Networking – Cloud Computing

Chapter 3

HCIA Sample Questions – Networking

  1. On Huawei Fusion Compute, the administrator can view the DVS port connected to the VM .

 

A TRUE B FALSE

 

  1. When creating a port group in Huawei FusionCompute, the following operation error is

 

A. Set the VLAN ID to ” 5000 ” / 1 -4094 total 4096 0-4095

B. Set the port group name to ” ceshi ”

C. Set the port type to “normal” // access ordinary trunk relay

D. Add “This is the test port” in the description



  1. In Huawei FusionCompute, the role of the uplink is

 

A. Assign an IP address to the virtual machine.

Connect virtual network and physical network

Manage the virtual machine MAC address

Detecting the status of the virtual network card Huawei FusionCompute , if the number of physical NICs fewer servers may be considered a plurality of combined flat portions

 

  1. Department, using VLAN to isolate from each plane is logically

 

  1. TRUE
  2. FALSE

 

  1. Huawei FusionCompute, a Department using the number of physical NICs fewer servers  may be considered a plurality of combined flat portions, using VLAN to isolate from each plane logically
    1. TRUE FALSE
  2. Which of the following technologies or devices cannot isolate broadcasts

A. Router B.VLAN C. Hub D. Firewall

  1. The following description of the difference between a physical switch and a virtual switch is incorrect
  • Virtual switch runs on a physical server, and the physical switch has separate hardware.
  • The virtual switch cannot operate on the VLAN tag. The physical switch can operate on the VLAN tag.
  • Virtual switch cannot be configured with a Layer 3 interface. A physical switch can be configured with a Layer 3 interface.
  • The normal operation of the virtual switch also requires certain hardware resources.

 

  1. Huawei Fusion Compute in the following on the virtual machine and DVS amount of correspondence between the description is correct (multiple choice)

When a virtual machine has a network card, the network card can only be  associated  with  one DVS.

When a virtual machine has multiple network cards, each network card can be associated with a DVS.

When a virtual machine has multiple network cards, multiple network cards can be associated with the same DVS.

When a virtual machine has a network card, the network card can be associated  with  multiple DVSs.



  1. The port configuration of a Huawei switch is as follows:

Interface ( GigabitEhernet 0/0/1 ) Port link-type trunk

Port trunk allow-pass vlan 16 17

According to the above configuration, the following statement is correct

  • data frame containing a vlan 16 tag will be stripped and forwarded as it passes through the port.
  • data frames that do not contain any labels are discarded when they pass through the port.
  • data frame does not contain  any labels when passing through the port, it is added VLAN       16 or VLAN 17 tag and Forwarding
  • The data frame containing the VLAN 17 tag will be reserved and forwarded when passing the port.

 

  1. In Huawei Fusion Compute, to facilitate unified management, each DVS needs to be configured with a management IP address.
    1. TRUE    B FALSE

 

  1. Which of the following technologies on the switch can increase the link rate?

 

  1. LDAP
  2. LACP
  3. VLAN
  4. VXLAN
  1. In Huawei FusionCompute, DVS supports multiple dynamic routes in addition to static routes.

 

  1. TRUE     FALSE
  1. The configuration of a Huawei switch port is as follows:

Interface GigabitEhernet 0/0/1 Port link-type access

Port default vlan 16

According to the above configuration, the following statement is correct

  1. This port will add a vlan 16 tag to the data frame that will pass.
  2. This port only allows data with vlan 16 tags to pass.
  3. The port will strip the vlan 16 label of the passed data frame and forward it.
  4. This port will not do anything with the passing data frames.



  1. Which device is capable of routing and forwarding in a physical network?
  • Hub
  • Layer 2 switch
  • Router
  • Physical server network card

 

  • In the cloud, the network can be divided into two virtual and physical networks Part A
  • Yes
  • Wrong

 

  1. In FusionCompute, the following description about deleting a security group is incorrect
  • The authorization behaviour between the security group to be deleted and other security groups does not affect the deletion operation.
  • There is no virtual machine in the security group. If there is a virtual machine in the security group, you need to remove the virtual machine from the security group.
  • After the security group is deleted, all security group rules in the group are deleted at the same time.
  • When a security group to which a virtual machine belongs is deleted, other security groups are not affected by the virtual machine.

