HCIP Mock Flashcards

Obtained my HCIP certification

1
Q

1.Which of the following is not one of the three Object Storage Service (OBS) storage classes?

A. Standard

B. Frequent Access

C. Infrequent Access

D. Archive

A

B. Frequent Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.Kubernetes provides multiple container runtime interfaces to improve cluster scalability. Which of the following is false about the extended interfaces supported by Kubernetes?

A. CRI (container runtime interface)

B. COI (container orchestration interface)

C. CNI (container network interface)

D. CSI (container storage interface)

A

B. COI (container orchestration interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.IMS provides public, private, shared, and Marketplace images. Which of the following images can be created and shared by a user?

A. Public images

B. Private images

C. Shared images

D. Marketplace images

A

B. Private images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.VPC Peering differs greatly from VPC Endpoint (VPCEP) in terms of security, communication mode, and route configuration. Which of the following is false about their differences?

A. For VPC Peering, all ECSs in the connected VPCs can be accessed. For VPCEP, only ECSs for which VPC endpoint services are created can be accessed.

B. Both VPC Peering and VPCEP allow overlapping VPCs to communicate.

C. For VPC Peering, two peered VPCs can communicate with each other. For VPCEP, requests can only be initiated from a VPC endpoint to a VPC endpoint service, but not the other way around.

D. For two VPCs connected by a VPC peering connection, you need to add routes for them. For two VPCs connected by a VPC endpoint, the route has been added, and you do not need to add again.

A

B. Both VPC Peering and VPCEP allow overlapping VPCs to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5.Huawei Cloud Application Service Mesh (ASM) is an easy-to-use, fully-managed service mesh with high performance and reliability. ASM supports multiple infrastructures such as VMs and containers. Which of the following statements about ASM is false?

A. The ASM data plane is fully compatible with Istio.

B. The ASM control plane is independently developed based on Istio and has higher performance. It is incompatible with Istio.

C. The ASM control plane can interconnect with Cloud Container Engine (CCE).

D. ASM provides a one-stop grayscale release platform with multiple built-in grayscale release processes, such as canary release and blue-green deployment.

A

B. The ASM control plane is independently developed based on Istio and has higher performance. It is incompatible with Istio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6.ROMA Connect is a full-stack application and data integration platform and is part of ROMA solution. Which of the following statements about ROMA Connect is false?

A. The service integration component supports API lifecyle management. It encapsulates existing backend services, data sources, and custom functions into standard RESTful APIs, and then makes them accessible to external systems.

B. The data integration component flexibly converts many heterogeneous data sources by incorporating data import capabilities of Data Replication Service (DRS) and Cloud Data Migration (CDM).

C. ROMA Connect provides public capabilities such as unified identity authentication, mobility, visual rendering, and cloud-edge-device collaboration for industry applications.

D. ROMA Connect implements IoT device access, device management, data collection, and device control based on the MQTT protocol.

A

C. ROMA Connect provides public capabilities such as unified identity authentication, mobility, visual rendering, and cloud-edge-device collaboration for industry applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7.Document Database Service (DDS) offers multiple types of DB instances to suit different scenarios. Which of the following instance types is not supported by DDS?

A. Single node

B. Primary/Standby

C. Replica set

D. Cluster

A

B. Primary/Standby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8.A user needs to collect Elastic Cloud Server (ECS) logs with Log Tank Service (LTS). Which of the following statements about LTS is false?

A. You can set the log retention duration by creating a log stream.

B. You need to install ICAgent on the Elastic Cloud Server (ECS).

C. You can create log groups in a log stream for log management.

D. Logs will be automatically deleted when the retention duration expires. You can transfer logs to Object Storage Service (OBS) buckets for long-term storage.

A

C. You can create log groups in a log stream for log management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9.Huawei Cloud Relational Database Service (RDS) DB instances support multiple access modes. Which of the following cannot be used to access an RDS DB instance?

A. Private IP address

B. Public IP address

C. Virtual Private Network (VPN)

D. Direct Connect

A

D. Direct Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10.Which of the following statements is true about the differences between an Elastic Cloud Server (ECS), a Bare Metal Server (BMS), and a Dedicated Host (DeH)?

A. Both an ECS and a BMS are VMs.

B. An ECS is a VM, but a BMS is a physical server.

C. Both a BMS and a DeH are physical servers and provide a virtualization platform.

D. Both a BMS and a DeH are physical servers and they do not provide a virtualization platform.

A

B. An ECS is a VM, but a BMS is a physical server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

11.Which of the following statements about Cloud Container Instance (CCI) is false?

