H13-821_V3.0試験無料問題集「Huawei HCIP-Cloud Service Solutions Architect V3.0 認定」

A large Internet company is planning to deploy a test environment on Huawei Cloud. The operation and maintenance director requires that when purchasing an elastic cloud server, in addition to the system disk, an additional data disk must be added, and the IOPS limit of the data disk must be higher than the upper limit. 2,220, the cloud disk with the lowest IOPS burst limit value higher than 6,500 and the lowest cost.
Which of the following descriptions about EVS types of cloud disks is most suitable? (Multiple choice)

The bare metal server supports four network types, which are virtual private cloud, advanced network, custom VLAN network, and B network.

An Internet company has deployed a new business system through Huawei Cloud, and now needs to set different access permissions for employees to achieve permission isolation between different employees. It is usually recommended that the company use the unified identity authentication service IAM for fine-grained permission management.

By using the API gateway, the company can reduce the R&D investment of the enterprise, focus on the core business of the enterprise, and improve operational efficiency. At the same time, it can also help users improve their monetization service capabilities.
Which of the following descriptions about API gateways is wrong?

The IoT data analysis service IOTA is based on the IoT asset model and integrates IoT data integration, cleaning, storage, analysis, visualization and other functions. Which of the following is the correct description of the IOTA analysis function? (Multiple choice)

正解:A,B,C 解答を投票する
Please match the following related components and functional characteristics of open source Kubernetes.
正解:
A scaling policy can trigger scaling activities, which is a way to adjust the number of instances or bandwidth in a scaling group. The scaling policy specifies the conditions that need to be met and the operations that need to be performed when the scaling activity is triggered. When the scaling conditions are met, the system will automatically trigger a scaling activity. Currently, the system supports three scaling policies: alarm policy, timing policy, and periodic policy.

Web Application Firewall (WAF) is an application security protection product provided by Huawei Cloud. Which of the following threats can WAF protect against? (Multiple choice)

正解:A,C,D 解答を投票する
Which of the following descriptions about storage disaster recovery service SDRS is correct? (Multiple choice)

正解:A,B,D 解答を投票する
Kubernetes cluster includes laster node and Node node, and llaster is the control node of the cluster. In order to ensure the high availability of the cluster, multiple Jaster nodes are usually deployed. Which of the following components does an Ilaster node mainly consist of? (Multiple choice)

正解:A,B,C 解答を投票する
Which of the following operations can improve the security of cloud server accounts? (Multiple choice)

正解:A,B,C 解答を投票する
A company plans to use the Service Mesh architecture as the upgrade target due to the early deployment of the IT environment and long running time, which makes it difficult to adapt to the rapidly changing business environment. Which of the following descriptions of the characteristics of the Service Mesh is wrong?

When a microservice application has a large flow of access requests and a single instance cannot bear the load, it can distribute the traffic to multiple instances to process requests through load balancing, thereby optimizing the response time and preventing instance overload.

The Docker image contains the packaged application and the environment it depends on (such as CPU, memory and other resources), it contains the file system and other metadata available to the application, such as the executable file path when the image is running, etc., so compared with virtualization technology, it has higher security.

Which of the following descriptions about the use of the FunctionGraph service is wrong?