SlideShare a Scribd company logo
2021-2022
TD 1
Cloud Computing
Yassine BOUJELBEN 2GII
Héla GASSARA
Please circle the correct answer
1 True or False
1. FusionCompute is a basic component of FusionSphere. It virtualizes hardware resources and
centrally manages virtual resources, service resources, and user resources.
A) True
B) False
2. In computing virtualization, the operating system running in a VM is referred to as the host
OS.
A) True
B) False
3. Computing virtualization technologies can be classified into type I and type II virtualization or
full virtualization and paravirtualization from different perspectives.
A) True
B) False
4. A virtual machine can have multiple virtual NICs at the same time, corresponding to different
virtual switches
A) True
B) False
5. In Huawei FusionCompute, the resources of the cluster are composed of the host and its associ-
ated storage and network resources.
A) True
B) False
6. In the KVM, the I/O virtualization performance is poor by using the QEMU. If the Virtio is
introduced, the NIC rate can be improved.
A) True
B) False
1
2 Single Choice
7. Which of the following is not a Kernel-based Virtual Machine (KVM) management tool?
A) Libvirt
B) Virsh command set
C) Virt-Manager
D) QEMU
8. The KVM virtualization architecture includes the KVM module, QEMU, and Libvirt. Which
of the following statements about these modules is false?
A) The KVM module is responsible for creating vCPUs and allocating virtual memory.
B) The QEMU module is responsible for simulating I/O operations.
C) Libvirt and QEMU can form a virtualization solution.
D) KVM and QEMU can form a virtualization solution.
9. In the Huawei FusionCompute architecture, what belongs to the Host Machine role is
A) CNA
B) UVP
C) KVM
D) VRM
10. Which of the following technologies or equipment cannot isolate broadcasts
A) Router
B) VLAN
C) Hub
D) Firewall
2
11. The configuration of a Huawei switch port is as follows:
Interface GigabitEhernet 0/0/1
Port link-type access
Port default vlan 16
According to the above configuration, the following statement is correct
A) The port will strip the VLAN 16 label of the passing data frame and forward it.
B) This port allows only data with vlan 16 tags to pass through.
C) This port will add a VLAN 16 tag to the data frames that pass by.
D) The port will not do any operations on the data frames passing by.
12. Which of the following statements is correct?
A) VLAN can be divided only based on switch ports.
B) The data transmission on the network is carried out in the form of broadcast.
C) The Ethernet frames sent from the Access interface to the peer device can be labeled.
D) The method of processing the frames sent by the trunk interface is as follows: If the VLAN
ID is the same as the default ID and the VLAN ID is allowed to pass through the interface,
remove the Tag, and send the packet.
3 Multiple Choice
13. The following description about KVM (Kernel-based Virtual Machine) is correct
A) KVM is a module in the Linux kernel
B) KVM is an open source virtualization technology
C) KVM is a type I virtualization
D) KVM is type II virtualization
14. In KVM type virtualization, which of the following descriptions is correct?
A) Guest OS can be Windows
B) Guest OS can be Linux
C) Host OS can be Windows
D) Host OS can be Linux
15. The following are computing virtualization
A) CPU virtualization
B) Network virtualization
C) Memory virtualization
D) I/O virtualization
E) Disk virtualization
16. The following description about the characteristics of type I (bare metal) computing virtualiza-
tion is correct
A) Applications can run directly on VMM
B) Hypervisor runs directly on physical hardware
C) Both applications and virtual machines can run directly on the Host OS
D) Application cannot run directly on Host Machine
3
17. The following are the north-south traffic
A) Traffic generated by virtual machine live migration
B) Traffic between virtual machines accessing each other across data centers
C) Traffic generated by customers accessing data center business via the Internet
D) Traffic between virtual machines inside the data center
18. The correct description of the advantages of virtualization is:
A) After using virtualization, multiple virtual machines can run simultaneously on one physical
host.
B) After using virtualization, the CPU utilization of a physical host can be stabilized at around
65%.
C) After using virtualization, virtual machines can be migrated between multiple hosts
D) After using virtualization, multiple applications can run simultaneously on the operating
system of one physical host.
19. In Huawei FusionCompute, the VLAN ID of a port group is set to 10, which indicates ( ).
A) The system will untag the data frames with the VLAN 10 tag that pass through the port
group and then forward the data frames.
B) The system will add the VLAN 10 tag to the data frames without a VLAN tag that pass
through the port group and then forward the data frames.
C) The system will discard the data frames with a tag other than VLAN 10 that pass through
the port group.
D) The system will change the tag of data frames with a non-VLAN-10 tag that pass through
the port group to VLAN 10 and then forward the data frames.
20. Which of the following statements about Virt-manager are true?
A) Virt-manager is a graphical management tool for KVM VMs.
B) Virt-manager is a KVM VM management command set.
C) Virt-manager is an open-source KVM VM management tool.
D) Virt-manager is a commercial KVM VM management tool.
4

