New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Alibaba Cloud ACA-Developer Dumps Questions Answers

ACA Developer Certification Questions and Answers

Question 1

Which of the following descriptions describes the (Security Token Service) STS service correctly? (Number of correct answers: 3)

Options:

A.

Through the STS service, RAM users or RAM roles can obtain a temporary token that allows them to call the Alibaba Cloud API or use the web console

B.

A STS request consists of an access address, communication protocol, request method, request parameters and character encoding

C.

When calling the STS API, in order to ensure the safe calling of the API, Alibaba Cloud will authenticate each API request through a signature when each API call is made

D.

The STS service supports the use of both HTTP and HTTPS protocols

Buy Now
Question 2

A development team currently supports an application that is designed to be deployed on a single server's local memory As part of migrating to Alibaba Cloud, the team needs to use Auto Scaling, and must therefore move their game state data off of their servers, so that they can automatically scale up and down without losing game data. Where should the team store these game results to best allow for consistent results without impacting performance?

Options:

A.

OSS

B.

RDS

C.

Redis

D.

Log Service

Question 3

CloudMonitor's "Event Monitoring" feature provides you with event reporting, query, and alarm functions, Score 2 so that you can collect metrics on your running Alibaba Cloud systems, and receive alerts when something goes wrong. Which of these is NOT a correct description of the monitoring event types supported by CloudMonitor?

Options:

A.

For ECS, CloudMonitor supports the collection and reporting of important ECS operating system level events, such as application crashes.

B.

For Object Storage Service (OSS), CloudMonitor supports the collection and reporting of bucket upstream and downstream bandwidth which exceeds the flow control threshold or the user-selected reporting threshold.

C.

For Server Load Balancer (SLB), CloudMonitor supports the collection and reporting of HTTPS certificate expiration events, for certificates installed on SLB.

D.

For E-MapReduce, CloudMonitor supports the collection and reporting of service component status, cluster creation failure, and timeout events.

Question 4

Which of the following options correctly describes CloudMonitor Custom Monitoring and Custom Events? (Number of correct answers; 2)

Options:

A.

Custom Events are used for collection of continuous event type data, queries, and alarms.

B.

Custom Events is for periodic and continuous collection of time series monitoring data, queries, and alarms.

C.

Custom Monitoring is used for periodic and continuous collection of time series monitoring data, queries, and alarms.

D.

Custom Monitoring is used for collection of non-continuous event data, such as information about ECS instance restarts.

Question 5

On which operating systems can you install Alibaba Cloud command line tools? (Number of correct answers: 3)

Options:

A.

Windows

B.

Linux

C.

macOS

D.

Android

Question 6

You can use Alibaba Cloud Data transmission service (DTS) or the open source tool Redis-shake to migrate and synchronize data from a local Redis instance to an Alibaba Cloud Redis instance. What is one feature which DTS has but Redis-shake does not?

Options:

A.

Full data migration

B.

Incremental data migration

C.

One-way data synchronization

D.

Two-way data synchronization

Question 7

Which of the following is NOT a valid state for a scaling activity in Alibaba Cloud's Elastic Scaling Service ESS -also known as Auto Scaling) state of the scaling activity in the Alibaba Cloud elastic

scaling group?

Options:

A.

Rejected

B.

Executing

C.

Failed

D.

Timeout

Question 8

Alibaba Cloud Log Service is a Pay-As-You-Go service. The billing unit is 7 day, and the configuration can be adjusted at any time: fees are charged according to actual usage. Which of the following are the main charges for Log Service? (Number of correct answers: 3)

Options:

A.

Read and write traffic

B.

Storage capacity

C.

Index traffic after index configuration

D.

Query analysis

Question 9

During the process of backing up an RDS database, a developer found that the backup failed. What might cause this to happen?

Options:

A.

The database instance is not stopped

B.

DDL operations were performed during the backup

C.

DML operations were performed during the backup

D.

DCL operations were performed during the backup

Question 10

Which of the following statements about PolarDB's endpoint(s) is NOT correct?

Options:

A.

The endpoint of the PolarDB MySQL database includes the cluster endpoint and the primary endpoint.

B.

Through a cluster endpoint, applications can connect to data nodes.

C.

The primary endpoint supports read/write splitting.

D.

Cluster endpoints support read/write splitting.

Question 11

You can create an event notification rule in Message Service and push notifications to the specified consumer in the form of messages, to receive events from specified Alibaba Cloud resources. Which of the following options are correct statements about the Message Service (MS) service? (Number of correct answers: 2)

Options:

A.

Event Notifications can cross regions.

B.

Message Service provides synchronous notifications to ensure the consistency between the message acknowledgment and event processing.

C.

The event notification message is retained within the valid time. When you fail to receive an event message, the event notification message is retried based on the specified retry policy.

D.

The consumer type of the event notification message can be HTTP Server, Queue, or Topic.

Question 12

Elastic Container instance (ECI) is an agile, secure, serverless service for running containers. If you need to configure public network access for ECI, which of these are reasonable solutions? (Number of correct answers: 3)

Options:

A.

Specify a public IP address when creating the ECI.

B.

Bind a NAT gateway and an EIP to the VPC to which the ECI belongs.

C.

Configure ECI as a backend for a Server Load Balancer (SLB) that has a public IP address.

D.

Bind an Elastic IP (EIP) to the ECI instance.

Question 13

Which of the following options is correct, regarding Object ACL in Alibaba Cloud's Object Storage Service (OSS)?

Options:

A.

Object ACL is an object-level (not bucket level) permission control mechanism. There are currently three levels of access rights: private, public-read, and public-read-write.

B.

"Private" indicates that an object is a private resource, that is, only the owner of the object has read and write permissions on the object, and other users can read but have no permission to modify or delete the object.

C.

If the permissions of an object are not set, the permissions of the object are inherited from the bucket.

D.

You can set the ACL associated with an object by examining the X-OSS-Object-ACL header in the HEAD request, when making the PutObjectACL API call.

Question 14

When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database's resources. Which of the following options are best practices when creating database indexes? (Number of correct answers: 3)

Options:

A.

Add an index to a field that is frequently queried but does not frequently perform add, delete, or modify operations.

B.

Applies indices to fields that contain many records.

C.

table should not contain more than 6 indexed fields.

D.

Apply indexing to fields of fixed length (preferably not long fields).

E.

Adhere to the rightmost prefix principle when using composite indexes.