Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

H13-811_V3.0 HCIA-Cloud Service V3.0 Questions and Answers

Questions 4

After the cloud dedicated line order expires, Enter the frozen state directly, If you don’t unfreeze the resource, it will be deleted

Options:

A.

True

B.

False

Buy Now
Questions 5

What management functions does Elastic Load Balance support?

Options:

A.

Create a load balancer

B.

Delete load balancer

C.

Adjust bandwidth

D.

Query load balancer

Buy Now
Questions 6

The main function of database security service does not include which of the following?

Options:

A.

Anti-reptile

B.

Database firewall

C.

Database audit

D.

Sensitive data discovery and desensitization

Buy Now
Questions 7

Statements about backup and disaster recovery, Which of the following is correct?

Options:

A.

Backup generally builds a backup copy of data through techniques such as snapshots and backups

B.

Disaster tolerance is generally to build a backup host and data for the business in a remote place through replication technology

C.

The cost of backup is usually higher than disaster recovery

D.

Disaster recovery mainly targets business interruptions caused by software and hardware failures and major natural disasters such as tsunamis, fires, and earthquakes

Buy Now
Questions 8

After the object storage service creates a bucket successfully, Cannot change area, so, When creating a bucket, choose the region carefully.

Options:

A.

True

B.

mistake

Buy Now
Questions 9

What are the advantages of the shared service system architecture?

Options:

A.

Services must be developed using the same programming language and tools

B.

Allows to frequently publish different services at the same time,Maintain the availability and stability of other parts of the system

C.

Low complexity

D.

Each service can be independently developed by different teams, Do not affect each other, Accelerate time to market

Buy Now
Questions 10

Which of the following parameters must be set when creating an API gateway flow control strategy?

Options:

A.

Source IP traffic limit

B API traffic limit

B.

User traffic limit

C.

App traffic limit

Buy Now
Questions 11

When the load balancer uses the seven-layer protocol HTTP/HTTPS, which of the following options is the network traffic path?

Options:

A.

LVS cluster>Nginx cluster>ECS

B.

Nginx cluster>LVS cluster>ECS

C.

LVS cluster>ECS

D.

Neinx cluster>ECS

Buy Now
Questions 12

Adopt IP During Sec VPN communication, Encryption and decryption verification is carried out on the firewalls at both ends

Options:

A.

True

B.

False

Buy Now
Questions 13

Enterprise Host Security provides functions such as account cracking protection, malicious program detection, critical file change detection, Web directory management, container escape detection, and software vulnerability detection.

Options:

A.

True

B.

False

Buy Now
Questions 14

Which of the following types of cloud hard disks are used by the ECS?

Options:

A.

Super highIO

B.

highIO

C.

Super highIO(Time delay optimization)

D.

ordinary

Buy Now
Questions 15

Which of the following courses in the Cloud Academy can be used for online learning to obtain scenario-based skills improvement?, And get a certification certificate through the online exam?

Options:

A.

Vocational Certification Course

B.

Foundation Course

C.

Q micro certification course

D.

Role course

Buy Now
Questions 16

public cloud provides multiple types of elastic cloud servers, Including but not limited to what?

Options:

A.

Bare Metal Server Type

B.

GPU accelerated

C.

Disk enhanced

D.

General calculation type

Buy Now
Questions 17

Which of the following methods can be used to set the access permissions for anonymous users of OBS objects?

Options:

A.

OBS bucket ACL

B.

About OBS Object Policy

C.

About OBS Bucket Policy

D.

OBS object ACL

Buy Now
Questions 18

When the capacity of the data disk mounted on the elastic cloud server is insufficient, you must uninstall and repurchase a large-capacity cloud disk.

Options:

A.

True

B.

mistake

Buy Now
Questions 19

What are the lifecycle management of elastic cloud servers?

Options:

A.

Shut down

B.

delete

C.

Boot up

D.

