New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H13-531_V2.0 Exam Dumps - HCIE-Cloud Computing (Written) V2.0

Go to page:
Question # 81

On the Rainbow server, after checking the source, it is found that there is a gray background and a white color lock before its name.

What does it stand for? (single choice)

A.

The task corresponding to the source has been completed and cannot be modified

B.

The source information is incorrectly configured, and the migration task cannot be created

C.

The source terminal has obtained the license at the end, and cannot create a migration task

D.

The task corresponding to the source terminal is being executed and cannot be modified

Full Access
Question # 82

Which of the following scenarios does Rainbow block-level migration apply to? Multiple choices)

A.

Hosts with lots of small files

B.

Hosts with high disk usage

C.

The partition structure needs to be consistent with the source side

D.

purpose of planningVMThe disk space size is expanded or reduced relative to the source.

Full Access
Question # 83

Which of the following is incorrect about the description of the cloud disk service in the FusionSphere cloud data center?

A.

When creating a cloud host, if you use an image with the option of "Quick Provisioning of Virtual Machines" checked, the system disk does not support capacity expansion.

B.

Cloud hard disk does not support online expansion, you need to uninstall the cloud hard disk from the host first

C.

The available partition type is "FusionCompute"and"KVM", the system disk can be uninstalled from the cloud host

D.

Cloud hard disk does not support changing storageSLA

Full Access
Question # 84

In order to give full play to the performance and function of the system, which of the following operations must be strictly observed (multiple choice)

A.

Strictly limit user roles to ensure (to ensure that users who belong to different roles only have the minimum operation permissions to access resources)

B.

Strictly implement the backup plan and regularly back up system data

C.

It is strictly forbidden to install or run non-standard software (such as firewalls, etc.) on the deployed equipment

D.

In case of emergency, maintenance personnel should immediately report back to the headquarters or contact technical support directly.

Full Access
Question # 85

Which of the following descriptions about FusionCompute clusters, hosts, and virtual machines is incorrect?

A.

Whether multiple hosts belong to the same cluster depends on whether they use the same shared storage.

B.

Hosts can be moved between different clusters.

C.

Virtual machines can be migrated across clusters.D. A cluster is composed of multiple hosts and their associated storage and network resources.

Full Access
Question # 86

(Single-choice questions) FusionComputerightVRMManual backup of node data does not include which of the following prerequisites

A.

VRMNode process is running normally

B.

ObtainCNAsofgandalfandrootuser password

C.

FusionComputeCan log in normally

D.

VRMThe database is running normally

Full Access
Question # 87

During the daily operation and maintenance work, a series of preliminary preparations are often required to ensure the smooth operation and maintenance work. Which of the following is the preliminary preparation information that needs to be done? (multiple choice)

A.

Human Matrix

B.

Account Information

C.

Alarm handling

D.

Environmental Information

Full Access
Question # 88

inFusionSphereIn the private cloud solution, which of the following descriptions are incorrect about the principle of rapid provisioning of virtual machines?

A.

When provisioning virtual machines, there is no need to create a new system volume in the storage and copy the full image content to it

B.

The system volume presented by the virtual machine to the outside worldIDof the parent volume used for itID

C.

During the use of the virtual machine, all modifications to the system volume are written to the subvolume

D.

When provisioning a virtual machine, the system only needs to quickly create a lightweight subvolume and add the existing parent volume to form a virtual machine

Full Access
Go to page: