Exam4Training

Alibaba Cloud ACA-Developer ACA Developer Certification Online Training

Question #1

In order to have your applications interact with Alibaba Cloud RabbitMQ, you need to create related MQ resources first.

Which of the following resources must be created? (Number of correct answers: 3)

  • A . Vhost
  • B . Exchange
  • C . Queue
  • D . Broker
  • E . Topic

Reveal Solution Hide Solution

Correct Answer: B,C,E
Question #2

During the process of backing up an RDS database, a developer found that the backup failed.

What might cause this to happen?

  • A . The database instance is not stopped
  • B . DDL operations were performed during the backup
  • C . DML operations were performed during the backup
  • D . DCL operations were performed during the backup

Reveal Solution Hide Solution

Correct Answer: C
Question #3

Which of the following descriptions describes the (Security Token Service) STS service correctly? (Number of correct answers: 3)

  • A . Through the STS service, RAM users or RAM roles can obtain a temporary token that allows them to call the Alibaba Cloud API or use the web console
  • B . A STS request consists of an access address, communication protocol, request method, request parameters and character encoding
  • C . When calling the STS API, in order to ensure the safe calling of the API, Alibaba Cloud will authenticate each API request through a signature when each API call is made
  • D . The STS service supports the use of both HTTP and HTTPS protocols

Reveal Solution Hide Solution

Correct Answer: A,B,C
Question #4

When a developer calls the Alibaba Cloud SDK to access Elastic Compute Service (ECS), the following error is returned; RealNameAuthenticationError

What is the possible cause?

  • A . The ECS instance name violates the ECS service’s naming conventions.
  • B . The ECS instance name conflicts with other instance names.
  • C . The user’s Alibaba Cloud account has not passed real name authentication
  • D . The API callers account and password are not authorized for ECS access.

Reveal Solution Hide Solution

Correct Answer: D
Question #5

Serverless Workflow allows you to orchestrate distributed tasks in sequence, branch, and parallel modes, and ensure that tasks are reliably coordinated according to your workflow logic.

Which of the following service integration modes is not supported by Serverless Workflow?

  • A . Request response mode
  • B . Synchronization mode
  • C . Asynchronous mode
  • D . Waiting for callback mode

Reveal Solution Hide Solution

Correct Answer: C
Question #5

Serverless Workflow allows you to orchestrate distributed tasks in sequence, branch, and parallel modes, and ensure that tasks are reliably coordinated according to your workflow logic.

Which of the following service integration modes is not supported by Serverless Workflow?

  • A . Request response mode
  • B . Synchronization mode
  • C . Asynchronous mode
  • D . Waiting for callback mode

Reveal Solution Hide Solution

Correct Answer: C
Question #5

Serverless Workflow allows you to orchestrate distributed tasks in sequence, branch, and parallel modes, and ensure that tasks are reliably coordinated according to your workflow logic.

Which of the following service integration modes is not supported by Serverless Workflow?

  • A . Request response mode
  • B . Synchronization mode
  • C . Asynchronous mode
  • D . Waiting for callback mode

Reveal Solution Hide Solution

Correct Answer: C
Question #5

Serverless Workflow allows you to orchestrate distributed tasks in sequence, branch, and parallel modes, and ensure that tasks are reliably coordinated according to your workflow logic.

Which of the following service integration modes is not supported by Serverless Workflow?

  • A . Request response mode
  • B . Synchronization mode
  • C . Asynchronous mode
  • D . Waiting for callback mode

Reveal Solution Hide Solution

Correct Answer: C
Question #9

It should be possible to process video in parallel at scale, to ensure that videos are preprocessed in a reasonable amount of time.

Which of the following Alibaba Cloud applications can be combined to provide a low operation and maintenance burden and relatively low operating costs? (Number of correct answers: 3)

  • A . Serverless Workflow
  • B . Function Compute
  • C . Log Service
  • D . Elastic Compute Service (ECS)
  • E . Server Load Balancer (SLB)

Reveal Solution Hide Solution

Correct Answer: A,C,D
Question #10

A Developer is asked to implement a caching layer in front of RDS. Cached content is expensive to regenerate in case of service failure.

Which implementation below would work while maintaining maximum uptime?

  • A . Implement ApsaraDB for Redis in Cluster Mode
  • B . Install Redis on an ECS instance
  • C . Implement ApsaraDB for Redis in Standard Mode
  • D . Migrate the ROS database to HBase to save the cache layer

Reveal Solution Hide Solution

Correct Answer: A

Question #11

You can use Alibaba Cloud Data transmission service (DTS) or the open source tool Redis-shake to migrate and synchronize data from a local Redis instance to an Alibaba Cloud Redis instance.

What is one feature which DTS has but Redis-shake does not?