A. The cloud platform automatically creates service clusters.

B. CCI supports multiple heterogeneous resources.

C. Users manage or maintain containerized workloads.

D. CCI enables auto scaling of containers in seconds.

A

C. Users manage or maintain containerized workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

12.Which of the following is not an advantage of workload deployment on the cloud over deployment on self-owned servers?

A. large number of cloud security experts and security services handle security issues in a timely manner.

B. Automatic data migration and snapshot backup upon breakdown facilitate data recovery.

C. Service provisioning is flexible and online upgrade and configuration are supported.

D. The technical threshold is low and maintenance is expensive.

A

D. The technical threshold is low and maintenance is expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

13.ServiceStage is a one-stop application management and O&M platform for enterprises. Which of the following statements about ServiceStage is false?

A. Supports runtime environments such as Java, Go, PHP, Node.js, Python, and Docker.

B. Supports access and governance of mainstream microservice frameworks, and works with microservice engines to implement service registration and discovery, configuration management, and service governance.

C. Supports web, common, and microservice applications, such as Apache ServiceComb, Spring Cloud, Dubbo, and Service Mesh.

D. Allows development personnel to quickly and accurately identify potential code problems through automatic defect rectification.

A

D. Allows development personnel to quickly and accurately identify potential code problems through automatic defect rectification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

14.Which of the following is not the detection/analysis data source of Situation Awareness (SA)?

A. Identity and Access Management (IAM)

B. Security protection device logs

C. Threat intelligence

D. Security news

A

A. Identity and Access Management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

15.Users A and user B have their own VPCs in CN East-Shanghai1 and the two VPCs need to communicate with each other. Which of the following statements is true about creating a VPC peering connection?

A. VPC peering connection can be created without the approval of the peer account.

B. VPC peering connection can be created without the approval of the local account.

C. VPC peering connection can be created only after the peer account accepts the request.

D. VPC peering connection can be created only after the local account accepts the request.

A

C. VPC peering connection can be created only after the peer account accepts the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16.If a user wants to use a ready-to-use, high-availability message-oriented middleware that supports the AMQP protocol, which of the following is recommended?

A. Kafka

B. RabbitMQ

C. Zookeeper

D. RocketMQ

A

B. RabbitMQ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

17.Which of the following products/services is not supported by the Managed Threat Detection (MTD)?

A. Virtual Private Cloud (VPC)

B. Object Storage Service (OBS)

C. Host Security Service (HSS)

D. Domain Name Service (DNS)

A

C. Host Security Service (HSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

18.Which of the following statements is true about Huawei Cloud Container Engine (CCE)?

A. Containers deployed using CCE can be isolated only by cgroups.

B. CCE nodes can be classified into master, worker, and backup nodes.

C. Worker nodes can be ECSs, BMSs, and DeHs.

D. Enterprise-class Kubernetes clusters with high scalability and performance are provided.

A

D. Enterprise-class Kubernetes clusters with high scalability and performance are provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

19.An Internet customer uses Content Delivery Network (CDN) for the following reasons. Which of the following is the most important?

A. Faster website access

B. Cross-carrier and cross-region coverage

C. High website security

D. Cost savings in O&M for more focus on services

A

A. Faster website access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

20.An enterprise uses Cloud Container Engine (CCE) to deploy applications and needs to monitor the running status of cloud resources and containers. Which of the following cloud services is recommended?

A. Log Tank Service (LTS)

B. Application Operations Management (AOM)

C. Cloud Trace Service (CTS)

D. Cloud Performance Test Service (CPTS)

A

B. Application Operations Management (AOM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

21.An e-commerce user wants to optimize the purchased ECSs to reduce costs. Which of the following measures can the customer take?

A. Continuously monitor and measure the resource usage and seek optimization opportunities.

B. Determine the server type at the lowest cost based on historical O&M monitoring data to meet performance and workload requirements.

C. Determine the number of servers based on historical and real-time O&M data and service requirements. There is no need to consider Auto Scaling (AS).

D. Identify and stop ECSs (such as development or testing ECSs) that remain idle for a long time based on O&M data.

A

A. Continuously monitor and measure the resource usage and seek optimization opportunities.

B. Determine the server type at the lowest cost based on historical O&M monitoring data to meet performance and workload requirements.

