Alibaba Cloud CDN can directly accelerate the access to the files stored in OSS and reduce OSS traffic costs.
__________feature in Server Load Balancer means that it can forward the access requests from a single user to the same ECS instance within a certain period to ensure session continuity.
Your website has high volume of traffic and sudden spikes for a very short time. In this scenario,
can manage traffic peak efficiently and maintain a consistent user experience.
Which of the following statements about file uploading to OSS strategy is not correct?
When using Alibaba Cloud SLB, you can set different weights for backend ECS instances. The higher the weight of a backend ECS instance, the more load will be assigned to it. If an SLB instance has 5 ECS instances in the backend server pool, all of which are healthy. Among these 5 ECS instances, the weight of ecs_inst1 is set to 100. Which of the following statements is correct?
You built an online shop using Alibaba Cloud services (ECS, RDS, …etc.) and very soon you’ll have a campaign that every customer that invites 3 friends will get a 50% off coupon. To avoid HTTP flood attacks and ensure only genuine customers (not bots) joining the event, which security product should you choose?
Alibaba Cloud Object Storage Service (OSS) is a massive, highly available, secured and cost effective storage service. One of the special characteristics of OSS is its superior data reliability, because of its underlying backup technology and policies. Which of the following statement about OSS backup is correct?
Your friend purchases some Alibaba Cloud resources and uses them to build an online training website. Before the site goes online, your friend wants to perform some performance tests but doesn't know how to do it. In this case, which of the following services can help?
Alibaba Cloud’s object storage (Object Storage Service, OSS for short) can be used to store massive amount of files, but there is still a maximum number of files in a single bucket.
In mainland China, the approval requirements for business record filing vary depending on provincial communication management bureaus.
A large shopping mall deploys a new video surveillance system. The five-floor building in which the mall is located installed 35 HD cameras to monitor the major exits. The surveillance system is deployed on an ECS instance, which has four 2 TB data disks to store video data.
However, video data grows rapidly and the engineers find that the ECS will run out of storage space within 2 weeks.
In this case,product is thought to be the best solution for addressing the storage challenge while ensuring quick access to historical video data when needed.
Alibaba Cloud provides powerful security services (the same level of security services used to support Alibaba Group double 11 shopping festival). However, you have to pay first before using any of the security services.
Auto Scaling is a management service that can automatically adjust elastic computing resources based on your business needs and policies. It supports adding an existing ECS instance into the scaling group but imposes certain requirements on instance region. In this case, which of the following statements is true?
Anti-DDoS is one of the major features in Alibaba Cloud Security Service. Many websites have experienced different types of DDoS attacks, an accurate understanding of DDoS is crucial to protecting websites. Which of the following descriptions about DDoS attack is the most accurate one?
Using a cloud computing service is simple and straightforward. One can choose the instance with desired specification, finish payment and then use it right away. Moreover, the underlying physical machines are managed by cloud service providers and transparent to users.
Auto Scaling is a management service that can automatically adjust elastic computing resources based on your business needs and policies. It supports adding existing ECS instances into the scaling group, whose status however must be________.
RDS provides whitelist access policies. You can set permitted IP addresses and IP network segments to effectively prevent hackers from attacking the server by port scanning.