Q1. Which of the following descriptions of the principles of Alibaba Cloud SSL certificate private key protection is correct?
A.Alibaba Cloud uses the built-in functionality of the SSL certificate service to encrypt and store the private key to certificates private key
B. The plaintext of Alibaba Cloud's private key is usually stored on disk and backed up regularly
C. Alibaba Cloud Certificate Service uses symmetric encryption to save the certificate private key
D. Alibaba Cloud Certificate Service keys are loaded Into memory in plaintext format ONLY when needed
Correct Answer: B
Q2. Which of the following statements describes AKs (Access Keys) incorrectly?
A.AK can refer to both the AccessKey ID and the AccessKey secret
B. You can use AK to construct an API request and the corresponding resources can be manipulated if your request successfully..
C. An AccessKey ID and AccessKey Secret cannot be used separately
D. AccessKey Secrets for RAM sub-accounts can be queried at any time on the Console Interface after creation
Correct Answer: A
Q3. Which of the following descriptions of the principles of Alibaba Cloud SSL certificate private key protection is correct?
A.Alibaba Cloud uses the built-in functionality of the SSL certificate service to encrypt and store the private key to certificates private key
B. The plaintext of Alibaba Cloud's private key is usually stored on disk and backed up regularly
C. Alibaba Cloud Certificate Service uses symmetric encryption to save the certificate private key
D. Alibaba Cloud Certificate Service keys are loaded Into memory in plaintext format ONLY when needed
Correct Answer: B
Q4. Which of the following options is correct, regarding Object ACL in Alibaba Cloud's Object Storage Service (OSS)?
A.Object ACL is an object-level (not bucket level) permission control mechanism. There are currently three levels of access rights: private, public-read, and public-read-write.
B. 'Private' indicates that an object is a private resource, that is, only the owner of the object has read and write permissions on the object, and other users can read but have no permission to modify or delete the object.
C. If the permissions of an object are not set, the permissions of the object are inherited from the bucket.
D. You can set the ACL associated with an object by examining the X-OSS-Object-ACL header in the HEAD request, when making the PutObjectACL API call.
Correct Answer: A
Q5. A developer is making the ModifyDDInstanceSpec API call to change the specifications of an RDS instance, but the operation fails. Why could this be? (Number of correct answers: 3)
A.The instance is in the running state
B. No instance type (specification) was included in the request parameters
C. The instance has a backup task being executed
D. The targeted RDS instance is a disaster recovery instance
Correct Answer: A, B, C
$ 39
Reviews
There are no reviews yet.