HCIA-Cloud Service V3.0 Questions and Answers
The object storage server provides account-based ACLs. Which of the following access rights are not supported by ACLs?
There are two ways to create an encrypted image: Created by encrypted elastic cloud server and created by external image file.
Which option below is Huawei's cloud A1 chip?
OBS Bucket A is set with a Policy policy, which does not allow any user to access the objects in the bucket; There is an object in bucket A, It is set with ACL permissions that allow anonymous users to visit the room, Then the user can access object B through anonymous access.
file systems can be mounted on cloud servers in different VPCs.
How many types of VPNs can be classified according to business purposes?
About the impact of cloud hard disk deletion on cloud hard disk backup, Which of the following statements is correct?
Description of the secret key, Which of the following is correct?
What is wrong about the API statement?
When creating an elastic cloud server, The elastic cloud server can be initialized through the "file injection" function provided by the system.
When mounting a file system in a Linux system, In which file do I need to configure DNS?
Which of the following statements about cloud hard disk backup is wrong?
What are the alarm levels of cloud monitoring?
Which of the following is not a basic concept of elastic load balancing?
Cloud Monitoring Service is a three-dimensional monitoring platform for elastic cloud servers, bandwidth and other resources. It can provide you with real-time monitoring alarms, notifications, and personalized report views, allowing you to accurately grasp the status of product resources.
For the created private image, What attributes can be modified?
When the capacity of the cloud hard disk is insufficient, which of the following solutions are available?
What types of protocols does the elastic load balancing system support?
When the state of the alarm rule has not changed, the system will only send an alarm notification to the user when the state occurs for the first time.
What parameters should be selected or set when copying images across regions?
Cyber security as an important component of cloud security services, Achieve network isolation, Responding to cyber attacks,Ensure network security.
Description of VPN gateway bandwidth is the following error?
Huawei provides developers with open capabilities, which will help developers integrate the open capabilities of Huawei products with their upper-layer applications, Build differentiated innovative solutions.
When the capacity of the data disk mounted on the elastic cloud server is insufficient, you must uninstall and repurchase a large-capacity cloud disk.
The application of cloud monitoring in elastic scaling includes monitoring scaling instances and scaling bandwidth.
Which of the following represents a general-purpose computing enhanced elastic cloud server?
Model What are the steps involved in the automatic learning function in Arts?
cloud hard disk supports multiple backups per day.
The two sites communicate across the Internet, and IP can be deployed on the firewalls at both ends Sec VPN thus protects the mutual access traffic between the two intranets.
The file system supports batch creation.
Regarding the process of opening a virtual private network, what is wrong in the following description?
After creating a backup strategy, you can change()The state of the cloud disk is bound to the backup strategy.
Mount the shared cloud hard disk to multiple cloud servers, Before the operating system has built a shared file system or similar cluster management system, Unable to realize the file sharing function.
About ELB configuration description, Which ones are incorrect?
users can realize the conversion between encrypted mirroring and non-encrypted mirroring through the mirroring function in the region.
Which of the following standard bucket strategies does OBS have? Multiple choice)
The traditional IT infrastructure architecture of enterprises is no longer capable of supporting the efficient operation of enterprises, Urgently calling for the arrival of structural changes, Which is not the main reason?
host monitoring supports monitoring of elastic cloud servers and bare metal servers.
Virtual Private Cloud (VirtualPrivateCloud, Abbreviated as VPC)It is an isolated and private virtual network environment that users apply for on HUAWEI CLOUD.
Which of the following options is the default port of the MySQL database instance?
loT Internet of Vehicles solution, All used HUAWEI CLOUD El Which services?
Object storage services are physical storage disks.
The fragments are junk data generated in the process of uploading objects.
API Which of the following product advantages does the gateway have?
Which of the following is reserved for users when deleting a relational database instance?
When creating a whole machine image, Which mirror sources can be selected?
Which of the following cloud products belong to the data security type?
What are the components of the elastic cloud server?
Adopt IP During Sec VPN communication, Encryption and decryption verification is carried out on the firewalls at both ends
Which service resource indicators can be monitored in cloud monitoring?
When the load balancer uses the seven-layer protocol HTTP/HTTPS, which of the following options is the network traffic path?
The cloud hard drive backup service can create backups for cloud hard drives, and use the backup data to roll back the cloud hard drives to maximize the accuracy and safety of user data and ensure your data security.
Which of the following options does a VPN consist of?
The cloud dedicated line supports dynamic routing protocols.
Elastic File Service can set read-only permission control for users.
Elastic File Service does not support cloud servers running the Windows operating system for mounting.
Elastic load balancing can add cloud servers with different operating systems.
The description of the physical leased line created by the partner is the following error?
public cloud provides multiple types of elastic cloud servers, Including but not limited to what?
load balancer can be used alone
Configure the VPC authorization address for the file system()Represents the highest priority
According to the classification of Huawei cloud services, which cloud service is not a computing cloud service?
Which of the following is not a security detection source for situational awareness services?
Which of the following are the advantages of load balancing?
Which computing cloud service does not belong to Huawei?
Shared path of the file system, What is the correct format of the NFS type?
Connecting to the local data center (ID)What are the ways? (Multiple choice)
The composition of the cloud security service system includes network security, application security, data security, host security and security management.