New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Alibaba Cloud ACP-Cloud1 Dumps Questions Answers

Page: 1 / 13
Total 176 questions

ACP Cloud Computing Certification Questions and Answers

Question 1

Alibaba Cloud CloudMonitor allows you to customize monitoring metrics and alert policies. Which of the following statements about customized monitoring are correct? (Choose two.)

Options:

A.

Users can monitor concerned services and report collected monitoring data to CloudMonitor so that CloudMonitor processes the data and generates alerts according to the result.

B.

Users can only select limited and fixed templates, and monitor specified server performance indicators.

C.

The number of customized monitoring metrics is limited, and programs used to report metric data must be deployed on the Alibaba Cloud server.

D.

The number of customized monitoring metrics is not limited, and programs used to report metric data may be deployed on devices other than the Alibaba Cloud server.

Buy Now
Question 2

During a scaling activity, when Auto Scaling fails to add ECS instances into a scaling group, it will try to ensure transaction completeness and roll back the scaling activity.

For example, a scaling activity intends to create and add 20 ECS instances into the scaling group, but only 19 of them are added successfully. In this case, the entire scaling activity will be rolled back, and the 19 instances will be removed and released as well.

Options:

A.

TRUE

B.

FALSE

Question 3

Before data communication is setup, the security groups match the security group rules one by one to query whether to allow access requests Assume that the user has created two security group rules 1 and 2 The protocol type, port range, authorization type, and authorization object of the two security group rules are the same. The difference is that Rule 1 is a denial policy, rule 2 is an allowed policy, so the following statement is correct_______ (Number of correct answers 2)

Options:

A.

If rule 1 and rule 2 have the same priority, the rule of the denial policy takes effect first, and the rule of the allowed policy does not take effect

B.

If rule 1 and rule 2 have the same priority, the rule of the allowed policy takes effect first, and the rule that of the denial policy does not take effect.

C.

If rule 1 and rule 2 have different priorities, the rule with a small priority number takes effect

D.

If rule 1 and rule 2 have different priorities, the rule with a large priority number takes effect.

Question 4

When creating a scaling group in Auto Scaling, there is one setting called “Removal policy.” Which of the following statements is true if the removal policy is set to “the earliest instance with the scaling configuration”?

Options:

A.

The earliest ECS instances created by Auto Scaling will be removed first

B.

The oldest ECS instances will be removed

C.

Only the earliest ECS instances created manually will be removed

D.

The earliest ECS instances added to the scaling group will be removed

Question 5

When using Alibaba Cloud SLB, users can enable the Health Check function. Layer-4 SLBs (TCP protocol) determine the availability of ECS instances through _________________.

Options:

A.

Whether the 3-way handshake can be established between the backend ECS instance and the SLB.

B.

Special characters contained in the message returned from backend ECS instances.

C.

Status codes returned from backend ECS instances.

D.

Length of the message returned from backend ECS instances.

Question 6

In Alibaba Cloud Object Storage, users want to use graphical tools to upload and download object files. Which tools can they use?

Options:

A.

ossbrowser

B.

ossutil

C.

osscmd

D.

ossfs

Question 7

Alibaba Cloud Content Delivery Network (CDN) is a distributed network that is built and overlaid on the bearer network. It is composed of edge node server clusters distributed across different regions.

Alibaba Cloud CDN can directly accelerate an IP address. The accelerated website does not need to bind a domain name.

Options:

A.

TRUE

B.

FALSE

Question 8

Availability Zones refer to data centers in the same region with independent power grids and networks. Which of the following statements are true for Zones? (Choose three.)

Options:

A.

If the disaster recovery requirements of your applications are demanding, it is recommended that you deploy ECS instances in the same Region and Zone.

B.

The network latency between inter-Zone ECS instances is lower.

C.

Intranet communication is available between different Zones in the same region, and data center-level fault isolation can be achieved between Zones.

D.

Whether you place ECS instances in the same Zone depends on the requirements for disaster recovery and network latency.

E.

If your applications require low network latency between ECS instances, it is recommended that you create ECS instances in different Zones.

Question 9

Alibaba Cloud Object Storage Service (OSS) is a cloud storage service that features massive capacity, outstanding security, low costs, and high reliability. In an OSS bucket, all elements are stored as________.

Options:

A.

Hashes

B.

Keys

C.

Objects

D.