 

  1. The following description of iSCSI and Fibre Channel is incorrect ().
  • The FC protocol is completely heterogeneous with the existing Ethernet, and the compatibility is poor.
  • iSCSI runs on Ethernet based on TCP/IP protocol and can be seamlessly integrated with existing Ethernet
  • FC transmission distance than the TCP / IP away
  • From the perspective  of  the  transport   layer,   the   Fibre   Channel   transmission   uses the FC protocol, and the iSCSI use
  • In Huawei Fusion compute , all virtual machine NICs that are added to the same security group are filtered by the security group. To improve security, you need to add the same NIC to multiple security groups. // One network card is only classified into one security group
  • True
  • False

 

  1. Virtual machine can have multiple virtual network cards at the same time, corresponding to different virtual switches.

A.TURE   B.FALSE

  1. In Fusioncompute, the virtual switch is connected to the physical network by ().

A.INIC

  1. Virtual network card
  2. Port group
  3. Uplink
  4. Rules within the security group will also delete the security group as

A.TRUE

B.FALSE

  1. The necessary conditions for the virtual machine to communicate normally with other virtual machines are (multiple choice)
  • Configure a fixed IP address for the virtual machine.
  • Configure the virtual machine with the correct IP address.
  • Configure the correct MAC address for the virtual machine.
  • Configure the gateway address for the virtual machine
  1. The VLAN ID (excluding 0 ) configured for the DVS in the Huawei FusionCompute needs to exist on the physical switch. Otherwise, the normal communication of the virtual machine will be affected.

A TRUE B FALSE


  1. If the virtual machine is to communicate with other virtual machines, which of the following options is necessary?
    • Need to configure port binding on the physical server
    • Need to configure port binding on the physical switch
    • Need to network the physical server where the virtual machine is located
    • Need to add at least one network card to the virtual machine
  2. The physical switch which follows the general support for remote management

(multiple choice)

  • Telnet
  • SSL
  • Web
  • SSH
  1. The following is the north-south traffic (multiple choice )
  • Traffic generated by virtual machine hot migration
  • Traffic between virtual machines that access each other across data centers
  • Traffic generated by customers accessing data center services over the Internet
  • Traffic between virtual machines in the data center

 

  1. Packets in the cloud computing virtual network need to be routed through routers in the physical network. /TOR switch

A.TURE B.FALSE

  1. ISCSI is a standardized protocol based on the protocol and SCSI instruction set, and is widely used in many storage networks using the architecture.

A. FC IP SAN   B. TCP/IP FC SAN   C. FC FC SAN   D. TCP/IP IP SAN

  1. In Huawei FusionCompute , the traditional network device corresponding to DVS is ()
  • Router
  • Hub
  • Layer 2 switch
  • Layer 3 switch

 

  1. In Huawei FusionCompute , a virtual machine can have multiple virtual network cards.
  • TURE B. FALSE
  1. If virtual machine A can ping virtual machine B, which of the following results can be inferred
  • Virtual machine A and virtual machine B use the same network segment.
  • Both virtual machine A and virtual machine B are configured with the correct IP address.
  • Virtual machine A and virtual machine B use different network segments.
  • Virtual machine A and virtual machine B run on the same physical host
  1. Huawei FusionCompute the DRS for a binding rule USB can not take effect device virtual machine.

A.TURE     B.FALSE

  1. FC SAN, which of the following is not the advantage of IP SAN ?

A. bandwidth extension is convenient

B. construction costs are low

C. transmission distance is far

D. transmission efficiency is high

  1. The following description about Huawei virtual switch is correct ( )
  2. The virtual switching function of the intelligent network card is also provided by Huawei virtual switch.

B , Huawei virtual switch is open source open vSWitch

  1. If Huawei distributed switches have multiple virtual ports, each port has its own attributes.
  2. Huawei virtual switches are divided into standard virtual switches and distributed virtual switches.
  3. Huawei FusionCompute , the following ports on the group and security groups are not correctly describe

A. virtual machine NIC is connected to a virtual port of the port group, and a virtual machine NIC is associated with a security group.

B. A port group is a collection of one or more virtual ports on a DVS , and a security group is a collection of one or more rules.

C. A DVS can have multiple port groups, and one VM can be protected by multiple security groups.

D. The security group is based on the port group to protect the virtual machine’s /// virtual network card.



  1. The switch can be divided into an access switch, an aggregation switch, and a core switch according to the use, and the virtual switch belongs to the convergence.

