- VPC can be used in combination with (B) products to form an on-demand customized network environment with traditional data centers to achieve smooth migration of applications to the cloud?
A.SLB
B.VPN
C.ECS
D.OCS
- Network ACL is a network access control function in VPC. Users can customize and set the network ACL rules, and bind the network ACL with the switch to achieve access control of the ECS traffic in the switch. The following statement about the network ACL feature is wrong (D).
A. Only filter the ECS traffic in the bound switch
B. Rules are stateless
C. Do not filter the traffic between ECSs in the same switch
D. When there are no rules, all access directions will be allowed
- You have successfully purchased Alibaba Cloud's EIP. You need to bind the EIP through the management console, but the interface prompts that the corresponding ECS instance is not found, which may be caused by (C).
A. There is no ECS instance of classic network in an available zone in the region where the EIP you applied for is located
B. There is no ECS instance in an available zone in the VPC of the EIP region you apply for
C. There is no ECS instance in the VPC in the region where the EIP you applied for is located
D. There is no ECS instance of classic network in the region where the EIP you apply for is located
- The personal blog of an industry bull has only some static pages. He wants to deploy the website on Alibaba Cloud in the most economical and convenient way. In addition, because many browsers have marked all websites that do not use HTTPS protocol as unsafe, he wants to enable HTTPS protocol support for the website. According to the user's situation, the most recommended Alibaba Cloud solution is (D).
A. Use the proposed host to deploy the blog website and deploy the SSL certificate in the virtual host
B. Deploy blog sites using ECS and deploy SSL certificates in ECS
C. Use ECS and SLB to deploy websites and host SSL certificates on SLB
D. Use object storage OSS to store website static pages, bind custom domain names, and enable certificate hosting
- What is the correct description of OSS domain name binding?
A. At present, the OSS domain name binding (CNAME) function only supports OSS binding in the secondary domain name access mode.
B. The access method for OSS domain name binding is (bucket name)$ {zone}.aliyuncs.com
C. The domain name bound by OSS cname must be filed by Alibaba Cloud
D. None of the above is true
- The CDN system of Alibaba Cloud's content distribution network can realize the function of content acceleration and needs the support of intelligent DNS resolution. The following (B) functions are not provided by the intelligent DNS resolution system.
A. The same domain name can be resolved into different IP addresses according to different visitor IPs
B. The intelligent DNS resolution system has the function of web page content cache. The user fetches data from the source site at the first visit, and the subsequent requests are read from the cache first
C. The user request can be directed to the server nearest to the customer according to the preconfigured IP segment location information
D. If users place the same mirror site in multiple computer rooms, customers in different places can visit different sites to achieve load balancing
- When opening an AliCloud content distribution network CDN, you should first "add and manage CDN acceleration domain names". The statement about managing acceleration domain names in the AliCloud management console is wrong (D).
A. The accelerated domain name must be registered through ICP first, otherwise it is not allowed to add
B. The origin of the accelerated domain name can be placed on Alibaba Cloud OSS
C. Before deleting an accelerated domain name, you must first stop the accelerated service for that domain name
D. When the origin type is domain name, the origin domain name is allowed to be the same as the acceleration domain name
- Object storage service OSS is a massive, secure, low-cost, highly reliable cloud storage service. OSS provides multiple permission control methods for accessing objects stored in buckets. Among them, (A) is not the permission control method supported by OSS. (New)
A.Security Group
B.ACL
C.Bucket Policy
D.RAM Pliey
- In accordance with the provisions of the Network Security Law of the People's Republic of China, an enterprise needs to obtain the three-level certification of equal security and compliance. It is recommended that it use Alibaba Cloud (C) services to improve the operation and maintenance security.
A. Web application firewall
B. SSL certificate
C. Safety public test
D. VPN gateway
- A user needs to trigger the elastic scaling activity according to the target value of the cloud monitoring indicator (average CPU utilization of ECS instances). The elastic scaling automatically calculates the number of instances required and scales to maintain the cloud monitoring indicator near the target value. The user needs to create (B).
A. Simple rules
B. Target tracking rules
C. Prediction rules
D. Step rules
- Alibaba Cloud's resources are deployed in multiple regions and zones. Generally speaking, the distance between different zones in the same region is about (C).
A. Hundreds of meters
B. kilometers
C. Dozens of kilometers
D. Hundreds of kilometers
- During the process of using Alibaba Cloud's ECS instance, if you perform (A) operation, it will not cause the ECS instance to be abnormal.
