- BMS

A

Internet elastic service load. Compared with VMs, BMS containers provide higher deployment density, lower resource overhead, and more agile deployment efficiency.

40
Q

_____________ are a kernel virtualization technology originating with Linux. They
provide lightweight virtualization to isolate processes and resources.

A

Containers

41
Q

__________ is the first system that allows containers to be portable in different machines. It simplifies both the
application packaging and the application library and dependency packaging.

A

Docker

42
Q

Why are Docker containers called like that?

A

Because an isolated process is independent of the host and other isolated processes

43
Q

provides functions such as service discovery, scaling, load balancing, self-healing, and even leader election, freeing developers from infrastructure-related configurations

A

Kubernetes

44
Q

is a highly scalable, high-performance, enterprise-
class Kubernetes service for you to run containers and applications.

A

Cloud Container Engine (CCE)

45
Q

The ______________NUMA architecture and high-speed InfiniBand network cards yield a three- to five-fold improvement in computing performance

A

Bare Metal

46
Q

You can create ______master nodes for your cluster control plane to avoid single points of failure.

A

3

47
Q

CCE supports heterogeneous computing architectures such as _____,_______, and______.

A

GPU, NPU, Arm

48
Q

CCE can use various heterogeneous infrastructures, such as:

A

high-performance ECSs, bare metal server, and GPU-accelerated ECSs.

49
Q

Supporting multi-AZ and multi-region disaster recovery, _____ ensures high availability of Kubernetes clusters.

A

CCE

50
Q

A _______ is a group of one or more cloud servers (also known as nodes) in the same subnet. It has all the cloud resources (including VPCs and compute resources) required for running containers.

A

cluster

51
Q

A _____ is the smallest and simplest unit in the Kubernetes object model that you create or deploy. A _____ encapsulates an application container (or, in some cases, multiple containers), storage resources, a unique network IP address, and options that govern how the containers should run.

A

pod

52
Q

A ______ is a cloud server (virtual or physical machine) running an instance of the Docker Engine. Containers are deployed, run, and managed on _______. The _____ agent (kubelet) runs on each node to manage container instances on the _______. The number of ______ in a cluster can be scaled.

A

node

53
Q

A ________ is an abstract method that exposes a group of applications running on
a pod as network services.

A

service

54
Q

A __________ is a running instance of a Docker image. Multiple ________ can run on one node. ___________ are actually software processes. Unlike traditional software processes, _______ have separate namespace and do not run directly on a host.

A

container

55
Q

________ become containers at runtime, that is, containers are created from images. Containers can be created, started, stopped, deleted, and suspended..

A

Images

56
Q

Whats a workload?

A

an application running on Kubernetes.

57
Q

Workloads classified in Kubernetes include

A

Deployments, StatefulSets, DaemonSets, jobs, and cron jobs.

58
Q

 Deployment

A

Pods are completely independent of each other and functionally identical. They feature auto
scaling and rolling upgrade. Typical examples include Nginx and WordPress.

59
Q

 StatefulSet

A

Pods are not completely independent of each other. They have stable persistent storage, and feature orderly deployment and deletion. Typical examples include MySQL-HA and etcd.

60
Q

A __________________ ensures that all or some nodes run a pod. It is applicable to pods running on every node. Typical examples include Ceph, Fluentd, and Prometheus Node Exporter.

A

DaemonSet

61
Q

It is a one-time task that runs to completion. It can be executed immediately after being created. Before creating a workload, you can execute a _____ to upload an image to the image repository.

A

 Job

62
Q

It runs a job periodically on a given schedule.

A

CronJob

63
Q

 ClusterIP

A

ClusterIP Service, as the default Service type, is exposed through the internal IP
address of the cluster. If this mode is selected, Services can be accessed only within the cluster.

64
Q

how are nodeport services exposed?

A

through the IP address and static port of each node. A ClusterIP Service, to which a NodePort Service will route, is automatically created.

65
Q

______ automatically completes code compilation, image build, grayscale release, and container-based deployment based on code sources.

A

CCE