Question 71

Which one of the following descriptions about high availability and disaster tolerance of user business systems is correct?
  • Question 72

    When the customer uses Huawei Cloud SMS to migrate the host, the source host is the key login, and the target is the host created using the password login method. After the migration is completed, you can use the password to log in to the target host.
  • Question 73

    When users use the "Site Monitoring" function of HUAWEI CLOUD CES, which of the following monitoring types can be used? (Multiple choice)
  • Question 74

    A company deploys its own platform service on a Huawei Cloud ECS instance, and regularly collects related logs of each service and database through the cloud log service LTS and stores them in OBS. The service log and database log have different naming methods. The storage period of the service log is 3 days. The database log storage period is one week.
    Which of the following solutions to delete expired logs are feasible? (Multiple choice)
  • Question 75

    HUAWEI CLOUD tenants have purchased DDOS high defense and WEB application firewall services at the same time for the security protection of their websites. Which of the following is the order of inbound traffic for website users to visit the website?