Stubs

Question 10

When you create an Alibaba Cloud VPC. a VRouter and a route table will be created automatically. Which of the following statements is NOT correct about the route table?

Options:

A.

Each VRouter may have multiple route tables.

B.

When a VPC is deleted, the corresponding route table is also deleted.

C.

This route table cannot be deleted

D.

The routing entries of the route table can not be modified manually.

Question 11

If you need to make the ECS instances under three VSwitches (inside the same Alibaba Cloud VPC) unable to access each other, while not affecting other Intranet connections in this VPC, what should you do?

Options:

A.

Create three Security Groups, each containing all ECS instances under these three VSwitches. First, configure each Security Group to allow access to all CIDR Blocks. Then, configure each Security Group to forbid access to the CIDR blocks of the other two VSwitches (with this rule given higher priority than the previous rule).

B.

Create three Security Groups, each containing all ECS instances under these three VSwitches. First, configure each Security Group to allow access to all CIDR Blocks. Then, configure each Security Group to forbid access to the CIDR blocks of the other two VSwitches (with this rule given a lower priority than the previous rule).

C.

Create one Security Group containing all ECS instances under these three VSwitches. First, configure the Security Group to allow access to all CIDR Blocks. Then, configure the Security Group to forbid access to the CIDR blocks of the other two VSwitches (with this rule given higher priority than the previous rule).

D.

None of these answers are correct.

Question 12

You have set an alert policy for the disk usage of an ECS instance by using Alibaba Cloud CloudMonitor. Each measurement cycle lasts for 5 minutes, during which the average disk usage is measured. If the average disk usage exceeds 80% for five consecutive measurement cycles, an alert will be reported. After your average disk usage exceeds 80%, how long will it take to receive an alert?

Options:

A.

0 minutes

B.

30 minutes

C.

40 minutes

D.

20 minutes

Question 13

You are designing a solution for a startup company, the proposed solution is like this You suggest they use ECS instances to process requests from mobile App clients, and use SLB to distribute data traffic and ensure the load across each backend ECS instance is balanced.

Moreover to deal with volatile fluctuations in business volume (page views are much higher on the weekends), you also suggest they use Auto Scaling to dynamically increase or reduce computing resources.

The company is satisfied with the solution you proposed. However, they have one concern that when removing an idle instance from the scaling group: if Auto Scaling shuts the instance down directly, the service running on that instance will be abruptly terminated, resulting in poor user experience.

In order to eliminate your customer's concern, which of the following solutions should you recommend them?

Options:

A.

Find the ECS instance that is going to be removed from the backend server pool of the SLB instancer and automatically set the weight of this ECS instance to 0. This instance will not be assigned with new requests, and will be automatically removed from the backend server pool after existing tasks are completed.

B.

First, insert a script into the image for creating the ECS instance Second, make the script run automatically when the operating system in this ECS instances is about to shut down. This script contains the processing logic that can ensure the instance finish all the remaining tasks before shutting down.

C.

Find the ECS instance that is going to be removed from the backend server pool of the SLB instance, and manually remove this instance from the backend server pool Applications running on this ECS instance will normally return results, but this instance will not be assigned with new requests.

D.

Use the Lifecycle Hook function embedded m Auto Scaling Define a suitable timeout and a web hook to do the necessary work before the instance is removed.

Question 14

The maximum number of connections for an RDS instance depends on ____________.

Options:

A.

Memory size

B.

CPU utilization rate

C.

Disk capacity

D.

Network traffic

Question 15

Alibaba Cloud ECS provides multiple instance types to meet the needs of different business scenarios. A medium-sized enterprise user wants to use two ECS instances, one to deploy a single Tomcat service and the other one to deploy Memcache. Which of the following configurations is most recommended?

Options:

A.

Tomcat: 4 cores. 8G, Memcache: 2 cores: 16G

B.

Tomcat: 4 cores 8G. Memcache: 2 cores 8G

C.

Tomcat: 4 cores, 4G, Memcache: 2 cores, 8G

D.

Tomcat: 4 cores: 4G, Memcache: 2 cores: 16G

Question 16

You need to create a new ECS instance for a 10-data test. Which of the following billing methods is most cost-effective?

Options:

A.

Pay-AS-You-Go with Savings Plan

B.

Preemptible

C.

Subscription

D.

