Which of the following descriptions of the principles of Alibaba Cloud SSL certificate private key protection is correct?
Answer : B
A developer creates a MySQL database service on a Linux ECS instance (ECS-A), and wants to access this database service from another instance (ECS-B) in the same VPC using the private IP address bound to the ECS instance, however, the connection can't be established. What could cause this? (Number of correct answers: 2)
Answer : C, D
When using Alibaba Cloud CDN, a visitor's request will first be routed to a CDN edge node, and in the event of a cache miss at this edge node, the node will fetch data from the origin site (back-to-source request). Even with this redirection, it is possible for the origin site to see the visitors real IP address. Which of the following statements about obtaining the visitor's real IP address are correct? (Number of correct answers: 2)
Answer : A, C
What are the benefits of creating indexes on PolarDB? (Number of correct answers: 2)
Answer : A, D
Which of the following descriptions of Alibaba Cloud ECS storage are correct? (Number of correct answers: 3)
Answer : A, B, C
you have a Node.js based application and you plan to migrate it to Alibaba Cloud Function Compute, which of the following steps is unnecessary?
Answer : A
Assume that a company uses ApsaraDB for PolarDB. The company commonly queries users based on their basic information, including: addresses, company names, and ID numbers. In this scenario, what is the best practice for creating a database index (or indexes)?
Answer : A