A developer needs to use some sensitive business data and operational data in the process of developing a program, but the data should be protected (encrypted or anonymized) as much as possible. In order to facilitate and secure management of data encryption keys, the developer can use Alibaba Cloud Key Management Service (KMS) envelope encryption technology. Which of these statements is NOT correct, regarding KMS?
You are responsible for the system operations of a product and have implemented the cloud infrastructure in the Alibaba Cloud platform. When
business loads increase, _______ automatically adds ECS instances to
ensure sufficient computing capabilities. When business loads decrease, the
same service automatically removes ECS instances to save costs. Which
service are you using?
Which of the following options are correct for Multipart Upload and Resumable Upload in Object Storage Service (OSS)? (Number of correct answers: 3)
Which of these metrics are collected by CloudMonitor’s Host Monitoring function? (Number of correct answers: 3)
Serverless Workflow allow you to orchestrate distributed tasks in sequence, branch, and parallel modes, and ensure that tasks are reliably coordinated according to your workflow logic. Which of the following service integration modes is not supported by Serverless Workflow?
Which of the following options correctly describes CloudMonitor Custom Monitoring and Custom Events? (Number of correct answers: 2)
Which of these are important concepts in Terraform’s configuration language, HCL? (Number of correct answers: 3)
A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server is 404. Which of these could be the cause?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Alibaba Cloud Free Exams |
---|
![]() |