SlideShare a Scribd company logo
1 of 4
Download to read offline
2021-2022
TD 1
Cloud Computing
Yassine BOUJELBEN 2GII
Héla GASSARA
Please circle the correct answer
1 True or False
1. FusionCompute is a basic component of FusionSphere. It virtualizes hardware resources and
centrally manages virtual resources, service resources, and user resources.
A) True
B) False
2. In computing virtualization, the operating system running in a VM is referred to as the host
OS.
A) True
B) False
3. Computing virtualization technologies can be classified into type I and type II virtualization or
full virtualization and paravirtualization from different perspectives.
A) True
B) False
4. A virtual machine can have multiple virtual NICs at the same time, corresponding to different
virtual switches
A) True
B) False
5. In Huawei FusionCompute, the resources of the cluster are composed of the host and its associ-
ated storage and network resources.
A) True
B) False
6. In the KVM, the I/O virtualization performance is poor by using the QEMU. If the Virtio is
introduced, the NIC rate can be improved.
A) True
B) False
1
2 Single Choice
7. Which of the following is not a Kernel-based Virtual Machine (KVM) management tool?
A) Libvirt
B) Virsh command set
C) Virt-Manager
D) QEMU
8. The KVM virtualization architecture includes the KVM module, QEMU, and Libvirt. Which
of the following statements about these modules is false?
A) The KVM module is responsible for creating vCPUs and allocating virtual memory.
B) The QEMU module is responsible for simulating I/O operations.
C) Libvirt and QEMU can form a virtualization solution.
D) KVM and QEMU can form a virtualization solution.
9. In the Huawei FusionCompute architecture, what belongs to the Host Machine role is
A) CNA
B) UVP
C) KVM
D) VRM
10. Which of the following technologies or equipment cannot isolate broadcasts
A) Router
B) VLAN
C) Hub
D) Firewall
2
11. The configuration of a Huawei switch port is as follows:
Interface GigabitEhernet 0/0/1
Port link-type access
Port default vlan 16
According to the above configuration, the following statement is correct
A) The port will strip the VLAN 16 label of the passing data frame and forward it.
B) This port allows only data with vlan 16 tags to pass through.
C) This port will add a VLAN 16 tag to the data frames that pass by.
D) The port will not do any operations on the data frames passing by.
12. Which of the following statements is correct?
A) VLAN can be divided only based on switch ports.
B) The data transmission on the network is carried out in the form of broadcast.
C) The Ethernet frames sent from the Access interface to the peer device can be labeled.
D) The method of processing the frames sent by the trunk interface is as follows: If the VLAN
ID is the same as the default ID and the VLAN ID is allowed to pass through the interface,
remove the Tag, and send the packet.
3 Multiple Choice
13. The following description about KVM (Kernel-based Virtual Machine) is correct
A) KVM is a module in the Linux kernel
B) KVM is an open source virtualization technology
C) KVM is a type I virtualization
D) KVM is type II virtualization
14. In KVM type virtualization, which of the following descriptions is correct?
A) Guest OS can be Windows
B) Guest OS can be Linux
C) Host OS can be Windows
D) Host OS can be Linux
15. The following are computing virtualization
A) CPU virtualization
B) Network virtualization
C) Memory virtualization
D) I/O virtualization
E) Disk virtualization
16. The following description about the characteristics of type I (bare metal) computing virtualiza-
tion is correct
A) Applications can run directly on VMM
B) Hypervisor runs directly on physical hardware
C) Both applications and virtual machines can run directly on the Host OS
D) Application cannot run directly on Host Machine
3
17. The following are the north-south traffic
A) Traffic generated by virtual machine live migration
B) Traffic between virtual machines accessing each other across data centers
C) Traffic generated by customers accessing data center business via the Internet
D) Traffic between virtual machines inside the data center
18. The correct description of the advantages of virtualization is:
A) After using virtualization, multiple virtual machines can run simultaneously on one physical
host.
B) After using virtualization, the CPU utilization of a physical host can be stabilized at around
65%.
C) After using virtualization, virtual machines can be migrated between multiple hosts
D) After using virtualization, multiple applications can run simultaneously on the operating
system of one physical host.
19. In Huawei FusionCompute, the VLAN ID of a port group is set to 10, which indicates ( ).
A) The system will untag the data frames with the VLAN 10 tag that pass through the port
group and then forward the data frames.
B) The system will add the VLAN 10 tag to the data frames without a VLAN tag that pass
through the port group and then forward the data frames.
C) The system will discard the data frames with a tag other than VLAN 10 that pass through
the port group.
D) The system will change the tag of data frames with a non-VLAN-10 tag that pass through
the port group to VLAN 10 and then forward the data frames.
20. Which of the following statements about Virt-manager are true?
A) Virt-manager is a graphical management tool for KVM VMs.
B) Virt-manager is a KVM VM management command set.
C) Virt-manager is an open-source KVM VM management tool.
D) Virt-manager is a commercial KVM VM management tool.
4

