Massive Black Friday Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

H13-811_V3.0 Questions and Answers

Question # 4

The VPC subnet segment can be modified after it is created.

A.

True

B.

mistake

Full Access
Question # 5

Which item does not exist in the configuration of creating Listener?

A.

Load balancer protocol port

B.

Load method

C.

HTTPSE certificate

D.

Belonging VPC

Full Access
Question # 6

Which of the following conditions must be met before API is released?

A.

Environment created

B.

API groups and APIs within the groups have been created

C.

Createdvisit Question control strategy

D.

Signing key created

Full Access
Question # 7

The object storage server provides account-based ACLs. Which of the following access rights are not supported by ACLs?

A.

Public read and write permissions

B.

View ACL permissions

C.

Modify ACL permissions

D.

Read permission

Full Access
Question # 8

Which of the following constitutes Huawei's public cloud ecosystem?

A.

Huawei Cloud Academy

B.

Partner

C.

Huawei Cloud Market

D.

Developer Center

Full Access
Question # 9

What management functions does Elastic Load Balance support?

A.

Create a load balancer

B.

Delete load balancer

C.

Adjust bandwidth

D.

Query load balancer

Full Access
Question # 10

Each cloud server backup can only create one whole machine image, For cloud server backups that have already created the entire machine image, the entire machine image cannot be created anymore.

A.

True

B.

False

Full Access
Question # 11

About the impact of cloud hard disk deletion on cloud hard disk backup, Which of the following statements is correct?

A.

After deleting the cloud drive, Backup data will not be deleted

B.

After deleting the cloud drive, The backup data is also deleted

C.

After deleting the cloud hard box, You can also use backups to restore cloud hard drives

D.

After deleting the cloud drive, You can also use backups to create cloud hard drives

Full Access
Question # 12

security expert services can provide one-stop security professional services including website security physical examination, host security physical examination, security reinforcement, security monitoring, emergency response and security product hosting.

A.

True

B.

mistake

Full Access
Question # 13

After deleting the elastic scaling group, the elastic cloud server instance automatically created by elastic scaling will also be deleted automatically.

A.

True

B.

mistake

Full Access
Question # 14

What can I do if the disk capacity of the elastic cloud server is insufficient?

A.

Reinstall the operating system

B.

Expand the disk

C.

Unmount disk

D.

Switch operating system

Full Access
Question # 15

You can install the operating system on the elastic cloud server by yourself, Upgrade CemtOS7.2 to CentOS77.30

A.

True

B.

mistake

Full Access
Question # 16

The description of the VPN gateway is wrong?

A.

Through the VPN gateway, secure and reliable encrypted communication between the virtual private cloud and the corporate data center or other regional VPCs can be established.

B.

The VPN gateway needs to correspond to the user's local gateway.

C.

A VPN gateway is an entry gateway device established in a virtual private cloud.

D.

Each VPN gateway can correspond to multiple VPN connections.

Full Access
Question # 17

cloud hard drives can be backed up and restored across regions.

A.

True

B.

mistake

Full Access
Question # 18

Which of the following functions does the Elastic Cloud Server service provide?

A.

Users can create, reinstall and cut virtual machinesChangeOS,switchmachine

B.

Users can add and uninstall expansion network cards by themselves, and add EIP, mount and unmount acid disk, apply for keypair, etc.

C.

Users can set the elastic cloud server alarm rules

D.

Users can view information about their own cloud server resources through the console interface

Full Access
Question # 19

What is the following error about the understanding of data encryption service DEW?

A.

Manage cloud platform and tenant keys

B.

Multi-layer key protection technology

C.

Support and application integration

D.

Use HSM (Hardware Security Module)

Full Access
Question # 20

If you want to keep multiple versions of an object, which of the following can be achieved?

A.

Modify storage category

B.

EnabledayBlog management

C.

Configure life cycle rules

D.

Enable multiple version control

Full Access
Question # 21

Which of the following are the main functions of the Enterprise Host Security HSS?

A.

Weak password detection

B.

Software vulnerability detection

C.

Remote login detection

D.

Malicious program detection

Full Access
Question # 22

When adding a VPC to the file system, the default IP address is automatically added0.0.0.0/0,The default read and write permissions are "read only".

A.

True

B.

mistake

Full Access
Question # 23

Description of peer-to-peer connection, Which of the following is wrong?

A.