D. Identify and stop ECSs (such as development or testing ECSs) that remain idle for a long time based on O&M data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

22.Web Application Firewall (WAF) is a security service that keeps web applications stable. Which of the following web attacks can WAF block for websites?

A. XSS attacks

B. SQL injection and command injection attacks

C. Website Trojan horse attacks

D. Text injection attacks

A

A. XSS attacks

B. SQL injection and command injection attacks

C. Website Trojan horse attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

23.Which of the following cluster network models are supported by Cloud Container Engine (CCE)?

A. O&M network

B. Node network

C. Container network

D. Service network

A

B. Node network

C. Container network

D. Service network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

24.Data Replication Service (DRS) can migrate data through multiple types of networks. Which of the following network types are supported by DRS real-time migration?

A. Virtual Private Cloud (VPC)

B. VPC Endpoint (VPCEP)

C. Virtual Private Network (VPN)

D. Direct Connect

A

A. Virtual Private Cloud (VPC)

C. Virtual Private Network (VPN)

D. Direct Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

25.A user deploys its core services in the on-premises data center and edge services on the cloud. The data center and the cloud need to communicate with each other. Which of the following services can be used?

A.
VPC Peering

B.
Virtual Private Network (VPN)

C.
Direct Connect

D.
Cloud Connect

A

B.
Virtual Private Network (VPN)

C.
Direct Connect

26
Q

26.Service Mesh is a dedicated infrastructure layer for processing service communication. Which of the following statements about Service Mesh are true?

A. Service Mesh is a middle layer for application communication.

B. Common applications, such as Istio and Spring Cloud, use Service Mesh architecture.

C. Service Mesh is a group of lightweight network proxies deployed with application services, transparent to application services.

D. Service Mesh supports distributed system functions such as load balancing, service discovery, monitoring and tracing, and traffic control.

A

A. Service Mesh is a middle layer for application communication.

C. Service Mesh is a group of lightweight network proxies deployed with application services, transparent to application services.

D. Service Mesh supports distributed system functions such as load balancing, service discovery, monitoring and tracing, and traffic control.

27
Q

27.DevCloud is a one-stop DevSecOps platform for developers. What functions and services does this platform consist of?

A. ProjectMan

B. CodeHub

C. CloudBuild

D. Application O&M and monitoring

A

A. ProjectMan

B. CodeHub

C. CloudBuild

28
Q

28.An e-commerce platform holds a promotion campaign, which will see access traffic spike within a few hours. Which two of the following services are suitable for this scenario?

A. Auto Scaling (AS)

B. Public NAT Gateway

C. Elastic Load Balance (ELB)

D. Content Delivery Network (CDN)

A

A. Auto Scaling (AS)

C. Elastic Load Balance (ELB)

29
Q

29.Which of the following statements about ServiceStage functions are true?

A. Code check: online static code check and security check in multiple languages, and defect analysis and rectification suggestions.

B. Application management: application lifecycle management and environment management.

C. Microservice application access: access and governance of mainstream microservice frameworks, and service registration and discovery, configuration management, and service governance by using together with CSE.

D. Application O&M: application O&M management through logs, monitoring, and alarms.

A

B. Application management: application lifecycle management and environment management.

C. Microservice application access: access and governance of mainstream microservice frameworks, and service registration and discovery, configuration management, and service governance by using together with CSE.

D. Application O&M: application O&M management through logs, monitoring, and alarms.

30
Q

30.Cloud Eye monitors cloud services and resources to keep you informed of any issues in real-time. Which of the following services can be monitored by Cloud Eye?

A. Elastic Cloud Server (ECS)

B. Elastic Volume Service (EVS)

C. Object Storage Service (OBS)

D. Bare Metal Server (BMS)

A

A. Elastic Cloud Server (ECS)

B. Elastic Volume Service (EVS)

C. Object Storage Service (OBS)

D. Bare Metal Server (BMS)

31
Q

31.Database and Application Migration UGO (UGO) supports source database profiling, which uses key database metrics as features for training to present a picture of the source database.

A. DB name and creation time

B. CPU and memory usage

C. Table and SQL complexity

D. IOPS and QPS

A

B. CPU and memory usage

C. Table and SQL complexity

D. IOPS and QPS

32
Q

32.Which of the following statements are true about the differences between Elastic Volume Service (EVS) backups and snapshots?

A. Backups are stored in Object Storage Service (OBS); snapshots are stored with the disk data.

B. backup is the data copy of a disk at a given point in time, and automatic backups can be configured. If a disk is deleted, the backups of this disk will not be deleted, but the snapshots of this disk will be deleted.

