A startup video streaming company deploys its service on Alibaba Cloud Elastic Compute Service (ECS) Christmas is coming soon and the CEO knows that they need to prepare more computing resources However, they don't want to purchase a large number of Elastic Compute Service (ECS) instances tor a long period of time. Instead, they want to buy ECS instances for a short period of time and release them after the event is over. Which of the following billing methods of ECS is the most suitable?
Cloud computing adopts a common model in Distributed Systems. It distributes a computing task to a resource pool (comprised of a large number of computers). Elastic utilization of the resource pool allows applications to obtain computing capacity, storage space, and message services according to needs. Which of the following statements are correct about cloud computing? (Choose four.)
To connect a VPC with your traditional IDC (Internet Data Center), Alibaba Cloud currently supports the following methods: _______________? (Choose two.)
If an administrator often needs to manage multiple ECS instances in an Alibaba Cloud VPC through the Internet Which of the following solutions can meet this need at low costs and without affecting system security.
An Alibaba Cloud RDS read-only instance has its data synchronized from the master instance. Which of the following can be performed by the read-only instance from the RDS management console?
Alibaba Cloud Content Delivery Network (CDN) performs content acceleration with the support of intelligent DNS resolution The following function_________is NOT included in intelligent DNS resolution.
Which of the following statements is true for RDS?
When creating an Alibaba Cloud VPC, you must specify Intranet network segments used in the VPC with a CIDR Block. This CIDR Block can later be modified after the VPC is created.
Before data communication is setup, the security groups match the security group rules one by one to query whether to allow access requests Assume that the user has created two security group rules 1 and 2 The protocol type, port range, authorization type, and authorization object of the two security group rules are the same. The difference is that Rule 1 is a denial policy, rule 2 is an allowed policy, so the following statement is correct_______ (Number of correct answers 2)
When the "'Obtain the Visitor's Real IP Address" function is enabled in Alibaba Cloud SLB For layer 7 services, you can obtain the real IP addresses of visitors through the______________field in HTTP header