  • A . Full data migration
  • B . Incremental data migration
  • C . One-way data synchronization
  • D . Two-way data synchronization

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Which of the following options is not included in Object Storage Service (OSS) object URLs?

  • A . Region name
  • B . Zone name
  • C . Bucket name
  • D . Filename

Reveal Solution Hide Solution

Correct Answer: B
Question #13

What are the benefits of creating indexes on PolarDB? (Number of correct answers: 2)

  • A . Improve the query efficiency SELECT statements.
  • B . Improve the efficiency of DML operations such as UPDATE.
  • C . Improve the efficiency of DDL operations.
  • D . Reduce invalid data scanning.

Reveal Solution Hide Solution

Correct Answer: A,D
Question #14

Which of these are suitable use cases for Alibaba Cloud’s MongoDB service? (Number of correct answers: 3)

  • A . Applications requiring high OPS, such as logging apps
  • B . Scenarios where complex transaction support is required
  • C . Applications where JSON is a good choice of storage format
  • D . Applications requiring geo-location queries, such as logistics or order status apps

Reveal Solution Hide Solution

Correct Answer: A,C,D
Question #15

A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server is 404.

Which of these could be the cause?

  • A . The log project (Project) does not exist
  • B . The requested digital signature does not match
  • C . Server internal error
  • D . Server is busy: please try later

Reveal Solution Hide Solution

Correct Answer: A
Question #16

CloudMonitor’s "Event Monitoring" feature provides you with event reporting, query, and alarm functions, Score 2 so that you can collect metrics on your running Alibaba Cloud systems, and receive alerts when something goes wrong.

Which of these is NOT a correct description of the monitoring event types supported by CloudMonitor?

  • A . For ECS, CloudMonitor supports the collection and reporting of important ECS operating system level events, such as application crashes.
  • B . For Object Storage Service (OSS), CloudMonitor supports the collection and reporting of bucket upstream and downstream bandwidth which exceeds the flow control threshold or the user-selected reporting threshold.
  • C . For Server Load Balancer (SLB), CloudMonitor supports the collection and reporting of HTTPS certificate expiration events, for certificates installed on SLB.
  • D . For E-MapReduce, CloudMonitor supports the collection and reporting of service component status, cluster creation failure, and timeout events.

Reveal Solution Hide Solution

Correct Answer: C
Question #17

What are the advantages of using Elastic Container Instance (ECI) to deploy applications compared with using ECS? (Number of correct answers; 2)

  • A . Low maintenance, low costs
  • B . Startup in seconds without the need to reserve resources
  • C . Less significant visualization layer performance losses
  • D . Stronger isolation between instances

Reveal Solution Hide Solution

Correct Answer: A,B
Question #18

Which of the following are correct, regarding RAM users? (Number of correct answers: 3)

  • A . RAM users can be created under a single Alibaba Cloud account, corresponding to employees, systems, or applications.
  • B . RAM users do not "own" the resources that they create (those belong to the Alibaba Cloud account itself), and RAM users cannot generate and pay their own individual bills (costs accrue to and are billed to the master Alibaba Cloud account).
  • C . RAM users belong to an Alibaba Cloud account, but they can also operate as independent accounts with their own private resources, not visible to the primary Alibaba Cloud account.
  • D . RAM users must be authorized by the Alibaba Cloud account to log in to the console or use the API to manage the resources owned by the Alibaba Cloud account.

Reveal Solution Hide Solution

Correct Answer: A,C,D
Question #19

Which of the following statements are correct, with regard to Alibaba Cloud Log Service? (Number of correct answers: 3)

  • A . As an agent for collecting logs, Logtail can collect logs from existing system log files in a non-intrusive manner
  • B . The Log Service frontend service adopts an LVS + NGINX architecture
  • C . The Logstore backend service is deployed on a single machine to complete the real-time persistence, indexing, query and delivery of Logstore data to MaxCompute
  • D . Each log written to the Log Service backend will be saved in triplicate (across three separate physical servers)

Reveal Solution Hide Solution

Correct Answer: A,B,D
Question #20

A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store the end user data for their app, and to ensure data isolation between each user of the app, to prevent one user from obtaining another’s data.

Which method can be done to meet these requirements?

  • A . RAM Policy
  • B . STS authorization
  • C . Bucket Policy
  • D . Object Policy

Reveal Solution Hide Solution

Correct Answer: B

Question #20

A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store the end user data for their app, and to ensure data isolation between each user of the app, to prevent one user from obtaining another’s data.

Which method can be done to meet these requirements?

  • A . RAM Policy
  • B . STS authorization
  • C . Bucket Policy
  • D . Object Policy

Reveal Solution Hide Solution

Correct Answer: B
Question #20

A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store the end user data for their app, and to ensure data isolation between each user of the app, to prevent one user from obtaining another’s data.

