Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Description of planning routing strategy, Which of the following is wrong?

A.

The routing table consists of a series of routing rules, Used to control the flow of outgoing traffic from subnets in the VPC

B.

If you do not need to control the flow of the subnet, In the case of the default VPC intranet interworking, Then use the default routing table, No need to configure custom routing strategies

C.

When the user creates a VPC, The system will automatically generate a default routing table for it, The meaning of the default routing table is VPC intranet intercommunication

D.

The routing table does not allow users to add custom routes

In the Huawei Cloud E1 service, which scenario can the OCR service solve?

A.

Image Processing

B.

Text recognition

C.

Speech Recognition

D.

Image Identification

Which of the following services can enable each instance in the scaling group to be allocated application traffic?

A.

Elastic File Service SFS

B.

Cloud Monitoring Service Cloud Eye

C.

Elastic load average street ELB

D.

Elastic public network IP

In the process of VPC creation, which parameter realizes the function of automatically obtaining IP?

A.

DHCP

B.

Gateway

C.

Partition

D.

network segment

Description of Security Group, Which of the following is wrong? (Single choice)

A.

The system will create a security group for each user by default, The rule of the default security group is to pass all data packets on the outgoing room, Restricted access in the inbound direction, The elastic cloud servers in the security group can access each other without adding rules.

B.

Security group is a logical grouping, Provide access policies for mutually trusted elastic cloud servers in the same VPC that have the same family protection requirements.

C.

After the security group is created, Users can define various access rules in the security group, When the elastic goes to the server to join the group or the whole group, It is protected by these access rules.

D.

When configuring security group rules, The source and destination addresses can only be set as IP addresses, It cannot be a security group.

The alarm threshold is composed of three parts: aggregation method, single selection condition, and critical value, Used to configure alarm conditions.

A.

True

B.

False

Which of the following cloud services can be used with elastic load balancing to ensure protection from external attacks and improve security and reliability?

A.

Cloud monitoring

B.

DDos prevention

C.

Cloud audit

D.

Elastic scaling

Anti-DDos does not support traffic cleaning for which service?

A Bare Metal Server BMS

B. Elastic load balancing ELB

C. Elastic Cloud Server ECS

D. ApsaraDB for RDS

The applications running in the elastically scalable cloud server can be stateful.

A.

True

B.

False

How many virtual gateways can a VPC create at most?

А. 3

B. 2 pcs

C. 1 piece

D. 4