Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

ACA-Developer Sample Questions Answers

Questions 4

When a developer uses the LogGroup function to package multiple logs and writes data through the API/SDK of the Log Service, it receives error code 403 or 500 continiously. What are the possible reasons?

Options:

A.

The "Topic" data field is empty

B.

The log size written to log group is less than 5MB

C.

The target partition in the Logstore is not specified

D.

Insufficient space in the Logstore partition

Buy Now
Questions 5

What migration features does Alibaba Cloud SMC (Server Migration Center) support? (Number of correct answers: 3)

Options:

A.

Supports incremental data migration

B.

Supports batch migration

C.

Supports migration from virtual machines to physical machines

D.

Supports migration to Container Registry

E.

Supports all versions Microsoft Windows

Buy Now
Questions 6

Which of these are good ways to secure access to your API deployed on Alibaba Cloud API Gateway?

(Number of correct answers: 3)

Options:

A.

Enable API Gateway to connect to backend services in an Alibaba Cloud VPC network group. This guarantees the security of API requests.

B.

Configure security keys for API Gateway.

C.

Use HTTPS to encrypt requests.

D.

Use OpenID Connect to authenticate requests.

E.

Allow only internal IP addresses to call the API.

Buy Now
Questions 7

Which of the following is NOT a valid state for a scaling activity in Alibaba Cloud's Elastic Scaling Service ESS -also known as Auto Scaling) state of the scaling activity in the Alibaba Cloud elastic

scaling group?

Options:

A.

Rejected

B.

Executing

C.

Failed

D.

Timeout

Buy Now
Questions 8

Which of the following is NOT a feature of Alibaba Cloud's Cassandra database service?

Options:

A.

Centerless distributed architecture

B.

Supports both narrow and wide tables, providing flexible schema functions

C.

Cluster storage, strong expansion of read and write capabilities

D.

Enterprise-level capabilities such as disaster tolerance, backup and recovery, security, and monitoring across data centers

Buy Now
Questions 9

A game company is developing a game application for the Apple and Android platforms. Currently, this application stores user data (as flat files) securely on the local storage of a user's device. The game company wants to provide a new feature that allows customers to play the same game on different devices, which requires synchronizing user data between different devices. Which of the following cloud services supports this requirement without creating a new back-end application?

Options:

A.

Function Compute

B.

Object Storage Service (OSS)

C.

Table Store

D.

Log service

Buy Now
Questions 10

Which of the following is NOT required for SMC (Server Migration Center) to migrate a server to Alibaba Cloud?

Options:

A.

Import the migration source information to the SMC console.

B.

From the SMC console, configure the type of disk image to be generated during the migration.

C.

The SMC client transfers the source data to an intermediate ECS instance.

D.

The SMC backend service generates a target Alibaba Cloud image based on the migration source.

Buy Now
Questions 11

Which of the following data volume types is not supported by Elastic Container Instance (ECI)?

Options:

A.

EmptyDir

B.

NFS

C.

ConfigFile

D.

FixedVolume

Buy Now
Questions 12

Which data format is NOT supported by Alibaba Cloud Message Service?

Options:

A.

XML

B.

JSON

C.

SIMPLIFIED

D.

VERBOSE

Buy Now
Questions 13

Which of the following statements about PolarDB's endpoint(s) is NOT correct?

Options:

A.

The endpoint of the PolarDB MySQL database includes the cluster endpoint and the primary endpoint.

B.

Through a cluster endpoint, applications can connect to data nodes.

C.

The primary endpoint supports read/write splitting.

D.

Cluster endpoints support read/write splitting.

Buy Now
Questions 14

To meet data analytics requirements on large datasets, which of these databases can meet the demand for structured and semi-structured storage for almost all types of data, albeit with limited support for strong transactions?

Options:

A.

HBase

B.

OceanBase

C.

RDSMariaDB

D.

TSDB

Buy Now
Questions 15

Function Compute supports one-way triggers and two-way triggers. Which of the following triggers is a one-way trigger? That is to say you only need to configure the trigger in the event source, not in Function Compute?.

Options:

A.

OSS event trigger(s)

B.

CloudMonitor trigger(s)

C.

MNS topic trigger(s)

D.

SLS trigger(s)

Buy Now
Questions 16

Which of these are suitable use cases for Alibaba Cloud's MongoDB service? (Number of correct answers: 3)

Options:

A.

Applications requiring high OPS, such as logging apps

B.

Scenarios where complex transaction support is required

C.

Applications where JSON is a good choice of storage format

D.

Applications requiring geo-location queries, such as logistics or order status apps

Buy Now
Questions 17

Which of the following options is not included in Object Storage Service (OSS) object URLs?

Options:

A.

Region name

B.

Zone name

C.

Bucket name

D.

Filename

Buy Now
Questions 18

A developer have written a web application using a microservice architecture, in such a architecture, the client (web browser or mobile application) first initiates a request. The request first reaches the load balancer, then goes through an authentication service, a billing service, then requests a resource, and finally a result is returned. How many spans does such a call chain consist of?

Options:

A.

3

B.

4

C.

5

D.

6

Buy Now
Questions 19

During the process of backing up an RDS database, a developer found that the backup failed. What might cause this to happen?