A True B False

  1. In actual work, which function can the VLAN implement (A)
  • Virtual machine IXUS belonging to the same VLAN uses the IP address of the same address segment, otherwise it cannot communicate normally.
  • After the virtual machines of the two departments use different VLANs, they can no longer communicate with each other.
  • Virtual machines belonging to the same VLAN can use IP addresses of different address segments and can discover each other using broadcasts.
  • Virtual machines belonging to different VLANs can use the same IP address without address conflicts.

 

  1. If two virtual machines can ping each other, the network device that will be used during the communication process is ( )
  • Distributed virtual machine switch
  • Physical switch
  • Physical network card
  • Virtual network card
  1. In KVM , there are two ways for a virtual machine NIC to connect to a physical network, namely ( )

A. bridge, address translation

B. address conversion, straight through

C. bridge, straight through

D. straight through, bridge

  1. In Huawei FusionCompute, the following descriptions about security groups and rules are incorrect ( )
  • Changes to security group rules need to be manually applied to virtual machines in the security group
  • must first create a security group to add rules
  • security group rejects all by default before adding rules
  • The prerequisite for deleting a security group is that there is no virtual machine in the security group.
  1. The following description about the security group application scenario is incorrect ( )
  • By setting security group rules, you can control the permissions of folders in the virtual machine.
  • By setting the security set of rules that can be achieved only allow specific IP addresses to virtual machines into the line telnet
  • By setting security group rules, you can protect virtual machines from being accessed.
  • By setting security group  rules,  you  can  make  the  virtual  machine  unable  to  access  the FTP server.

 

  1. Setting the port group vlan ID to 10 in Huawei FusionCompute (multiple choice)

A forwards the data frame with the VLAN 10 label passing through the port group and then forwards it.

B forwards the data frame with the VLAN 10 label through the port group to VLAN ID and forwards it.

C discards data frames with non- VLAN 10 labels passing through the port group

D forwards the data frame with no VLAN tag on the port group and then forwards the label of VLAN 10.



  1. The following description of the role of the VLAN is incorrect
  • Enhance network security
  • Increase physical switch interface bandwidth
  • Isolate the broadcast domain
  • Improve the robustness of the network
  1. In Huawei FusionCompute set the port group VLAN ID to 0 for

 

  • Set the vlan tag of the data frame passing the port group to 0.
  • Only data frames with vlan 0 tags are allowed to pass through this port group
  • Allow the data frames with vlan tag 0 through the port group
  • No modifications are made to the data frames passing through this port group

 

  1. In the FusionCompute, and the IP address of a Windows VM is 0.0.0.0. The possible reason is ( )
  • the virtual machine’s IP address is manually set
  • the virtual machine’s IP address is manually set to 0.0.0.0
  • the virtual machine’s IP address is assigned to DHCP
  • the virtual machine does not have Tools installed
  1. In FusionCompute , the virtual NIC is connected to each virtual machine on the virtual switch port, in order to facilitate the user to simultaneously configure and manage a plurality of ports, the ports have the same network properties into the same port of the group

A , True B , False

  1. If virtual machine A and virtual machine B are running on different physical servers, which physical device will be used in the process of communication? (multiple choice )
    • Virtual network card
    • Virtual switch
    • Physical switch
    • Physical network card

 

  1. A virtual machine can have multiple virtual network cards at the same time, corresponding to different virtual switches

A.True B. False

  1. Huawei FusionCompute, if only one physical network ports bound network port, the physical network interface cannot be removed directly

A.True B. False

  1. In Huawei FusionCompute, the following description of the security group rules is incorrect ( ).
  • When a virtual machine has multiple NICs, you can configure a security group for each NIC.
  • After creating a security group and adding rules, the virtual machine can communicate with the outside world.
  • All virtual machine NICs in the same security group will use this security group rule for access control.
  • The essence of a security group is the collection of rules
  1. In Huawei FusionCompute, the description of the login VM is correct ( ).

[multiple choice]

  • The virtual machine   does   not   have   an IP address,   and   the   administrator   can log   in through VNC, so VNC gets rid of the dependence on the network.
  • If the operating system of the virtual machine is windows, the administrator can log in to the virtual machine through the remote desktop.
  • The administrator can log in to the virtual machine of any operating system through VNC.
  • If the operating system of the virtual machine is Linux, the administrator can log in to the virtual machine through the remote desktop.

 

  1. In Huawei FusionCompute, the management VLAN ID used by the VRM cannot be changed.

A. TRUE B. FALSE