Which of the following options is not the typical scene of cloud application?
A . Elastic calculations for the public
B . Elastic storage and backup
C . Enterprise desktop cloud
D . Server Co-Location
Answer: D
Which of the following options is not the typical scene of cloud application?
A . Elastic calculations for the public
B . Elastic storage and backup
C . Enterprise desktop cloud
D . Server Co-Location
Answer: D
Which of the following are included in the FusionManager alarm settings? (Multiple Choice)
A . Mail notification
B . SMS notification
C . Alarm template
D . Alarm threshold
Answer: ABD
When creating RAID, which of the following statement is incorrect?
A . RAID0 is suitable for high reading and writing requirements, and data has no security requirements.
B . RAID1 is suitable for the case of data security requirements first
C . RAID5 is suitable for a large number of small IO switching frequently operation situations
D . RAID6 applies to situations where data security requirements are high
Answer: C
Which of the following description of the OBS (Object Based Storage) function is incorrect?
A . Block replication
B . Fault tolerance
C . Simulating a local hard drive
D . Smooth expansion
Answer: C
When configuring the security level of the firewall security zone, which of the following statement is wrong?
A . The security level of the newly created security zone is 1 by default.
B . You can only set security levels for custom security zones
C . Security level is not allowed to change once set
D . Two security domains in the same system are not allowed to configure the same security level
Answer: A
Which of the following is incorrect about the description of FusionManager deployment?
A . FusionManager can be deployed in active/standby mode.
B . FusionManager supports single point deployment
C . FusionManager can be deployed on the V
E . FusionManager must be deployed on the physical server.
Answer: D
In server virtualization, virtual machines running on the same physical computer do not affect the running status of other virtual machines when one of them crashes or modifies. What feature does this represent for virtualization?
A . Isolation
B . Compatibility
C . Hardware-independent
D . Unity
Answer: A
Which of the following statement about the description of VPC is incorrect?
A . You can define your own private subnet in the VPC and deploy the application and other services under the corresponding subnet as needed.
B . You can use the security group function to divide the Elastic Cloud Server in the VPC into different security domains and define different access control rules for each security domain.
C . You can apply for an independent public IP address, bind to the elastic cloud server freely and flexibly and take effect immediately.
D . VPC is a separate area that cannot be interconnected with traditional data centers.
Answer: D
The attacker intercepts and records the data from A to B, and then extracts the information from the data intercepted earlier to B, what is the process called?
A . Man-in-the-middle attack
B . Password guesser and dictionary attack
C . Reflection attack
D . Replay attack
Answer: D
In RAID 2.0, which of the following is the basic object that make up a RAID group?
A . CK
B . CKG
C . extent
D . disk
Answer: B