More Related Content

Similar to TD1-2022-GII.pdf

Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02Shu Shin
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02Shu Shin
 
Ccna network simulator
Ccna network simulatorCcna network simulator
Ccna network simulatorccnaguide
 
Ccna certification
Ccna certificationCcna certification
Ccna certificationccnaguide
 
Ccna certification course
Ccna certification courseCcna certification course
Ccna certification courseccnaguide
 
Ccna certification training
Ccna certification trainingCcna certification training
Ccna certification trainingccnaguide
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdfVUPHUONGTHAO9
 
Ccna final exam
Ccna final examCcna final exam
Ccna final examccnaguide
 
Ccna exam 640 802
Ccna exam 640 802Ccna exam 640 802
Ccna exam 640 802ccnaguide
 
Ccna 10 exam
Ccna 10 examCcna 10 exam
Ccna 10 examccnaguide
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5friv4schoolgames
 
Ccna discovery
Ccna discoveryCcna discovery
Ccna discoveryccnaguide
 
Ccna 12 exam
Ccna 12 examCcna 12 exam
Ccna 12 examccnaguide
 
Ccna 11 exam
Ccna 11 examCcna 11 exam
Ccna 11 examccnaguide
 

Similar to TD1-2022-GII.pdf (20)

Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
lecciones ccna3
lecciones ccna3lecciones ccna3
lecciones ccna3
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02
 
Ccna network simulator
Ccna network simulatorCcna network simulator
Ccna network simulator
 
Ccna certification
Ccna certificationCcna certification
Ccna certification
 
Ccna certification course
Ccna certification courseCcna certification course
Ccna certification course
 
Ccna pdf
Ccna pdfCcna pdf
Ccna pdf
 
Ccna certification training
Ccna certification trainingCcna certification training
Ccna certification training
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
Ccna final exam
Ccna final examCcna final exam
Ccna final exam
 
Ccna exam 640 802
Ccna exam 640 802Ccna exam 640 802
Ccna exam 640 802
 
Ccna 10 exam
Ccna 10 examCcna 10 exam
Ccna 10 exam
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
Ccna study
Ccna studyCcna study
Ccna study
 
Ccna dumps
Ccna dumpsCcna dumps
Ccna dumps
 
Ccna discovery
Ccna discoveryCcna discovery
Ccna discovery
 
Ccna 12 exam
Ccna 12 examCcna 12 exam
Ccna 12 exam
 
Ccna 11 exam
Ccna 11 examCcna 11 exam
Ccna 11 exam
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 

Recently uploaded

Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2T.D. Shashikala
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edgePaco Orozco
 
Lect_Z_Transform_Main_digital_image_processing.pptx
Lect_Z_Transform_Main_digital_image_processing.pptxLect_Z_Transform_Main_digital_image_processing.pptx
Lect_Z_Transform_Main_digital_image_processing.pptxMonirHossain707319
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationDr. Radhey Shyam
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Lect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptxLect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptxHamzaKhawar4
 
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDrGurudutt
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineJulioCesarSalazarHer1
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
Teachers record management system project report..pdf
Teachers record management system project report..pdfTeachers record management system project report..pdf
Teachers record management system project report..pdfKamal Acharya
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxwendy cai
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdfKamal Acharya
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientistgettygaming1
 
E-Commerce Shopping for developing a shopping ecommerce site
E-Commerce Shopping for developing a shopping ecommerce siteE-Commerce Shopping for developing a shopping ecommerce site
E-Commerce Shopping for developing a shopping ecommerce sitejatinraor66
 
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineAftabkhan575376
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5T.D. Shashikala
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 

Recently uploaded (20)

Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
Lect_Z_Transform_Main_digital_image_processing.pptx
Lect_Z_Transform_Main_digital_image_processing.pptxLect_Z_Transform_Main_digital_image_processing.pptx
Lect_Z_Transform_Main_digital_image_processing.pptx
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
Lect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptxLect 2 - Design of slender column-2.pptx
Lect 2 - Design of slender column-2.pptx
 
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Teachers record management system project report..pdf
Teachers record management system project report..pdfTeachers record management system project report..pdf
Teachers record management system project report..pdf
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
E-Commerce Shopping for developing a shopping ecommerce site
E-Commerce Shopping for developing a shopping ecommerce siteE-Commerce Shopping for developing a shopping ecommerce site
E-Commerce Shopping for developing a shopping ecommerce site
 
