Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A startup video streaming company deploys its service on Alibaba Cloud Elastic Compute Service (ECS) Christmas is coming soon and the CEO knows that they need to prepare more computing resources However, they don't want to purchase a large number of Elastic Compute Service (ECS) instances tor a long period of time. Instead, they want to buy ECS instances for a short period of time and release them after the event is over. Which of the following billing methods of ECS is the most suitable?

A.

Pay-As-You-Go Only

B.

Pay-As-You-Go with Reserved Instances

C.

Subscription with Reserved Instances

D.

Pay-As-You-Go with Savings Plan

Cloud computing adopts a common model in Distributed Systems. It distributes a computing task to a resource pool (comprised of a large number of computers). Elastic utilization of the resource pool allows applications to obtain computing capacity, storage space, and message services according to needs. Which of the following statements are correct about cloud computing? (Choose four.)

A.

Large scale

B.

High availability

C.

Service on demand

D.

Versatility

E.

Container-based

F.

Only supports single tenant

To connect a VPC with your traditional IDC (Internet Data Center), Alibaba Cloud currently supports the following methods: _______________? (Choose two.)

A.

VPN

B.

HTTP agent

C.

Connection through a stepping stone

D.

Leased line connection

If an administrator often needs to manage multiple ECS instances in an Alibaba Cloud VPC through the Internet Which of the following solutions can meet this need at low costs and without affecting system security.

A.

None of these answers are correct.

B.

Choose an ECS instance from VPC and make it as the bastion host And then, apply an EIP and bind it to this ECS instance. After that the administrator can manage other ECS instances through this bastion host.

C.

Modify the VPC Security Group policy, to allow access from the Internet.

D.

Bind an EIP to each of the ECS instances, and Jog on to each of these ECS instances to manage them.

An Alibaba Cloud RDS read-only instance has its data synchronized from the master instance. Which of the following can be performed by the read-only instance from the RDS management console?

A.

Backup policy configuration and manual backup

B.

Database creation or deletion

C.

Editing its own whitelist

D.

Account authorization and account password changing

Alibaba Cloud Content Delivery Network (CDN) performs content acceleration with the support of intelligent DNS resolution The following function_________is NOT included in intelligent DNS resolution.

A.

A user request is directed to the server nearest to the customer based on location information of the pre-configured IP section.

B.

The intelligent DNS resolution can parse the same domain name into different IP addresses based on the IP of different visitors.

C.

The intelligent DNS resolution supports web page content caching. A user will receive data from the origin site at first-time access, and then will be reading data from cache in subsequent requests

D.

If a user activates mirror sites in different IDCs, intelligent DNS resolution can achieve load balancing by guiding customers in different places to different mirror sites.

Which of the following statements is true for RDS?

A.

Multiple databases can be created for one instance

B.

Databases with the same name are allowed in the same instance

C.

Resources are not shared among the databases in the same instance

D.

None of the above is true

When creating an Alibaba Cloud VPC, you must specify Intranet network segments used in the VPC with a CIDR Block. This CIDR Block can later be modified after the VPC is created.

A.

True

B.

False

Before data communication is setup, the security groups match the security group rules one by one to query whether to allow access requests Assume that the user has created two security group rules 1 and 2 The protocol type, port range, authorization type, and authorization object of the two security group rules are the same. The difference is that Rule 1 is a denial policy, rule 2 is an allowed policy, so the following statement is correct_______ (Number of correct answers 2)

A.

If rule 1 and rule 2 have the same priority, the rule of the denial policy takes effect first, and the rule of the allowed policy does not take effect

B.

If rule 1 and rule 2 have the same priority, the rule of the allowed policy takes effect first, and the rule that of the denial policy does not take effect.

C.

If rule 1 and rule 2 have different priorities, the rule with a small priority number takes effect

D.

If rule 1 and rule 2 have different priorities, the rule with a large priority number takes effect.

When the "'Obtain the Visitor's Real IP Address" function is enabled in Alibaba Cloud SLB For layer 7 services, you can obtain the real IP addresses of visitors through the______________field in HTTP header

A.

Connection

B.

Authorization

C.

Etag

D.

X-Forwarded-For