DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Latest Huawei H13-821 Free Exam Questions | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
Which of the following scenarios are suitable for using Mesher to access CSE? (Multiple Choice)
A. Transform business codes written in non-java languages into microservicescorrect
B. Old Java services transform microservicescorrect
C. Connect non-java SDK-developed services with services written in java SDKcorrect
D. Distributed transactions are used
E. Microservices written in java language, especially new microservice projects
View answer
Correct Answer: ABC
Question #2
What are the three major middleware services of Huawei Cloud? () [Multiple choice questions]
A. DCS distributed cache service
B. DMS Distributed Message Service
C. DDM distributed database middleware
View answer
Correct Answer: ABC
Question #3
In Kubernetes, a Pod can contain multiple containers.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #4
Cloud log service TS, which provides collection, storage, and query functions for various cloud resource operation records, including detailed information about tenants' operations on cloud service resources such as creation, modification, and deletion. The default storage time is 7 days. For events that require long-term storage, you can configure the object storage OBS dump for the tracker, and store the events synchronously and long-term in the OBS bucket.
A. False
B. True
View answer
Correct Answer: A
Question #5
What stage has the application architecture evolution reached?
A. Monomer architecture
B. SOA architecture
C. Microservice architecturecorrect
D. Fog technology architecture
View answer
Correct Answer: C
Question #6
When using Huawei Cloud Object Storage Migration Service OMS for data migration, the migration is listed in the dictionary order of the selected prefix by default. Whether the new data can be successfully migrated during the migration process depends on whether the migration task has been completed when it is added.
A. False
B. True
View answer
Correct Answer: A
Question #7
Which of the following descriptions about the product architecture of the document database service DDS replica set is wrong?
A. The master node is used for read and write requests
B. The standby node is used for read requests
C. Users can directly operate the primary node, standby node and hidden nodecorrect
D. The replica set architecture consists of primary nodes, standby nodes and hidden nodes
View answer
Correct Answer: C
Question #8
Which of the following scenarios is not suitable for HDFS?
A. Stored data write times
B. The stored data needs frequent modification
C. Store ultra-large-scale data
D. The stored data needs to be read repeatedly
View answer
Correct Answer: A
Question #9
Which of the following are the key features of DDM services?
A. Business is not interrupted, horizontal splitting and smooth expansion are automatically completedcorrect
B. Can withstand PB-level data volume, million-level concurrent volume, ten times the single-machine database connectioncorrect
C. High availability of the cluster, automatic recovery in secondscorrect
D. Compatible with MySQL protocolcorrect
E. Compatible with Oracle protocol
View answer
Correct Answer: ABCD
Question #10
You can set the number of Pods in Kubernetes Replicaset
A. Right
B. Wrong
View answer
Correct Answer: A
Question #11
Compared to traditional monolithic architecture, what problems can be solved by Microservice? (Multiple Choice)
A. Maintenance costs highcorrect
B. Long lead timecorrect
C. Poor code quality
D. Poor scalabilitycorrect
E. Newcomer training cyclecorrect
View answer
Correct Answer: ABDE
Question #12
Both SOA architecture and microservice architecture are common microservice architectures. Which of the following descriptions about the difference between the two is wrong?
A. SOA architecture usually uses ESB for system integration
B. The scalability of SOA architecture is bettercorrect
C. are still in use
D. The upgrade and release cycle of the microservice architecture is shorter
View answer
Correct Answer: B
Question #13
Which of the following descriptions about NAT gateways is wrong?
A. Each subnet in a VPC can be bound to multiple SNAT rulescorrect
B. When the specification of ECS is changed, the configured NAT rules will become invalid
C. When the cloud host accesses the external network through the NAT gateway, its bandwidth is determined by the bound elastic public network IP
D. DNAT and SNAT rules need to be configured separately
View answer
Correct Answer: A
Question #14
An enterprise has a Kubernetes cluster deployed in the local data center. In order to meet the needs of rapid business development, the newly launched business is deployed in Huawei Cloud Container Engine CCE. To facilitate operation and maintenance supervision, the company plans to implement unified operation of the two clusters. Which of the following descriptions of the solution is correct?
A. The multi-cloud container platform MPC can support cluster management, but does not support operation and maintenance
B. It is recommended to directly connect to the application management and operation and maintenance platform ServiceStage platform to realize unified management of operation and maintenance
C. You need to enter the application management and operation and maintenance platform ServiceStage first, and then perform unified management through the multi-cloud container platform MCP
D. Use Huawei's multi-cloud container platform MCP for management
View answer
Correct Answer: D
Question #15
The microservice engine provides a series of out-of-the-box microservice governance capabilities, such as automatic fault tolerance, service failure level, service current limit and automatic disaster tolerance.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #16
Which of the following scenarios can tenants be recommended to use OBS to complete data storage and distribution? (Multiple Choice)
A. Video multimedia datacorrect
B. Albums and picturescorrect
C. Video surveillance on the cloudcorrect
D. Distribution of games and applicationscorrect
E. Medical PACS datacorrect
F. Genetic datacorrect
View answer
Correct Answer: ABCDEF
Question #17
ICAgent is the collection agent of APM. It runs on the elastic cloud server where the application is located. It is used to collect monitoring data such as topology and call chain in real time. Which of the following statements is incorrect?
