H13-831-ENU試験無料問題集「Huawei HCIE-Cloud Service Solutions Architect V1.0 認定」
During the Spring Festival travel season, when a ticketing website was grabbing tickets, the website was paralyzed due to the huge increase in instant visits.
Which of the following microservice governance methods can effectively deal with traffic peaks and prevent system overloads from crashing?
Which of the following microservice governance methods can effectively deal with traffic peaks and prevent system overloads from crashing?
正解:B
解答を投票する
Deploy the Guestbook application on ServiceStage. Guestbook is composed of three container application components: Frontend is the front-end page component, the code logic is in Frontend, and the redis master and redis- sl ave components provide primary and secondary storage.
How to implement container affinity deployment can achieve the following two goals: 1. Reduce the possible network loss between Frontend and redis master communication. 2. Enable the main and backup storage to be scattered on different nodes and reduce the impact of downtime.
How to implement container affinity deployment can achieve the following two goals: 1. Reduce the possible network loss between Frontend and redis master communication. 2. Enable the main and backup storage to be scattered on different nodes and reduce the impact of downtime.
正解:B,C
解答を投票する
A company has deployed a public-facing forum through Huawei Cloud. In order to avoid Cc attacks on registered accounts, the company puts forward the following two requirements to forum administrators.
Requirement 1: Login protection, only 3 attempts to log in within five minutes are allowed, more than 3 times will prevent them from logging in again within 1 hour.
Requirement 2: Web search, a single user searches the page no more than 30 times in one minute, if it exceeds 30, the verification code will be verified.
In response to the above requirements, which features of DDOS can be used by tenants to complete the above requirements?
Requirement 1: Login protection, only 3 attempts to log in within five minutes are allowed, more than 3 times will prevent them from logging in again within 1 hour.
Requirement 2: Web search, a single user searches the page no more than 30 times in one minute, if it exceeds 30, the verification code will be verified.
In response to the above requirements, which features of DDOS can be used by tenants to complete the above requirements?
正解:A,D
解答を投票する