HCIA v.3.5 _ Compute_Cloud_Services Flashcards

Pass and thrive

1
Q

Cloud Computing

A

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EVS disk types

A

Common I/O, high I/O, ultra-high I/O, general purpose SSD, and extreme SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To back up ECSs and EVS disks periodically or at a specified time you can

A

configure backup policies on the management console or use an API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

yearly/monthly, pay-per-use, and spot price

A

Billing modes for ECS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECSs are deployed in multiple Availability Zones (AZs) connected with each other through an __________.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You can use Cloud Eye to monitor ECS resource usage.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The central processing unit (CPU) is mainly composed of three parts:

A

calculator, controller and register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Complex instruction set computer (CISC) is used by and Reduced instruction set computer (RISC)

A

x86 based CPUS and Kunpeg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______has strong compatibility, a variety of instructions, variable length, and is implemented by microprogramming. _______, on the other hand, has few instructions and similar frequency, and is mainly implemented by hardware (general-purpose registers, hard-wired logic control).

A

CISC, RISC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Regions are classified into

A

A universal region provides universal cloud services for common tenants. A dedicated region provides specific services for specific tenants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ________can have multiple AZs, and an ____can belong to only one region.

A

region, AZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AZs in each region can communicate with each other

A

they can communicate with each other at the network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If an ECS is associated with an anti-affinity policy

A

ECSs added to the ECS group are deployed on different hosts for higher reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You can access ECSs
through the ___________________ or _______________.

A

Management console or HTTPS-based REST APIs. Use an API if you need to integrate the ECSs into a
third-party system for secondary development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When Selecting a login method and log in to the Windows ECS, which of the following methods does not have a binded EIP? -Through the management console (VNC)
- RDP file
- Using MSTSC
- mobile terminal
- From a Mac

A

Through the management console (VNC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To log in to Linux ECS using a password for the first time, you can log in as root:

A
  • Through the management console (VNC).
    ▫ Using an SSH password, as long as the ECS has an EIP bound.
    ▫ From a mobile terminal, as long as the ECS has an EIP bound.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false:
Only the original image of the ECS can be used to reinstall the OS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or false:
Changing the OS won’t change the system disk of the ECS. After the change, there wont be a new system disk ID, and the original system
disk wont be gone.

A

False:
* Changing the OS will change the system disk of the ECS. After the change, there will be a new system disk ID, and the original system
disk will be gone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or false:

Source/destination check is not used for existing NICs. It is only used for NICs created together with the ECS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An image is a server or disk template that contains

A

an operating system (OS), service data, and necessary application software, such as database software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Private images can be transferred between accounts, regions, or cloud platforms through

A

image sharing, replication, and export.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or false:
IMS allows you to batch deploy and upgrade application systems, improving O&M efficiency and ensuring consistency.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A _______________contains an OS and pre-installed software for various services. You can use a _____________to create ECSs and migrate your services to the cloud.

A

system disk image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

contains only service data.

