50 likes | 72 Views
Share Huawei H31-521 questions and answers in the PDF file.
E N D
Full version: 272 Q&As Full Version of H31-521 Exam Dumps Share Huawei H31-521 Exam Dumps Below. 1. Which of the following statements is correct? A. cp command can be used for packaging B. mv command can be used for file renaming C. file command can be used to modify the file type D. mkdir can be used to create text documents Answer: B 2.Which of the following statements about RAID6 is accurate? (Multiple Choice) A. Advantages: strong redundancy, allowing 2 bad disks B. Disadvantages: Disk utilization is not higher than RAID5
C. RAID6 does not require a check disk D. Disk utilization: (n-2)/n, n represents the number of disks Answer: ABD 3.Which of the following commands can be used to view Redhat Linux as a system version? A. cat/etc/redhat-release B. show version C. find version D. cat version Answer: A 4.Which of the following options is a data security solution? A. Network isolation B. Hypervisor hardening C. Data access control D. Centralized user management and authentication Answer: C
5.Which of the following about the three-layer switch is incorrect? A. Layer 3 switches can implement VLAN division B. Layer 3 switch can implement Layer 2 switching inside the VLAN. C. Layer 3 switches can implement routing between VLANs D. Layer 3 switches can implement all the functions of the router Answer: D 6.Which of the following security threats does cloud computing bring? (Multiple Choice) A. Tenants lose control of resources B. Virtualization security C. It is more difficult to deal with disasters such as earthquakes D. DDOS attacks are more prominent Answer: ABD
7.Which of the following descriptions about technical shortcomings of traditional storage virtualization is wrong? A. Use storage resources to reduce application performance B. compatibility issues of Operating system and application C. Leading to storage upgrades, maintenance, and expansion D. Need a complex data upgrade process Answer: B 8.The firewall has 4 security zones by default. Which of the following is the security domain priority from high to low? A. Trust、Local、DMZ、Untrust B. Local、DMZ、Trust、Untrust C. Local、Trust、DMZ、Untrust D. Trust、Untrust、Local、DMZ Answer: C 9.Which of the following are included FusionManager alarm list? (Multiple Choice)
A. Alarm ID B. Alarm level C. Alarm object D. Processing method Answer: ABC 10.Where does the Eudemon firewall usually enable security policies? A. Inside the security domain B. Between security domains C. Between interfaces D. Anywhere Answer: B