A. Modify the network protocol of the upper application
B. Self-compiled system kernel
C. Deploy virtualization programs on ECS instances
D. Change the permissions of the directory under the system partition at will
- An e-commerce website was attacked by a competitor, and the website suffered a large number of malicious CC attacks, which consumed the core resources of the server for a long time, resulting in server performance bottlenecks, such as CPU, memory, bandwidth, resulting in slow business response or inability to provide services normally. If you are an Alibaba Cloud security engineer, you will recommend users to activate (A).
A. WAF firewall
B. Cloud Security Center
C. Content security
D. Safety public test
- A company has two businesses. To purchase Alibaba Cloud ECS servers, the network delay between the two businesses is required to be low. You can create two business instances in (C)
A. Different regions
B. Within different availability zones in the same region
C. Within the same availability zone
D. The same security group
- Alibaba Cloud's Yundun DDoS Advanced Anti-DDoS IP is an advanced protection product provided by Alibaba Cloud on the basis of "basic DDoS protection". It supports four and seven layers of anti-attack capability. The following description of Yundun DDoS Advanced Anti-DDoS IP is wrong (B)
A. Support flexible billing by day
B. DDoS protection threshold elastic adjustment, you can upgrade higher level of protection at any time, and the service interruption time in the adjustment process should not exceed 5 minutes
C. Provide real-time and accurate traffic reports and attack details, so that you can get the current service details in a timely and accurate manner
D. Protect against multiple DDoS attacks, including but not limited to the following types of attacks: ICMP Flood, UDP Flood, TCP Flood, SYN Flood, ACK Flood, etc
- If an ECS instance has an automatic instance recovery event, such as unexpected physical machine downtime or active operation and maintenance, Alibaba Cloud automatically restarts the recovery instance by default. Users can customize the automatic instance recovery method by modifying the instance maintenance properties. If the instance is attached to a local disk, the recovery methods that users can choose do not include (D)
A. Automatic restart recovery
B. Restart recovery prohibited
C. Automatic redeployment
D. Partial restart recovery
- As an architect, you are designing an architecture scheme for a company. First, the request from the mobile APP client will be processed by the ECS instance, and then the SLB instance will be used for traffic distribution, so that the load of each ECS instance in the background will be roughly uniform. In order to cope with the sharp fluctuations in business volume (the number of visits on weekends is relatively large), You also suggest that they use Auto Scaling to dynamically increase or decrease computing resources. They are quite satisfied with your solution. As an entrepreneurial company that pays special attention to user experience, they have a problem of concern: when the backend ECS instance is relatively idle, it may trigger scaling activities to reduce ECS instances. At this time, applications running on ECS instances that are about to move out of the scaling group will be terminated, and the experience of users who launch these applications will become worse. Which of the following solutions should you recommend to customers to eliminate their worries? (A)
A. In elastic scaling, the custom image used by the scaling configuration corresponding to the scaling group stores the execution script, and sets the command to automatically execute the script when the operating system shuts down, where the script stores the processing logic under this condition
B. In the backend server pool of the load balancing SLB instance, find the ECS instance to be moved out, and automatically set the weight of the ECS instance to 0, then the instance will not be assigned to new requests, and will be automatically moved out of the backend server pool after processing the existing requirements
C. In the backend server pool of the load balancing SLB instance, find the ECS instance to be removed, and manually remove the instance from the backend server pool, then the application running on this ECS instance will return results normally, but will not be assigned to new requests
D. In the SLB instance of load balancing, turn on the data synchronization option of the backend server and the application drift option of the backend server. When the scaling activity moves an ECS instance from the scaling group, the data on it and the running application will be taken over by another ECS instance in the same scaling group
- ECS is a simple and efficient computing service with flexible processing capacity. In the process of using ECS, it is sometimes inevitable that data will be deleted by mistake. There are many ways to recover data deleted by mistake on Alibaba Cloud, which do not include:? (B)
A Roll back the created snapshot through the ECS management console
B Restore the corresponding block copy of the disk through the ECS management console
C Use the open source tool ext3grep to recover the deleted data
D Use the open source tool Extradelete to recover the deleted data
- User can configure_____ Pay attention to ECS instance usage in real time, when_____ When the vCPU usage of ECS instances in the scaling group exceeds 80%____ Resiliently expand ECS resources according to the scaling rules configured by users, and automatically create an appropriate number of ECS instances. (C)
