Which of the following are the application scenarios of elastic load balancing? (Multiple choice)
Users can use()Create an encrypted file system.
Which of the following container exceptions can the Container Security Service monitor?
After creating a backup strategy, you can change()The state of the cloud disk is bound to the backup strategy.
VPC cannot connect to the local data center
BS The management console does not support batch upload of files.
Which of the following is not included in the main functions of the Web Application Firewall WAF?
After deleting the elastic scaling group, the elastic cloud server instance automatically created by elastic scaling will also be deleted automatically.
Which of the following are the advantages of load balancing?
Which of the following options is the most reasonable virtual private cloud configuration process?
Cloud hard disk backup is billable, Divided into two types: "yearly and monthly" and "pay-as-you-go".
Which of the following are the functions of relational database services?
What is the full name of ECS?
flexible file service supports standard()protocol.
When configuring bucket logging, Which of the following statements about the storage location of the log file is correct?
IAM refers to unified identity authentication service.
What does the elastic cloud server use to store data?
cloud hard disk is in()The status can be backed up.
VBS Supports simultaneous backup of all cloud hard drives in the server.
After the object storage service creates a bucket successfully, Cannot change area, so, When creating a bucket, choose the region carefully.
pairs of created backups can be input()Share to other projects.
Which of the following options does a VPN consist of?
API Which of the following product advantages does the gateway have?
What are the types of scaling strategies for elastic scaling?
Which of the following methods can prevent the specified instance from being removed from the scaling group?
Description of VPN gateway bandwidth is the following error?
There are two ways to create an encrypted image: Created by encrypted elastic cloud server and created by external image file.
Compared with the self-built database, which of the following is not an advantage of RDS?
Elastic cloud servers between different availability zones in the same area cannot communicate with each other.
Which of the following options is the default port of the MySQL database instance?
Cloud hard disk backup cannot be used to create a new system disk.
API Provider and API The identity of the consumer is not fragmented, It can be converted to each other.
Which of the following components does not belong to the big data platform?
Which of the following functions does RDS provide?
What are the alarm levels
Which of the following functions does the Elastic Cloud Server service provide?
What is wrong about the following statement about the elastic scaling service?
When the capacity of the cloud hard disk is insufficient, which of the following solutions are available?
IP Sec VPN is an encrypted tunnel technology, Establish confidential and secure communication tunnels between different networks by using encrypted security services. Which of the following is not the guaranteed data packet transmission characteristics on the public network?
Which of the following are the main usage scenarios of SFS?
Regarding the description of object storage service billing, which of the following is correct?
Which of the following types of attacks can be prevented by the Anti-DDos traffic cleaning service?
The access control strategy is one of the security protection components provided by the API gateway.
Which SDK language does the API gateway support?
The main function of database security service does not include which of the following?
After the cloud dedicated line order expires, Enter the frozen state directly, If you don’t unfreeze the resource, it will be deleted
When modifying the VPN connection, which of the following parameters can be modified?
Which of the following parameters need to be configured for Cloud Monitoring to create an alarm rule?
The relational database service RDS does not have database backup and recovery functions.
Which of the following cloud services can be used with elastic load balancing to ensure protection from external attacks and improve security and reliability?
Which of the following is not a security detection source for situational awareness services?
Which of the following are the main functions of the Enterprise Host Security HSS?
Which of the following scenarios is suitable for object storage?
In which of the following scenarios can a elastic scaling group modify the availability zone and subnet of the scaling group?
What applications and services does Huawei Cloud Application Supermarket provide?
relational database binding()Later, it can be accessed through the external network
Description of peer-to-peer connection, Which of the following is wrong?
Which of the following conditions must be met before API is released?
What are the key features of LAM unified identity authentication?
The elastic scaling service must be used with elastic load balancing.()
Which of the following is wrong about the description of the elastic public network IP?
The threshold of alarm consists of three parts: aggregation method, single selection condition, and critical value,Used to configure alarm conditions
Which of the following factors need to be considered in the early stage of cloud dedicated line access?
The default backup strategy of cloud hard drives cannot be deleted.
What are the key features of RDS?
Which of the following is reserved for users when deleting a relational database instance?
When registering a private image with the image file, the capacity of the system disk filled in is less than the capacity of the system disk inside the image file, which will cause the image creation to fail.
host monitoring supports monitoring of elastic cloud servers and bare metal servers.