Which of the following statements are true about applying for global IPv6 unicast addresses from ISPs? (Choose all that apply.)
AThis address application mode applies to small and midsize enterprises.
BSuch IPv6 addresses are tightly bound to ISPs and have poor scalability.
CSuch IPv6 address space is large and address planning is independent and controllable.
DThis address application mode is cost-effective and such addresses are generally applied for together with private line services.
Hybrid cloud is a cloud computing model that integrates one or more public or private cloud environments through network connections, allowing data and applications to be shared between these cloud environments.
ATRUE
BFALSE
Core plug-ins of open source OpenStack Neutron integrate Layer 2 network services supported by various vendors and backend technologies and provide basic network services including networks, subnets, and ports.
ATRUE
BFALSE
The CloudFabric intelligent O&M solution can aggregate faults, trace their sources, and automatically locate their root causes.
ATRUE
BFALSE
Which of the following statements is false about the container and VM technologies?
AContainers do not require independent kernels.
BContainers provide better isolation capability than VMs.
CContainer images are smaller than VMs.
DContainers boot faster than VMs.
You can use Ethernet switches with all or part of optical ports to build a Fibre Channel storage network.
ATRUE
BFALSE
In the CloudFabric solution for the hybrid cloud scenario, which of the following interconnection modes are supported between the public cloud and private cloud? (Choose all that apply.)
AMPLS VPN mode
BPrivate line mode
CVXLAN mode
DIPsec VPN mode
The Linux namespace mainly solves the environment isolation problem. We also need to isolate the usage of computer resources. Which of the following technologies is used to meet this requirement?
AHypervisor
BStorage I/O
CCgroup
DProcess ID
Which of the following statements is false about RDMA?
ARDMA is widely used in HPC, AI, and storage scenarios due to its ability to reduce the CPU load and processing latency and improve application performance.
BRDMA enables peripherals (such as NICs) to directly access memory resources of remote hosts.
CRDMA requires host CPUs to participate in the memory copy of protocol stacks multiple times. As a result, the CPU usage is continuously high.
DIn contrast with the traditional TCP socket network interface, RDMA bypasses the operating system kernel.
When a server uses local storage devices, which of the following file systems may be used? (Choose all that apply.)
Aext4
BCIFS
CNTFS
DNFS
When a centralized storage application writes the original and backup data to multiple servers, 1:N incast traffic is generated.
ATRUE
BFALSE
Based on the change management functions of the CloudFabric solution, which of the following change functions are provided by iMaster NCE-FabricInsight? (Choose all that apply.)
AComparing network snapshots before and after a change
BService simulation and verification before a change
CTenant snapshot rollback after a change
DData plane intent verification after a change
In the Huawei CloudFabric solution, when a tenant orchestrates the VPC communication service, interconnection VRFs may be required. Which of the following statements is true about interconnection VRFs?
ATwo different interconnection VRFs need to be created when the virtual firewalls of the two VPCs that communicate with each other are on the same physical firewall; traffic passes through firewalls at both ends, and the two VPCs share the same service leaf node.
BTwo different interconnection VRFs need to be created when the virtual firewalls of the two VPCs that communicate with each other are on two different physical firewalls connected to the same service leaf node, and traffic passes through firewalls at both ends.
CIn all VPC communication scenarios, if interconnection VRFs are used, the VPCs share one interconnection VRF. The controller does not create two different interconnection VRFs.
DTwo different interconnection VRFs need to be created when the virtual firewalls of the two VPCs that communicate with each other are on two different physical firewalls connected to different service leaf nodes, and traffic passes through firewalls at both ends.
In the CloudFabric solution for the Multi-Site scenario, which of the following statements are true when segment VXLAN is used to implement communication? (Choose all that apply.)
AIn a fabric, BGP EVPN is used as the VXLAN control plane.
BSpine nodes function as RRs in a fabric to reduce the number of BGP peer relationships.
CFabric gateways can be used as RRs between fabrics to reduce the number of BGP peer relationships.
DBGP EVPN is used as the VXLAN control plane between multiple fabrics.
Microsegmentation has a finer segmentation granularity than traditional ACLs. Which of the following granularities does microsegmentation support? (Choose all that apply.)
AIP address segment or discrete IP addresses
BContainer
CMAC address
DVM name
On a DCN, which of the following protocols can be used to dynamically establish VXLAN tunnels?
AOSPF
BM-LAG
CBGP EVPN
DMPLS
An OVS is a distributed virtual switch and can help VMs maintain consistent network configurations and policies before and after migration between hosts.
ATRUE
BFALSE
Which of the following statements are true about the consistency check function of iMaster NCE-Fabric? (Choose all that apply.)
AIf the function of deletion via reconciliation is enabled, the configurations that exist on the controller but not on the forwarder are deleted.
BiMaster NCE-Fabric supports manual and automatic inconsistency discovery.
CConfigurations can be synchronized from iMaster NCE-Fabric to forwarders and from forwarders to iMaster NCE-Fabric.
DDuring full inconsistency discovery, iMaster NCE-Fabric collects all the data on the forwarder for comparison.
In the Huawei CloudFabric solution, distributed VAS resource pools have higher resource utilization than centralized VAS resource pools and are therefore recommended in all scenarios.
ATRUE
BFALSE
Which of the following layers are included in the architecture of the CloudFabric solution for the container network scenario? (Choose all that apply.)
ANetwork service layer
BNetwork analysis/control layer
CComputing access layer
DService presentation/orchestration layer
Which of the following is not included in the protocol health evaluation scope of iMaster NCE-FabricInsight?
ABGP peer connection
BOSPF connection
CVXLAN tunnel
DM-LAG group status
On a VXLAN network, after the distributed gateway function is enabled on a VBDIF interface, the device where the VBDIF interface resides deletes ARP entries learned from the network side.