Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Alibaba Cloud ACA-Developer ACA Developer Certification Exam Practice Test

Page: 1 / 10
Total 95 questions

ACA Developer Certification Questions and Answers

Question 1

Which of the following parameter locations should be specified for the parameter of key1 where the request URL is in the form: http://somesite.com/test?key1 =[value1] ?

Options:

A.

Parameter Path

B.

Query

C.

HTTP Header

D.

HTTP Body

Question 2

Which of the following descriptions of Alibaba Cloud's SSL certificate service are correct? (Number of correct answers: 2)

Options:

A.

Alibaba Cloud SSL Certificate Service supports the purchase of three types of certificates: DV certificates, OV certificates, and EV certificates.

B.

EV certificates are suitable for large enterprises, financial institutions, etc.

C.

OV certificates are suitable for personal websites.

D.

DV level certificates are suitable for government organizations, enterprises, educational institutions, etc.

Question 3

Which of the following programming languages are supported by the Alibaba Cloud SDK? (Number of correct answers: 3)

Options:

A.

Java

B.

Swift

C.

PHP

D.

Python

E.

Bash shell

Question 4

Which of the following operations can be performed through Log Service sAPI? (Number of correct answers: 3)

Options:

A.

Collect logs based on Logtail configuration and Logtail machine group information

B.

Create a Logstore, write and read logs to the Logstore

C.

Access control for different users

D.

Deliver logs to OSS for storage and analysis

Question 5

On which operating systems can you install Alibaba Cloud command line tools? (Number of correct answers: 3)

Options:

A.

Windows

B.

Linux

C.

macOS

D.

Android

Question 6

Which of the following errors may occur when you access an image stored in Object Storage Service, and attach an image processing URL parameter to the URL ? (Number of correct answers: 3)

Options:

A.

NoSuchStyle

B.

NoSuchKey

C.

NoSuchFile

D.

NoSuchObject

E.

NoSuchBucket

Question 7

Which of the following detection protocol is NOT supported by CloudMonitor's Site Monitoring feature?

Options:

A.

HTTP(S)

B.

TCP/UDP

C.

DNS

D.

SNMP

Question 8

Elastic Container instance (ECI) is an agile, secure, serverless service for running containers. If you need to configure public network access for ECI, which of these are reasonable solutions? (Number of correct answers: 3)

Options:

A.

Specify a public IP address when creating the ECI.

B.

Bind a NAT gateway and an EIP to the VPC to which the ECI belongs.

C.

Configure ECI as a backend for a Server Load Balancer (SLB) that has a public IP address.

D.

Bind an Elastic IP (EIP) to the ECI instance.

Question 9

When using Alibaba Cloud CDN, a visitor's request will first be routed to a CDN edge node, and in the event of a cache miss at this edge node, the node will fetch data from the origin site (back-to-source request). Even with this redirection, it is possible for the origin site to see the visitors real IP address. Which of the following statements about obtaining the visitor's real IP address are correct? (Number of correct answers: 2)

Options:

A.

A visitor's real IP address can only be obtained by modifying the site or web application.

B.

A visitor's real IP address is stored in the "X-Forwarded-For" HTTP header It can be directly obtained via Apache or NGINX logs.

C.

In Windows, if IIS is used, after installing the "F5XForwardedFor" extension module, the visitor's real IP address can be seen via IIS logs.

D.

You can activate the "record visitor's real IP" function in the Alibaba Cloud CDN console, then you can directly view visitor's IP addresses from the Alibaba Cloud CDN access logs.

Question 10

Which of the following descriptions of the principles of Alibaba Cloud SSL certificate private key protection is correct?

Options:

A.

Alibaba Cloud uses the built-in functionality of the SSL certificate service to encrypt and store the private key to certificates private key

B.

The plaintext of Alibaba Cloud's private key is usually stored on disk and backed up regularly

C.

Alibaba Cloud Certificate Service uses symmetric encryption to save the certificate private key

D.

Alibaba Cloud Certificate Service keys are loaded Into memory in plaintext format ONLY when needed

Question 11

By default, Function Compute creates an instance for each request Function compute allows you to create multiple instances concurrently to reduce costs and improve execution efficiency Which of the following scenarios is NOT suitable for enabling the feature of handling multiple requests on a single instance? (Number of correct answers: 2)

Options:

A.

The function has a shared state and cannot be accessed concurrently.

B.

Requests are waiting for responses from the downstream service for an extended period of time.

C.

A request consumes a large amount of CPU and memory resources.

D.

Functions processes independent data objects.

Question 12

When a developer uses the LogGroup function to package multiple logs and writes data through the API/SDK of the Log Service, it receives error code 403 or 500 continiously. What are the possible reasons?

Options:

A.

The "Topic" data field is empty

B.

The log size written to log group is less than 5MB

C.

The target partition in the Logstore is not specified

D.

Insufficient space in the Logstore partition

Question 13

What are the advantages of using Elastic Container Instance (ECI) to deploy applications compared with using ECS? (Number of correct answers; 2)

Options:

A.

Low maintenance, low costs

B.

Startup in seconds without the need to reserve resources

C.

Less significant visualization layer performance losses

D.

Stronger isolation between instances

Question 14

When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database's resources. Which of the following options are best practices when creating database indexes? (Number of correct answers: 3)

Options:

A.

Add an index to a field that is frequently queried but does not frequently perform add, delete, or modify operations.

B.

Applies indices to fields that contain many records.

C.

table should not contain more than 6 indexed fields.

D.

Apply indexing to fields of fixed length (preferably not long fields).

E.

Adhere to the rightmost prefix principle when using composite indexes.

Page: 1 / 10
Total 95 questions