Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Hot Vendors

H31-522 Huawei Certified Network Professional - Cloud DataCentre Operations Questions and Answers

Questions 4

Routine priorities of traditional U O&M are to responsively handle IT service interrupts, service performance deterioration, and production changes of supported IT services.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

Which of the following O&M components are supported by ManageOne? (Multiple Choice)

Options:

A.

FusionSphere OpenStack OM

B.

OperationCenter

C.

eSight

D.

ServiceCenter

Buy Now
Questions 6

Which of the following statements about FusionSphere OpenStack components is incorrect?

Options:

A.

In the FusionSphere OpenStack environment, Nova provides lifecycle management for compute instances. On-demand response includes VM creation, scheduling, and reclamation.

B.

Cinder provides persistent block storage for running instances. Its pluggable drives facilitate block storage device creation and management.

C.

Keystone provides monitoring and measurement for FusionSphere OpenStack charging, baseline, scalability, and statistics.

D.

Horizon provides a web-based self-service portal which interacts with FusionSphere OpenStack underlying services, such as starting an instance, allocating IP addresses, and configuring access control.

Buy Now
Questions 7

Storage devices in FusionCompute need to be scanned. These devices refer to physical storage devices, such as IP SAN, AdvancedSAN, and NAS.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

Which of the following layer does FusionSphere focuses on?

Options:

A.

IaaS

B.

PasS

C.

SaaS

D.

MaaS

Buy Now
Questions 9

The service operation process mainly contains event status management, event management, request fulfillment, and problem management

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 10

Why is it important to know how data is accessed?

Options:

A.

Data access devices may have different ownership characteristics.

B.

Data access devices have different storage formats.

C.

Data access devices use different applications or clients and thus may have different security characteristics.

D.

Data access devices use different operating systems and thus may run different applications.

Buy Now
Questions 11

Which of the following information is most likely to be audited in the data center?

Options:

A.

Applications that are running in the data center and contain regulatory information

B.

Personal information, such as names and addresses

C.

Non-attribute information, such as gender or nationality

D.

User names and passwords

Buy Now
Questions 12

Which of the following is not involved in the service design management?

Options:

A.

Service catalog management

B.

Service level management

C.

Supplier management

D.

Financial management

Buy Now
Questions 13

Which of the following is incorrect about the stateless computing device group of eSight?

Options:

A.

The group management of computing nodes classifies computing nodes with the same configuration policy to the same device group.

B.

eSight detects and limits the resource usage of different computing nodes, ensuring the resource uniqueness.

C.

A computing node can belong to either a device set or a device group.

D.

A group can be associated with multiple group profiles. The member profile of a computing node is generated based on the group profile.

Buy Now
Questions 14

In cloud data center scenarios (FusionCompute+FusionSphere OpenStack+FusionSphere OpenStack OM), images in which of the following formats can be used to create VMs?

Options:

A.

VHD

B.

OVF

C.

OVA

D.

ISO

Buy Now
Questions 15

Which of the following components displays the service provisioning GUI of ManageOne?

Options:

A.

CSB

B.

ServiceCenter

C.

OperationCenter

D.

CA SDM

Buy Now
Questions 16

When an enterprise IT system is moved to the cloud, services will be migrated accordingly. The specific migration objects include the basic IT service, office system, service production system, development and test system, and management system.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

Which of the following statements about FusionCompute cluster management is incorrect?

Options:

A.

The computing resource scheduling automation technology can determine whether to migrate a VM based on the CPU usage, memory usage, or both the CPU and memory usage.

B.

In power management, hosts can be powered on or powered off manually or automatically.

C.

The VM migration rules include the keep-VMs-together, mutually-exclusive-VM, and the VM-to-host-group rules.

D.

The IMC policy supports only live migration of Intel CPU series. CPUs from other vendors can be configured with this policy.

Buy Now
Questions 18

Which of the following types of VPN are suitable for staff on business trip to connect to the enterprise intranet over the public network? (Multiple Choice)

Options:

A.

GREVPN

B.

L2TPVPN

C.

SSL VPN

D.

L2TP Over IPSec

Buy Now
Questions 19

Which of the following virtual resources are supported by eSight? (Multiple Choice)

Options:

A.

FusionSphere OpenStack

B.

VMware ESX/ESXi Server

C.

VMware vCenter Server

D.

Huawei FusionCompute

Buy Now
Questions 20

OperationCenter can be deployed only in single-node mode.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

Which of the following statements about block storage and object storage is incorrect?

