Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Alibaba Exam ACA-Developer Topic 7 Question 82 Discussion

Actual exam question for Alibaba's ACA-Developer exam
Question #: 82
Topic #: 7
[All ACA-Developer Questions]

A certain project of Enterprise A (called Project-X) moves to the cloud and will need to use a variety of s Alibaba Cloud resources, such as ECS instances, RDS instances, SLB instances, and OSS storage space. There are multiple employees on the project who need to operate these cloud resources. Because each employee has different job responsibilities and requires different permissions, what is the WRONG approach to resource management?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Mitsue
20 days ago
Option D sounds like the way to go. CusSusyizing policies for fine-grained control is crucial for managing cloud resources securely.
upvoted 0 times
...
Lera
21 days ago
Haha, who would ever think giving everyone the keys to the kingdom is a good idea? Option B is a big no-no.
upvoted 0 times
...
Sonia
26 days ago
I agree with Susy. Option B is a bad idea. Access management should be handled more systematically using groups and policies.
upvoted 0 times
...
Susy
1 months ago
Option B is definitely wrong. Giving both web console and AccessKey credentials to each user is a security risk. They should be kept separate.
upvoted 0 times
Glory
7 days ago
D) Use system policies to bind reasonable permissions policies to users or user groups, and customize policies for more fine-grained control
upvoted 0 times
...
Corazon
8 days ago
C) When there are multiple RAM users under a cloud account, create user groups to classify and authorize RAM users with the same responsibilities
upvoted 0 times
...
Diane
13 days ago
A) Create RAM users each employee, and set login passwords or create AccessKey credentials as needed
upvoted 0 times
...
...
Gracia
2 months ago
I think the correct approach is D. Using system policies for fine-grained control seems like the most secure way to manage resources.
upvoted 0 times
...
Kimbery
2 months ago
I agree with Barrett. Option B is risky because if one set of credentials is compromised, the other one is also at risk.
upvoted 0 times
...
Barrett
2 months ago
I think the wrong approach is B. It's not safe to give both web console and AccessKey credentials to each user.
upvoted 0 times
...

Save Cancel