Options:

A.

The database instance is not stopped

B.

DDL operations were performed during the backup

C.

DML operations were performed during the backup

D.

DCL operations were performed during the backup

Buy Now
Questions 20

A developer received a response code of 409 when trying to use a KMS key via the API. Given that a 409 response was returned, which of these states could the KMS key be in? (Number of correct answers: 3)

Options:

A.

PendingDeletion

B.

Pendinglmport

C.

Disabled

D.

PendingCreate

Buy Now
Questions 21

A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server is 404. Which of these could be the cause?

Options:

A.

The log project (Project) does not exist

B.

The requested digital signature does not match

C.

Server internal error

D.

Server is busy: please try later

Buy Now
Questions 22

A Developer is asked to implement a caching layer in front of RDS. Cached content is expensive to regenerate in case of service failure. Which implementation below would work while maintaining maximum uptime?

Options:

A.

Implement ApsaraDB for Redis in Cluster Mode

B.

Install Redis on an ECS instance

C.

Implement ApsaraDB for Redis in Standard Mode

D.

Migrate the ROS database to HBase to save the cache layer

Buy Now
Questions 23

Alibaba Cloud Log Service is a Pay-As-You-Go service. The billing unit is 7 day, and the configuration can be adjusted at any time: fees are charged according to actual usage. Which of the following are the main charges for Log Service? (Number of correct answers: 3)

Options:

A.

Read and write traffic

B.

Storage capacity

C.

Index traffic after index configuration

D.

Query analysis

Buy Now
Questions 24

CloudMonitor's "Event Monitoring" feature provides you with event reporting, query, and alarm functions, Score 2 so that you can collect metrics on your running Alibaba Cloud systems, and receive alerts when something goes wrong. Which of these is NOT a correct description of the monitoring event types supported by CloudMonitor?

Options:

A.

For ECS, CloudMonitor supports the collection and reporting of important ECS operating system level events, such as application crashes.

B.

For Object Storage Service (OSS), CloudMonitor supports the collection and reporting of bucket upstream and downstream bandwidth which exceeds the flow control threshold or the user-selected reporting threshold.

C.

For Server Load Balancer (SLB), CloudMonitor supports the collection and reporting of HTTPS certificate expiration events, for certificates installed on SLB.

D.

For E-MapReduce, CloudMonitor supports the collection and reporting of service component status, cluster creation failure, and timeout events.

Buy Now
Questions 25

A certain project of Enterprise A (called Project-X) moves to the cloud and will need to use a variety of s Alibaba Cloud resources, such as ECS instances, RDS instances, SLB instances, and OSS storage space. There are multiple employees on the project who need to operate these cloud resources. Because each employee has different job responsibilities and requires different permissions, what is the WRONG approach to resource management?

Options:

A.

Create RAM users each employee, and set login passwords or create AccessKey credentials as needed

B.

When creating RAM for users, give each user both web console AND AccessKey credentials: there is no need to keep these separate

C.

When there are multiple RAM users under a cloud account, create user groups to classify and authorize RAM users with the same responsibilities

D.

Use system policies to bind reasonable permissions policies to users or user groups, and customize policies for more fine-grained control

Buy Now
Questions 26

When using Alibaba Cloud CDN, a visitor's request will first be routed to a CDN edge node, and in the event of a cache miss at this edge node, the node will fetch data from the origin site (back-to-source request). Even with this redirection, it is possible for the origin site to see the visitors real IP address. Which of the following statements about obtaining the visitor's real IP address are correct? (Number of correct answers: 2)

Options:

A.

A visitor's real IP address can only be obtained by modifying the site or web application.

B.

A visitor's real IP address is stored in the "X-Forwarded-For" HTTP header It can be directly obtained via Apache or NGINX logs.

C.

In Windows, if IIS is used, after installing the "F5XForwardedFor" extension module, the visitor's real IP address can be seen via IIS logs.

D.

You can activate the "record visitor's real IP" function in the Alibaba Cloud CDN console, then you can directly view visitor's IP addresses from the Alibaba Cloud CDN access logs.

Buy Now
Questions 27

you have a Node.js based application and you plan to migrate it to Alibaba Cloud Function Compute, which of the following steps is unnecessary?

Options:

A.

Manually install the Node. Js package in the Function Compute console

B.

Create a single web application and upload the corresponding code package via the Function Compute console (or fcli)

C.

Configure program startup commands and access ports in the Function Compute console

D.

Start and verify the application in the Function Compute console

Buy Now
Questions 28

When a developer calls the Alibaba Cloud SDK to access Elastic Compute Service (ECS), the following error is returned; RealNameAuthenticationError What is the possible cause?

Options:

A.

The ECS instance name violates the ECS service's naming conventions.

B.

The ECS instance name conflicts with other instance names.

C.

The user's Alibaba Cloud account has not passed real name authentication

D.

The API callers account and password are not authorized for ECS access.

Buy Now
Exam Code: ACA-Developer
Exam Name: ACA Developer Certification
Last Update: May 18, 2024
Questions: 95
$64  $159.99
$48  $119.99
$40  $99.99
buy now ACA-Developer