Alibaba ACP Answer
Alibaba ACP Answer
Alibaba ACP Answer
1 D. Port 3306
2 D. RDS requires no O&M while self-built database require a dedicated DBA for maintenance, which results
in high HR costs.
4 A. Elastic resource scaling, you are charged only for resources you actually use, and can achieve cross-
carrier, cross-region network-wide coverage.
5 A. In the scaling group, both types of ECS instances may be removed from the scaling group by Auto
Scaling. But only the instances that are automatically created will be stopped and released.
8 B. Customer has to safeguard their own data. OSS provides various backup interfaces to facilitate offsite
backups.
9 C. Setup “Hotlink Protection” of OSS and use an HTTP Referent whitelist to prevent unauthorized users
from accessing your data in OSS.
10 C.OSS
11 B.5GB
12 A. Running
13 B.10
14 D. You need to enter an “installation verification key“ during Security Center agent installation, and use this
key to associate the console.
15 B. Create a probe point at Site Monitoring of the Alibaba Cloud CloudMonitor to monitor the port status.
17 A. Vertical scaling
18 C. Log on to Alibaba Cloud console, and add a frequent logon location to the Security Center configuration
item.
20 A.Even-triggered mode
22 B. 10.0.0.0/8
23 D.The routing entries of the route table can not be modified manually.
24 B. If you are uploading some small file (less than 1m), you can choose PUT method to finish uploading in
one HTTP request.
25 B. There exists signicant load on the ECS that is connected to this read-only instance.
26 A. Session persistence
27 A. PEM - C. PFX
28 A. You need to host server SSL certificates and client CA certificates on SLB.
29 A. HTTP
31 B. The automatic snapshot time of the ECS instance is set to 03:00 am.
32 A. Regardless of the selected billing method, you must select a public bandwidth threshold when
purchasing the ECS instance.
35 C. MAC authorization
36 True
37 True
38 True
39 True
40 True
41 True
42 True
43 False
44 False
45 False
46 True
47 True
48 False
49 False
50 True
51 False
52 False
53 False
54 True
55 True
56 A.TCP B. UDP C.HTTP D.HTTPS
57 - A.ECS (for deploying the application server) - C.Resource Access Management (for fenerating temporary
access credentials)
58 - A.Public IP address internet access control - B.Password cracking detection and handling - C.Unusual
remote logon reminder
61 - A.HTTP - C. TCP
62 - A. Each VPC has an independent tunnel ID, and a tunnel ID corresponds to a virtualized network. -
B.Subnets can be divided like the traditional network environment. Different cloud servers within each subnet
are connected by the same router, and different subnets are interconnected by switches.
63 - A.Scheduled task: Increases the number of ECS instance to 40 on the first day of the holidays and reduce
the number to 20 after the holidays. - B.Cloud monitor and event-triggered task: Dynamically adds ECS
instances during resource shortage and reduces ECS instances during idle hours by monitoring the Cpu
utilization rate and workload.
64 - C.Object Storage Service (OSS) for archiving the files for Online Disk service - D.Content Delivery
Network (CDN) for content caching.
65 - B.Static sites with more than 100,000 daily page views. - C.Image, HTML, CSS and JS files on a
medium-sized e-commerce website. - D.News websites with more than 30 million daily page views and users
all around the world.
67 - A.Create Elastic Compute Service (ECS) instances in different zones inside the same region and
incorporate on Server Load Balancer (SLB) instance to improve service availability - C.Create Server Load
Balancer (SLB) instances in different regions and mount the Elastic Compute Service (ECS) instances inside
the region. After that, utilize intelligent DNS to direct users to different SLBs.
68 - A.VSwitch is a Layer 3 switch that does not support Layer 2 broadcast or multicast. - D.The CIDR Block
used by a newly created VSwitch can be the same as an existing VSwitch CIDR Block.
69 - A.MySQL - B.SQLServer
70 - A.If rule 1 and rule 2 have the same priority, the rule of the denial policy takes effect first, and the rule of
the allowed policy does not take effect. - C.If rule 1 and rule 2 have different priorities, the rule with a small
priority number takes effect.