Q - 121 What are the basic functions of HSS?

  1. Asset management
  2. Vulnerability management
  3. Baseline inspection
  4. Intrusion detection

Answer: ALL

Q - 122 Which of the following statements about HTTPS site protection is not true

  1. When an HTTPS service is released to users, the HTTPS certificate needs to be uploaded for using WAF.
  2. No matter whether the original website server provides HTTPS or HTTP services, users can have HTTPS services when using WAF.
  3. The basic edition does not support HTTPS protection.
  4. A domain name can choose to use either HTTP or HTTPS protocols only.

Answer: D

Q - 123 Which of the following problems can WAF solve?

  1. The service server of an e-commerce website cannot respond to normal requests because its order interface is overly invoked.
  2. Numerous exclusive and beautiful pictures on a website are crawled by competitors in batches.
  3. A website faces threats such as SQL and command code injection.
  4. The website server is infected with viruses and CPU usage remains high.

Answer: A & B & C

Q - 124 Which of the following scenarios can WAF apply to?

  1. The official website of a university deployed on the education portal
  2. An enterprise portal in a self-deployed data center
  3. A testing website deployed in a LAN
  4. An open website deployed on the platforms of other cloud vendors

Answer: A & B D

Q - 125 Which of the following is NOT a capability of Web Application Firewall (WAF)?

  1. Anti-SQL injection
  2. Anti-Webshell uploading
  3. Anti-leeching
  4. Anti-traffic attack

Answer: D

Q - 126 Which of the following problems can VSS solve?

  1. Help tenants detect web vulnerabilities.
  2. Help users detect weak passwords of the host.
  3. Guide tenants in fixing the root cause of security vulnerabilities.
  4. Help tenants repair or intercept vulnerabilities.

Answer: A & B & C

Q -127 Which of the following statements about VSS is not true?

    A. VSS is installation and maintenance free, requiring no extra labor cost. The service is offered in the basic (free of charge) and
  1. fessional (additional fees) editions to meet the requirements of users.
  2. VSS is easy to use and can be enabled with one click.
  3. VSS is able to dynamically adjust the scanning frequency to ensure service availability.
  4. Users need to manually upgrade the vulnerability library before scanning to improve scanning accuracy.

Answer: D

Q - 128 Which of the following statements about VSS is incorrect?

  1. VSS has no industry restrictions and can be widely applied in industries such as finance, government, and transportation.
  2. Users should have obtained a HUAWEI CLOUD account before using VSS.
  3. If a tenant's web site or applications can be accessed through the public network, VSS is available.
  4. The tenant needs to deploy services on VMs of HUAWEI CLOUD.

Answer: D

Q - 129 Which of the following domain name types is *.huaweicloud.com?

  1. Single domain name
  2. Wildcard domain name
  3. Multiple domain names
  4. Double domain names

Answer: B

Q - 130 What are the challenges of defending against DDoS attacks?

  1. Limited performance of the protection device
  2. Insufficient service capabilities
  3. Low Internet bandwidth
  4. Sufficient port services

Answer: A & B & C

Q - 131 Which of the following protocols does AAD support?

  1. TCP
  2. UDP
  3. HTTPS
  4. HTTP

Answer: ALL

Q - 132 Which of the following service is a data security service?

  1. Host Intrusion Detection
  2. Host Vulnerability Detection
  3. Key Management Service
  4. SSL/TLS Certificate Service

Answer: C

Q - 133 Anti DDOS can mitigate which kind of attack:

  1. Volume attack
  2. Brute force
  3. Disk attack
  4. Man in Middle attack

Answer: A

Q - 134 Which of the following statements about KMS are correct?

  1. The key and random numbers are generated by the certified third-party hardware security module.
  2. The master key of a user is stored redundantly online.
  3. C. KMS is deeply integrated with computing and storage services such as ECS, EVS, IMS, OBS, EVS, and VBS. KMS is used to manage the
  4. s of these services.
  5. The number of keys can be dynamically adjusted based on service development.

Answer: ALL

Q - 135 Which of the following problems does a website tenant not need to consider when selecting a package or edition?

  1. Threat types concerning the service website
  2. Web service framework and the system version of the server
  3. Number of domain names and subdomain names that need protection
  4. Service traffic volume

Answer: B

Q - 136 Which of the following are the advantages of SCM?

  1. Improved website security
  2. Optimized website image
  3. Higher search engine rankings

Answer: ALL

Q - 137 Which of the following domain name types does SCM support?

  1. Single domain name
  2. Wildcard domain name
  3. Multiple domain names

Answer: ALL

Q - 138 Which of the following technologies does SA use?

  1. Big Data
  2. Web Crawlers
  3. Encryption
  4. ID Authentication

Answer: A & B

Q - 139 Server Monitoring includes:

  1. Network Monitoring
  2. OS Monitoring
  3. CPU Monitoring
  4. Disk Monitoring

Answer: B

Q - 140 Which rollup methods does Cloud Eye support?

  1. Max.
  2. Min.
  3. Avg.
  4. Sum

Answer: ALL

Q - 141 Cloud Eye can be used to:

  1. monitor the utilization of service resources
  2. track the running status of cloud services
  3. configure alarm rules and notifications
  4. respond to resource changes

Answer: ALL

Q - 142 Which tool monitors RDS DB.

  1. ECS
  2. VPC
  3. OBS
  4. loud Eye

Answer: D

Q - 143 Which of the following DB instances can RDS create?

  1. MySQL
  2. SQL Server
  3. MongoDB
  4. PostgreSQL

Answer: A & B & D

Q - 144 The Key Features of RDS include:

  1. Information Availability
  2. Backup and Restoration
  3. DB Instance Monitoring
  4. High security

Answer: B & C

Q - 145 To retrieve Alarm History for 7 days. What Service you will use?

  1. SMN
  2. CTS
  3. ECS
  4. RDS

Answer: B

Q - 146 Where to restore RDS instance from?

  1. Xxx
  2. ECS
  3. VPC
  4. OBS

Answer: D

Q - 147 What are the advantages of HUAWEI CLOUD EI service ModelArts?

  1. Readily acquired
  2. Fast training
  3. Fast launch
  4. One-stop

Answer: ALL

Q - 148 Which of the following Huawei Cloud EI APIs are vision related?

  1. Face Recognition
  2. Data Recognition
  3. Text Moderation
  4. Search

Answer: A

Q - 149 Which EI service can implement large scale data analysis and query?

  1. DLF
  2. DWS
  3. DIS
  4. GES

Answer: D

Q - 150 Which of the following is NOT a security feature on API Gateway?

  1. App authentication
  2. Request throttling
  3. IP address blacklist
  4. Security sandbox

Answer: A