Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H13-811 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H13-811_V3.0

H13-811 Exam Dumps - HCIA-Cloud Service V2.0

Question # 4

Relational database service users can modify the configuration of the database to achieve optimal performance.

A.

TRUE

B.

FALSE

Full Access
Question # 5

Data security provides confidentiality and integrity protection for user data applications and storage in the cloud computing environment.

A.

TRUE

B.

FALSE

Full Access
Question # 6

Which of the following is not a security detection source for situational awareness services?

A.

Web firewall, database firewall

B.

DDos, IDS

C.

Vulnerability scanning, host security, flow probe

D.

ACL/Security Group

Full Access
Question # 7

What can be configured to receive notification of deleted objects?

A.

Life cycle rules

B.

Event notification

C.

Anti-leech

D.

Static website hosting

Full Access
Question # 8

If you need to dynamically expand resources, which strategy should you choose when creating a scaling strategy?

A.

Alarm strategy

B.

Random strategy

C.

Timing strategy

D.

Periodic strategy

Full Access
Question # 9

Realize batch data migration from cloud to cloud What kind of EI service.

A.

Data Warehouse Service DWS

B.

Cloud data migration service CDM

C.

Real-time streaming computing service CloudStream

D.

Data access service DIS

Full Access
Question # 10

Huawei provides developers with open capabilities, which will help developers integrate the open capabilities of Huawei products with their upper-layer applications and build differentiated innovative solutions.

A.

TRUE

B.

FALSE

Full Access
Question # 11

Virtual private cloud support through dedicated line/VPN and other connection methods connect VPNs with traditional data centers and integrate resources flexibly.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Under normal circumstances, the value-added service fee generated by cloud monitoring is very low, and it can be used with value-added services such as monitoring data file dump and sending alarm notifications as needed.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Which of the following parameters must be set when creating a flow control strategy for an API gateway?

A.

API flow limit

B.

User traffic limit

C.

Application traffic limit

D.

Source IP traffic limit

Full Access
Question # 14

The bottom layer of SFS elastic file service uses Erasure Code to achieve high storage and high reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 15

When purchasing a VPN connection, which of the following parameters need to be configured?

A.

Remote subnet

B.

VPN gateway

C.

This terminal network

D.

Remote gateway

Full Access
Question # 16

Cloud hard disk backup supports () to record the operation of backup service resources so that users can query, audit and trace back.

A.

Object storage service

B.

Cloud monitoring service

C.

Cloud audit service

D.

Cloud hard drive

Full Access
Question # 17

When the state of the alarm rule has not changed, the system will only send an alarm notification to the user when the state appears for the first time.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Regarding the relationship between the cloud dedicated line and other services, which of the following is wrong?

A.

Cloud dedicated line can realize local data center and cross-regional connection through cloud connectionInterconnection between VPCs

B.

Cloud dedicated line through VPN can realize the interconnection between multiple VPCs

C.

Cloud dedicated line through VPC peering connection can realize the interconnection between multiple VPCs

D.

The user's local data center can go to the cloud through the cloud dedicated line, or through NAT gateway to access the public network or provide services for the Internet

Full Access
Question # 19

Scalable bandwidth supports the setting of three types of scalable bandwidth strategies, namely alarm strategy, timing strategy and periodic strategy.

A.

TRUE

B.

FALSE

Full Access