Company A constructed a sales management platform using three Elastic Compute Service (ECS) instances. One of the instances runs MySQL, and is used as the database server. The other two instances are used as Web servers After some time, the number of employees in Company A dramatically increases, leading to higher sales volumes At the same time, the platform response speed is gradually decreasing too.
According to the report from CloudMonitor, the average CPU utilization rate of the two Web servers exceeds 70%, and database load reaches 75% Company A can select Alibaba Cloud_________ services.to cope with the issue and optimize the performance. (Number of correct answers: 2)
A. Import database data into Object Storage Service (OSS) to share the storage pressure on the platform
B. Incorporate Server Load Balancer (SLB) and add additional ECS instances to relieve the load on existing ECS instances
C. Use Content Delivery Network (CDN) to enhance content loading speed
D. Replace the self-built MySQL database with ApsaraDB for RDS to obtain better database performance, and utilize RDS read-only instances to handle read-only requests
After creating an RDS for MySQL read-only instance, which of the following CAN NOT be performed by the read-only instance in RDS management console?
A. Parameter configuration
B. Specification change
C. SQL log auditing
D. Intranet/Internet switchover
Before data communication is setup, the security groups match the security group rules one by one to query whether to allow access requests Assume that the user has created two security group rules 1 and 2 The protocol type, port range, authorization type, and authorization object of the two security group rules are the same. The difference is that Rule 1 is a denial policy, rule 2 is an allowed policy, so the following statement is correct_______ (Number of correct answers 2)
A. If rule 1 and rule 2 have the same priority, the rule of the denial policy takes effect first, and the rule of the allowed policy does not take effect
B. If rule 1 and rule 2 have the same priority, the rule of the allowed policy takes effect first, and the rule that of the denial policy does not take effect.
C. If rule 1 and rule 2 have different priorities, the rule with a small priority number takes effect
D. If rule 1 and rule 2 have different priorities, the rule with a large priority number takes effect.
Once ECS is created, you can't change its private IP address anymore.
A. True
B. False
Which of the following scenarios can be done using Alibaba Cloud Express Connection? (Number of correct answers: 2)
A. Intranet communication between VPCs and Smart Access Gateway in customers different branch offices
B. Intranet communication between a VPC and servers in an external IDC
C. Intranet communication between two VPCs in different accounts and different CIDR Blocks
D. Intranet communication between two VPCs under the same account in the same region
The daily PV volume of a community website is as high as 20 million. The applications of the website are deployed on ECS instances while logs are stored on the data disks of a single ECS instance.
Now, the website wants to extend the log retention period to 24 months and ensure that logs can be quickly downloaded when needed. The current data disks they have can only help retain three months of logs In this case, ________ is the ideal solution for solving the log retention issue.
A. CDN
B. Container Service
C. OSS
D. ApsaraDB for RDS
Object Storage Service (OSS) supports sub accounts, and you can allocate access permissions to different buckets for each sub account.
A. True
B. False
When using Alibaba Cloud SLB, users can enable the health check function If a backend ECS instance A is running abnormally, SLB will isolate it and forward the requests to other ECS instances, and when the backend ECS instance A is back to normal, SLB will again forward requests to it.
A. True
B. False
RDS accounts can be used to connect with the databases created on a given RDS instance. Each account can be bound with multiple databases. Yet, the read/write permissions of each database can only be assigned to one RDS account
A. True
B. False
Which of the following ports does RDS for MySQL listen on by default?
A. Port 8080
B. Port 3306
C. Port 3060
D. Port 3600
OSS supports multi-part uploading for large files, namely dividing a large file into multiple parts and uploading them in order. This function is suitable for scenarios such as uploading large files or uploading files with poor connectivity.
After completing all the multi-part uploading tasks, if you forget to invoke the "Complete Multipart Upload" interface, there will be fragment files left in OSS, occupying bucket storage space-To facilitate deleting those files, OSS provides the________function.
A. OpenAPI batch deletion
B. Online batch deletion
C. Bucket clearing
D. Fragment management
The difference between public and private Server Load Balancers (SLBs) is that private SLBs connect to their backend ECS instances using the private network (Intranet) while public SLBs connect to their backend ECS instances using the public network (Internet).
A. True
B. False
Recently, response speed of a certain Alibaba Cloud Elastic Compute Service (ECS) instance is unacceptably slow. By using CloudMonitor we discovered that the ECS instance utilizes more than 80% of the assigned bandwidth. Which of the following approach can address this issue and without the need to reboot the ECS instance?
A. Upgrade the bandwidth of the ECS instance
B. None of the above
C. Upgrade the CPU and memory of the ECS ins
D. Add a disk to the ECS instance
An enterprise hosts their servers (include both Linux and Windows servers) in a traditional IDC Every night hackers with IP addresses from many countries try to crack the password of their servers, making the administrator terribly worried about this However because of work requirements the remote management port of these servers must be opened to public network.
The administrator heard that Alibaba Cloud has solutions that can help customers improve the security of their systems Therefore, he/she wants to migrate the system to Alibaba Cloud. Which of the following functions should the administrator activate in Alibaba Cloud to reduce the possibility of brute force password cracking?
A. Cloud Firewall
B. Anti-DDoS Origin Basic Edition
C. CloudMonitor
D. Security Center