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 

TD1-2022-GII.pdf

  • 1. 2021-2022 TD 1 Cloud Computing Yassine BOUJELBEN 2GII Héla GASSARA Please circle the correct answer 1 True or False 1. FusionCompute is a basic component of FusionSphere. It virtualizes hardware resources and centrally manages virtual resources, service resources, and user resources. A) True B) False 2. In computing virtualization, the operating system running in a VM is referred to as the host OS. A) True B) False 3. Computing virtualization technologies can be classified into type I and type II virtualization or full virtualization and paravirtualization from different perspectives. A) True B) False 4. A virtual machine can have multiple virtual NICs at the same time, corresponding to different virtual switches A) True B) False 5. In Huawei FusionCompute, the resources of the cluster are composed of the host and its associ- ated storage and network resources. A) True B) False 6. In the KVM, the I/O virtualization performance is poor by using the QEMU. If the Virtio is introduced, the NIC rate can be improved. A) True B) False 1
  • 2. 2 Single Choice 7. Which of the following is not a Kernel-based Virtual Machine (KVM) management tool? A) Libvirt B) Virsh command set C) Virt-Manager D) QEMU 8. The KVM virtualization architecture includes the KVM module, QEMU, and Libvirt. Which of the following statements about these modules is false? A) The KVM module is responsible for creating vCPUs and allocating virtual memory. B) The QEMU module is responsible for simulating I/O operations. C) Libvirt and QEMU can form a virtualization solution. D) KVM and QEMU can form a virtualization solution. 9. In the Huawei FusionCompute architecture, what belongs to the Host Machine role is A) CNA B) UVP C) KVM D) VRM 10. Which of the following technologies or equipment cannot isolate broadcasts A) Router B) VLAN C) Hub D) Firewall 2
  • 3. 11. The configuration of a Huawei switch port is as follows: Interface GigabitEhernet 0/0/1 Port link-type access Port default vlan 16 According to the above configuration, the following statement is correct A) The port will strip the VLAN 16 label of the passing data frame and forward it. B) This port allows only data with vlan 16 tags to pass through. C) This port will add a VLAN 16 tag to the data frames that pass by. D) The port will not do any operations on the data frames passing by. 12. Which of the following statements is correct? A) VLAN can be divided only based on switch ports. B) The data transmission on the network is carried out in the form of broadcast. C) The Ethernet frames sent from the Access interface to the peer device can be labeled. D) The method of processing the frames sent by the trunk interface is as follows: If the VLAN ID is the same as the default ID and the VLAN ID is allowed to pass through the interface, remove the Tag, and send the packet. 3 Multiple Choice 13. The following description about KVM (Kernel-based Virtual Machine) is correct A) KVM is a module in the Linux kernel B) KVM is an open source virtualization technology C) KVM is a type I virtualization D) KVM is type II virtualization 14. In KVM type virtualization, which of the following descriptions is correct? A) Guest OS can be Windows B) Guest OS can be Linux C) Host OS can be Windows D) Host OS can be Linux 15. The following are computing virtualization A) CPU virtualization B) Network virtualization C) Memory virtualization D) I/O virtualization E) Disk virtualization 16. The following description about the characteristics of type I (bare metal) computing virtualiza- tion is correct A) Applications can run directly on VMM B) Hypervisor runs directly on physical hardware C) Both applications and virtual machines can run directly on the Host OS D) Application cannot run directly on Host Machine 3
  • 4. 17. The following are the north-south traffic A) Traffic generated by virtual machine live migration B) Traffic between virtual machines accessing each other across data centers C) Traffic generated by customers accessing data center business via the Internet D) Traffic between virtual machines inside the data center 18. The correct description of the advantages of virtualization is: A) After using virtualization, multiple virtual machines can run simultaneously on one physical host. B) After using virtualization, the CPU utilization of a physical host can be stabilized at around 65%. C) After using virtualization, virtual machines can be migrated between multiple hosts D) After using virtualization, multiple applications can run simultaneously on the operating system of one physical host. 19. In Huawei FusionCompute, the VLAN ID of a port group is set to 10, which indicates ( ). A) The system will untag the data frames with the VLAN 10 tag that pass through the port group and then forward the data frames. B) The system will add the VLAN 10 tag to the data frames without a VLAN tag that pass through the port group and then forward the data frames. C) The system will discard the data frames with a tag other than VLAN 10 that pass through the port group. D) The system will change the tag of data frames with a non-VLAN-10 tag that pass through the port group to VLAN 10 and then forward the data frames. 20. Which of the following statements about Virt-manager are true? A) Virt-manager is a graphical management tool for KVM VMs. B) Virt-manager is a KVM VM management command set. C) Virt-manager is an open-source KVM VM management tool. D) Virt-manager is a commercial KVM VM management tool. 4