A developer is writing logs through the Log Service API, and can see via the Logstore monitorin metrics that write traffic is about 10 MB/s, but a 403 error is reported during the writing process. Which of these is a possible cause?
A developer creates a MySQL database service on a Linux ECS instance (ECS-A), and wants to access this database service from another instance (ECS-B) in the same VPC using the private IP address bound to the ECS instance, however, the connection can't be established. What could cause this? (Number of correct answers: 2)
Which of the following configurations cannot improve the stability, reliability or availability of an Alibaba Cloud Scaling Group? (Number of correct answers: 3)
On which operating systems can you install Alibaba Cloud command line tools? (Number of correct answers: 3)
You can create an event notification rule in Message Service and push notifications to the specified consumer in the form of messages, to receive events from specified Alibaba Cloud resources. Which of the following options are correct statements about the Message Service (MS) service? (Number of correct answers: 2)
Which of the following descriptions of Alibaba Cloud ECS storage are correct? (Number of correct answers: 3)
Which of the following descriptions of the principles of Alibaba Cloud SSL certificate private key protection is correct?
Which of the following web applications are suitable for deployment on Simple Application Server (SAS), as compared with LCS? (Number of correct answers: 3)
Function Compute supports one-way triggers and two-way triggers. Which of the following triggers is a one-way trigger? That is to say you only need to configure the trigger in the event source, not in Function Compute?.
A certain project of Enterprise A (called Project-X) moves to the cloud and will need to use a variety of s Alibaba Cloud resources, such as ECS instances, RDS instances, SLB instances, and OSS storage space. There are multiple employees on the project who need to operate these cloud resources. Because each employee has different job responsibilities and requires different permissions, what is the WRONG approach to resource management?