Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which of the following steps is NOT mandatory when creating an API through Alibaba Cloud API Gateway?

A.

Define basic API information

B.

Attach a domain name

C.

Define API Request parameters

D.

Define the API backend service

Full Access
Question # 5

Which database utility is suitable for database migration?

A.

DMS

B.

DBS

C.

DTS

D.

DAS

Full Access
Question # 6

Which of the following is NOT required for SMC (Server Migration Center) to

migrate a server to Alibaba Cloud?

A.

Import the migration source information to the SMC console

B.

From the SMC console, configure the type of disk image to be generated during the migration

C.

The SMC client transfers the source data to an intermediate ECS instance

D.

The SMC backend service generates a target Alibaba Cloud image based on the migration source

Full Access
Question # 7

A developer is making the ModifyDBInstanceSpec API call to change the specifications of an RDS instance, but the operation fails. Why could this be? (Number of correct answers: 3)

A.

The instance is in the "running" state

B.

No instance type (specification) was included in the request parameters

C.

The instance has a backup task being executed

D.

The targeted RDS instance is a disaster recovery instance

Full Access
Question # 8

A company is developing a music application based on OSS and ECS, their users can download mp3 files after signing up for the application. Recently, the public network traffic to the OSS has doubled but the increase of registered users is less than 10%. After in-depth analysis, system operators find that many download requests are requested from the external search engine. In this case, which of the following measures is thought to be able to address this issue?

A.

Migrate music files from the OSS to the data disks for ECS instances

B.

Change the website access mode to HTTPS

C.

Enable “Hotlink protection” of OSS and use an HTTP Referer whitelist to prevent unauthorized users from accessing your data

D.

Use SLB for extra protection

Full Access
Question # 9

When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database's resources. Which of the following options are best practices when creating database indexes? (Number of correct answers: 3)

A.

Add an index to a field that is frequently queried but does not frequently perform add, delete, or modify operations.

B.

Applies indices to fields to contain many records.

C.

A table should not contaiiAiore than 6 indexed fields.

D.

Apply indexing to fields of fixed length (preferably not long fields).

E.

Adhere to the rightmost prefix principle when using composite indexes

Full Access