0% found this document useful (0 votes)
24 views6 pages

Tencent Cloud SysOps Associate Exam Online Questions

The document provides an overview of the Tencent Cloud SysOps Associate exam, including details about the exam code, name, and certification. It offers a discount on exam dumps and includes sample questions and answers covering various topics related to Tencent Cloud services. The content emphasizes the importance of practicing with exam dumps to build confidence and improve chances of passing the certification exam.

Uploaded by

buddyzabbo94
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views6 pages

Tencent Cloud SysOps Associate Exam Online Questions

The document provides an overview of the Tencent Cloud SysOps Associate exam, including details about the exam code, name, and certification. It offers a discount on exam dumps and includes sample questions and answers covering various topics related to Tencent Cloud services. The content emphasizes the importance of practicing with exam dumps to build confidence and improve chances of passing the certification exam.

Uploaded by

buddyzabbo94
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Exam Code: Tencent Cloud SysOps Associate

Exam Name: Tencent Cloud SysOps Associate

Associate Certification: TCA certificate

Samples: 20Q&As

Save 40% on Full Tencent Cloud SysOps Associate Exam


Dumps with Coupon “40PASS”

Tencent Cloud SysOps Associate exam dumps provide the most effective
material to study and review all key Tencent Cloud SysOps Associate
topics. By thoroughly practicing with Tencent Cloud SysOps Associate
exam dumps, you can build confidence and pass the exam in a shorter
time.

Practice Tencent Cloud SysOps Associate exam online questions


below.

1. Which of the following are types of Autoscaling instance removal policy? Select all that apply.
A. Remove the oldest CVMs
B. Remove the newest CVMs
C. Avoid misoperation
D. One CVM for multiple uses
Answer: A, B

2. Which of the following is the correct process of creating an instance through custom
configuration in Tencent Cloud?
A. Select the region and model > select the storage and network > select the image > set the
information (such as server name, login method, and security group) > make the payment.
B. Select the region and model > select the image > set the information (such as server name,
login method, and security group) > select the storage and network > make the payment.
C. Select the region and model > select the image > select the storage and network > set the
information (such as server name, login method, and security group) > make the payment.
D. Select the image > select the region and model > select the storage and network > set the
information (such as server name, login method, and security group) > make the payment.
Answer: C

3. Source hashing scheduling algorithm (ip_hash) is a load balancing algorithm of Tencent


Cloud.
Which of the following are its advantages? Select all that apply.
A. It can achieve certain session persistence and remember the source IPs.
B. It can map requests from a client to the same real server through the hash table.
C. In scenarios where session persistence is unsupported, it can be used to achieve a simple
session persistence effect.
D. It is usually used in non-persistent connection services, which is suitable for scenarios with
low data refreshing frequency such as website browsing.
Answer: A, B, C

4. Which of the following are generally causes of the problem where a TencentDB for MySQL
instance fails to provide service normally as max_connections (number of connections) reaches
the upper limit?
A. A connection has been executed for too long and exclusively used the TencentDB for
MySQL resources, which blocks a large number of access requests.
B. The business traffic is too low.
C. The number of access requests from the frontend is far beyond what can be processed by
the instance.
D. A business program bug causes too many null sessions.
Answer: A, C, D
5. Which of the following statements is true about hot backup origin servers and HTTPS origin-
pulls in CDN?
A. You can select HTTPS origin-pull no matter whether a hot backup origin server is configured.
B. CDN supports only one origin server, and there is no concept of hot backup origin server.
C. Hot backup origin servers currently do not support HTTPS origin-pull. When you configure a
certificate for a domain name with a hot backup origin server, you should not select HTTPS
origin-pull.
D. To accelerate client access, CDN does not support HTTPS.
Answer: C

6. How many replicas should be used for a cloud disk to guarantee the data reliability?
A. You can use three high-performance replicas for a cloud disk to guarantee the data reliability.
B. You can use one high-performance replica for a cloud disk to guarantee the data reliability.
C. You can use four high-performance replicas for a cloud disk to guarantee the data reliability.
D. You can use two high-performance replicas for a cloud disk to guarantee the data reliability.
Answer: A

7. You have successfully connected a domain name in the CDN Console, and the Tencent
Cloud system assigns an address [Link] to you. To allow your users to access
through a domain name meeting your brand image, which of the following records should you
configure in DNS?
A. A record
B. S?PF record
C. A CNAME record
D. M?X record
Answer: C