Two VPCs in the same area can communicate with each other through a peer-to-peer connection

B.

Two VPCs in different regions can establish intercommunication through a peer-to-peer connection

C.

In the same district, you can create a peering connection between your own vPc, or you can create a peering connection between your own VPC and the VCs of other tenants.

D.

Up to 5 can be created in a region0Peer-to-peer connection

Full Access
Question # 24

KMS which of the following is not included in the main application scenarios of (Key Management Service)?

A.

Key information asset encryption and decryption

B.

Network transmission data encryption

C.

Business core data encryption and decryption

D.

User personal data encryption and decryption

Full Access
Question # 25

Which of the following file system types does Resilient File Service have?

A.

SFS

B.

SFS Turbo Standard

C.

SFS Turbo enhanced

D.

SFS Turbo Performance Type

Full Access
Question # 26

Which of the following database examples supports GIS geographic information processing and is suitable for location application systems?

A.

SQLServer

B.

MongoDB

C.

MySQL

D.

PostgresQL

Full Access
Question # 27

Anti-DD Which of the following options are included in the main protection types of os?

A.

Resistant to application attacks

B.

Anti-data attack

C.

Anti-brute force cracking

D.

Anti-traffic attacks

Full Access
Question # 28

The cloud hard drive backup service can create backups for cloud hard drives, and use the backup data to roll back the cloud hard drives to maximize the accuracy and safety of user data and ensure your data security.

A.

True

B.

mistake

Full Access
Question # 29

VBS Supports simultaneous backup of all cloud hard drives in the server.

A.

True

B.

mistake

Full Access
Question # 30

by setting() Can filter and manage backup resources.

A.

Backup time

B.

Retention rules

C.

shared

D.

Label

Full Access
Question # 31

To use shared cloud hard drives, a cluster must be set up.

A.

True

B.

mistake

Full Access
Question # 32

The API gateway cannot monitor the call of the API at all times.

A.

True

B.

mistake

Full Access
Question # 33

Which of the following container exceptions can the Container Security Service monitor?

A.

High-risk system calls

B.

Escape vulnerability attack

C.

Escape file access

D.

Container abnormal process

Full Access
Question # 34

Which of the following cloud server resources can be automatically raised and lowered through elastic scaling?

A.

bandwidth

B.

RAM

C.

CPU

D.

Hard drive capacity

Full Access
Question # 35

What are the ways to connect to the public network (Internet)?

A.

Elastic public network ip

B.

Cloud monitoring

C.

NAT gateway

D.

Elastic load balancing

Full Access
Question # 36

What are the deployment modes of cloud computing?

A.

Private Cloud

B.

Hybrid cloud

C.

Community Cloud Industry Cloud

D.

Public cloud

Full Access
Question # 37

When two elastic cloud servers in the same VPC cannot communicate with each other or packet loss occurs, Which of the following factors need to be investigated?

A.

Check network ACL

B.

Check the internal network card information of the elastic cloud server

C.

Check security group rules

D.

Troubleshoot unreachable ports

Full Access
Question # 38

The disk capacity of the relational database is insufficient. In which way can it be solved?

A.

Switch operating system

B.

Expand the disk

C.

Reinstall the operating system

D.

Unmount disk

Full Access
Question # 39

What are the deployment modes of cloud computing?

A.

Private Cloud

B.

Public cloud

C.

Hybrid cloud

D.

Community Cloud Industry Cloud

Full Access
Question # 40

What are the pain points facing API capability opening?

A.

API How does the provider open up capabilities

B.

The pursuit of back-end services is more stable, safe and reliable.

C.

How to quickly acquire and master the API

D.

How to manage and control the open API

Full Access
Question # 41

data access service provides a one-stop big data collaborative development platform, Help users easily complete multiple tasks such as data modeling, data integration, script development, job scheduling, etc.

A.

True

B.

mistake

Full Access
Question # 42

Map What are the advantages of Reduce service?

A.

Stablize

B.

open

C.

Easy to use

D.

low cost

Full Access
Question # 43

When creating a listener, Under which protocol is the server certificate configurable?

A.

HTTPS

B.

UDP

C.

HTTP

D.

TCP

Full Access
Question # 44

Virtual machines that are not bound to EIP can access the external network by configuring custom routes.

A.

True

B.

mistake

Full Access
Question # 45

What are the alarm levels of cloud monitoring?

