Which of the following descriptions about elastic scaling services is wrong?
Which of the following descriptions about elastic scaling services is wrong?A . Auto-scaling supports health checks on instance statusB . Auto-scaling can automatically adjust the number of instances in a scaling group according to the set policyC . Auto-scaling supports instance protection for specific instances in a scaling groupD ....
Huawei Cloud covers multiple PaaS development production lines. Which production line can help enterprises quickly build data operation capabilities and achieve integrated batch, stream, and interactive data governance?
Huawei Cloud covers multiple PaaS development production lines. Which production line can help enterprises quickly build data operation capabilities and achieve integrated batch, stream, and interactive data governance?A . NetaStudioB . DataArts StudioC . CodeArtsD . ModelArtsView AnswerAnswer: B
A tenant rents a virtual machine from a cloud service provider for daily use and returns the virtual machine to the cloud service provider after use. This reflects which key feature of cloud services?
A tenant rents a virtual machine from a cloud service provider for daily use and returns the virtual machine to the cloud service provider after use. This reflects which key feature of cloud services?A . Extensive network accessB . Rapid elastic scalingC . Location-independent resource poolD . Pay-per-useView AnswerAnswer: D
Which of the following is not a storage category provided by Huawei Cloud Object Storage Service OBS?
Which of the following is not a storage category provided by Huawei Cloud Object Storage Service OBS?A . Archive StorageB . Low-frequency access storageC . Backup storageD . Standard storageView AnswerAnswer: C
Which of the following is not one of the main functions of Web Application Firewall (WAF)?
Which of the following is not one of the main functions of Web Application Firewall (WAF)?A . Prevent sensitive information leakageB . Website Anti-CrawlerC . Web page tamper-proofingD . Brute force attack protection for elastic cloud serversView AnswerAnswer: D
A user uses Huawei Cloud Elastic Cloud Server to build a business website. The backend uses Huawei Cloud relational database to store business data. When the database is configured correctly, it is found that the business website cannot communicate with the database. Which of the following possible scenarios is wrong?
A user uses Huawei Cloud Elastic Cloud Server to build a business website. The backend uses Huawei Cloud relational database to store business data. When the database is configured correctly, it is found that the business website cannot communicate with the database. Which of the following possible scenarios is wrong?A...
If two VPCs in the same region need to communicate, which of the following methods is the most economical?
If two VPCs in the same region need to communicate, which of the following methods is the most economical?A . Purchase an elastic public IPB . Apply for cloud dedicated lineC . Create SNAT rulesD . Create a peer connectionView AnswerAnswer: D
Which of the following options is the smallest unit for Kubernetes creation, management, and scheduling?
Which of the following options is the smallest unit for Kubernetes creation, management, and scheduling?A . PodB . ProcessC . Virtual MachineD . ContainerView AnswerAnswer: A
Cloud computing can convert similar resources into resource pools and decompose resources into the smallest units. Which feature of cloud computing does this reflect?
Cloud computing can convert similar resources into resource pools and decompose resources into the smallest units. Which feature of cloud computing does this reflect?A . On-demand self-serviceB . Measurable servicesC . Resource poolingD . Extensive Internet accessView AnswerAnswer: C
Which of the following is not a main function of Huawei Cloud Database Security Service?
Which of the following is not a main function of Huawei Cloud Database Security Service?A . Discovery and desensitization of sensitive dataB . Anti-crawlerC . Database FirewallD . Database AuditView AnswerAnswer: B