A

data disk image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
An ______ image is created from an external _____ image file. It is a special image that is not available on the ECS console.
ISO
25
A full ECS image contains
pre-installed os software and service data.
26
Marketplace image
It has an OS, application environment, and software pre-installed. You can use these images to deploy websites and application development environments in just a few clicks
27
You can use an ECS or external image file to create an ECS private image. You can also:
▫ Use an ISO file to create an ECS system disk image. ▫ Use a CBR backup to create a full-ECS image. ▫ Use a BMS to create a system disk image.
28
You can modify the following information of an image:
name, description, minimum memory, maximum memory, NIC multi-queue, and SR-IOV driver.
29
Talk about in-region and cross-region replication
In region: is used for conversion between encrypted and unencrypted images or for enabling advanced features (such as fast ECS creation) for images. cross-region: is used for replicating a private image in the current region to the same account in another region.
30
Encrypted images can be shared with other users or published in the Marketplace.
False: Encrypted images cannot be shared with other users or published in the Marketplace.
31
________________________ provides tenants with dedicated servers featuring excellent computing performance equivalent to physical servers as well as high security and reliability.
BMS
32
_____________ provides tenants with dedicated servers featuring excellent computing performance equivalent to physical servers as well as high security and reliability.
Bare Metal Server (BMS)
33
_______________ service offers both the stability of traditional hosted servers and the high scalability of cloud-based services.
The BMS
34
True or false : physical servers do not have performance loss due to no virtualization overhead.
true
35
An _______ disk can be attached to multiple BMSs, enabling cluster-based application deployment.
EVS
36
: A BMS can have multiple EVS disks attached, each as large as _____ TB. EVS disk capacity can be expanded as needed and you only pay for what you use.
32
37
key aspect of BMS
No virtualization overhead
38
Database scenario - BMS
Key database services for government, enterprise, and financial services must be carried on physical servers with dedicated resources, isolated networks, and guaranteed performance.
39
Container scenario- BMS
Internet elastic service load. Compared with VMs, BMS containers provide higher deployment density, lower resource overhead, and more agile deployment efficiency.
40
_____________ are a kernel virtualization technology originating with Linux. They provide lightweight virtualization to isolate processes and resources.
Containers
41
__________ is the first system that allows containers to be portable in different machines. It simplifies both the application packaging and the application library and dependency packaging.
Docker
42
Why are Docker containers called like that?
Because an isolated process is independent of the host and other isolated processes
43
provides functions such as service discovery, scaling, load balancing, self-healing, and even leader election, freeing developers from infrastructure-related configurations
Kubernetes
44
is a highly scalable, high-performance, enterprise- class Kubernetes service for you to run containers and applications.
Cloud Container Engine (CCE)
45
The ______________NUMA architecture and high-speed InfiniBand network cards yield a three- to five-fold improvement in computing performance
Bare Metal
46
You can create ______master nodes for your cluster control plane to avoid single points of failure.
3
47
CCE supports heterogeneous computing architectures such as _____,_______, and______.
GPU, NPU, Arm
48
CCE can use various heterogeneous infrastructures, such as:
high-performance ECSs, bare metal server, and GPU-accelerated ECSs.
49
Supporting multi-AZ and multi-region disaster recovery, _____ ensures high availability of Kubernetes clusters.
CCE
50
A _______ is a group of one or more cloud servers (also known as nodes) in the same subnet. It has all the cloud resources (including VPCs and compute resources) required for running containers.
cluster
51
A _____ is the smallest and simplest unit in the Kubernetes object model that you create or deploy. A _____ encapsulates an application container (or, in some cases, multiple containers), storage resources, a unique network IP address, and options that govern how the containers should run.
pod
52
A ______ is a cloud server (virtual or physical machine) running an instance of the Docker Engine. Containers are deployed, run, and managed on _______. The _____ agent (kubelet) runs on each node to manage container instances on the _______. The number of ______ in a cluster can be scaled.
node
53
A ________ is an abstract method that exposes a group of applications running on a pod as network services.
service
54
A __________ is a running instance of a Docker image. Multiple ________ can run on one node. ___________ are actually software processes. Unlike traditional software processes, _______ have separate namespace and do not run directly on a host.
container
55
________ become containers at runtime, that is, containers are created from images. Containers can be created, started, stopped, deleted, and suspended..
Images
56
Whats a workload?
an application running on Kubernetes.
57
Workloads classified in Kubernetes include
Deployments, StatefulSets, DaemonSets, jobs, and cron jobs.
58
 Deployment
Pods are completely independent of each other and functionally identical. They feature auto scaling and rolling upgrade. Typical examples include Nginx and WordPress.
59
 StatefulSet
Pods are not completely independent of each other. They have stable persistent storage, and feature orderly deployment and deletion. Typical examples include MySQL-HA and etcd.
60
A __________________ ensures that all or some nodes run a pod. It is applicable to pods running on every node. Typical examples include Ceph, Fluentd, and Prometheus Node Exporter.
DaemonSet
61
It is a one-time task that runs to completion. It can be executed immediately after being created. Before creating a workload, you can execute a _____ to upload an image to the image repository.
 Job
62
It runs a job periodically on a given schedule.
CronJob
63
 ClusterIP
ClusterIP Service, as the default Service type, is exposed through the internal IP address of the cluster. If this mode is selected, Services can be accessed only within the cluster.
64
how are nodeport services exposed?
through the IP address and static port of each node. A ClusterIP Service, to which a NodePort Service will route, is automatically created.
65
______ automatically completes code compilation, image build, grayscale release, and container-based deployment based on code sources.
CCE