Alibaba Cloud ACA-Developer ACA Developer Certification Online Training
Alibaba Cloud ACA-Developer Online Training
The questions for ACA-Developer were last updated at Nov 22,2024.
- Exam Code: ACA-Developer
- Exam Name: ACA Developer Certification
- Certification Provider: Alibaba Cloud
- Latest update: Nov 22,2024
You can use Alibaba Cloud Data transmission service (DTS) or the open source tool Redis-shake to migrate and synchronize data from a local Redis instance to an Alibaba Cloud Redis instance.
What is one feature which DTS has but Redis-shake does not?
- A . Full data migration
- B . Incremental data migration
- C . One-way data synchronization
- D . Two-way data synchronization
Which of the following options is not included in Object Storage Service (OSS) object URLs?
- A . Region name
- B . Zone name
- C . Bucket name
- D . Filename
What are the benefits of creating indexes on PolarDB? (Number of correct answers: 2)
- A . Improve the query efficiency SELECT statements.
- B . Improve the efficiency of DML operations such as UPDATE.
- C . Improve the efficiency of DDL operations.
- D . Reduce invalid data scanning.
Which of these are suitable use cases for Alibaba Cloud’s MongoDB service? (Number of correct answers: 3)
- A . Applications requiring high OPS, such as logging apps
- B . Scenarios where complex transaction support is required
- C . Applications where JSON is a good choice of storage format
- D . Applications requiring geo-location queries, such as logistics or order status apps
A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server is 404.
Which of these could be the cause?
- A . The log project (Project) does not exist
- B . The requested digital signature does not match
- C . Server internal error
- D . Server is busy: please try later
CloudMonitor’s "Event Monitoring" feature provides you with event reporting, query, and alarm functions, Score 2 so that you can collect metrics on your running Alibaba Cloud systems, and receive alerts when something goes wrong.
Which of these is NOT a correct description of the monitoring event types supported by CloudMonitor?
- A . For ECS, CloudMonitor supports the collection and reporting of important ECS operating system level events, such as application crashes.
- B . For Object Storage Service (OSS), CloudMonitor supports the collection and reporting of bucket upstream and downstream bandwidth which exceeds the flow control threshold or the user-selected reporting threshold.
- C . For Server Load Balancer (SLB), CloudMonitor supports the collection and reporting of HTTPS certificate expiration events, for certificates installed on SLB.
- D . For E-MapReduce, CloudMonitor supports the collection and reporting of service component status, cluster creation failure, and timeout events.
What are the advantages of using Elastic Container Instance (ECI) to deploy applications compared with using ECS? (Number of correct answers; 2)
- A . Low maintenance, low costs
- B . Startup in seconds without the need to reserve resources
- C . Less significant visualization layer performance losses
- D . Stronger isolation between instances
Which of the following are correct, regarding RAM users? (Number of correct answers: 3)
- A . RAM users can be created under a single Alibaba Cloud account, corresponding to employees, systems, or applications.
- B . RAM users do not "own" the resources that they create (those belong to the Alibaba Cloud account itself), and RAM users cannot generate and pay their own individual bills (costs accrue to and are billed to the master Alibaba Cloud account).
- C . RAM users belong to an Alibaba Cloud account, but they can also operate as independent accounts with their own private resources, not visible to the primary Alibaba Cloud account.
- D . RAM users must be authorized by the Alibaba Cloud account to log in to the console or use the API to manage the resources owned by the Alibaba Cloud account.
Which of the following statements are correct, with regard to Alibaba Cloud Log Service? (Number of correct answers: 3)
- A . As an agent for collecting logs, Logtail can collect logs from existing system log files in a non-intrusive manner
- B . The Log Service frontend service adopts an LVS + NGINX architecture
- C . The Logstore backend service is deployed on a single machine to complete the real-time persistence, indexing, query and delivery of Logstore data to MaxCompute
- D . Each log written to the Log Service backend will be saved in triplicate (across three separate physical servers)
A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store the end user data for their app, and to ensure data isolation between each user of the app, to prevent one user from obtaining another’s data.
Which method can be done to meet these requirements?
- A . RAM Policy
- B . STS authorization
- C . Bucket Policy
- D . Object Policy