Unmount disk

Buy Now
Questions 20

Which of the following parameters need to be configured for Cloud Monitoring to create an alarm rule?

Options:

A.

Monitoring indicators

B.

Alert strategy

C.

Monitoring time

D.

Alert level

Buy Now
Questions 21

Statements about cloud hard disk backup and cloud server backup, Which of the following is correct?

Options:

A.

Cloud hard disk backup is to protect the entire cloud server

B.

The backup generated by the cloud server backup will also appear on the cloud hard disk backup interface

C.

The backup objects of cloud server backup are all cloud hard disks in the elastic cloud server

D.

The backup object of cloud hard disk backup is one or more specified cloud hard disks

Buy Now
Questions 22

Which service resource indicators can be monitored in cloud monitoring?

Options:

A.

Virtual private cloud

B.

Distributed Cache Service

C.

Elastic load balancing

D.

Elastic Computing Service

Buy Now
Questions 23

When registering a private image with the image file, the capacity of the system disk filled in is less than the capacity of the system disk inside the image file, which will cause the image creation to fail.

Options:

A.

True

B.

mistake

Buy Now
Questions 24

When uploading objects, Which configuration item cannot be set?

Options:

A.

KMS encryption

B.

Storage category

C.

Storage path

D.

Object size

Buy Now
Questions 25

What are the ways to create a private image?

Options:

A.

Created by cloud server

B.

Created by OBS file

C.

Created by external image file

D.

Created by physical server

Buy Now
Questions 26

Description of planning routing strategy, Which of the following is wrong?

Options:

A.

The routing table consists of a series of routing rules, Used to control the flow of outgoing traffic from subnets in the VPC

B.

If you do not need to control the flow of the subnet, In the case of the default VPC intranet interworking, Then use the default routing table, No need to configure custom routing strategies

C.

When the user creates a VPC, The system will automatically generate a default routing table for it, The meaning of the default routing table is VPC intranet intercommunication

D.

The routing table does not allow users to add custom routes

Buy Now
Questions 27

Huawei provides developers with open capabilities, which will help developers integrate the open capabilities of Huawei products with their upper-layer applications, Build differentiated innovative solutions.

Options:

A.

True

B.

False

Buy Now
Questions 28

published APIs, after modifying the API information, No need to republish.

Options:

A.

True

B.

mistake

Buy Now
Questions 29

elastic load balancing automatically distributes access traffic to multiple cloud servers, expands the external service capabilities of the application system, and achieves a higher level of application fault tolerance.

Options:

A.

True

B.

mistake

Buy Now
Questions 30

Which computing cloud service does not belong to Huawei?

Options:

A.

Bare Metal Service

B.

Mirroring service

C.

Elastic scaling

D.

Flexible file service

Buy Now
Questions 31

Which of the following cloud servers cannot be elastically scaled?

Options:

A.

Cloud server for deploying database applications

B.

Cloud server for deploying static web pages

C.

The cloud server that saves the application session

D.

Cloud server that saves data log information

Buy Now
Questions 32

Which of the following commands can be executed to verify whether the file system domain name can be resolved toIP address?

Options:

A.

nslookup

B.

scp

C.

wget

D.

ping

Buy Now
Questions 33

Which of the following commands can be used to view the final mounting result in the Linux system?

Options:

A.

pwd

B.

mount

C.

df-TH

D.

touch

Buy Now
Questions 34

When external traffic enters Loadbalancer, Which component to enter first?

Options:

A.

Linux Virtualserver

B.

nginx

C.

Healthcheck (health check)

D.

Firewall

Buy Now
Questions 35

Virtual Private Cloud (VirtualPrivateCloud, Abbreviated as VPC)It is an isolated and private virtual network environment that users apply for on HUAWEI CLOUD.

Options:

A.

True

B.

False

Buy Now
Questions 36

Cloud hard disk backup has nothing to do with which of the following services?()

Options:

A.

Cloud server backup

B.

Cloud hard drive

C.

