Alibaba Cloud Related Exams
ACP-Cloud1 Exam
Before data communication is setup, the security groups match the security group rules one by one to query whether to allow access requests Assume that the user has created two security group rules 1 and 2 The protocol type, port range, authorization type, and authorization object of the two security group rules are the same. The difference is that Rule 1 is a denial policy, rule 2 is an allowed policy, so the following statement is correct_______ (Number of correct answers 2)
In some cases, you can purchase Elastic Compute Service (ECS) instances in Pay-As-You-Go mode to meet the demands for requiring additional computing resources in a particular period of time and set an auto-release time to release these Pay-As-You-Go instances later. ___________________ is a correct description of this operation.
If users use Alibaba Cloud Anti-DDoS Basic service, when the attack traffic exceeds the service upper limit, the black hole policy will then be triggered; after that, the users’ servers can still provide services at a limited speed.