Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Alibaba Cloud ACA-Developer ACA Developer Certification Exam Practice Test

Page: 1 / 10
Total 95 questions

ACA Developer Certification Questions and Answers

Question 1

A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store the end user data for their app, and to ensure data isolation between each user of the app, to prevent one user from obtaining another's data. Which method can be done to meet these requirements?

Options:

A.

RAM Policy

B.

STS authorization

C.

Bucket Policy

D.

Object Policy

Question 2

Which of the following web applications are suitable for deployment on Simple Application Server (SAS), as compared with LCS? (Number of correct answers: 3)

Options:

A.

Quickly build a personal blog website

B.

Quickly build a small e-commerce website

C.

Quickly build serverless site using Function Compute

D.

Set up a NoSQL database service

E.

Quickly build a personal, learning, or test environment

Question 3

Which of the following database connection methods does ApsaraDB for Redis support? (Number of correct answers: 2)

Options:

A.

DMS (Data Management Service)

B.

aliyun-cll

C.

Redis-cIl

D.

Sentinel

Question 4

As more businesses move online and collect more data about their users, databases are beginning to grow very large, affecting table query performance and business operations. In order to solve these problems, in addition to sub-database sub-table transformation, we can also use Data Management Service (DMS)'s archiving function to regularly archive large table data. We can then remove the archived records from the original table to improve query performance. Which of these statements about this feature of DMS is NOT correct?

Options:

A.

The supported database types are RDS MySQL and PolarDB MySQL

B.

Before you can use this feature of DMS, you must first enable Alibaba Cloud's Database Backup Service (DBS)

C.

Backup data can be stored In OSS

D.

The user role of this operation must be 'administrator" or "DBA"

Question 5

Which of the following is NOT required for SMC (Server Migration Center) to migrate a server to Alibaba Cloud?

Options:

A.

Import the migration source information to the SMC console.

B.

From the SMC console, configure the type of disk image to be generated during the migration.

C.

The SMC client transfers the source data to an intermediate ECS instance.

D.

The SMC backend service generates a target Alibaba Cloud image based on the migration source.

Question 6

You can use Alibaba Cloud Data transmission service (DTS) or the open source tool Redis-shake to migrate and synchronize data from a local Redis instance to an Alibaba Cloud Redis instance. What is one feature which DTS has but Redis-shake does not?

Options:

A.

Full data migration

B.

Incremental data migration

C.

One-way data synchronization

D.

Two-way data synchronization

Question 7

Alibaba Cloud Link Tracing Analysis supports call link reporting based on the Open Tracing standard. Which of the following client types does link tracing support? (Number of correct answers:3)

Options:

A.

Jaeger

B.

Zipkln

C.

Skywalklng

D.

Pinpoint

Question 8

In order to have your applications interact with Alibaba Cloud RabbitMQ, you need to create related MQ resources first. Which of the following resources must be created? (Number of correct answers: 3)

Options:

A.

Vhost

B.

Exchange

C.

Queue

D.

Broker

E.

Topic

Question 9

Company A has a large number of files store in Alibaba Cloud OSS that need to be deleted (numbering in the tens of thousands). What is the fastest, easiest way to delete these files?

Options:

A.

Manually delete them one by one

B.

Configure a life cycle rule that matches the entire bucket, and delete all files after one day

C.

Call the API from a script, deleting files in batches

D.

Directly delete the bucket

Question 10

Which of the following statements describes AKs (Access Keys) incorrectly?

Options:

A.

AK can refer to both the AccessKey ID and the AccessKey secret

B.

You can use AK to construct an API request and the corresponding resources can be manipulated if your request successfully..

C.

An AccessKey ID and AccessKey Secret cannot be used separately

D.

AccessKey Secrets for RAM sub-accounts can be queried at any time on the Console Interface after creation

Question 11

In Alibaba Cloud RocketMQ, messages are kept for up to _____ days. We recommend configuring a monitoring service to watch the consumption status, and intervene manually when ''not consumed but to be deleted'' message alarms occur.

Options:

A.

2

B.

3

C.

4

D.

5

Question 12

Which of the following errors may occur when you access an image stored in Object Storage Service, and attach an image processing URL parameter to the URL ? (Number of correct answers: 3)

Options:

A.

NoSuchStyle

B.

NoSuchKey

C.

NoSuchFile

D.

NoSuchObject

E.

NoSuchBucket

Question 13

Which of these are good ways to secure access to your API deployed on Alibaba Cloud API Gateway?

(Number of correct answers: 3)

Options:

A.

Enable API Gateway to connect to backend services in an Alibaba Cloud VPC network group. This guarantees the security of API requests.

B.

Configure security keys for API Gateway.

C.

Use HTTPS to encrypt requests.

D.

Use OpenID Connect to authenticate requests.

E.

Allow only internal IP addresses to call the API.

Question 14

When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database's resources. Which of the following options are best practices when creating database indexes? (Number of correct answers: 3)

Options:

A.

Add an index to a field that is frequently queried but does not frequently perform add, delete, or modify operations.

B.

Applies indices to fields that contain many records.

C.

table should not contain more than 6 indexed fields.

D.

Apply indexing to fields of fixed length (preferably not long fields).

E.

Adhere to the rightmost prefix principle when using composite indexes.

Page: 1 / 10
Total 95 questions