More Related Content

Similar to TD1-2022-GII.pdf

Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
CiscoExamDumpsarticl
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02Shu Shin
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02Shu Shin
 
Ccna network simulator
Ccna network simulatorCcna network simulator
Ccna network simulatorccnaguide
 
Ccna certification
Ccna certificationCcna certification
Ccna certificationccnaguide
 
Ccna certification course
Ccna certification courseCcna certification course
Ccna certification courseccnaguide
 
Ccna certification training
Ccna certification trainingCcna certification training
Ccna certification trainingccnaguide
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
VUPHUONGTHAO9
 
Ccna final exam
Ccna final examCcna final exam
Ccna final examccnaguide
 
Ccna exam 640 802
Ccna exam 640 802Ccna exam 640 802
Ccna exam 640 802ccnaguide
 
Ccna 10 exam
Ccna 10 examCcna 10 exam
Ccna 10 examccnaguide
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5friv4schoolgames
 
Ccna discovery
Ccna discoveryCcna discovery
Ccna discoveryccnaguide
 
Ccna 12 exam
Ccna 12 examCcna 12 exam
Ccna 12 examccnaguide
 
Ccna 11 exam
Ccna 11 examCcna 11 exam
Ccna 11 examccnaguide
 

Similar to TD1-2022-GII.pdf (20)

Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
lecciones ccna3
lecciones ccna3lecciones ccna3
lecciones ccna3
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02
 
Uccn1003 -may2010_-_mid_term_02
Uccn1003  -may2010_-_mid_term_02Uccn1003  -may2010_-_mid_term_02
Uccn1003 -may2010_-_mid_term_02
 
Ccna network simulator
Ccna network simulatorCcna network simulator
Ccna network simulator
 
Ccna certification
Ccna certificationCcna certification
Ccna certification
 
Ccna certification course
Ccna certification courseCcna certification course
Ccna certification course
 
Ccna pdf
Ccna pdfCcna pdf
Ccna pdf
 
Ccna certification training
Ccna certification trainingCcna certification training
Ccna certification training
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
Ccna final exam
Ccna final examCcna final exam
Ccna final exam
 
Ccna exam 640 802
Ccna exam 640 802Ccna exam 640 802
Ccna exam 640 802
 
Ccna 10 exam
Ccna 10 examCcna 10 exam
Ccna 10 exam
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
Ccna study
Ccna studyCcna study
Ccna study
 
Ccna dumps
Ccna dumpsCcna dumps
Ccna dumps
 
Ccna discovery
Ccna discoveryCcna discovery
Ccna discovery
 
Ccna 12 exam
Ccna 12 examCcna 12 exam
Ccna 12 exam
 
Ccna 11 exam
Ccna 11 examCcna 11 exam
Ccna 11 exam
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 

Recently uploaded

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 

Recently uploaded (20)