Options:

A.

Cinder provides block storage to be attached to VMs to provide additional disk space for VMs.

B.

Swift is used to store VM images.

C.

In the FusionSphere environment, Glance backend storage is the Swift object storage by default.

D.

In the FusionCompute environment, block storage contains only SAN storage and local storage.

Buy Now
Questions 22

Which of the following may cause communication between VMs out of the network security control?

Options:

A.

Most of the cyber security systems cannot identify the traffic of the encrypted VMs.

B.

Communication between VMs in a server is not perceived by physical security devices.

C.

VM images use the tools that can enable communication between VMs to bypass firewalls.

D.

The client operating system can activate the secret mode.

Buy Now
Questions 23

Which of the following third-party storage vendors are supported by eSight? (Multiple Choice)

Options:

A.

NetApp

B.

IBM

C.

EMC

D.

HP

Buy Now
Questions 24

In the cloud service, the unique authentication method is to enter your user name and password.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

Which of the following networks does not need a VLAN tag?

Options:

A.

External_OM

B.

External_API

C.

Internal_Base

D.

storage_data0

Buy Now
Questions 26

The charging mode of the cloud computing services is based on the usage instead of the device cost.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

Which of the following roles serves as the super administrator in the OperationCenter system?

Options:

A.

System administrator

B.

Monitoring personnel

C.

Maintenance personnel

D.

Security administrator

Buy Now
Questions 28

Which of the following statements is incorrect about the data center service migration scenario?

Options:

A.

Services are migrated from traditional data centers to cloud data centers.

B.

Traditional data centers are taken over by cloud data centers after being cloudified.

C.

Services are migrated from the existing cloud data centers to other cloud data centers.

D.

Services are migrated from cloud data centers to traditional data centers.

Buy Now
Questions 29

Which of the following statements is incorrect about the VM snapshots?

Options:

A.

To create a snapshot, the current disk is set to read-only. The system automatically creates an incremental disk in the data store where the disk locates.

B.

An incremental disk records the differences between the current state of the disk and the state of the disk in the last snapshot.

C.

Multiple snapshots can be created for one VM. If a VM is being restored using a snapshot, other snapshots of the VM are not affected.

D.

Snapshots can be automatically deleted.

Buy Now
Questions 30

ServiceCenter is deployed on a VM created on the host of the management cluster. If ServiceCenter is deployed in active/standby mode, the active and standby VMs are separately deployed on the two hosts of the management cluster.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

Internet services drive enterprise IT from the traditional silo architecture to pooled, cloud-based architecture.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

Which of the following users should be used for using PuTTY to log in to OperationCenter?

Options:

A.

root

B.

appuser

C.

oracle

D.

admin

Buy Now
Questions 33

Which of the following are practices adopted by cloud O&M? (Multiple Choice)

Options:

A.

Lightweight, self-service, and automated ITSM management system architecture

B.

Agile DevOps O&M method which prevails in the industry

C.

Passive management

D.

Focus only on the service strategy from the view of management.

Buy Now
Questions 34

If the type of a registered image is KVM, the image file extension can be .qcow2, .iso, .img, .raw, and ,vhd,

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

In the multi-tenant, resource sharing scenario, which of the following issues causes customer information and processes to be attacked by another customer?

Options:

A.

Isolation failure

B.

Information disclosure

C.

Data loss

D.

Relationship invalidity

Buy Now
Questions 36

Which of the following is not an indicator in the disk information monitoring of eSight?

Options:

A.

Disk name

B.

Health status

C.

Installation status

D.

Hard disk usage

Buy Now
Questions 37

The Service User role can define service types.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

Disaster recovery (DR) combines local backup and remote replication to provide comprehensive data protection.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

Which of the following statements is incorrect about the VM VNC login?

Options:

A.

TightVNC depends on the Java (TM) plug-in.

B.

noVNC does not depend on the Java (TM) plug-in and cannot restart and stop a VM.

C.

A 64-bit browser can run the 32-bit Java CTM) plug-in.

D.

The drive management function of noVNC depends on the Java platform.

Buy Now
Exam Code: H31-522
Exam Name: Huawei Certified Network Professional - Cloud DataCentre Operations
Last Update: Nov 17, 2024
Questions: 262

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now H31-522 testing engine

PDF (Q&A)

$35  $99.99
buy now H31-522 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2024