8. Which of the following statements is true about the VPC IP address space?
A. After a VPC is created, its IP address space can be adjusted in the console.
B. To adjust the VPC IP address space, you need to submit a ticket.
C. A VPC provides an unlimited IP address space by default.
D. After a VPC is created, its IP address space cannot be adjusted.
Answer: D

9. Which of the following data replication methods are supported by TencentDB for MySQL?
A. Async replication
B. Semi-async replication
C. Semi-sync replication
D. Strong sync replication
Answer: A, C, D

10. A user wants subsequent requests from the client to be assigned to the same server. To
meet the requirements of the user's specified application server and maintain the continuity of
client sessions, which of the following CLB algorithms can be used?
A. Weighted least-connection algorithm
B. Source hashing scheduling algorithm
C. Weighted most-connection algorithm
D. Weighted round-robin algorithm
Answer: B

11. CLB divides into CLB instances and classic CLB instances.
Which of the following statements is true about the two types of CLB instances?
A. A frontend port in one CLB instance can point to multiple backend ports.
B. A frontend port in one classic CLB instance can point to multiple types of protocols.
C. A frontend port in one classic CLB instance can point to multiple backend ports.
D. A frontend port in one CLB instance can point to multiple types of protocols.
Answer: A

12. CLB divides into CLB instances and classic CLB instances.
Which of the following statements is true about the two types of CLB instances?
A. A frontend port in one classic CLB instance can point to multiple types of protocols.
B. A frontend port in one CLB instance can point to multiple types of protocols.
C. A frontend port in one CLB instance can point to multiple backend ports.
D. A frontend port in one classic CLB instance can point to multiple backend ports.
Answer: C

13. Which of the following statements about the default routing table is not correct?
A. Traffic within VPC: traffic within VPC is matched first.
B. Exact match route (the longest prefix match): when there are multiple routes in the route
table that can match the destination IP, the route with the longest (exact) mask is matched to
determine the next hop
C. Public IP: if no routing policy is matched, a CVM instance can access the Internet through its
public IP address.
D. Traffic within VPC: traffic within VPC is matched first.
Answer: D

14. Which of the following statements is wrong about an auto scaling group?
A. The lower limit can be set to ensure the scaling group performance.
B. The upper limit can be set to restrict the resources used by the scaling group.
C. The number of instances in a scaling group cannot be adjusted online. You can modify it only
after stopping the business.
D. Scaling can be triggered at the scheduled time or by alarms.
Answer: C

15. Configure
the client on the mobile device. 6. Test the connectivity
A. 1,2,3,4,5,6
B. 2,3,5,6,4,1
C. 4,5,6,3,1,2
D. 6,5,4,3,2,1
Answer: A

16. You purchased a CDH instance to sustain your business but found that it could not be
directly used after the purchase.
Which of the following might be the cause?
A. You need to contact the customer service to initialize the CDH instance after purchasing it.
B. You can use the CDH instance after waiting 24 hours after purchase.
C. You need to create a dedicated CVM instance on the CDH instance first before you can use
it.
D. You need to mount a cloud disk to the CDH instance first before you can start the system.
Answer: C

17. Which of the following statements is wrong about VPC, subnet, and route table?
A. A user can create multiple subnets at the same time.
B. A route table is used to control the outbound traffic destination of the subnets in a VPC.
C. A route table needs to be managed for each subnet.
D. A VPC can have only one subnet.
Answer: D

18. Which of the following are generally causes of the problem where a TencentDB for MySQL
instance fails to provide service normally as max_connections (number of connections) reaches
the upper limit? Select all that apply.
A. The business traffic is too low.
B. The number of access requests from the frontend is far beyond what can be processed by
the instance.
C. A business program bug causes too many null sessions.
D. A connection has been executed for too long and exclusively used the TencentDB for
MySQL resources, which blocks a large number of access requests.
Answer: B, C, D

19. Suppose that a user has configured the following IP allowlist for domain name
[Link] in the purchased CLB instance:
20. Which of the following statements is true about a secondary ENI?
A. It cannot be unbound.
B. It is an ENI created by the user.
C. It is an ENI created automatically when a CVM instance is created.
D. It cannot be bound.
Answer: B

Powered by TCPDF ([Link])

You might also like