In Alibaba Cloud, a developer finds that the ECS instance he created does not
have public IP assigned. The API method used was ''CreateInstance''. Which
of the following is the most likely reason?
Your company decided to replicate the whole cloud environment in another
region and use it as a cross-region failover in disaster recovery scenarios.
Your current environment includes Elastic Compute Service (ECS) instances,
Server Load Balancer (SLB) instances and Relational Database Service
(RDS) instances. Which of the following statements is correct?
Which of the following steps is NOT mandatory when creating an API through Alibaba Cloud API Gateway?
A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server is 404. Which of these could be the cause?
A company is developing a music application based on OSS and ECS, their users can download mp3 files after signing up for the application. Recently, the public network traffic to the OSS has doubled but the increase of registered users is less than 10%. After in-depth analysis, system operators find that many download requests are requested from the external search engine. In this case, which of the following measures is thought to be able to address this issue?
Answer : D
You can configure a HTTP Referer whitelist for a bucket to prevent extra fees
caused by unauthorized access to the bucket.
https://www.alibabacloud.com/help/doc-detail/31901.htm
A developer has written a web application using a microservice architecture,
in such an architecture, the client (web browser or mobile application) first initiates a request. The request first reaches the load balancer, then goes through an authentication service, a billing service, then requests a resource, and finally a result is returned. How many spans does such a call chain
consist of?
Answer : C
1-request, 2-load balancer, 3-authentication service, 4-billing service, 5- resource request
If you have a Node.js based application and you plan to migrate it to Alibaba Cloud Function Compute, which of the following steps is unnecessary?