HCIP Mock Flashcards
Obtained my HCIP certification
1.Which of the following is not one of the three Object Storage Service (OBS) storage classes?
A. Standard
B. Frequent Access
C. Infrequent Access
D. Archive
B. Frequent Access
2.Kubernetes provides multiple container runtime interfaces to improve cluster scalability. Which of the following is false about the extended interfaces supported by Kubernetes?
A. CRI (container runtime interface)
B. COI (container orchestration interface)
C. CNI (container network interface)
D. CSI (container storage interface)
B. COI (container orchestration interface)
3.IMS provides public, private, shared, and Marketplace images. Which of the following images can be created and shared by a user?
A. Public images
B. Private images
C. Shared images
D. Marketplace images
B. Private images
4.VPC Peering differs greatly from VPC Endpoint (VPCEP) in terms of security, communication mode, and route configuration. Which of the following is false about their differences?
A. For VPC Peering, all ECSs in the connected VPCs can be accessed. For VPCEP, only ECSs for which VPC endpoint services are created can be accessed.
B. Both VPC Peering and VPCEP allow overlapping VPCs to communicate.
C. For VPC Peering, two peered VPCs can communicate with each other. For VPCEP, requests can only be initiated from a VPC endpoint to a VPC endpoint service, but not the other way around.
D. For two VPCs connected by a VPC peering connection, you need to add routes for them. For two VPCs connected by a VPC endpoint, the route has been added, and you do not need to add again.
B. Both VPC Peering and VPCEP allow overlapping VPCs to communicate.
5.Huawei Cloud Application Service Mesh (ASM) is an easy-to-use, fully-managed service mesh with high performance and reliability. ASM supports multiple infrastructures such as VMs and containers. Which of the following statements about ASM is false?
A. The ASM data plane is fully compatible with Istio.
B. The ASM control plane is independently developed based on Istio and has higher performance. It is incompatible with Istio.
C. The ASM control plane can interconnect with Cloud Container Engine (CCE).
D. ASM provides a one-stop grayscale release platform with multiple built-in grayscale release processes, such as canary release and blue-green deployment.
B. The ASM control plane is independently developed based on Istio and has higher performance. It is incompatible with Istio.
6.ROMA Connect is a full-stack application and data integration platform and is part of ROMA solution. Which of the following statements about ROMA Connect is false?
A. The service integration component supports API lifecyle management. It encapsulates existing backend services, data sources, and custom functions into standard RESTful APIs, and then makes them accessible to external systems.
B. The data integration component flexibly converts many heterogeneous data sources by incorporating data import capabilities of Data Replication Service (DRS) and Cloud Data Migration (CDM).
C. ROMA Connect provides public capabilities such as unified identity authentication, mobility, visual rendering, and cloud-edge-device collaboration for industry applications.
D. ROMA Connect implements IoT device access, device management, data collection, and device control based on the MQTT protocol.
C. ROMA Connect provides public capabilities such as unified identity authentication, mobility, visual rendering, and cloud-edge-device collaboration for industry applications.
7.Document Database Service (DDS) offers multiple types of DB instances to suit different scenarios. Which of the following instance types is not supported by DDS?
A. Single node
B. Primary/Standby
C. Replica set
D. Cluster
B. Primary/Standby
8.A user needs to collect Elastic Cloud Server (ECS) logs with Log Tank Service (LTS). Which of the following statements about LTS is false?
A. You can set the log retention duration by creating a log stream.
B. You need to install ICAgent on the Elastic Cloud Server (ECS).
C. You can create log groups in a log stream for log management.
D. Logs will be automatically deleted when the retention duration expires. You can transfer logs to Object Storage Service (OBS) buckets for long-term storage.
C. You can create log groups in a log stream for log management.
9.Huawei Cloud Relational Database Service (RDS) DB instances support multiple access modes. Which of the following cannot be used to access an RDS DB instance?
A. Private IP address
B. Public IP address
C. Virtual Private Network (VPN)
D. Direct Connect
D. Direct Connect
10.Which of the following statements is true about the differences between an Elastic Cloud Server (ECS), a Bare Metal Server (BMS), and a Dedicated Host (DeH)?
A. Both an ECS and a BMS are VMs.
B. An ECS is a VM, but a BMS is a physical server.
C. Both a BMS and a DeH are physical servers and provide a virtualization platform.
D. Both a BMS and a DeH are physical servers and they do not provide a virtualization platform.
B. An ECS is a VM, but a BMS is a physical server.
11.Which of the following statements about Cloud Container Instance (CCI) is false?
A. The cloud platform automatically creates service clusters.
B. CCI supports multiple heterogeneous resources.
C. Users manage or maintain containerized workloads.
D. CCI enables auto scaling of containers in seconds.
C. Users manage or maintain containerized workloads.
12.Which of the following is not an advantage of workload deployment on the cloud over deployment on self-owned servers?
