Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H13-522 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H13-522 Exam Dumps - Huawei Certified Network Professional-Cloud Resource Pool Management (HCNP-Cloud-CRPM)

Question # 4

Which of the following SaaS services are targeted at enterprises? (Multiple Choice)

A.

Customer relationship management (CRM)

B.

Contact management

C.

Enterprise resource management (ERP)

D.

Picture management

Full Access
Question # 5

During routine O&M, which of the following roles in the OperationCenter system is responsible for dispatching work orders?

A.

System administrator

B.

Monitoring personnel

C.

Maintenance personnel

D.

Development personnel

Full Access
Question # 6

Which of the following systems is used by OperationCenter as an ITlL system by default?

A.

CASDM

B.

CA APM

C.

CA Spectrum

D.

CA Performance Center

Full Access
Question # 7

Which of the following statements is incorrect about service combination management?

A.

In the service lifecycle, tracking investment works with other service management processes to ensure appropriate investment return.

B.

It clarifies the service definition and ensures service achievements, thereby all design, transition, and operation activities are consistent with service values.

C.

It builds an official complaint and upgrade procedure for customers.

D.

Service combination is clear, and service requirements satisfied and service achievements supported by each service are clarified.

Full Access
Question # 8

Which of the following networks does not need a VLAN tag?

A.

External_OM

B.

External_API

C.

Internal_Base

D.

storage_data0

Full Access
Question # 9

How many IPSec SAs will be created when one IPSec channel is created using AH+ESP in IPSec?

A.

2

B.

3

C.

4

D.

1

Full Access
Question # 10

Which of the following statements is incorrect about the change consultation committee?

A.

The committee consists of a group of people who provide advice for the change manager on the determination of change assessment and priority and change planning.

B.

The committee consists of IT service providers and representatives from service-related departments and third-parties.

C.

The emergency change advisory board (ECAB) is a subset of the standard change consultation committee.

D.

The members of the change consultation committee depend on the actual change.

Full Access
Question # 11

How long is the validity period of the trial license of Operation Center?

A.

1 month

B.

3 months

C.

6 months

D.

1 year

Full Access
Question # 12

On which of the following pages, client logout upon timeout can be disabled?

A.

User management

B.

Account policy

C.

Idle timeout settings

D.

User session inspection

Full Access
Question # 13

Which of the following object types can be managed by ManageOne? (Multiple Choice)

A.

Server

B.

Switch

C.

Firewall

D.

VM

Full Access
Question # 14

External_API network IP addresses need to be planned to install FusionSphere OpenStack. How many IP addresses need to be planned at least?

A.

3

B.

5

C.

7

D.

9

Full Access
Question # 15

Which of the following statements about the INTEL hardware virtualization is incorrect?

A.

VT-x refers to the hardware-assisted virtualization technology of INTEL.

B.

VT-d refers to the I/O assisted virtualization technology.

C.

VT-d refers to the network-assisted virtualization technology.

D.

SR-IOV refers to the VMDq technology.

Full Access
Question # 16

Which of the following statements is incorrect about the FusionSphere OpenStack network?

A.

In FusionSphere OpenStack, physical networks define mappings between virtual networks and host physical network ports.

B.

VMs can directly use physical networks.

C.

A physical network is mapped to a physical network port or port bonding.

D.

No matter on which host a VM is running, the VM can communicate with external networks using the same physical network.

Full Access
Question # 17

eSight uses the C/S architecture. The eSight client can access the eSight server anytime anywhere without installing any plug-in.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Which of the following options are included on the Alarm Settings page of OperationCenter? (Multiple Choice)

A.

Alarm Masking

B.

Alarm Severity Redefinition

C.

Alarm Notification

D.

Alarm Transfer to Work Order

Full Access
Question # 19

How is data encrypted for comprehensive data protection in the cloud?

A.

When data is being migrated to the cloud, the data transfer process is encrypted.

B.

Data is encrypted after being stored to the cloud.

C.

When data is being migrated to the cloud, the data transfer process is encrypted; after data is stored to the cloud, the static data is encrypted.

D.

Data is encrypted before being transferred out of the cloud.

Full Access
Question # 20

In the cloud data center scenario, the following prerequisites must be met to configure Cinder: If only FusionCompute and VMware are to be interconnected with FusionSphere OpenStack, the user does not need to configure the storage network plane and storage multipathing. After the interconnection, configure the corresponding backend storage without configuring the backend storage in Cinder.

A.

TRUE

B.

FALSE

Full Access
Question # 21

Which of the following is incorrect about the eSight security management feature?

