Which of the following are typical application scenarios of web application firewalls?
Which of the following services can be used in conjunction with Elastic Scaling?
Inter-Internet communication between two sites,IPSecVPN can be deployed on the firewalls at both ends to protect the mutual access traffic between the two intranets.
VPC cannot connect to the local data center
Which option below is Huawei's cloud A1 chip?
Relational database service RDS does not have database backup and recovery functions.
Which of the following file system types does Resilient File Service have?
What is the full name of ECS?
Which of the following is wrong about the storage category provided by the object storage service?
Which of the following parameters need to be configured for Cloud Monitoring to create an alarm rule?
API What is included in the gateway's multiple security protection?
After the elastic cloud server is successfully created, If the size does not meet the demand, The specifications of the cloud server can be changed.
Which of the following load methods are not supported by the listener?
What service is CloudTable based on?
Which of the following methods can prevent the specified instance from being removed from the scaling group?
cloud hard drives need to be used with elastic cloud servers or bare metal servers.
Which of the following components does Elastic Load Balancing include?
How does the elastic cloud server construct a logically completely isolated network area?
Which of the following are the basic characteristics of cloud computing?
elastic load balancing automatically distributes access traffic to multiple cloud servers, expands the external service capabilities of the application system, and achieves a higher level of application fault tolerance.
users can use the management console (OBS Use the object storage service in two ways: Console) and client (OBS Browser).
does not need to delete the virtual gateway and virtual interface bound to the physical leased line when unsubscribing from the physical leased line.
Which of the following correspondences does the VPN gateway and remote gateway support?
What are the login authentication methods for the elastic cloud server?
The API gateway service currently supports API integration and API openness including the entire HUAWEI CLOUD.
Which of the following are the application scenarios of elastic load balancing? (Multiple choice)
About ELB configuration description, Which ones are incorrect?
Description of Security Group, Which of the following is wrong? (Single choice)
Elastic cloud servers between different availability zones in the same area cannot communicate with each other.
When creating a listener, Under which protocol is the server certificate configurable?
The object is the basic unit of data storage in OBS. Which of the following parts does it include?
Which of the following container exceptions can the Container Security Service monitor?
Elastic File Service does not support cloud servers running the Windows operating system for mounting.
The description of the redundant physical leased line is the following error?
The main function of database security service does not include which of the following?
Description of peer-to-peer connection, Which of the following is wrong?
data access service provides a one-stop big data collaborative development platform, Help users easily complete multiple tasks such as data modeling, data integration, script development, job scheduling, etc.
Which of the following security measures does the relational database service have?
Which of the following cloud disks can be created directly through the cloud disk console?
In order to use the ping program to test the communication status between elastic cloud servers, Which of the following protocols need to be added to the security group?
Which of the following is not included in the function of Vulnerability Scanning Service?
Which of the following commands can be executed to verify whether the file system domain name can be resolved toIP address?
What are the key features of LAM unified identity authentication?
More than elastic cloud servers can share a key pair.
The network segment of the subnet must be within the range of the VPC network segment.
Which of the following options is the cloud private line self-service activation process?
The management console can view all types of Huawei cloud service products.
Which of the following services does cloud hard disk backup service depend on?
Which of the following aggregation methods does the instance monitoring in the cloud monitoring service support?
Generally, the cost of value-added services generated by cloud monitoring is very low, which can be used with value-added services such as dumping of monitoring data files and sending alarm notifications as needed.
What are the application scenarios of real-time streaming computing service?
Alarm notification is the action taken when a certain alarm state is triggered. Users can set notifications when creating or modifying alarms, or turn off notifications.
Which of the following is a computing service?
What advantages does the gateway play to realize the digital transformation of enterprises?
The alarm threshold is composed of three parts: aggregation method, single selection condition, and critical value, Used to configure alarm conditions.
Call AP IWhich of the following security authentication methods are there?
Which of the following may be the reasons why you cannot log in to the windows virtual machine through mstsc?
What is the deduction period of API gateway?
Shared path of the file system, What is the correct format of the NFS type?
After deleting the elastic scaling group, the elastic cloud server instance automatically created by elastic scaling will also be deleted automatically.
file systems can be mounted on cloud servers in different VPCs.
Model What are the steps involved in the automatic learning function in Arts?
Enterprise Host Security provides functions such as account cracking protection, malicious program detection, critical file change detection, Web directory management, container escape detection, and software vulnerability detection.
Which of the following cloud services can be used with elastic load balancing to ensure protection from external attacks and improve security and reliability?
On the cloud hard disk backup interface, you can delete the backup whose source is "Cloud Server Backup".
Cloud monitoring parameter configuration is in progress, Which of the following notification methods are included in the alarm notification?
Which of the following standard bucket strategies does OBS have? Multiple choice)
What operations can the shared mirror provider do?