What can be done when the vCPU and memory of the elastic cloud server you purchased is insufficient?
Which of the following commands can be used to view the newly added data disk in the Linux system?
Huawei provides developers with open capabilities, which will help developers integrate the open capabilities of Huawei products with their upper-layer applications, Build differentiated innovative solutions.
When two elastic cloud servers in the same VPC cannot communicate with each other or packet loss occurs, Which of the following factors need to be investigated?
Which of the following types of attacks can be prevented by the Anti-DDos traffic cleaning service?
Cloud Monitoring Service is a three-dimensional monitoring platform for elastic cloud servers, bandwidth and other resources. It can provide you with real-time monitoring alarms, notifications, and personalized report views, allowing you to accurately grasp the status of product resources.
Which of the following is not included in the function of Vulnerability Scanning Service?
uses IP Encryption and decryption verification during Sec VPN communication is performed on the firewalls at both ends.
When creating a scaling configuration, What are the options for configuration templates?
Financial insurance users who apply for reimbursement need to provide ID cards, medical documents and other materials. Through image recognition services, information can be automatically entered and verified and proofread.
After the relational database is successfully created, if the size of the specifications (CPU and memory) does not meet the requirements, the specifications can be changed.
KMS which of the following is not included in the main application scenarios of (Key Management Service)?
The network segment of the subnet must be within the range of the VPC network segment.
Mount the shared cloud hard disk to multiple cloud servers, Before the operating system has built a shared file system or similar cluster management system, Unable to realize the file sharing function.
Cloud Disk is a virtual block storage service based on a distributed architecture that can be flexibly expanded.
When creating a file system, Which of the following parameters need to be configured?
By modifying the IP or city name that provides services to the outside world, Direct traffic to the high-defense machine room, All traffic is cleaned in the high-defense machine room, and the cleaned business traffic is returned to()
Which of the following operations cannot be performed in the RDS backup strategy?
The relational database service RDS does not have database backup and recovery functions.
Which of the following parameters need to be configured when purchasing a VPN connection?
Which of the following is not a characteristic of relational database services?
Which of the following is wrong about the description of the elastic public network IP?
VPC itself does not charge fees, but users need to purchase according to the charging standards when using bandwidth or VPN.
The threshold of alarm consists of three parts: aggregation method, single selection condition, and critical value,Used to configure alarm conditions
What is the following error about the understanding of data encryption service DEW?
The object storage server provides account-based ACLs. Which of the following access rights are not supported by ACLs?
The use of the cloud hard disk is the same as that of the transfer hard disk. The cloud hard disk mounted on the cloud server can be formatted and file system created to realize the persistent storage of data.
Which of the following is reserved for users when deleting a relational database instance?
Elastic cloud servers between different availability zones in the same area cannot communicate with each other.
After the elastic cloud server is successfully created, If the size does not meet the demand, The specifications of the cloud server can be changed.
The composition of the cloud security service system includes network security, application security, data security, host security and security management.
Description of Security Group, Which of the following is wrong? (Single choice)
Which of the following cloud services will the data backed up by the cloud hard drive be stored?
The cloud hard drive backup service can create backups for cloud hard drives, and use the backup data to roll back the cloud hard drives to maximize the accuracy and safety of user data and ensure your data security.
users can realize the conversion between encrypted mirroring and non-encrypted mirroring through the mirroring function in the region.
public cloud provides multiple types of elastic cloud servers, Including but not limited to what?
Which of the following database examples supports GIS geographic information processing and is suitable for location application systems?
elastic load balancing automatically distributes access traffic to multiple cloud servers, expands the external service capabilities of the application system, and achieves a higher level of application fault tolerance.
After the object storage service creates a bucket successfully, Cannot change area, so, When creating a bucket, choose the region carefully.
users can use the management console (OBS Use the object storage service in two ways: Console) and client (OBS Browser).
The application of cloud monitoring in elastic scaling includes monitoring scaling instances and scaling bandwidth.
Enterprise Host Security provides functions such as account cracking protection, malicious program detection, critical file change detection, Web directory management, container escape detection, and software vulnerability detection.
VPN connection is a technology based on Internet tunnel, Can help you quickly build a secure and reliable encrypted channel between the VPN gateway and the user gateway
cloud traditional file sharing storage compared, What are the advantages of SFS?
Which of the following databases can be protected by database security services?
Which of the following actions is not included in the execution of the bandwidth scaling strategy?
Which of the following factors need to be considered in the early stage of cloud dedicated line access?
Generally, the cost of value-added services generated by cloud monitoring is very low, which can be used with value-added services such as dumping of monitoring data files and sending alarm notifications as needed.
relational database binding()Later, it can be accessed through the external network
When the health check is abnormal, First, check whether the rules of the security group where the back-end cloud server is located are valid.()IP network segment?
Which of the following cloud disks can be created directly through the cloud disk console?
Which of the following correspondences does the VPN gateway and remote gateway support?
Which of the following aggregation methods does the instance monitoring in the cloud monitoring service support?
Elastic Cloud Server is bound( ), you can provide access to the outside through a fixed public network I address.
When creating a listener, Under which protocol is the server certificate configurable?
The access control strategy is one of the security protection components provided by the API gateway.
When it is necessary to increase the number of instances in the scaling group at a fixed time each week, Which of the following scaling strategies can I implement?
On which service is the backup and snapshot data of the RDS database instance stored?
The applications running in the elastically scalable cloud server can be stateful.
Elastic File Service does not support cloud servers running the Windows operating system for mounting.
Cloud hard disks can be mounted to cloud servers in different availability zones.
cloud dedicated line currently supports manual activation and self-service activation.
Which of the following commands can be executed to verify whether the file system domain name can be resolved toIP address?
Divided by HUAWEI CLOUD services, Which cloud service is not a computing cloud service?
Which of the following operations can be performed on the cloud hard disk backup strategy?
After the elastic cloud server is successfully created, Once the bandwidth used is determined, Will not be able to modify.
Which of the following services can be used in conjunction with Elastic Scaling?
The traditional IT infrastructure architecture of enterprises is no longer capable of supporting the efficient operation of enterprises, Urgently calling for the arrival of structural changes, Which is not the main reason?
relational database services can meet the changing needs of the game industry, effectively shorten the research and development cycle, and reduce research and development costs.
When the capacity of the cloud hard disk is insufficient, which of the following solutions are available?
Faced with massive multi-dimensional spatio-temporal data, fast data access is required. Which of the following services is most suitable for storage?
API Provider and API The identity of the consumer is not fragmented, It can be converted to each other.
A user with which of the following rights can perform any operations on OBS resources?
When adding a VPC to the file system, the default IP address is automatically added0.0.0.0/0,The default read and write permissions are "read only".