C. backup and its source disk reside in the same AZ, and cloud server backup supports cross-region replication. A snapshot and its source disk reside in different AZs.

D. backup can be used to restore disk or create a new disk; a snapshot can also be used to restore disk or create a new disk.

A

A. Backups are stored in Object Storage Service (OBS); snapshots are stored with the disk data.

B. backup is the data copy of a disk at a given point in time, and automatic backups can be configured. If a disk is deleted, the backups of this disk will not be deleted, but the snapshots of this disk will be deleted.

D. backup can be used to restore disk or create a new disk; a snapshot can also be used to restore disk or create a new disk.

33
Q

33.A user wants two VPCs from different regions to communicate with each other. Which of the following services can be used?

A. VPC Peering

B. Virtual Private Network (VPN)

C. Direct Connect

D. Cloud Connect

A

B. Virtual Private Network (VPN)

D. Cloud Connect

34
Q

34.Which of the following statements about Application Performance Management (APM) are true?

A. APM monitors application invocations and visualizes service execution tracks and statuses for fast locating of faults and performance bottlenecks.

B. APM supports languages such as PHP, Java, Python, Go, and C#.

C. APM will automatically install an Agent on the host you select and performs tracing analysis.

D. APM collects metric data (such as service invocations and database access) for you to monitor applications.

A

A. APM monitors application invocations and visualizes service execution tracks and statuses for fast locating of faults and performance bottlenecks.

D. APM collects metric data (such as service invocations and database access) for you to monitor applications.

35
Q

35.An e-commerce user wants to implement automated and less expensive O&M, standardize the usage of cloud resources, and clear non-standard or idle resources in a timely manner. Which of the following services can meet these requirements?

A. Cloud Eye

B. Cloud Trace Service (CTS)

C. Application Operations Management (AOM)

D. Application Performance Management (APM)

A

A. Cloud Eye

B. Cloud Trace Service (CTS)

C. Application Operations Management (AOM)

36
Q

36.Which of the following statements about Scalable File Service (SFS) are true?

A. SFS provides on-demand high-performance file storage, which can be shared by multiple servers.

B. SFS stores files. Data is sorted and displayed in files and folders.

C. SFS file systems can be accessed after being mounted to servers through NFS or CIFS.

D. SFS application scenarios include big data analytics, static website hosting, databases, and gene sequencing.

A

A. SFS provides on-demand high-performance file storage, which can be shared by multiple servers.

B. SFS stores files. Data is sorted and displayed in files and folders.

C. SFS file systems can be accessed after being mounted to servers through NFS or CIFS.

37
Q

37.To improve automation, an enterprise plans to use Huawei Cloud FunctionGraph and other services to build cloud native web applications. Which of the following statements about FunctionGraph are true?

A. FunctionGraph supports multiple runtimes, including Node.js, Java, Python, and C#.

B. FunctionGraph provides unified plug-ins for on-/off-cloud development and debugging.

C. You can just write your code and set running conditions without provisioning or managing servers.

D. You can visually orchestrate event triggers, functions, and process controllers in a flowchart through lines.

A

A. FunctionGraph supports multiple runtimes, including Node.js, Java, Python, and C#.

B. FunctionGraph provides unified plug-ins for on-/off-cloud development and debugging.

C. You can just write your code and set running conditions without provisioning or managing servers.

D. You can visually orchestrate event triggers, functions, and process controllers in a flowchart through lines.

38
Q

38.Kata containers provide a more secure running environment than common containers. Which of the following statements are true about Kata containers?

A. Kata containers are lightweight VMs created using the QEMU/KVM technology.

B. Kata containers are OCI-compliant and support the Kubernetes CRI interface.

C. Kata is a type of VMs. A complete guest OS needs to be deployed for container running.

D. Kata containers are compatible with VM security and container lightweight features. Independent isolation is provided for kernel, network, I/O, and memory.

A

A. Kata containers are lightweight VMs created using the QEMU/KVM technology.

B. Kata containers are OCI-compliant and support the Kubernetes CRI interface.

D. Kata containers are compatible with VM security and container lightweight features. Independent isolation is provided for kernel, network, I/O, and memory.

39
Q

39.IoT Device Access (IoTDA) allows you to connect device fleets to the cloud, enable device-cloud intercommunications, manage devices in batches, and forward device data to other Huawei Cloud services.Which of the following statements about the IoTDA component are true?

