Alibaba Cloud ACP-Cloud1 ACP Cloud Computing Certification Online Training
Alibaba Cloud ACP-Cloud1 Online Training
The questions for ACP-Cloud1 were last updated at Apr 02,2025.
- Exam Code: ACP-Cloud1
- Exam Name: ACP Cloud Computing Certification
- Certification Provider: Alibaba Cloud
- Latest update: Apr 02,2025
Alibaba Cloud Object Storage OSS can upload object files through the console.
What is the largest object file uploaded? (Single answer)
- A . 1GB
- B . 5GB
- C . 10GB
- D . 1TB
Auto Scaling is a management service that can automatically adjust elastic computing resources based on your business needs and policies. This service can automatically adjust. (Single answer)
- A . Number of ECS instances
- B . CPU for ECS instances
- C . Memory size for ECS instances
- D . Bandwidth for ECS instances
When using Auto Scaling, you want to add/remove ECS instances based on the utilization rate of computing resources. For example, you want to remove one ECS instance when the average CPU utilization rate is not greater than 30%. In this case, you need to set the scaling rule "Remove 1 ECS instance" and _____to finish the configuration. (Single answer)
- A . Create a scaling configuration
- B . Configure the attributes of the scaling group
- C . Create a Scheduled task
- D . Create an Event-triggered task
You have bought an ECS instance on Alibaba Cloud. After deploying a Python environment on it which of the following is the easiest and quickest way to monitor whether the Python process is running normally and report an alert if the process is accidentally terminated? (Single answer)
- A . Write a script for monitoring by yourself.
- B . Use process monitor of ECS instance monitoring.
- C . Use site monitoring.
- D . Log on to the ECS instance console.
Many websites have suffered DDoS attacks of different volumes. Therefore, accurate understanding of DDoS attacks is critical to website security protection.
Which of the following statements about DDoS attacks is the MOST accurate? (Single answer)
- A . DDoS attacks primarily target databases.
- B . DDoS attacks crack the server’s logon password by means of a massive number of attempts.
- C . The main purpose of a DDoS attack is to prevent the target server from providing normal services. Currently the DoS attack is one of the strongest and most indefensible website attacks.
- D . The purpose of a DDoS attack is to steal confidential information.
An insurance company has more than 200,000 online orders per day on their platform. in the past one year, the platform has suffered frequent large volume DDoS attacks (exceeding 10 Gbps).
Which of the following Alibaba Cloud products can the customer use to defend against this type of attacks and ensure service availability? (Single answer)
- A . Anti-DDoS Origin Basic Edition
- B . Managed Security Service
- C . Security Center
- D . Anti-DDoS Pro or Premium Service
Alibaba Cloud ECS is a simple and efficient computing service. ECS helps you quickly deploy applications, improve your 0&M efficiency, and reduce IT cost. ECS belongs to this type of service_______.(Single answer)
- A . SaaS (Software as a Service)
- B . PaaS (Platform as a Service)
- C . IaaS (Infrastructure as a Service)
- D . DaaS (Data as a Service)
User A is the system administrator of a company, who often takes business trips to Shanghai. Each time he remotely logs on to the server in Shanghai, an alert is reported, prompting "Someone is remotely logging on to the server. Please pay attention to your server security ".
Which of the following methods can be used to quickly and automatically resolve this problem? (Single answer)
- A . Open a ticket immediately to consult Alibaba Cloud engineers.
- B . Ask the company leaders for help.
- C . Log on to Alibaba Cloud console, and add a frequent logon location to the Security Center configuration item.
- D . Call a friend for help, who is a famous hacker in the industry.
If you need to make the ECS instances under three VSwitches (inside the same Alibaba Cloud VPC) cannot access to each other, meanwhile, not affecting other Intranet connections in this VPC, what should you do? (Single answer)
- A . Create three Security Groups, which respectively include all ECS instances under these three VSwitches. First, configure each of these Security Groups to allow access of all CIDR Blocks. Second, configure each of these Security Groups to forbidden the access of CIDR blocks of the other two VSwitches (given this rule with a higher priority than the previous rule).
- B . Create three Security Groups, which respectively include all ECS instances under these three VSwitches. First, configure each of these Security Groups to allow access of all CIDR Blocks. Second, configure each of these Security Croups to forbidden the access of CIDR blocks of the other two VSwitches (given this rule with a lower priority than the previous rule).
- C . Create one Security Group, which include all ECS instances under these three VSwitches. First, configure each of these Security Groups to allow access of all CIDR Blocks. Second, configure each of these Security Groups to forbidden the access of CIDR blocks of the other two VSwitches (given this rule with a higher priority than the previous rule).
- D . None of these answers are correct.
An online education website is built based on ECS, SLB and Auto Scaling, which greatly reduces resource cost, O&M cost and without compromising system stability and user experience.
Now, the website admin wants to keep the user information (such as source IP, accessed URLs, and duration on each page) for analysis to support their upcoming campaign events.
In this case, which of the following statements is NOT correct? (Single answer)
- A . Let each ECS instance in the scaling group keeps the user access information it processes. Thus, the data saved by these ECS instances can be accessed and analyzed at any time, making the solution not only simple, but also efficient, reliable, and cost-effective.
- B . Save user-related access information to ApsaraDB for RDS in real time or quasi real time, which can then be used for performing query and analysis,
- C . Synchronize user-related access information to ApsaraDB for Memcache in real time or quasi real time. Then, access Memcache using an application or make the data in Memcache persistent based on certain rules, and then can use the persistent data for further analysis.
- D . Synchronize user-related access information to OSS in real time or quasi real time for further use.