Which of the following are container orchestration tools? (Choose all that apply.)
A. Kubernetes
B. OpenShift
C. Docker Swarm
D. Mesos
Which of the following statements about EVS and snapshots is false?
A. You can roll back a snapshot to the source EVS disk when the disk is in the Available state
B. A snapshot can be rolled back to any designated EVS disk
C. If data on an EVS disk has errors or is corrupted, you can roll back the data snapshot to the source disk to restore the data
D. Creating a snapshot will fail if the EVS disk is in the Attaching state or Expanding state
Which of the following services can be used with ELB? (Choose all that apply.)
A. VPC
B. AS
C. Cloud Eye
D. CTS
After deleting the elastic scaling group, the elastic cloud server instances automatically created by elastic scaling will also be automatically deleted.
A. TRUE
B. FALSE
Which of the following is not a security detection source for situational awareness services?
A. Web firewall, database firewall
B. DDos, IDS
C. Vulnerability scanning, host security, flow probe
D. ACL/Security Group
Which of the following types of attacks can be prevented by the Anti-DDoS traffic cleaning service?
A. Malformed packets
B. SYN Flood attack
C. HTTP Get/ Post Flood attack
D. TCP connection exhaustion attack
What are the columns related to the public cloud ecosystem on Huawei Cloud official website?
A. Developer Center
B. Huawei Cloud Academy
C. Huawei Cloud Market
D. Partners
When two elastic cloud servers in the same VPC cannot communicate with each other or packet loss occurs, which of the following factors need to be checked.
A. Check the network ACL
B. Check the unreachable port
C. Check the internal network card information of the elastic cloud server
D. Check the security group rules
What are the application scenarios of real-time streaming computing services?
A. Log online analysis
B. Network traffic monitoring
C. Real-time file transmission
D. Online graph calculation