A. Device access

B. Device managemen

C. DMS MQ

D. Data forwarding

A

A. Device access

B. Device management

D. Data forwarding

40
Q

40.Data Encryption Workshop (DEW) is a comprehensive cloud data encryption service. It uses keys to encrypt data. DEW provides multiple service modules. Which of the following are true?

A. Dedicated HSM

B. Key Management Service (KMS)

C. Key Pair Service (KPS)

D. Cloud Secret Management Service (CSMS)

A

A. Dedicated HSM

B. Key Management Service (KMS)

C. Key Pair Service (KPS)

D. Cloud Secret Management Service (CSMS)

41
Q

41.Microservice is a software architecture based on small functional blocks that focus on a single responsibility and function. Functional blocks communicate with each other using language-agnostic APIs. A large complex application is constructed as a suite of modular services.

True

False

A

True

42
Q

42.Istio is an open platform that provides connection, protection, control, and observation functions. It is a non-intrusive microservice governance solution to solve service network governance issues such as cloud native service management, network connection, and security management.

True

False

A

True

43
Q

43.Driven by technologies, services, and policies, enterprises will gradually migrate their workloads to the cloud.

True

False

A

True

44
Q

44.The workloads of cloud resources, such as VMs, load balancers, and containers, are the core of enterprise business on the cloud.

True

False

A

False

45
Q

45.Elastic Volume Service (EVS) disks are classified into the common I/O, high I/O, general purpose SSD, and ultra-high I/O types based on performance.

True

False

A

False

46
Q

46.Virtual Private Cloud (VPC) builds a private and isolated virtual network environment for cloud resources, such as Elastic Cloud Server (ECSs), cloud containers, and cloud databases.

True

False

A

True

47
Q

47.Prometheus is an open-source system monitoring and alarm framework, which provides common data models and convenient data collection, storage, and query interfaces. It is suitable for both machine-centric monitoring and highly dynamic service-oriented architecture monitoring. It can work with graphical tools (such as Grafana) to achieve more user-friendly display of data and alarms.

True

False

A

True

48
Q

48.Relational databases use semi-structured datasets to store data, and non-relational databases use structured tables to store data.

True

False

A

False

49
Q

49.The smallest unit in Kubernetes is container. Containers can be managed by pods.

True

False

A

False

50
Q

50.Data Lake Insight (DLI) provides Hadoop-based high-performance big data components, such as Hudi, ClickHouse, Spark, Flink, Kafka, and HBase for data lakes, data warehouses, business intelligence (BI), AI, and more.

True

False

A

False

51
Q

51.With the development of cloud computing technologies, computing that used to be serverless is now performed on virtual machines (VMs).

True

False

A

False

52
Q

52.In the Docker environment, cgroups encapsulate kernel resources so that each container has independent resources and different processes do not interfere with each other when using the same resource in their own space.

True

False

A

False

53
Q

53.Serverless computing provides a mini-architecture. End users do not need to deploy, configure, or manage servers. The servers required for code running are provided by the cloud platform.

True

False

A

True

54
Q

54.You can configure security groups and network ACLs to protect ECSs in your VPCs. Security groups protect ECSs, and network ACLs protect subnets.

True

False

A

True

55
Q

55.Log Tank Service (LTS) collects, stores, and queries cloud resource operation records, including details about tenants’ operations, such as creating, modifying, and deleting cloud service resources. The default storage duration is seven days. To store traces for longer, configure a tracker to transfer traces to Object Storage Service (OBS) buckets.

True

False

A

False

56
Q

56.The monolithic architecture is a service-oriented architecture that features loose coupling, simple structure, and easy deployment and upgrade, and uses an enterprise service bus (ESB) for communication between services.

True

False

A

False

57
Q

57.If an Elastic Volume Service (EVS) disk space is insufficient, you can increase the disk size by expanding capacity. If there is too much available space, you can reduce the disk size.

True

False

A

False

58
Q

58.Four types of networks are available for Bare Metal Server (BMS): Virtual Private Cloud (VPC), advanced network, user-defined VLAN, and BI network.

True

False

A

False

59
Q

59.Cloud Firewall (CFW) mainly protects Internet borders and VPC borders, while Web Application Firewall (WAF) mainly protects web services, domain names, or IP addresses.

True

False

A

True

60
Q

60.Unlike using traditional databases, customers using cloud databases only need to pay for DB instances. They do not need to purchase or install any hardware or software. Using cloud databases makes O&M less expensive.

True

False

A

True