The alarm threshold is composed of three parts: aggregation mode, condition, and critical value, which are used to configure alarm conditions.

The alarm threshold is composed of three parts: aggregation mode, condition, and critical value, which are used to configure alarm conditions.A . TrueB . FalseView AnswerAnswer: A

August 26, 2022 No Comments READ MORE +

What are the types of scaling strategies for elastic scaling? (Multiple Choice)

What are the types of scaling strategies for elastic scaling? (Multiple Choice)A . Timing strategyB . Warning strategyC . Random strategyD . Cycle strategyView AnswerAnswer: ABD

August 26, 2022 No Comments READ MORE +

Data access service provides a one-stop big data collaborative development platform to help users easily complete multiple tasks such as data modeling, data integration, script development, and job scheduling.

Data access service provides a one-stop big data collaborative development platform to help users easily complete multiple tasks such as data modeling, data integration, script development, and job scheduling.A . TrueB . FalseView AnswerAnswer: A

August 26, 2022 No Comments READ MORE +

Which of the following services can be used in conjunction with elastic scaling? (Multiple Choice)

Which of the following services can be used in conjunction with elastic scaling? (Multiple Choice)A . Flexible file serviceB . Elastic Cloud ServerC . Cloud monitoringD . Elastic load balancingView AnswerAnswer: ABCD

August 25, 2022 No Comments READ MORE +

Users can use the object storage service in two ways: the management console (OBS Console) and the client (OBS Browser).

Users can use the object storage service in two ways: the management console (OBS Console) and the client (OBS Browser).A . TrueB . FalseView AnswerAnswer: B

August 25, 2022 No Comments READ MORE +

The file system supports batch creation.

The file system supports batch creation.A . TrueB . FalseView AnswerAnswer: A

August 24, 2022 No Comments READ MORE +

Which of the following is not included in the main application scenarios of KMS (Key Management Service)?

Which of the following is not included in the main application scenarios of KMS (Key Management Service)?A . Encryption and decryption of key information assetsB . Network transmission data encryptionC . Business core data encryption and decryptionD . Encryption and decryption of user personal dataView AnswerAnswer: B

August 24, 2022 No Comments READ MORE +

Which of the following options is the most reasonable configuration process of virtual private cloud?

Which of the following options is the most reasonable configuration process of virtual private cloud?A . Create virtual private cloud and default subnet>Create new subnet>Add security group policy>Create security groupB . Create virtual private cloud and default subnet>Create new subnet>Create security group>Add security group rulesC . Create virtual private cloud...

August 24, 2022 No Comments READ MORE +

Elastic load balancing can add cloud servers with different operating systems.

Elastic load balancing can add cloud servers with different operating systems.A . TrueB . FalseView AnswerAnswer: A

August 24, 2022 No Comments READ MORE +

Which of the following standard bucket strategies does OBS have? (Multiple Choice)

Which of the following standard bucket strategies does OBS have? (Multiple Choice)A . Public writingB . PrivateC . Public readingD . Public read and writeView AnswerAnswer: BCD

August 24, 2022 No Comments READ MORE +