DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Huawei H13-511 Exam Sample Questions | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
Which of the following does not belong to Huawei's VLAN interface type?
A. Turnel
B. Trunk
C. Hybrid
D. Accesscorrect
View answer
Correct Answer: D
Question #2
In the early stage of enterprise operation, two physical hosts are used to deploy the FusionCompute platform to carry services. The two hosts are in the same cluster. Virtual machine 1 runs on host A, and virtual machine 2 runs on host B. The business needs to reduce the load on host A. The technician wants to migrate virtual machine 1 on host A to host B, but finds that the migration cannot be completed. Which of the following is the possible reason?
A. The cluster has enabled the IMC policy
B. The cluster has enabled memory multiplexing
C. Virtual machine 2 is set to bind with host B
D. Virtual machine 1 and virtual machine 2 have set mutually exclusive virtual machine policiescorrect
View answer
Correct Answer: D
Question #3
Which of the following is not a virtualization platform?
A. KVM
B. OpenStackcorrect
C. EXSi
D. XEN
View answer
Correct Answer: B
Question #4
Which of the following descriptions about distributed virtual switches is wrong?
A. Each virtual machine has only one VNC connectioncorrect
B. For the convenience of management, port groups are used to manage a group of ports with the same attributes
C. Multiple distributed switches can be configured in the cluster
D. Each distributed switch has multiple distributed virtual ports
View answer
Correct Answer: A
Question #5
CORRECT TEXT In Huawei Fusion Compute, the following description of the number correspondence between virtual machines and DVS is correct (multiple selection)
A. When a virtual machine has a network card, the network card can only be associated with one DVScorrect
B. When a virtual machine has multiple network cards, each network card can be associated with a DVScorrect
C. When there are multiple NICs in a virtual machine, multiple NICs can be associated with the same DVcorrect
D. When a virtual machine has a network card, the network card can be associated with multiple DVSs
View answer
Correct Answer: ABC
Question #6
The following description about KVM (Kernel - based Virtual Machine) is correct (multiple selection)
A. KVM is type II virtualization
B. KVM is a type I virtualization
C. KVM is a module in the Linux kernel
D. KVM is an open source virtualization technology
View answer
Correct Answer: ACD
Question #7
CS is a standardized protocol based on the () protocol and the SCS instruction set, and is widely used in many storage networks that use the () architecture.
A. TCP/P FC SAN
B. FC, IP SAN
C. FC, FC SAN
D. TCP/IPIP SANcorrect
View answer
Correct Answer: D
Question #8
When configuring IP SAN for the host, it is usually necessary to configure () for the host on the storage device so that the host and IPSAN can be mapped.
A. ISCSI Client
B. ISCSI Target
C. ISCSI Server
D. ISCSI Initiatorcorrect
View answer
Correct Answer: D
Question #9
During the implementation of the FusionAccess gateway and load balancing deployment solution, after configuring vAG/MLB, it is found that the HA status is abnormal. Which of the following options is the cause of this failure?
A. The administrator changed the root password of HDCcorrect
B. The administrator changed the gandalf password of vAG/vLB
C. The administrator changed the ITA portal login password
D. The administrator changed the root password of vAG/vLB
View answer
Correct Answer: A
Question #10
Which of the following descriptions about DVs is wrong?
A. Support QoS function
B. Support VLAN function
C. Does not support web services
D. Does not support the OpenFlow protocolcorrect
View answer
Correct Answer: D
Question #11
Which of the following descriptions about the virtual network card is wrong?
A. The virtual network card has its own MAC address
B. From a network point of view, the function of the virtual network card is similar to that of the physical network card
C. The virtual network card has its own IP address
D. A virtual machine can only have one virtual network card at the same timecorrect
View answer
Correct Answer: D
Question #12
CORRECT TEXT As FusionSphere, the disk thin provisioning can be achieved is (multiple choice)
A. thin provisioning and virtual storage operating system, hardware has nothing to do, so as long as the use of virtual image management system, will be able to achieve disk thin provisioningcorrect
B. does not currently support NTFS formatted virtual machine disk recovery // NTFS does not support online recovery
C. providing virtual disk space monitoring and recovery featurescorrect
D. to provide data storage capacity warning threshold may be set, generating a warning when the storage capacity exceeds the threshold valuecorrect
View answer
Correct Answer: ACD
Question #13
CORRECT TEXT In Huawei FusionCompute, in addition to configuring static routes, DVS also supports multiple dynamic routes.
A. TRUE
B. FALSEcorrect
View answer
Correct Answer: B
Question #14
Which of the following virtual machine disk file formats does Huawei fusioncompute not support?
A. VMDKcorrect
B. VHD
C. RAW
D. QCOW2
View answer
Correct Answer: A
Question #15
Which of the following options is the correct sequence for making a complete template for Huawei Desktop Cloud?
A. Create a bare virtual machine>install the operating system>configure the operating system>encapsulate the template>convert the virtual machine into a template>configure the templatecorrect
B. Create a bare virtual machine > install the operating system > configure the operating system > join the domain > encapsulate the template > convert the virtual machine to a template > configure the template
C. Create a bare virtual machine > install the operating system > join the domain > configure the operating system > package the template > convert the virtual machine to a template > configure the template
D. Create a bare virtual machine > install the operating system > configure the operating system > encapsulate the template > join the domain > convert the virtual machine to a template > configure the template
View answer
Correct Answer: A
Question #16
Which of the following is a common virtual machine disk file format?
