Which of the following statements is correct?

Your company decided to replicate the whole cloud environment in another region and use it as a cross-region failover in disaster recovery scenarios. Your current environment includes Elastic Compute Service (ECS) instances, Server Load Balancer (SLB) instances and Relational Database Service (RDS) instances. Which of the following statements is correct?A...

October 20, 2021 No Comments READ MORE +

Which database utility is suitable for automate perception, healing, optimization, O&M, and security assurance for databases?

Which database utility is suitable for automate perception, healing, optimization, O&M, and security assurance for databases?A . DMSB . DBSC . DTSD . DASView AnswerAnswer: D Explanation: https://www.alibabacloud.com/help/doc-detail/64851.htm

October 19, 2021 No Comments READ MORE +

A system operator can tag resources for costing and billing purposes.

A system operator can tag resources for costing and billing purposes.A . TrueB . FalseView AnswerAnswer: A Explanation: https://www.alibabacloud.com/help/doc-detail/25477.htm

October 18, 2021 No Comments READ MORE +

Which of these Alibaba Cloud services are used for security (either credentials management, logging, or auditing?) (Number of correct answers: 3)

Which of these Alibaba Cloud services are used for security (either credentials management, logging, or auditing?) (Number of correct answers: 3)A . ActionTrailB . Log ServiceC . Key Management Service (KMS)D . Table storeView AnswerAnswer: A,B,C Explanation: https://www.alibabacloud.com/help/doc-detail/27280.htm

October 18, 2021 No Comments READ MORE +

________________ is a fully-managed event-driven computing service that allows you to run code in an elastic and reliable way?

________________ is a fully-managed event-driven computing service that allows you to run code in an elastic and reliable way?A . Function ComputeB . Serverless WorkflowC . Elastic Compute Service (ECS)D . Batch ComputeView AnswerAnswer: A Explanation: https://www.alibabacloud.com/help/doc-detail/52895.htm

October 18, 2021 No Comments READ MORE +

Which of the following functions are provided by Cloud Monitor?

Alibaba Cloud Cloud Monitor is a service that monitors Alibaba Cloud resources and internet applications. Which of the following functions are provided by Cloud Monitor? (Number of correct answers: 4)A . Site monitoringB . Cloud product monitoringC . Custom monitoringD . AlertsE . Custom firewallView AnswerAnswer: A,B,C,D Explanation: https://www.alibabacloud.com/help/doc-detail/35170.htm

October 18, 2021 No Comments READ MORE +

Which of the following services is used to establish private network connections between virtual private clouds (VPCs) in different regions, or between VPCs and data centers?

Which of the following services is used to establish private network connections between virtual private clouds (VPCs) in different regions, or between VPCs and data centers?A . CEN (Cloud Enterprise Network)B . Express ConnectC . VPN GatewayD . NAT GatewayView AnswerAnswer: A Explanation: https://www.alibabacloud.com/help/doc-detail/59870.htm

October 16, 2021 No Comments READ MORE +

Which of the following steps is NOT mandatory when creating an API through Alibaba Cloud API Gateway?

Which of the following steps is NOT mandatory when creating an API through Alibaba Cloud API Gateway?A . Define basic API informationB . Attach a domain nameC . Define API Request parametersD . Define the API backend serviceView AnswerAnswer: B Explanation: https://www.alibabacloud.com/help/doc-detail/29478.htm

October 15, 2021 No Comments READ MORE +

Which command is used to get the Docker daemon information?

Which command is used to get the Docker daemon information?A . docker infoB . docker versionC . docker pullD . docker imageView AnswerAnswer: A Explanation: https://docs.docker.com/engine/reference/commandline/info/

October 15, 2021 No Comments READ MORE +

Which of the following options are best practices when creating database indexes?

When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database's resources....

October 14, 2021 No Comments READ MORE +