Label Management Service

D.

Virtual private cloud

Buy Now
Questions 37

Which of the following are the application scenarios of elastic load balancing?

Options:

A.

Realize more flexible service forwarding

B.

Shield the real ip from the outside to achieve the purpose of security protection

C.

Provide routing balancing capabilities based on domain names and URLs

D.

Suitable for web services with large traffic

Buy Now
Questions 38

oneAZ(Availability Zone) is a collection of one or more physical data centers, Independent wind, fire, water and electricity, Az logically divides the cost sources such as computing, network, and storage into multiple clusters.

Options:

A.

True

B.

False

Buy Now
Questions 39

Which of the following is wrong about the description of the elastic public network IP?

Options:

A.

It can be flexibly bound and unbound with resources such as elastic cloud servers, virtual IP, elastic load balancing, and NAT gateways.

B.

EIP can add shared bandwidth to reduce bandwidth usage costs.

C.

Elastic public IP (ElasticIP) provides independent public IP resources, including public IP addresses and public network export bandwidth services.

D.

Only support billing on demand.

Buy Now
Questions 40

After the relational database is successfully created, Cannot replace the database engine, so, Choose carefully when creating a database instance.

A correct

B mistake

Options:

Buy Now
Questions 41

Face recognition is provided to users in an open API, The user obtains the face processing result through real-time access and call API.

Options:

A.

True

B.

mistake

Buy Now
Questions 42

When configuring bucket logging, Which of the following statements about the storage location of the log file is correct?

Options:

A.

Can be stored in the current bucket or other buckets

B.

Can only be stored in other buckets

C.

Enable log management

D.

Can only be stored in the current bucket

Buy Now
Questions 43

loT Internet of Vehicles solution, All used HUAWEI CLOUD El Which services?

Options:

A.

Map Reduce service MRS

B.

Data Access Service DIS

C.

Real-time streaming computing service Cloud Stream

D.

Graph Computing Service GES

Buy Now
Questions 44

Which of the following is not the main usage scenario of VPC?

Options:

A.

Virtual machines access each other

B.

Desktop cloud access to Huawei Mall

C.

Virtual machine access to the external network

D.

VPN access to the virtual machine

Buy Now
Questions 45

cloud hard drives need to be used with elastic cloud servers or bare metal servers.

Options:

A.

True

B.

False

Buy Now
Questions 46

cloud hard disk supports multiple backups per day.

Options:

A.

True

B.

False

Buy Now
Questions 47

Which of the following is not a characteristic of relational database services?

Options:

A.

No need to buy and install any software and hardware

B.

Reduce DBA skills requirements and costs

C.

Just pay the RDS rental fee

D.

Expensive DBA costs

Buy Now
Questions 48

The default backup strategy of cloud hard drives cannot be deleted.

Options:

A.

True

B.

mistake

Buy Now
Questions 49

API What is included in the gateway's multiple security protection?

Options:

A.

Threat protection

B.

Access security

C.

Log audit

D.

Authentication service extension

Buy Now
Questions 50

What status does the API Gateway monitor API?

Options:

A.

Number of requests

B.

Number of errors

C.

system resource

D.

Call delay,

Buy Now
Questions 51

Description of Security Group, Which of the following is wrong? (Single choice)

Options:

A.

The system will create a security group for each user by default, The rule of the default security group is to pass all data packets on the outgoing room, Restricted access in the inbound direction, The elastic cloud servers in the security group can access each other without adding rules.

B.

Security group is a logical grouping, Provide access policies for mutually trusted elastic cloud servers in the same VPC that have the same family protection requirements.

C.

After the security group is created, Users can define various access rules in the security group, When the elastic goes to the server to join the group or the whole group, It is protected by these access rules.

D.

When configuring security group rules, The source and destination addresses can only be set as IP addresses, It cannot be a security group.

Buy Now
Questions 52

Which statement about Anti-DDos traffic cleaning is wrong?