A. VHD
B. RAWcorrect
C. VMDK
D. VDI
View answer
Correct Answer: B
Question #17
Which of the following does not belong to the interface type of VLAN?
A. Trunk
B. Hybrid
C. Tunelcorrect
D. Access
View answer
Correct Answer: C
Question #18
Two virtual machines belonging to the same network segment in the same host cannot communicate with each other. Which of the following is not a possible cause of the failure?
A. The network card of the virtual machine is faulty
B. Virtual machine firewalls deny access to each other
C. Virtual machines are isolated through security groups
D. Two virtual machine NICs join the same port groupcorrect
View answer
Correct Answer: D
Question #19
The following are the north-south traffic (multi-select)
A. Traffic generated by virtual machine live migration
B. Traffic between virtual machines accessing each other across data centerscorrect
C. Traffic generated by customers accessing data center business via the Internetcorrect
D. Traffic between virtual machines inside the data center
View answer
Correct Answer: BC
Question #20
Which of the following descriptions about KVM is wrong?
A. KVM is a kernel-based virtual machine that runs on the Linux operating system
B. KVM supports hardware-assisted virtualization
C. KVM needs the DomianO virtual machine to schedule hardware resourcescorrect
D. The KVM virtual machine exists as a process on the operating system
View answer
Correct Answer: C
Question #21
Which of the following descriptions about centralized storage and distributed storage is wrong?
A. Distributed storage system is to disperse and store data on multiple independent devices
B. Centralized storage can be divided into SANFINAS storage according to the technical architecture, and SAN storage can be divided into FC-SAN and IP-SAN
C. The biggest feature of centralized storage is that the deployment structure is simple, and RAID technology can also be used to ensure data security and reliability
D. The distributed network storage system adopts a scalable system structure and uses multiple storage servers to share the storage load
View answer
Correct Answer: A
Question #22
CORRECT TEXT Artificial intelligence is the research and development of concepts, methods, technologies and application systems for simulation extension and expansion of artificial intelligence. A new technology science, the following false statement about artificial intelligence is
A. Artificial intelligence does not have the dynamic creativity unique to human consciousness
B. Artificial intelligence is a technology for items to communicate with each other through the networkcorrect
C. Artificial intelligence is not social
D. Physical processes that are unconscious mechanical
View answer
Correct Answer: B
Question #23
Which of the following statements about the relationship between cloud computing and the Internet of Things is incorrect?
A. Cloud computing is the cornerstone of the development of the Internet of Things, and at the same time, the Internet of Things continues to promote the development of cloud computing
B. Without cloud computing support, the Internet of Things cannot perform data transmission
C. If there is no cloud computing as the basic support, the work efficiency of the Internet of Things will be greatly reduced
D. Cloud computing can provide enough storage space for massive data of the Internet of Things
View answer
Correct Answer: B
Question #24
Which of the following descriptions about Libvirt components is wrong?
A. Both KVM and Xen can call the api provided by Libvirt to manage the virtualization platform
B. Libvirt is a set of library functions that are called by other technologies to manage the virtual machine on the machine
C. Libvirt provides programming interfaces in multiple languages
D. Libvirt is a closed source project, it is a very powerful management toolcorrect
View answer
Correct Answer: D
Question #25
The port configuration of a Huawei switch is as follows: iteftce Ggabtethete por inkn type acespot defaut Wan16 According to the above configuration, which of the following description is correct?
A. This port only allows data frames containing Van16 tags to pass through
B. This port will add a Vanl6 tag to the data frame that will pass through
C. The port will not perform any operations on the passing data
D. The port will strip off the vlan16 label in the passing data frame and forward itcorrect
View answer
Correct Answer: D
Question #26
Which of the following descriptions about centralized storage and distributed storage is wrong?
A. Distributed storage system is to disperse and store data on multiple independent devices
B. Centralized storage can be divided into SANFINAS storage according to the technical architecture, and SAN storage can be divided into FC-SAN and IP-SAN
C. The biggest feature of centralized storage is that the deployment structure is simple, and RAID technology can also be used to ensure data security and reliability
D. The distributed network storage system adopts a scalable system structure and uses multiple storage servers to share the storage load
View answer
Correct Answer: A
Question #27
In Huawei FusionCompute, the administrator can view the DVS port to which the virtual machine is connected.
A. TRUE
B. FALSEcorrect
View answer
Correct Answer: B
Question #28
About the iSCSI protocol, which description of the following are right? (Select three Answers)
A. iSCSI is based on IP protocol proposed by Microsoft technical standards
B. iSCSI essence is SCSI commands and data transmission in IP frame format
C. iSCSI support users through its access IP SAN storage network
D. iSCSI protocol based on SCSI and TCP/IP
View answer
Correct Answer: BCD
Question #29
In Huawei FusionCompute, which of the following descriptions of memory reuse is incorrect?
A. After memory multiplexing is turned off, the sum of the memory of all virtual machines is less than or equal to the sum of the actual available physical memory
B. Turning off memory reuse requires that the memory reuse rate of all hosts in the cluster be less than or equal to 100%
C. The use of memory reuse will degrade the performance of the virtual machinecorrect
D. The administrator can turn on or off the memory reuse function at any time
View answer
Correct Answer: C
Question #30
CORRECT TEXT The following incorrect description of Huawei FusionCompute HA is
A. If the data of the virtual machine is stored in shared storage, the data saved in the event of a failure will not be lost
B. This function supports automatic restart after a virtual machine failurecorrect
C. The system periodically detects the status of the virtual machine
D. administrator can set different HA policies according to the importance of the virtual machine
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: