Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Resource Management provides a collection of resource management services that support enterprise IT administration.

A.

True

B.

False

Which of the following web applications are suitable for deployment on Simple Application Server (SAS), as compared with ECS? (Number of correct answers: 3)

A.

Quickly build a personal blog website

B.

Quickly build a small e-commerce website

C.

Quickly build serverless site using Function Compute

D.

Set up a NoSQL database service

E.

Quickly build a personal, learning, or test environment

When using Alibaba Cloud CDN, a visitor's request will first be routed to a CDN edge node, and in the event of a cache miss at this edge node, the node will fetch data from the origin site (back-to-source request). Even with this redirection, it is possible for the origin site to see the visitor's real IP address. Which of the following statements about obtaining the visitor's real IP address are correct? (Number of correct answers: 2)

A visitor's real IP address can only be obtained by modifying the site or web application.

B. visitor's real IP address is stored in the "X-Forwarded-For" HTTP header. It can be directly obtained via Apache or NGINX logs.

C. In Windows, if IIS is used, after installing the "F5XForwardedFor" extension module, the visitor's real IP address can be seen via IIS logs.

D. You can activate the "record visitor's real IP" function in the Alibaba Cloud CDN console, then you can directly view visitor's IP addresses from the Alibaba Cloud CDN access logs.

Which of the following descriptions of the principles of Alibaba Cloud SSL certificate private key protection is correct?

A.

Alibaba Cloud uses the built-in functionality of the SSL certificate service to encrypt and store the private key to ensure the security of your certificate's private key

B.

The plaintext of Alibaba Cloud's private key is usually stored on disk and backed up regularly

C.

Alibaba Cloud Certificate Service uses symmetric encryption to save the certificate private key.

D.

Alibaba Cloud Certificate Service keys are loaded into memory in plaintext format ONLY when needed.

A company is developing a music application based on OSS and ECS, their users can download mp3 files after signing up for the application. Recently, the public network traffic to the OSS has doubled but the increase of registered users is less than 10%. After in-depth analysis, system operators find that many download requests are requested from the external search engine. In this case, which of the following measures is thought to be able to address this issue?

A.

Migrate music files from the OSS to the data disks for ECS instances

B.

Change the website access mode to HTTPS

C.

Enable “Hotlink protection” of OSS and use an HTTP Referer whitelist to prevent unauthorized users from accessing your data

D.

Use SLB for extra protection

In order to deal with sudden spikes in traffic, Company A uses Alibaba Cloud

Auto Scaling to set up an alarm trigger task (growing the Scaling Group when

the average memory utilization on ECS instances exceeds 80%). During the

test, it was found that the alarm task was not executed successfully. Which of

these could be possible causes? (Number of correct answers: 3)

A.

The ECS instances in the Scaling Group have not yet installed the CloudMonitor monitoring agent

B.

Before triggering the alarm task, the number of instances in the group has reached the maximum number of instances allowed (MaxSize)

C.

The instance types chosen in the Scaling Configuration are out-of-stock in the Alibaba Cloud Region where the Scaling Group is located

D.

The number of instances in the current group exceeds the “expected number of instances” for the Scaling Group

A system operator can tag resources for costing and billing purposes.

A.

True

B.

False

PolarDB supports three engines: MySQL, PostgreSQL and Oracle.

A.

True

B.

False