1 / 5

Share Huawei H31-521 Questions and Answers

Share Huawei H31-521 questions and answers in the PDF file.

wirygnrhd
Download Presentation

Share Huawei H31-521 Questions and Answers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Full version: 272 Q&As Full Version of H31-521 Exam Dumps Share Huawei H31-521 Exam Dumps Below. 1. Which of the following statements is correct? A. cp command can be used for packaging B. mv command can be used for file renaming C. file command can be used to modify the file type D. mkdir can be used to create text documents Answer: B 2.Which of the following statements about RAID6 is accurate? (Multiple Choice) A. Advantages: strong redundancy, allowing 2 bad disks B. Disadvantages: Disk utilization is not higher than RAID5

  2. C. RAID6 does not require a check disk D. Disk utilization: (n-2)/n, n represents the number of disks Answer: ABD 3.Which of the following commands can be used to view Redhat Linux as a system version? A. cat/etc/redhat-release B. show version C. find version D. cat version Answer: A 4.Which of the following options is a data security solution? A. Network isolation B. Hypervisor hardening C. Data access control D. Centralized user management and authentication Answer: C

  3. 5.Which of the following about the three-layer switch is incorrect? A. Layer 3 switches can implement VLAN division B. Layer 3 switch can implement Layer 2 switching inside the VLAN. C. Layer 3 switches can implement routing between VLANs D. Layer 3 switches can implement all the functions of the router Answer: D 6.Which of the following security threats does cloud computing bring? (Multiple Choice) A. Tenants lose control of resources B. Virtualization security C. It is more difficult to deal with disasters such as earthquakes D. DDOS attacks are more prominent Answer: ABD

  4. 7.Which of the following descriptions about technical shortcomings of traditional storage virtualization is wrong? A. Use storage resources to reduce application performance B. compatibility issues of Operating system and application C. Leading to storage upgrades, maintenance, and expansion D. Need a complex data upgrade process Answer: B 8.The firewall has 4 security zones by default. Which of the following is the security domain priority from high to low? A. Trust、Local、DMZ、Untrust B. Local、DMZ、Trust、Untrust C. Local、Trust、DMZ、Untrust D. Trust、Untrust、Local、DMZ Answer: C 9.Which of the following are included FusionManager alarm list? (Multiple Choice)

  5. A. Alarm ID B. Alarm level C. Alarm object D. Processing method Answer: ABC 10.Where does the Eudemon firewall usually enable security policies? A. Inside the security domain B. Between security domains C. Between interfaces D. Anywhere Answer: B

More Related