Pay-As-You-Go

Question 17

A startup team developed an app named “Public Image Service,” which provides image management services for e-commerce websites. The app includes a self-developed API for file uploads, queries, and deletions, and aims to manage a large number of small images with fast global access. Currently, 500 GB of images and files are uploaded daily. The team is ready to migrate all applications to Alibaba Cloud. They should at least choose Alibaba Cloud ___________________ service. (Choose three.)

Options:

A.

Object Storage Service

B.

Elastic Compute Service

C.

Content Delivery Network

D.

Auto Scaling

Question 18

Alibaba Cloud Content Delivery Network (CDN) is a distributed network that is built and overlaid on the bearer network Moreover it is composed of edge node server clusters distributed across different regions. It replaces the traditional data transmission mode, which is centered on Web servers. When using Alibaba Cloud CDN, a user's request wilt first reach the edge node, and then receive data from the origin site by means of back-to-source Moreover, the admin can obtain visitor's real IP on the origin site. Which of the following descriptions relate to "obtaining visitors real IP" are correct? (Number of correct answers: 2)

Options:

A.

"Visitor's real IP" is saved in "X-Forwarded-For" header in HTTP protocol. It can be directly obtained in the user-defined LOG of Apache and Nginx.

B.

"Visitor's real IP" can only be obtained by modifying the application

C.

You can one-step activate the "recording visitor's real IP" function in Alibaba Cloud CDN console to directly view the visitor's real IP in the access log.

D.

In Windows, if IIS is used: after installing "F5XForwardedFor" extension module. 'Visitor's real IP" can then be seen in the log.

Question 19

Alibaba Cloud Object Storage Service (OSS) is a massive, highly available, secured, and cost-effective storage service. One of the special characteristics of OSS is its superior data reliability due to its underlying backup technology and policies. Which of the following statements about OSS backup is correct?

Options:

A.

OSS supports 3 internal data copies, so the data can be manually recovered should there be any problem.

B.

Customers have to safeguard their own data. OSS provides various backup interfaces to facilitate off-site backups.

C.

OSS leverages RAID0+1 configuration of its underlying physical hard disks. There is no impact even if 2 hard disks were to fail simultaneously.

D.

OSS supports 3 internal data copies; no human intervention is required to recover the data when anything goes wrong.

Question 20

Recently, response speed of a certain Alibaba Cloud Elastic Compute Service (ECS) instance is unacceptably slow. By using CloudMonitor we discovered that the ECS instance utilizes more than 80% of the assigned bandwidth.

Which of the following approach can address this issue and without the need to reboot the ECS instance?

Options:

A.

Upgrade the bandwidth of the ECS instance

B.

None of the above

C.

Upgrade the CPU and memory of the ECS ins

D.

Add a disk to the ECS instance

Question 21

When distributing loads to multiple ECS instances with an Alibaba Cloud Server Load Balancer (SLB), you can obtain the real IP addresses of users who initiate the requests through _____________. (Choose two.)

Options:

A.

For Layer-7 services, SLB obtains the real IP addresses of the visitors by means of HTTP Header: X-Forwarded-For, but the “Obtain the Visitors Real IP Address” function must be enabled first.

B.

For Layer-4 services, you can obtain the visitors' real IP addresses directly, without any additional settings.

C.

For Layer-4 services, SLB obtains the real IP addresses of the visitors by means of the HTTP Header: X-Forwarded-For, but the “Obtain the Visitors Real IP Address” function must be enabled first.

D.

For Layer-7 services, you can obtain the visitors' real IP addresses directly, without any additional settings.

Question 22

On an Alibaba Cloud Elastic Compute Service (ECS) instance, if you change the MAC address of the NIC within the operating system, this may result in network connection failure.

Options:

A.

True

B.

False

Question 23

ECS provides several benefits, such as Elastic Computing. In ECS, Elastic Computing includes features like ___________________. (Choose four.)

Options:

A.

Starting or releasing hundreds of ECS instances in several minutes

B.

Supporting uninterrupted online bandwidth upgrading

C.

Supporting upgrading the CPU and memory specifications of ECS instances

D.

Supporting horizontal elastic scaling of applications in conjunction with SLB

E.

