Practice Free CAP-C01 Exam Online Questions
RDS instances are automatically created in master-slave mode without any extra costs or associated configuration.
- A . TRUE
- B . FALSE
The backend server pool of an Alibaba Cloud SLB contains multiple ECS instances, which may have different service capacities. To exploit the different service capacities of backend ECS instances, which of the following statements is correct?
- A . Choose Weighted Round Robin mode to set higher weights to ECS instances with higher capacities The higher the weight of the backend ECS instance the higher chance that the instance will receive requests.
- B . SLB cannot assign more requests to certain ECS instances.
- C . Choose Round-Robin model and ECS instances with higher capacities will surely be assigned with more requests.
- D . Choose Weighted Least-Connection mode, and ECS instances with higher capacities will surely be assigned with more requests.
A
Explanation:
Weighted Round Robin (WRR) is a load balancing mode that assigns requests to backend ECS instances based on their weights. The higher the weight of the backend ECS instance, the higher the chance that the instance will receive requests. This mode can exploit the different service capacities of backend ECS instances by setting higher weights to ECS instances with higher capacities. For example, if there are two ECS instances in the backend server pool, one with a weight of 10 and the other with a weight of 20, the ECS instance with a weight of 20 will receive twice as many requests as the ECS instance with a weight of 10.
Reference: 1: SLB overview – Server Load Balancer – Alibaba Cloud Documentation Center
4: Server Load Balancer – Alibaba Cloud
5: Alibaba Server Load Balancer (SLB) Course – Cloud Academy
When you create an Alibaba Cloud VPC. a VRouter and a route table will be created automatically.
Which of the following statements is NOT correct about the route table?
- A . Each VRouter may have multiple route tables.
- B . When a VPC is deleted, the corresponding route table is also deleted.
- C . This route table cannot be deleted
- D . The routing entries of the route table can not be modified manually.
D
Explanation:
A route table is a set of rules that determine how network traffic is routed within a VPC or between different network instances 1. A VRouter is a hub that connects all VSwitches in the same VPC and enables communication between them2. When you create a VPC, a VRouter and a default route table are automatically created for the VPC 1. The default route table contains system routes that are automatically generated by the system based on the network topology 1. The system routes cannot be modified or deleted 1.
However, you can also create custom route tables for your VPC and add custom routes to them 1. Custom routes are manually configured by users to route traffic to specific destinations, such as other VPCs, VBRs, VPN Gateways, or NAT Gateways 1. Custom routes can be modified or deleted as needed 1. You can also associate VSwitches with different route tables to implement fine-grained routing control 1.
Therefore, the statement that the routing entries of the route table can not be modified manually is not correct, as it only applies to system routes, not custom routes. The other statements are correct, as each VRouter may have multiple route tables, one default and several custom1; when a VPC is deleted, the corresponding route table is also deleted3; and the default route table cannot be deleted 1.
Reference: Route table overview – Virtual Private Cloud – Alibaba Cloud Documentation Center, VRouter overview – Virtual Private Cloud – Alibaba Cloud Documentation Center, Delete a VPC – Virtual Private Cloud – Alibaba Cloud Documentation Center
An online education website is built based on ECS, SLB and Auto Scaling, which greatly reduces resource cost, O&M cost and without compromising system stability and user experience.
Now, the website admin wants to keep the user information (such as source IP, accessed URLs, and duration on each page) for analysis to support their upcoming campaign events.
In this case, which of the following statements is NOT correct? (Single answer)
- A . Let each ECS instance in the scaling group keeps the user access information it processes. Thus, the data saved by these ECS instances can be accessed and analyzed at any time, making the solution not only simple, but also efficient, reliable, and cost-effective.
- B . Save user-related access information to ApsaraDB for RDS in real time or quasi real time, which can then be used for performing query and analysis,
- C . Synchronize user-related access information to ApsaraDB for Memcache in real time or quasi real time. Then, access Memcache using an application or make the data in Memcache persistent based on certain rules, and then can use the persistent data for further analysis.
