Resource Management provides a collection of resource management services that support enterprise IT administration.
Which of the following web applications are suitable for deployment on Simple Application Server (SAS), as compared with ECS? (Number of correct answers: 3)
When using Alibaba Cloud CDN, a visitor's request will first be routed to a CDN edge node, and in the event of a cache miss at this edge node, the node will fetch data from the origin site (back-to-source request). Even with this redirection, it is possible for the origin site to see the visitor's real IP address. Which of the following statements about obtaining the visitor's real IP address are correct? (Number of correct answers: 2)
A visitor's real IP address can only be obtained by modifying the site or web application.
B. visitor's real IP address is stored in the "X-Forwarded-For" HTTP header. It can be directly obtained via Apache or NGINX logs.
C. In Windows, if IIS is used, after installing the "F5XForwardedFor" extension module, the visitor's real IP address can be seen via IIS logs.
D. You can activate the "record visitor's real IP" function in the Alibaba Cloud CDN console, then you can directly view visitor's IP addresses from the Alibaba Cloud CDN access logs.
Which of the following descriptions of the principles of Alibaba Cloud SSL certificate private key protection is correct?
A company is developing a music application based on OSS and ECS, their users can download mp3 files after signing up for the application. Recently, the public network traffic to the OSS has doubled but the increase of registered users is less than 10%. After in-depth analysis, system operators find that many download requests are requested from the external search engine. In this case, which of the following measures is thought to be able to address this issue?
In order to deal with sudden spikes in traffic, Company A uses Alibaba Cloud
Auto Scaling to set up an alarm trigger task (growing the Scaling Group when
the average memory utilization on ECS instances exceeds 80%). During the
test, it was found that the alarm task was not executed successfully. Which of
these could be possible causes? (Number of correct answers: 3)
A system operator can tag resources for costing and billing purposes.
PolarDB supports three engines: MySQL, PostgreSQL and Oracle.