Supporting attaching an unlimited number of disks to ECS instances for disk capacity expansion

Question 24

A user builds an ECS + SLB + RDS architecture on Alibaba Cloud, with Auto Scaling to dynamically manage ECS instances. For business needs, they use ApsaraDB for Redis as a cache for hot data, requiring ECS instances to be added or removed from the Redis whitelist as they scale. As an Alibaba Cloud architect, which three Auto Scaling and OOS features would you recommend to automate adding and removing instances from the Redis whitelist? (Choose three.)

Options:

A.

Auto-Scaling lifecycle hooks

B.

OOS Template

C.

MNS

D.

Instance launch template

Question 25

Different Alibaba Cloud VPCs are completely isolated from each other.

By default, the VPCs cannot communicate with each other over Intranet, but you can establish VPN connections via the Internet to achieve interconnection between VPCs.

Options:

A.

True

B.

False

Question 26

A Virtual Private Cloud (VPC) is an isolated network environment that is completely isolated from each other The following statements about VPC are correct_________. (Number of correct answers: 2)

Options:

A.

Each VPC has an independent tunnel ID, and a tunnel ID corresponds to a virtualized network.

B.

Subnets can be divided like the traditional network environment. Different cloud servers within each subnet are connected by the same router and different subnets are interconnected by switches.

C.

ECS instances in a VPC use security group firewalls for Layer 2 network access control.

D.

The internal networks of different VPCs are completely isolated and can be interconnected through IP addresses mapped to the outside.

Question 27

If users use Alibaba Cloud Anti-DDoS Basic service, when the attack traffic exceeds the service upper limit, the black hole policy will then be triggered; after that, the users’ servers can still provide services at a limited speed.

Options:

A.

TRUE

B.

FALSE

Question 28

Alibaba Cloud Object Storage Service (OSS) provides massive, secure, relatively low-cost, and highly reliable cloud storage services. Users can upload and download files to/from OSS via the Web Console or API.

Options:

A.

True

B.

False

Question 29

RDS provides whitelist access policies. You can set permitted IP addresses and IP network segments to effectively prevent hackers from attacking the server by port scanning.

Options:

A.

True

B.

False

Question 30

A large shopping mall deploys a new video surveillance system. The five-floor building in which the mall is located has installed 35 HD cameras to monitor the major exits. The surveillance system is deployed on an ECS instance, which has four 2 TB data disks to store video data.

However, video data grows so rapidly that the engineers find the ECS will run out of storage space within 2 weeks.

In this case, ___________ product is thought to be the best solution for addressing the storage challenge while ensuring quick access to historical video data when needed.

Options:

A.

Container Service

B.

ECS

C.

OSS

D.

CDN

Question 31

A video company uses SLB to distribute user requests to 20 ECS instances with the same configuration to response these requests. As the Spring Festival approaches, service traffic would double during holidays (based on past experience). Thus, you use Auto Scaling to elastically adjust computing resources. Since the services is online for many years, you have historic records that can help predict the upcoming service traffic and choose the scaling mode freely. In this scenario, which of the following options are feasible and with minimum operation efforts? (Number of correct answers: 2)

Options:

A.

Cloud monitor and event-triggered task: Dynamically adds ECS instances during resource shortage and reduces ECS instances during idle hours by monitoring the CPU utilization rate and workload

B.

Scheduled task: Increases the number of ECS instances to 40 on the first day of the holidays and reduce the number to 20 after the holidays.

C.

Manual mode: Set the minimum number of instances to 40 on the first day of the holidays and change the number to 20 after the holidays.

D.

Healthy check mode: Ensures that all the current ECS instances in scaling groups are working correctly to meet user access requests.

Question 32

When the "'Obtain the Visitor's Real IP Address" function is enabled in Alibaba Cloud SLB For layer 7 services, you can obtain the real IP addresses of visitors through the______________field in HTTP header

Options:

A.

Connection

B.

Authorization

C.

Etag

D.

X-Forwarded-For

Question 33

Auto Scaling is a management service that can automatically adjust elastic computing resources based on your business needs and policies It supports adding an existing ECS instance into the scaling group but imposes certain requirements on instance region In this case, which of the following statements is true?

Options:

A.

The instance and the scaling group must be in the same region and zone.

B.

The instance and the scaling group must be in the same region but not necessarily the same zone.

C.

Each scaling group can span up to two regions. After adding the ECS instance, the number of regions of all the ECS instances in the scaling group must be no greater than two.

D.

The instance and the scaling group can be in different regions and zones.

Question 34

Which of the following statements is true for RDS?

Options:

A.

Multiple databases can be created for one instance

B.

Databases with the same name are allowed in the same instance

C.

Resources are not shared among the databases in the same instance

D.

None of the above is true

Question 35

The backend server pool of an Alibaba Cloud SLB contains multiple ECS instances, which may have different service capacities. To exploit the different service capacities of backend ECS instances, which of the following statements is correct?

Options:

A.

Choose Weighted Round Robin mode to set higher weights to ECS instances with higher capacities The higher the weight of the backend ECS instance the higher chance that the instance will receive requests.

B.

SLB cannot assign more requests to certain ECS instances.

C.

Choose Round-Robin model and ECS instances with higher capacities will surely be assigned with more requests.

D.

Choose Weighted Least-Connection mode, and ECS instances with higher capacities will surely be assigned with more requests.

Question 36

In some cases, you can purchase Elastic Compute Service (ECS) instances in Pay-As-You-Go mode to meet the demands for requiring additional computing resources in a particular period of time and set an auto-release time to release these Pay-As-You-Go instances later. ___________________ is a correct description of this operation.

Options:

A.

You can set the auto-release time only when creating the Elastic Compute Service (ECS) instance

B.

You can set the auto-release time of the ECS instance once

C.

You can set the auto-release time of the ECS instance multiple times

D.

You cannot cancel the set auto-release time of the ECS instance

Question 37

Alibaba Cloud provides comprehensive security protection covering networks, hosts, applications, databases, and content for on-cloud clients. Users using Alibaba Cloud services only need to focus on their own services, without the need to pay any attention to security protection issues.

Options:

A.

True

B.

False

Question 38

An Alibaba Cloud RDS read-only instance has its data synchronized from the master instance. Which of the following can be performed by the read-only instance from the RDS management console?

Options:

A.

Backup policy configuration and manual backup

B.

Database creation or deletion

C.

Editing its own whitelist

D.

Account authorization and account password changing

Question 39

Alibaba Cloud SLB can help distribute traffic among multiple backend servers. Which of the following statements is correct about backend servers?

Options:

A.

The backend servers can only be Alibaba Cloud ECS instances

B.

All servers that can be accessed through the Internet are supported

C.

Supports all cloud products in Alibaba Cloud

D.

Supports AWS EC2

Question 40

Alibaba Cloud SLB includes components like external service requests, Listeners, Load Balancer, Backend Servers, etc. Which of the following statements is correct about Listeners?

Options:

A.

A Listener includes SLB policies and forwarding rules.

B.

A Listener is a collection of ECS instances that provide external services.

C.

A Listener refers to an SLB instance.

D.

By configuring monitoring rules, a Listener can generate monitoring metrics for SLB.

Question 41

When using Alibaba Cloud SLB to forward layer 7 (HTTP) service requests, SLB will replace the IP address in the HTTP header file to forward requests. Therefore, the access IP address that can be seen on the backend ECS instance is the IP address of SLB instead of the client’s real IP address.

Options:

A.

TRUE

B.

FALSE

Question 42

You deployed a website on an Alibaba Cloud Elastic Compute Service (ECS) instance. After some time, you are concerned that the ECS instance might be compromised by brute-force password cracking. To address this issue, you can use Alibaba Cloud’s ________________ product.

Options:

A.

Object Storage Service

B.

CloudMonitor

C.

Server Load Balancer

D.

Security Center

Question 43

When using Alibaba Cloud SLB to forward layer 7 (HTTP) service requests. SLB will replace the IP address in the HTTP header file to forward requests.

Therefore the source IP address that can be seen on the backend ECS instance is the IP address of SLB instead of the clients real IP address.

Options:

A.

True

B.

False

Question 44

Alibaba Cloud Server Load Balancer (SLB) provides services for distributing traffic among multiple ECS instances SLB can expand the application system's service capacity through traffic distribution, and improve the system's availability by eliminating SPoFs (Single Points of Failure). Which of the following statements are correct? (Number of correct answers; 2)

Options:

A.

One of SLB's features is the Health Check. If some of the backend ECS instances are down, whereas other backend ECS instances can still provide services, then the system can continue to work normally.

B.

When recreating an SLB instance that has an Internet IP address, a new Internet IP address will be assigned to the SLB instance.

C.

Before using SLB to provide external services, make sure that you have installed and correctly configured the SLB agent on all of the backend ECS instances.