- D . Synchronize user-related access information to OSS in real time or quasi real time for further use.
Once ECS is created, you can’t change its private IP address anymore.
- A . True
- B . False
B
Explanation:
You can change the private IP address of an ECS instance after it is created, but you need to stop the instance first. The private IP address must be within the CIDR block of the VPC and the VSwitch that
the instance belongs to. You can modify the private IP address of an instance by using the console or the API.
Reference: 3, ACP Cloud Computing Certification – Alibaba Cloud Academy
After stopping an Alibaba Cloud Elastic Compute Service (ECS) instance, you will still be charged for some resources related to that ECS instance, such as disks, snapshots, and public IP addresses, until you release them. The charging policy depends on the billing method and network type of the ECS instance. For pay-as-you-go instances, you can choose whether to enable the No fees for stopped instances feature, which allows you to stop paying for vCPUs and memory when the instance is stopped. However, this feature is only available for VPC-connected instances in some regions 1. For subscription instances, you will be charged for the entire subscription period regardless of whether the instance is running or stopped2.
Reference: 1: Billing FAQ – Elastic Compute Service – Alibaba Cloud Documentation Center1
2: Billing overview – Elastic Compute Service – Alibaba Cloud Documentation Center2
You have bought an ECS instance on Alibaba Cloud. After deploying a Python environment on it which of the following is the easiest and quickest way to monitor whether the Python process is running normally and report an alert if the process is accidentally terminated? (Single answer)
- A . Write a script for monitoring by yourself.
- B . Use process monitor of ECS instance monitoring.
- C . Use site monitoring.
- D . Log on to the ECS instance console.
Cloud computing adopts a common model in Distributed System. It distributes a computing task to the resource pool (comprised of a large number of computers). Elastically utilize the resource pool can allow applications to obtain computing capacity, storage space, and message services according to the needs.
Which of the following statements are correct about cloud computing? (Number of correct answers: 4)
- A . Large scale
- B . High availability
- C . Service on demand
- D . Versatility
- E . Container based
- F . Only supports single tenant
For Alibaba Cloud ECS instances in a VPC, you can configure Resource Access Management settings on ECS instances through Security Group.
Which of the following statements is correct? (Single answer)
- A . A security group can contain ECS instances of different VPCs in the same zone.
- B . A security group can contain ECS instances of different VPCs in the same region.
- C . A security group can only contain ECS instances of the same VPC in the same zone.
- D . A security group can contain ECS instances of the same VPC in the same region.
Which of the following ports does RDs for MySQL listen on by default? (Single answer)
- A . Port 8080
- B . Port 3060
- C . Port 3600
- D . Port 3306
Alibaba Cloud will check source IP addresses that connect to ApsaraDB for RDS through the public internet. When Alibaba Cloud Situation Awareness detects an alert reporting “a seldom-used IP address connecting to the database,” which of the following is the safest way to handle this alert?
- A . This alert does not matter and can be ignored
- B . Log on to Alibaba Cloud console, modify the IP address whitelist for authorized access to RDS, and retain the IP addresses that need to connect to RDS
- C . Modify the security group policies for ECS instances, and allow only specified IP addresses to connect to the server
- D . Log on to RDS console, and view the SQL audit logs to check whether any destructive operation has been performed. If no, you do not need to handle the alert
B
Explanation:
The safest response to a seldom-used IP alert connecting to ApsaraDB for RDS is to adjust the IP whitelist to allow only trusted IP addresses. By limiting the IP addresses in the whitelist, unauthorized or unfamiliar IP addresses cannot access the database. This approach provides direct
control over access to RDS and minimizes potential security risks. Checking SQL audit logs (as suggested in option D) is useful but not sufficient on its own for a comprehensive security response.
Reference: Alibaba Cloud RDS Security Best Practices
