Alibaba Cloud Related Exams
ACP-Cloud1 Exam
Before data communication is setup, the security groups match the security group rules one by one to query whether to allow access requests Assume that the user has created two security group rules 1 and 2 The protocol type, port range, authorization type, and authorization object of the two security group rules are the same. The difference is that Rule 1 is a denial policy, rule 2 is an allowed policy, so the following statement is correct_______ (Number of correct answers 2)
Which of the following statements is true for RDS?
Recently, response speed of a certain Alibaba Cloud Elastic Compute Service (ECS) instance is unacceptably slow. By using CloudMonitor we discovered that the ECS instance utilizes more than 80% of the assigned bandwidth.
Which of the following approach can address this issue and without the need to reboot the ECS instance?