A. Non-intrusive data collection through JVM bytecode technology, users do not need to modify the business code
B. The deployment of the acquisition probe can be completed automatically through the application of the Services tage online
C. The resource overhead of each acquisition probe is minimal and will not affect the business
D. Support data collection for applications developed in C languagecorrect
View answer
Correct Answer: D
Question #18
ROMA Connect is an all-in-one application and data integration platform, which belongs to the ROMA series of products. Which of the following descriptions about ROMA Connect is wrong?
A. Provide a collection of public capabilities such as unified identity authentication, mobility, visual rendering, and cloud-edge-device collaboration for industry applications
B. ROMA Connect supports the MQTT protocol to realize IoT device access, device management, data collection and device control capabilities
C. Service integration encapsulates the existing back-end services, data sources and custom functions into a standard RESTful API, and opens it to the outside world
D. Data integration supports flexible conversion of multiple heterogeneous data sources, and the ability to store data into lakes and warehouses integrates data replication services DRS and cloud data migration CDM services
View answer
Correct Answer: A
Question #19
What operations of the following can the CI/CD pipeline in the software development cloud (DevCloud) help developers automatically complete? (Multiple Choice)
A. Application buildcorrect
B. Application automation testcorrect
C. Application operation and maintenance and fault recovery
D. Application deploymentcorrect
View answer
Correct Answer: ABD
Question #20
Cloud architecture design is very flexible and does not require mastering UML. () [Multiple choice questions]
A. True
B. False
View answer
Correct Answer: B
Question #21
Huawei Cloud Application Performance Management Service uses bytecode enhancement technology to implement non-intrusive collection of user application performance metrics. Users deploy a C-developed application on Huawei Cloud, or use Huawei Cloud Application Performance Management Service to analyze its performance issues.
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #22
In the actual microservice guidance, what information needs to be configured before starting the service locally so that the microservice can be successfully registered to the service center on HUAWEI CLOUD?
A. Monitoring center address
B. Configurating center address
C. Certification information such as AK/SKcorrect
D. handler
View answer
Correct Answer: C
Question #23
What capabilities does Huawei CSE microservices provide for the full life cycle management? (Multiple Choice)
A. Service creation - local engineering, cloud engineeringcorrect
B. CICD - application development pipelinecorrect
C. Service operation and maintenance - microservice governancecorrect
D. Service monitoring - dashboard, docking APMcorrect
View answer
Correct Answer: ABCD
Question #24
kubelet is a management component located on the master node of the cluster.
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #25
Which of the following are the factors to be considered for cost design on the cloud? (Multiple choices)
A. Instance typecorrect
B. Scaling strategy settings
C. Billing method selectioncorrect
D. Example specificationscorrect
View answer
Correct Answer: ACD
Question #26
The intranet connection method provided by GaussDB (for Redis) is applicable when the application is deployed on the elastic cloud server, and the elastic cloud server and the database instance are in the same region and in the same VPC. The following describes how to connect to a GaussDB (for Redis) instance, which one is wrong?
A. Intranet IP
B. Intranet domain name
C. Reverse proxy address
D. Load balancing addresscorrect
View answer
Correct Answer: D
Question #27
Which of the following are the application scenarios of HUAWEI CLOUD APM (Application Performance Management Service)? (Multiple Choice)
A. Analyze transaction status through Apdex valuecorrect
B. Use templates to deploy applications to the cloud in one click
C. Trace the root cause of the problem through the call chaincorrect
D. Use the topological diagram to grasp the health of the applicationcorrect
View answer
Correct Answer: ACD
Question #28
What are the steps of "Zero Transformation of Traditional Applications on the Cloud" in the microservice cloud application platform?
A. Write Dockerfilecorrect
B. Upload the software package to the software repositorycorrect
C. Create resourcescorrect
D. Deployment referencecorrect
View answer
Correct Answer: ABCD
Question #29
Which of the following are cloud - native advantages? () [Multiple choice questions]
A. Modules are loosely coupled
B. Quick deployment
C. Hardware virtualization 0%
D. Quick Service Recovery
View answer
Correct Answer: ABD
Question #30
In order to improve the security of the system architecture, a company hopes to improve the load security by purchasing enterprise host security HSS services. Which of the following scenarios is not suitable for HSS services?
A. Verify the access account to ensure that the identity of the login meets the security requirements
B. Perform security assessment on the host system, detect host vulnerabilities and insecure configurations, and be able to prompt users of risks
C. Ability to configure account permissions to distinguish employees from different functional departments in the enterprise who access the hostcorrect
D. Provide the ability to detect the entire attack path of the host, and be able to perceive hacking events in real time and accurately
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: