Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A developer creates a MySQL database service on a Linux ECS instance (ECS-A), and wants to access this database service from another instance (ECS-B) in the same VPC using the private IP address bound to the ECS instance, however, the connection can't be established. What could cause this? (Number of correct answers: 2)

A.

The security group for ECS-A does not have the default MySQL service port open.

B.

The built-in firewall on ECS-A has rules that prohibit external access to the MySQL service port.

C.

No Internet IP address is configured for ECS-A.

D.

The bind-address parameter set in the my.ini configuration file of the MySQL service is commented out.

You have an application with the following requirements:

7. There will be a lot of video content that need to be uploaded.

2. Each uploaded video needs to be preprocessed to provide different video resolutions and quality levels to accommodate different devices and network conditions.

3. It should be possible to process video in parallel at scale, to ensure that videos are preprocessed in a reasonable amount of time.

Which of the following Alibaba Cloud applications can be combined to provide a low operation and maintenance burden and relatively low operating costs? (Number of correct answers: 3)

A.

Serverless Workflow

B.

Function Compute

C.

Log Service

D.

Elastic Compute Service (ECS)

E.

Server Load Balancer (SLB)

Which of the following is NOT a valid state for a scaling activity in Alibaba Cloud's Elastic Scaling Service ESS -also known as Auto Scaling) state of the scaling activity in the Alibaba Cloud elastic

scaling group?

A.

Rejected

B.

Executing

C.

Failed

D.

Timeout

A game company is developing a game application for the Apple and Android platforms. Currently, this application stores user data (as flat files) securely on the local storage of a user's device. The game company wants to provide a new feature that allows customers to play the same game on different devices, which requires synchronizing user data between different devices. Which of the following cloud services supports this requirement without creating a new back-end application?

A.

Function Compute

B.

Object Storage Service (OSS)

C.

Table Store

D.

Log service

Which of the following are types of backend services that API Gateway supports? (Number of correct answers: 3)

A.

HTTP(s) service

B.

CloudMonitor Service

C.

Resources In a VPC

D.

Function Compute

E.

Log service

Which of the following descriptions of Alibaba Cloud's SSL certificate service are correct? (Number of correct answers: 2)

A.

Alibaba Cloud SSL Certificate Service supports the purchase of three types of certificates: DV certificates, OV certificates, and EV certificates.

B.

EV certificates are suitable for large enterprises, financial institutions, etc.

C.

OV certificates are suitable for personal websites.

D.

DV level certificates are suitable for government organizations, enterprises, educational institutions, etc.

When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database's resources. Which of the following options are best practices when creating database indexes? (Number of correct answers: 3)

A.

Add an index to a field that is frequently queried but does not frequently perform add, delete, or modify operations.

B.

Applies indices to fields that contain many records.

C.

table should not contain more than 6 indexed fields.

D.

Apply indexing to fields of fixed length (preferably not long fields).

E.

Adhere to the rightmost prefix principle when using composite indexes.

Which of the following operations can be performed through Log Service sAPI? (Number of correct answers: 3)

A.

Collect logs based on Logtail configuration and Logtail machine group information

B.

Create a Logstore, write and read logs to the Logstore

C.

Access control for different users

D.

Deliver logs to OSS for storage and analysis

Which of these are good ways to secure access to your API deployed on Alibaba Cloud API Gateway?

(Number of correct answers: 3)

A.

Enable API Gateway to connect to backend services in an Alibaba Cloud VPC network group. This guarantees the security of API requests.

B.

Configure security keys for API Gateway.

C.

Use HTTPS to encrypt requests.

D.

Use OpenID Connect to authenticate requests.

E.

Allow only internal IP addresses to call the API.

By default, Function Compute creates an instance for each request Function compute allows you to create multiple instances concurrently to reduce costs and improve execution efficiency Which of the following scenarios is NOT suitable for enabling the feature of handling multiple requests on a single instance? (Number of correct answers: 2)

A.

The function has a shared state and cannot be accessed concurrently.

B.

Requests are waiting for responses from the downstream service for an extended period of time.

C.

A request consumes a large amount of CPU and memory resources.

D.

Functions processes independent data objects.