A. large number of cloud security experts and security services handle security issues in a timely manner.
B. Automatic data migration and snapshot backup upon breakdown facilitate data recovery.
C. Service provisioning is flexible and online upgrade and configuration are supported.
D. The technical threshold is low and maintenance is expensive.
D. The technical threshold is low and maintenance is expensive.
13.ServiceStage is a one-stop application management and O&M platform for enterprises. Which of the following statements about ServiceStage is false?
A. Supports runtime environments such as Java, Go, PHP, Node.js, Python, and Docker.
B. Supports access and governance of mainstream microservice frameworks, and works with microservice engines to implement service registration and discovery, configuration management, and service governance.
C. Supports web, common, and microservice applications, such as Apache ServiceComb, Spring Cloud, Dubbo, and Service Mesh.
D. Allows development personnel to quickly and accurately identify potential code problems through automatic defect rectification.
D. Allows development personnel to quickly and accurately identify potential code problems through automatic defect rectification.
14.Which of the following is not the detection/analysis data source of Situation Awareness (SA)?
A. Identity and Access Management (IAM)
B. Security protection device logs
C. Threat intelligence
D. Security news
A. Identity and Access Management (IAM)
15.Users A and user B have their own VPCs in CN East-Shanghai1 and the two VPCs need to communicate with each other. Which of the following statements is true about creating a VPC peering connection?
A. VPC peering connection can be created without the approval of the peer account.
B. VPC peering connection can be created without the approval of the local account.
C. VPC peering connection can be created only after the peer account accepts the request.
D. VPC peering connection can be created only after the local account accepts the request.
C. VPC peering connection can be created only after the peer account accepts the request.
16.If a user wants to use a ready-to-use, high-availability message-oriented middleware that supports the AMQP protocol, which of the following is recommended?
A. Kafka
B. RabbitMQ
C. Zookeeper
D. RocketMQ
B. RabbitMQ
17.Which of the following products/services is not supported by the Managed Threat Detection (MTD)?
A. Virtual Private Cloud (VPC)
B. Object Storage Service (OBS)
C. Host Security Service (HSS)
D. Domain Name Service (DNS)
C. Host Security Service (HSS)
18.Which of the following statements is true about Huawei Cloud Container Engine (CCE)?
A. Containers deployed using CCE can be isolated only by cgroups.
B. CCE nodes can be classified into master, worker, and backup nodes.
C. Worker nodes can be ECSs, BMSs, and DeHs.
D. Enterprise-class Kubernetes clusters with high scalability and performance are provided.
D. Enterprise-class Kubernetes clusters with high scalability and performance are provided.
19.An Internet customer uses Content Delivery Network (CDN) for the following reasons. Which of the following is the most important?
A. Faster website access
B. Cross-carrier and cross-region coverage
C. High website security
D. Cost savings in O&M for more focus on services
A. Faster website access
20.An enterprise uses Cloud Container Engine (CCE) to deploy applications and needs to monitor the running status of cloud resources and containers. Which of the following cloud services is recommended?
A. Log Tank Service (LTS)
B. Application Operations Management (AOM)
C. Cloud Trace Service (CTS)
D. Cloud Performance Test Service (CPTS)
B. Application Operations Management (AOM)
21.An e-commerce user wants to optimize the purchased ECSs to reduce costs. Which of the following measures can the customer take?
A. Continuously monitor and measure the resource usage and seek optimization opportunities.
B. Determine the server type at the lowest cost based on historical O&M monitoring data to meet performance and workload requirements.
C. Determine the number of servers based on historical and real-time O&M data and service requirements. There is no need to consider Auto Scaling (AS).
D. Identify and stop ECSs (such as development or testing ECSs) that remain idle for a long time based on O&M data.
A. Continuously monitor and measure the resource usage and seek optimization opportunities.
B. Determine the server type at the lowest cost based on historical O&M monitoring data to meet performance and workload requirements.
D. Identify and stop ECSs (such as development or testing ECSs) that remain idle for a long time based on O&M data.
22.Web Application Firewall (WAF) is a security service that keeps web applications stable. Which of the following web attacks can WAF block for websites?
A. XSS attacks
B. SQL injection and command injection attacks
C. Website Trojan horse attacks
D. Text injection attacks
A. XSS attacks
B. SQL injection and command injection attacks
C. Website Trojan horse attacks
23.Which of the following cluster network models are supported by Cloud Container Engine (CCE)?
A. O&M network
B. Node network
C. Container network
D. Service network
B. Node network
C. Container network
D. Service network
24.Data Replication Service (DRS) can migrate data through multiple types of networks. Which of the following network types are supported by DRS real-time migration?
A. Virtual Private Cloud (VPC)
B. VPC Endpoint (VPCEP)
C. Virtual Private Network (VPN)
D. Direct Connect
A. Virtual Private Cloud (VPC)
C. Virtual Private Network (VPN)
D. Direct Connect