Mount the shared cloud hard disk to multiple cloud servers, Before the operating system has built a shared file system or similar cluster management system, Unable to realize the file sharing function.
Install Cloudbase before creating a private image-init. The purpose of this tool is to ensure that new cloud servers created with private images can be customized.
Cyber security as an important component of cloud security services, Achieve network isolation, Responding to cyber attacks,Ensure network security.
Which of the following parameters need to be set when creating a backup strategy?
Through private images in area B, elastic cloud servers can be deployed in area A.
The API gateway service currently supports API integration and API openness including the entire HUAWEI CLOUD.
Which of the following correspondences does the VPN gateway and remote gateway support?
Generally, the cost of value-added services generated by cloud monitoring is very low, which can be used with value-added services such as dumping of monitoring data files and sending alarm notifications as needed.
Regarding the creation of a private image, which of the following is correct?
VPC itself does not charge fees, but users need to purchase according to the charging standards when using bandwidth or VPN.
RDS can be used in combination with which of the following cloud services ,So as to ensure that the RDS instance is safely isolated from other services on the network?
When configuring bucket logging, Which of the following statements about the storage location of the log file is correct?
does not need to delete the virtual gateway and virtual interface bound to the physical leased line when unsubscribing from the physical leased line.
When external traffic enters Loadbalancer, Which component to enter first?
The cloud hard disk is like a traditional server hard disk. You can format and create a file system on the cloud hard disk mounted on the cloud server, and store the data persistently.
After the elastic cloud server is successfully created, Once the bandwidth used is determined, Will not be able to modify.
Which of the following addresses cannot be added to the authorized address of the VPC?
After deleting the elastic scaling group, the elastic cloud server instance automatically created by elastic scaling will also be deleted automatically.
When the system disk fails, you can create a new cloud hard disk through the backup of the system disk and mount it to the cloud server as a system disk.
Elastic Cloud Server is bound()Rear. Can be through the fixed public network IP The address provides external access.
Which of the following is not a security detection source for situational awareness services?
Which of the following scenarios can the object storage service be applied to?
Which of the following courses in the Cloud Academy can be used for online learning to obtain scenario-based skills improvement?, And get a certification certificate through the online exam?
The use of the cloud hard disk is the same as that of the transfer hard disk. The cloud hard disk mounted on the cloud server can be formatted and file system created to realize the persistent storage of data.
What key performance indicators of the relational database service support monitoring database instances and database engines?
In which of the following scenarios can a elastic scaling group modify the availability zone and subnet of the scaling group?
After the relational database instance is successfully created, the database port cannot be modified.
Which of the following factors need to be considered in the early stage of cloud dedicated line access?
The scalable bandwidth supports the setting of three types of scalable bandwidth strategies, which are alarm strategy, timing strategy and periodic strategy.
Which of the following is not included in the function of Vulnerability Scanning Service?
The two sites communicate across the Internet, and IP can be deployed on the firewalls at both ends Sec VPN thus protects the mutual access traffic between the two intranets.
HUAWEI CLOUD Elastic Cloud Server connects to the public network(Internet) What are the ways?
Adopt IP During Sec VPN communication, Encryption and decryption verification is carried out on the firewalls at both ends
Cloud computing is a model, It can obtain the required resources from the configurable resource sharing pool anytime, anywhere, conveniently and on-demand (e.g.,Computing, storage, network, applications, and services),Resources can be quickly supplied and released,Minimize the workload of managing resources and interaction with service providers
Which of the following descriptions about the cloud dedicated line is wrong?
In the process of VPC creation, which parameter realizes the function of automatically obtaining IP?
HUAWEI CLOUD E1 service is called "Faster Pratt & Whitney AI Which service is "Development Platform"?
IP Sec VPN is an encrypted tunnel technology, Establish confidential and secure communication tunnels between different networks by using encrypted security services. Which of the following is not the guaranteed data packet transmission characteristics on the public network?
Which of the following database instance types does the relational database service have?
users can add or delete the monitoring charts of the instance resources of key concern on the homepage of the cloud monitoring overview. As the object of the important instance of concern, it can support the multi-index comparison function., It is convenient to check in time every time you log in to the cloud monitoring platform.
When creating an elastic cloud server, The elastic cloud server can be initialized through the "file injection" function provided by the system.
Which of the following key technologies does SA (Security Situation Awareness Service) use?