A.

urgent

B.

hint

C.

secondary

D.

important

Full Access
Question # 46

What parameters should be selected or set when copying images across regions?

A.

IAM support

B.

Purpose item

C.

Destination zone

D.

Destination area

Full Access
Question # 47

Which of the following correspondences does the VPN gateway and remote gateway support?

A.

One to one

B.

-To many

C.

many to many

D.

many to one

Full Access
Question # 48

What are the following restrictions on cloud server instances manually moved into a scaling group? (Multiple choice)

A.

This instance is the same as the scaling group VPC

B.

The instance has been bound to an elastic public IP

C.

The scaling group AZ contains the AZ where the instance is located

D.

This instance is not used by other scaling groups

Full Access
Question # 49

Adopt IP During Sec VPN communication, Encryption and decryption verification is carried out on the firewalls at both ends

A.

True

B.

False

Full Access
Question # 50

What scenes are included in user copy mirroring?

A.

Copy non-encrypted images across regions

B.

Copy encrypted image to non-encrypted image

C.

Copy encrypted images across regions

D.

Copy non-encrypted image to encrypted image

Full Access
Question # 51

Which of the following are the execution actions in the scaling strategy?

A.

Randomly generated

B.

Set as

C.

Increase

D.

Reduce

Full Access
Question # 52

The elastic load balancing system supports three scheduling algorithms.

A.

True

B.

mistake

Full Access
Question # 53

When the health check is abnormal, First, check whether the rules of the security group where the back-end cloud server is located are valid.()IP network segment?

A.

100.125.0.0/14

B.

100.125.0.0/12

C.

100.125.0.0/16

D.

100.125.0.0/10

Full Access
Question # 54

Which computing cloud service does not belong to Huawei?

A.

Bare Metal Service

B.

Mirroring service

C.

Elastic scaling

D.

Flexible file service

Full Access
Question # 55

In case of disk data loss, you can use the pre-created backup()Perform data recovery.

A.

createNew disk

B.

delete

C.

Restore data to the original disk

D.

Unmount disk

Full Access
Question # 56

IP The Sec framework contains several protocols, which are the important ones?

A.

AH

B.

IP

C.

ESP

D.

IKE

Full Access
Question # 57

A file system can be mounted on multiple cloud servers at the same time.

A.

True

B.

False

Full Access
Question # 58

When creating a whole machine image, Which mirror sources can be selected?

A.

Bare metal server

B.

Cloud server backup

C.

Mirror file

D.

Cloud Server

Full Access
Question # 59

Users can use()Create an encrypted file system.

A.

Password

B.

Own key material

C.

Key provided by the key management service

D.

password

Full Access
Question # 60

Compared with the self-built database, which of the following is not an advantage of RDS?

A.

Elastic scaling

B.

convenient management

C.

Ready to use

D.

Users self-install the database

Full Access
Question # 61

Cloud Monitoring, What alarm status does Cloud Monitoring currently support?

A.

Warning

B.

Back to normal

C.

Insufficient data

D.

All of the above

Full Access
Question # 62

What are the application scenarios of real-time streaming computing service?

A.

real-time file transfer

B.

Log online analysis

C.

Network traffic monitoring

D.

Online graph calculation

Full Access
Question # 63

What can be used to monitor the elastic cloud server?

A.

Cloud container engine

B.

Cloud Monitoring Service

C.

Virtual private cloud

D.

Elastic scaling

Full Access
Question # 64

HUAWEI CLOUD E1 service, What kind of service has full-stack big data capabilities?

A.

CDM Cloud Data Migration Service

B.

CloudStream real-time streaming computing service

C.

DS data warehouse service

D.

MRSMapReduce service

Full Access
Question # 65

Inter-Internet communication between two sites,IPSecVPN can be deployed on the firewalls at both ends to protect the mutual access traffic between the two intranets.

A.

True

B.

False

Full Access
Question # 66

When the capacity of the data disk mounted on the elastic cloud server is insufficient, you must uninstall and repurchase a large-capacity cloud disk.

A.

True

B.

mistake

Full Access
Question # 67

Elastic Load Balancing can add cloud servers with different operating systems.()

A.

True

B.

False

Full Access
Question # 68

What are the current network segments supported by the VPC?

A.

100.64.0.0/twenty four

B.

100172.16.0.0/12

C.

100.0.0.0/8

D.

100192.168.0.0/16

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 30 Nov 2021