A.

System security ensures proper running of the operating system, database, and middleware.

B.

Network security includes transmission security and firewall security protection.

C.

Data security includes the storage, transmission, and management security of user identity information, system configurations, run logs, and database data

D.

The security mechanism is provided from the user, application, and audit perspectives, ensuring the O&M security.

Full Access
Question # 22

A virtual firewall is a virtualization instance of a network service firewall or device running firewall.

A.

TRUE

B.

FALSE

Full Access
Question # 23

The eSight failover (configuring automate migration) function implements failover of devices associated with profiles and provides backup for key devices.

A.

TRUE

B.

FALSE

Full Access
Question # 24

Which of the following is incorrect about the event status management tool?

A.

Active and passive monitoring

B.

Dashboard and report

C.

Management upgrade

D.

Management console

Full Access
Question # 25

Which of the following functions is configured from Operation Center to an interconnected system to allow users to log in to the interconnected system through My Link on Operation Center without entering the user name and password?

A.

Resource management

B.

Routine monitoring

C.

SSO

D.

Real-time monitoring

Full Access
Question # 26

FusionSphere focuses on the Huawei virtualization platform and provides differentiated competitiveness by supporting computing, network, and storage virtualization. However, FusionSphere does not support heterogeneous hypervisors.

A.

TRUE

B.

FALSE

Full Access
Question # 27

OperationCenter can be deployed on a VM or a physical server. The deployment modes are the same,

A.

TRUE

B.

FALSE

Full Access
Question # 28

SAs are uniquely identified by a triplet consisting of three elements. Which of the following elements does not belong to the triplet? (Multiple Choice)

A.

Security protocol

B.

Source IP address

C.

Destination IP address

D.

Security parameter index

Full Access
Question # 29

Which of the following statements is correct about backup network topologies?

A.

In the LAN-Base network topology, backup data and service data are transferred over different networks.

B.

In the LAN-Free network topology, backup data and service data are transferred over different networks.

C.

In the Server-Free network topology, backup data and service data are transferred over the same network.

D.

The Server-Free network topology exerts the greatest impact on the service data among the three network topologies.

Full Access
Question # 30

Which of the following statements about RPO is incorrect?

A.

RPO is short for recovery point objective.

B.

RPO is measured based on data.

C.

RPO is the time taken to recover data.

D.

In theory, the shorter the RPO is, the better.

Full Access
Question # 31

How many Keystones are required for ServiceCenter to interconnect with multiple non-cascaded FusionSphere OpenStack resource pools?

A.

1

B.

2

C.

5

D.

10

Full Access
Question # 32

Which of the following are components of Cinder? (Multiple Choice)

A.

cinder-driver

B.

cinder-api

C.

cinder-scheduler

D.

cinder-volume

Full Access
Question # 33

Data center DR levels include application-level DR, data-level DR, and media-level DR and backup.

A.

TRUE

B.

FALSE

Full Access
Question # 34

What actions are taken to prevent against security risks in the cloud?

A.

Understand related supervision regulations.

B.

Run standard security software.

C.

Encrypt everything.

D.

Understand the cloud storage architecture in use.

Full Access
Question # 35

Why is it important to know how data is accessed?

A.

Data access devices may have different ownership characteristics.

B.

Data access devices have different storage formats.

C.

Data access devices use different applications or clients and thus may have different security characteristics.

D.

Data access devices use different operating systems and thus may run different applications.

Full Access
Question # 36

IaaS is an infrastructure service of cloud computing. Which of the following are applications of

IaaS?

(Multiple Choice)

A.

End-to-end software development environment

B.

Data-intensive application

C.

Compute-intensive application

D.

Large scale distributed application

Full Access
Question # 37

Virilization antivirus software is installed in which of the following VMs?

A.

Security VM

B.

Guest VM

C.

HostVM

D.

User VM

Full Access
Question # 38

Which of the following services are supported by ManageOne? (Multiple Choice)

A.

RCS

B.

EBS

C.

OBS

D.

Data Backup

Full Access
Question # 39

In the multi-tenant, resource sharing scenario, which of the following issues causes customer information and processes to be attacked by another customer?

A.

Isolation failure

B.

Information disclosure

C.

Data loss

D.

Relationship invalidity

Full Access
Question # 40

The FusionCompute distributed virtual switch (DVS) is similar to a two-layer physical switch. Which of the following is used for DVS to connect VMs and physical networks? (Multiple Choice)

A.

Port group

B.

VLAN pool and subnet

C.

Uplink group

D.

Downlink group

Full Access