D.

SLB provides a function to automatically synchronize data among backend ECS instances using rsync remote synchronization.

Question 45

You are using Auto Scaling with one scaling group already created, then you want to execute a task at a specific time such as removing 1 ECS instance every night at 00:00. To achieve this, which of the following operations should be performed'? (Number of correct answers; 2)

Options:

A.

Create a scaling rule

B.

Create a scheduled task.

C.

Create a new scaling group.

D.

Create an event-triggered task.

Question 46

Alibaba Cloud SLB can distribute user requests to backend ECS instances. These ECS instances must have the same specification (CPU, Memory)

Options:

A.

True

B.

False

Question 47

When creating cloud product instances in Alibaba Cloud, you can choose the default VPC and VSwitch. The difference between non-default VPC/VSwitch and default VPC/VSwitch is that default VPC and VSwitch can only be created by Alibaba Cloud. Which of the following statements is incorrect about default VPC?

Options:

A.

There is only one default VPC for each region

B.

Default and non-default VPCs have different constraints and operations

C.

Default VPCs are created for you by Alibaba Cloud. Any VPCs you create are non-default VPCs

D.

Default VPCs are not counted in your given VPC quota in Alibaba Cloud

Question 48

If you need to accelerate a certain domain name (such as abc.com) via Alibaba Cloud Content Delivery Network (CDN), you must add it to "CDN Domain Name List" in the CDN service. After added successfully, you will get a CNAME address A Next, you need to modify domain name resolution and direct the domain name (such as abc.com) to CNAME address A. Which of the following is a NOT correct description of modifying domain name resolution?

Options:

A.

If your domain name (such as abc.com) is transferred to Alibaba Cloud in advance, and managed by the same Alibaba Cloud account, you can perform one-step resolution modification.

B.

The CNAME address allocated to the domain name (such as abc.com) will point to an IP address. This IP address resolving mechanism is intelligently managed by Alibaba Cloud CDN system.

C.

The DNS service provider used by the domain name (such as abc.com) must support intelligent resolution.

D.

The DNS service provider used by the domain name (such as abc.com) can be companies other than Alibaba Cloud.

Question 49

To connect a VPC with your traditional IDC (Internet Data Center), Alibaba Cloud currently supports the following methods: _______________? (Choose two.)

Options:

A.

VPN

B.

HTTP agent

C.

Connection through a stepping stone

D.

Leased line connection

Question 50

By using ApsaraDB for RDS to implement read/write splitting, which of the following can be achieved? (Number of correct answers 2)

Options:

A.

Write requests are distributed to multiple instances.

B.

Read requests are distributed to multiple instances.

C.

Read/write requests to the database are separated.

D.

Both read and write requests are distributed to multiple instance

Question 51

When creating cloud product instances in Alibaba Cloud, you can choose the default VPC and VSwitch. The difference between non-default VPC/VSwitch and default VPC/VSwitch is that default VPC and VSwitch can only be created by Alibaba Cloud. Which of the following statements is incorrect about default VSwitch?

Options:

A.

Default VSwitches can only be created in default VPCs

B.

If you have already created a VPC and a VSwitch by yourself, when creating a cloud product instance, the instance cannot be created under the default VSwitch

C.

Default and non-default VSwitches have the same constraints and operations

D.

Default VSwitches are created for you by Alibaba Cloud. Any VSwitches you create are non-default switches

Question 52

A large enterprise wants to migrate the entire business system to Alibaba Cloud to save the overall IT procurement and O&M costs From the security aspect, the company requires that

1. Must support secured remote O&M because the administrator often takes business trips.

2. Networks between subsystems should be isolated because subsystems are independently used by different departments Which of the followings should be used together to meet the company's requirements? (Number of correct answers: 3)

Options:

A.

Enable the VPN on the bastion host (or directly use the VPN image on Alibaba Cloud Marketplace). The administrator uses VPN encrypted communication during O&M.

B.

Build an independent ECS instance as the bastion host or remote logon and O&M, and authorize the bastion host to access ECS instances running other subsystems.

C.

Use the security group function of the ECS instance, and respectively deploy ECS instances running different subsystems to independent security groups.

D.

Create multiple ECS instances in the VPC to install subsystems of different departments- Allocate only Intranet IP addresses to all ECS instances, and deploy them in the same security groups.

Page: 1 / 13
Total 176 questions