Options:

A.

Provides public IP protection against elastic cloud hosts and load balancing devices

B.

Provide monitoring capability to view a single public network IP,Including current protection status, current protection configuration parameters, traffic conditions from 24 hours ago to the present, 2 hours of abnormal events

C.

Possess Web vulnerability security detection capabilities

D.

Provide configuration and modification for public network IP Anti-DDosAbility to correlate parameters

Buy Now
Questions 53

What is the application of content review in the HUAWEI CLOUD E1 AI API?

Options:

A.

Text-based image search, content-based image search, and image search

B.

Detect pornography, advertising, tyranny, politics and other content in images, texts and videos

C.

Convert the text in the image into an editable text format

D.

Recognize tags of objects, scenes, etc. in images

Buy Now
Questions 54

Model What are the steps involved in the automatic learning function in Arts?

Options:

A.

Data standard

B.

Write code

C.

Deploy online

D.

Model training

Buy Now
Questions 55

The threshold of alarm consists of three parts: aggregation method, single selection condition, and critical value,Used to configure alarm conditions

Options:

A.

True

B.

False

Buy Now
Questions 56

In case of disk data loss, you can use the pre-created backup()Perform data recovery.

Options:

A.

createNew disk

B.

delete

C.

Restore data to the original disk

D.

Unmount disk

Buy Now
Questions 57

users can realize the conversion between encrypted mirroring and non-encrypted mirroring through the mirroring function in the region.

Options:

A.

True

B.

mistake

Buy Now
Questions 58

The file system supports batch creation.

Options:

A.

True

B.

False

Buy Now
Questions 59

Strictly selected products are based on industry needs, Strictly select products, services and solutions that meet customer needs and service quality requirements

Options:

A.

True

B.

False

Buy Now
Questions 60

When modifying the VPN connection, which of the following parameters can be modified?

Options:

A.

Remote network

B.

VPN connection name

C.

This terminal network

D.

Remote gateway

Buy Now
Questions 61

How does the elastic cloud server construct a logically completely isolated network area?

Options:

A.

Elastic scaling

B.

Virtual private cloud

C.

Cloud audit

D.

Cloud container engine

Buy Now
Questions 62

HUAWEI CLOUD E1 service, What kind of service has full-stack big data capabilities?

Options:

A.

CDM Cloud Data Migration Service

B.

CloudStream real-time streaming computing service

C.

DS data warehouse service

D.

MRSMapReduce service

Buy Now
Questions 63

The composition of the cloud security service system includes network security, application security, data security, host security and security management.

Options:

A.

True

B.

mistake

Buy Now
Questions 64

HUAWEI CLOUD El What solutions are provided?

Options:

A.

Park Agent

B.

Traffic agent

C.

Industrial Agent

D.

Internet of Vehicles Intelligent Body

Buy Now
Questions 65

Which option below is Huawei's cloud A1 chip?

Options:

A.

Inferentia

B.

MLU100

C.

Cloud TPU

D.

Ascend 910

Buy Now
Questions 66

API Provider and API The identity of the consumer is not fragmented, It can be converted to each other.

Options:

A.

True

B.

False

Buy Now
Questions 67

Cloud hard disk backup cannot be used to create a new system disk.

Options:

A.

True

B.

mistake

Buy Now
Questions 68

Which of the following types of certificates are in elastic load balancing?

Options:

A.

Sub-certificate

B.

Root certificate

C.

CA certificate

D.

Server certificate

Buy Now
Exam Code: H13-811_V3.0
Exam Name: HCIA-Cloud Service V3.0
Last Update: Nov 24, 2024
Questions: 454
H13-811_V3.0 pdf

H13-811_V3.0 PDF

$25.5  $84.99
H13-811_V3.0 Engine

H13-811_V3.0 Testing Engine

$30  $99.99
H13-811_V3.0 PDF + Engine

H13-811_V3.0 PDF + Testing Engine

$40.5  $134.99