users cannot deploy business applications on elastic cloud servers arbitrarily like using traditional servers.
by default, The elastic cloud servers in all subnets of the same virtual private cloud can communicate, but the elastic cloud servers of different virtual private clouds cannot communicate.
HUAWEI CLOUD EIserving ,Model Arts, machine learning, and graph engines are AI platform services.
When mounting a file system in a Linux system, In which file do I need to configure DNS?
oneAZ(Availability Zone) is a collection of one or more physical data centers, Independent wind, fire, water and electricity, Az logically divides the cost sources such as computing, network, and storage into multiple clusters.
If you need to dynamically expand resources, When creating a scaling strategy, which strategy should you choose?
The cloud hard drive backup service can create backups for cloud hard drives, and use the backup data to roll back the cloud hard drives to maximize the accuracy and safety of user data and ensure your data security.
Which of the following may be the reasons why you cannot log in to the windows virtual machine through mstsc?
In which of the following scenarios can a elastic scaling group modify the availability zone and subnet of the scaling group?
Which of the following is wrong about the description of purchasing a physical leased line?
Cloud hard disks can be mounted to cloud servers in different availability zones.
Which of the following parameters must be set when creating an API gateway flow control strategy?
API Provider and API The identity of the consumer is not fragmented, It can be converted to each other.
The main function of database security service does not include which of the following?
Which of the following types of attacks can be prevented by the Anti-DDos traffic cleaning service?
security expert services can provide one-stop security professional services including website security physical examination, host security physical examination, security reinforcement, security monitoring, emergency response and security product hosting.
Which of the following addresses cannot be added to the authorized address of the VPC?
Cloud Monitoring is an open resource monitoring platform, It can provide resource monitoring, alarm, notification and other services.
When creating a listener, Under which protocol is the server certificate configurable?
After the elastic cloud server is successfully created, If the size does not meet the demand, The specifications of the cloud server can be changed.
After creating a backup strategy, you can change()The state of the cloud disk is bound to the backup strategy.
users can realize the conversion between encrypted mirroring and non-encrypted mirroring through the mirroring function in the region.
Elastic Cloud Server is bound()Rear. Can be through the fixed public network IP The address provides external access.
Which of the following courses in the Cloud Academy can be used for online learning to obtain scenario-based skills improvement?, And get a certification certificate through the online exam?
Which of the following cloud services can be used with elastic load balancing to ensure protection from external attacks and improve security and reliability?
Which of the following cloud server specifications is suitable for graphics hosting scenarios?
Cloud hard disk backup has nothing to do with which of the following services?()
Which of the following is reserved for users when deleting a relational database instance?
Anti-DDos does not support traffic cleaning for which service?
A Bare Metal Server BMS
B. Elastic load balancing ELB
C. Elastic Cloud Server ECS
D. ApsaraDB for RDS
Anti-DD Which of the following options are included in the main protection types of os?
Which of the following factors need to be considered in the early stage of cloud dedicated line access?
Enterprise Host Security provides functions such as account cracking protection, malicious program detection, critical file change detection, Web directory management, container escape detection, and software vulnerability detection.
relational database services can meet the changing needs of the game industry, effectively shorten the research and development cycle, and reduce research and development costs.
VBD type cloud hard drives support SCSI command transparent transmission, Allow the cloud server operating system to directly access the underlying storage media.
Generally, the cost of value-added services generated by cloud monitoring is very low, which can be used with value-added services such as dumping of monitoring data files and sending alarm notifications as needed.
According to the classification of Huawei cloud services, which cloud service is not a computing cloud service?
Which of the following methods can delete a cloud server created by elastic scaling?
Which of the following cloud server resources can be automatically raised and lowered through elastic scaling?
What are the following restrictions on cloud server instances manually moved into a scaling group? (Multiple choice)
Through private images in area B, elastic cloud servers can be deployed in area A.
Which of the following cloud disks can be created directly through the cloud disk console?
The virtual private cloud supports the interconnection and intercommunication of VPCs and traditional data centers through dedicated lines/VPNs and other connection methods, which flexibly integrate resources.
Regarding the constraints of the whole machine mirroring, which of the following are correct?
Inter-Internet communication between two sites,IPSecVPN can be deployed on the firewalls at both ends to protect the mutual access traffic between the two intranets.
Passing(), can record operation events related to relational database instances, Facilitate future inquiries, audits and backtracking?
Elastic Cloud Server is bound( ), you can provide access to the outside through a fixed public network I address.
When adding a VPC to the file system, the default IP address is automatically added0.0.0.0/0,The default read and write permissions are " read only " .
You can install the operating system on the elastic cloud server by yourself, Upgrade CemtOS7.2 to CentOS77.30
The number of snapshots of the cloud disk will affect the performance of the cloud disk.
Install Cloudbase before creating a private image-init. The purpose of this tool is to ensure that new cloud servers created with private images can be customized.
Which of the following options is not the difference between cloud disk backup and snapshot?
data security provides confidentiality and integrity protection for user data applications and storage in the cloud computing environment.
VPN connection is a technology based on Internet tunnel, Can help you quickly build a secure and reliable encrypted channel between the VPN gateway and the user gateway
When the state of the alarm rule has not changed, the system will only send an alarm notification to the user when the state occurs for the first time.
Which of the following are the main functions of the Enterprise Host Security HSS?
Configure the VPC authorization address for the file system()Represents the highest priority
Which of the following services does the Standard Edition Security Expert Service include?
Which of the following operations cannot be performed in the RDS backup strategy?
From what perspective does SSA (Security Situation Awareness Service) analyze the security situation?
Which of the following parameters can the user modify when modifying the physical leased line?
Among the Huawei Cloud E1 services, which service is most suitable for solving sales forecast scenarios?
Elastic Load Balancing can add cloud servers with different operating systems.()
After the elastic cloud server is successfully created, Once the bandwidth used is determined, Will not be able to modify.
The alarm threshold is composed of three parts: aggregation method, single selection condition, and critical value, Used to configure alarm conditions.
Which of the following commands can be executed to verify whether the file system domain name can be resolved toIP address?
KMS which of the following is not included in the main application scenarios of (Key Management Service)?
VPC itself does not charge fees, but users need to purchase according to the charging standards when using bandwidth or VPN.
Elastic File Service does not support cloud servers running the Windows operating system for mounting.
Statements about backup and disaster recovery, Which of the following is correct?
When modifying a virtual interface, which of the following parameters can be modified?
Each cloud server backup can only create one whole machine image, For cloud server backups that have already created the entire machine image, the entire machine image cannot be created anymore.
If you want to keep multiple versions of an object, which of the following can be achieved?
WAF Which of the following is not included in the key features of (Teb Application Firewall)?
Relational databases support the creation of the following database instances?
Which of the following is wrong about the description of the elastic public network IP?
Which of the following options is the most reasonable virtual private cloud configuration process?
When the capacity of the cloud hard disk is insufficient, which of the following solutions are available?
Which of the following represents a general-purpose computing enhanced elastic cloud server?