A. Instance health, instance health elastic scaling
B. Elastic expansion. Elastic expansion. Instance health
C. Cloud monitoring. Cloud monitoring, elastic scaling
D. Security group, cloud monitoring, elastic scaling
- Load balancing provides performance-sharing instances and performance-supported instances, and performance-supported instances provide reliable performance indicators. Which of the following options (A) is not a key indicator of a performance assurance instance? (C)
A. Maximum number of connections
B. Number of new connections per second
C. Number of new queries per second
D. Number of queries per second
- A user uses load balancing SLB and ECS to build a website. For security reasons, the website has deployed SSL certificates, and uses HTTPS protocol to access it to redirect the user's HTTP access to HTTPS. The simplest way to achieve this is:? (B)
A. Enable SLB's certificate hosting function
B. Add a new monitor and enable the monitor forwarding function
C. Add a domain name forwarding strategy for the existing seven-layer listening
D. Add a path forwarding strategy for the existing seven-layer listening
- SLB is a load balancing service that distributes traffic to multiple cloud servers, providing rich functions to meet the needs of various business scenarios. A user uses SLB and multiple back-end cloud services to deploy a highly concurrent website. In the process of using it, he found that there was a delay in client access for a period of time, and wanted to quickly locate abnormal back-end servers. What is the recommended method? (C)
A. Locate ECS with abnormal health check through SLB health check function
B. Through elastic scaling service and cloud monitoring, rapidly increase cloud server instances when client access is delayed
C. Analyze the response time of load balancing through dashboard patrol in combination with Alibaba Cloud log service
D. View the cloud monitoring data of load balancing in combination with Alibaba Cloud cloud monitoring service
- Before starting elastic scaling, you need to set the (C) condition to automatically increase ECS instances when business demand increases to ensure computing capacity, and automatically reduce ECS instances when business demand decreases to save costs.
A. Telescopic configuration
B. Trigger conditions
C. Expansion rules
D. Scaling strategy
- The availability zone of cloud products refers to a set of independent infrastructure. The infrastructure (network, power, air conditioning, etc.) between different availability zones are independent from each other, that is, the failure of infrastructure in one availability zone does not affect the other. What is the correct statement about the availability zone of Alibaba Cloud ECS? (A)
The A zone is specified when the user purchases, and does not support changes after purchase
Intranet interworking between zones B
C The maximum network delay in the availability zone shall not exceed 1s
D If you want to improve the disaster tolerance capability of the application, you can create the instance in the same zone
- A user uses load balancing SLB and ECS to set up an FTP service (listening to port 99). After setting up, he accesses port 99 of SLB public IP through the filezilla client. He can log in to FTP, but reading the directory fails. What is the key reason for this error? (B)
A. Back-end server load is too high
B. ECS security group rule entry direction configuration error
C. After creating a load balancing instance, no listening is added
D. SLB does not support building FTP services
- The application deployed on the ECS instance of a cloud user A accesses the RDS API of its business database through the AccessKey of the cloud account in the cloud product communication. In order to call it conveniently and quickly, a cloud user A directly writes the AccessKey in the configuration file. However, this method has problems such as excessive permissions, information disclosure and difficult maintenance. If you are an Alibaba Cloud product manager, would you recommend that the user open a service to solve this problem? (A)
A. RAM service
B. Cloud firewall service
C. VPC services
D. SLB service
- In the object storage service OSS, users can upload any type of file (object) to the storage space after creating a storage space (bucket). The OSS service supports multiple file upload methods. If the file size to be uploaded is 10MB, users are recommended to use (A) upload method.
A. Console upload
B. Form Upload
C. Slice upload
D. Add upload
- SLB is a load balancing service that distributes traffic to multiple cloud servers. It provides two types of load balancing instances, public and private. For the IP address of the public network type load balancing instance, is the following statement correct? (A)
A system will assign a public network service address to it
B system will assign an elastic public IP address to it
C system will assign a public network service address and a private network service address
D The system will assign an elastic public IP and a private network service address to it
- You want to modify the private IP address of the ECS instance in Alibaba Cloud's VPC through the management console, but find that the operation menu is unavailable, which is caused by (D).
A. The ECS instance is not bound to EIP
B. The VPC type of the ECS instance is the default VPC
C. The ECS instance is not running
D. The ECS instance is not stopped and the ECS instance is not stopped.
网友评论