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 

TD1-2022-GII.pdf

  • 1. 2021-2022 TD 1 Cloud Computing Yassine BOUJELBEN 2GII Héla GASSARA Please circle the correct answer 1 True or False 1. FusionCompute is a basic component of FusionSphere. It virtualizes hardware resources and centrally manages virtual resources, service resources, and user resources. A) True B) False 2. In computing virtualization, the operating system running in a VM is referred to as the host OS. A) True B) False 3. Computing virtualization technologies can be classified into type I and type II virtualization or full virtualization and paravirtualization from different perspectives. A) True B) False 4. A virtual machine can have multiple virtual NICs at the same time, corresponding to different virtual switches A) True B) False 5. In Huawei FusionCompute, the resources of the cluster are composed of the host and its associ- ated storage and network resources. A) True B) False 6. In the KVM, the I/O virtualization performance is poor by using the QEMU. If the Virtio is introduced, the NIC rate can be improved. A) True B) False 1
  • 2. 2 Single Choice 7. Which of the following is not a Kernel-based Virtual Machine (KVM) management tool? A) Libvirt B) Virsh command set C) Virt-Manager D) QEMU 8. The KVM virtualization architecture includes the KVM module, QEMU, and Libvirt. Which of the following statements about these modules is false? A) The KVM module is responsible for creating vCPUs and allocating virtual memory. B) The QEMU module is responsible for simulating I/O operations. C) Libvirt and QEMU can form a virtualization solution. D) KVM and QEMU can form a virtualization solution. 9. In the Huawei FusionCompute architecture, what belongs to the Host Machine role is A) CNA B) UVP C) KVM D) VRM 10. Which of the following technologies or equipment cannot isolate broadcasts A) Router B) VLAN C) Hub D) Firewall 2
  • 3. 11. The configuration of a Huawei switch port is as follows: Interface GigabitEhernet 0/0/1 Port link-type access Port default vlan 16 According to the above configuration, the following statement is correct A) The port will strip the VLAN 16 label of the passing data frame and forward it. B) This port allows only data with vlan 16 tags to pass through. C) This port will add a VLAN 16 tag to the data frames that pass by. D) The port will not do any operations on the data frames passing by. 12. Which of the following statements is correct? A) VLAN can be divided only based on switch ports. B) The data transmission on the network is carried out in the form of broadcast. C) The Ethernet frames sent from the Access interface to the peer device can be labeled. D) The method of processing the frames sent by the trunk interface is as follows: If the VLAN ID is the same as the default ID and the VLAN ID is allowed to pass through the interface, remove the Tag, and send the packet. 3 Multiple Choice 13. The following description about KVM (Kernel-based Virtual Machine) is correct A) KVM is a module in the Linux kernel B) KVM is an open source virtualization technology C) KVM is a type I virtualization D) KVM is type II virtualization 14. In KVM type virtualization, which of the following descriptions is correct? A) Guest OS can be Windows B) Guest OS can be Linux C) Host OS can be Windows D) Host OS can be Linux 15. The following are computing virtualization A) CPU virtualization B) Network virtualization C) Memory virtualization D) I/O virtualization E) Disk virtualization 16. The following description about the characteristics of type I (bare metal) computing virtualiza- tion is correct A) Applications can run directly on VMM B) Hypervisor runs directly on physical hardware C) Both applications and virtual machines can run directly on the Host OS D) Application cannot run directly on Host Machine 3
  • 4. 17. The following are the north-south traffic A) Traffic generated by virtual machine live migration B) Traffic between virtual machines accessing each other across data centers C) Traffic generated by customers accessing data center business via the Internet D) Traffic between virtual machines inside the data center 18. The correct description of the advantages of virtualization is: A) After using virtualization, multiple virtual machines can run simultaneously on one physical host. B) After using virtualization, the CPU utilization of a physical host can be stabilized at around 65%. C) After using virtualization, virtual machines can be migrated between multiple hosts D) After using virtualization, multiple applications can run simultaneously on the operating system of one physical host. 19. In Huawei FusionCompute, the VLAN ID of a port group is set to 10, which indicates ( ). A) The system will untag the data frames with the VLAN 10 tag that pass through the port group and then forward the data frames. B) The system will add the VLAN 10 tag to the data frames without a VLAN tag that pass through the port group and then forward the data frames. C) The system will discard the data frames with a tag other than VLAN 10 that pass through the port group. D) The system will change the tag of data frames with a non-VLAN-10 tag that pass through the port group to VLAN 10 and then forward the data frames. 20. Which of the following statements about Virt-manager are true? A) Virt-manager is a graphical management tool for KVM VMs. B) Virt-manager is a KVM VM management command set. C) Virt-manager is an open-source KVM VM management tool. D) Virt-manager is a commercial KVM VM management tool. 4