Which method can be done to meet these requirements?

  • A . RAM Policy
  • B . STS authorization
  • C . Bucket Policy
  • D . Object Policy

Reveal Solution Hide Solution

Correct Answer: B
Question #20

A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store the end user data for their app, and to ensure data isolation between each user of the app, to prevent one user from obtaining another’s data.

Which method can be done to meet these requirements?

  • A . RAM Policy
  • B . STS authorization
  • C . Bucket Policy
  • D . Object Policy

Reveal Solution Hide Solution

Correct Answer: B
Question #20

A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store the end user data for their app, and to ensure data isolation between each user of the app, to prevent one user from obtaining another’s data.

Which method can be done to meet these requirements?

  • A . RAM Policy
  • B . STS authorization
  • C . Bucket Policy
  • D . Object Policy

Reveal Solution Hide Solution

Correct Answer: B
Question #25

1 he server uploads the resume to OSS

Which of the following methods can be used to upload objects to OSS without requiring Step 3?

  • A . Simple Upload
  • B . Form Upload
  • C . Multipart Upload
  • D . Append Upload

Reveal Solution Hide Solution

Correct Answer: D
Question #26

Which of the following database connection methods does ApsaraDB for Redis support? (Number of correct answers: 2)

  • A . DMS (Data Management Service)
  • B . aliyun-cll
  • C . Redis-cIl
  • D . Sentinel

Reveal Solution Hide Solution

Correct Answer: A,C
Question #27

If a user finds that the Content Delivery Network (CDN) cache hit rate is low, what could be the reason? (Number of correct answers: 3)

  • A . When the website has low traffic, the CDN will receive fewer requests and this will result in a lower cache hit rate.
  • B . Insufficient bandwidth was selected when enabling the CDN service, causing the service capacity reach its limit too early.
  • C . HTTP Header settings may cause cache misses.
  • D . The origin site has a large number of dynamic resources.
  • E . Cache configuration is inappropriate (ex. overly short Cache Expiry Time for popular files).

Reveal Solution Hide Solution

Correct Answer: A,B,E
Question #28

Assume that a company uses ApsaraDB for PolarDB. The company commonly queries users based on their basic information, including: addresses, company names, and ID numbers.

In this scenario, what is the best practice for creating a database index (or indexes)?

  • A . Create a b-tree index on each column to be searched.
  • B . Create a hash index on each column to be searched.
  • C . Create a gin index for multiple fields.
  • D . Create a gist index for multiple fields.

Reveal Solution Hide Solution

Correct Answer: C
Question #29

On which operating systems can you install Alibaba Cloud command line tools? (Number of correct answers: 3)

  • A . Windows
  • B . Linux
  • C . macOS
  • D . Android

Reveal Solution Hide Solution

Correct Answer: A,B,C
A,B,C

Explanation: https://www.alibabacloud.com/blog/how-to-manage-your-alibaba-cloud-linux-server-from-the-command-line-interface-%28cli%29_593878

Question #30

A development team currently supports an application that is designed to be deployed on a single server’s local memory As part of migrating to Alibaba Cloud, the team needs to use Auto Scaling, and must therefore move their game state data off of their servers, so that they can automatically scale up and down without losing game data.

Where should the team store these game results to best allow for consistent results without impacting performance?

  • A . OSS
  • B . RDS
  • C . Redis
  • D . Log Service

Reveal Solution Hide Solution

Correct Answer: C

Question #31

To meet data analytics requirements on large datasets, which of these databases can meet the demand for structured and semi-structured storage for almost all types of data, albeit with limited support for strong transactions?

  • A . HBase
  • B . OceanBase
  • C . RDSMariaDB
  • D . TSDB

Reveal Solution Hide Solution

Correct Answer: A
Question #32

Which of the following programming languages are supported by the Alibaba Cloud SDK? (Number of correct answers: 3)

  • A . Java
  • B . Swift
  • C . PHP
  • D . Python
  • E . Bash shell

Reveal Solution Hide Solution

Correct Answer: A,C,D
A,C,D

Explanation:

https://www.alibabacloud.com/help/doc-detail/74712.htm

Question #33

Company A has a large number of files store in Alibaba Cloud OSS that need to be deleted (numbering in the tens of thousands).

What is the fastest, easiest way to delete these files?

  • A . Manually delete them one by one
  • B . Configure a life cycle rule that matches the entire bucket, and delete all files after one day
  • C . Call the API from a script, deleting files in batches
  • D . Directly delete the bucket

Reveal Solution Hide Solution

Correct Answer: B
Question #34

you have a Node.js based application and you plan to migrate it to Alibaba Cloud Function Compute, which of the following steps is unnecessary?

  • A . Manually install the Node. Js package in the Function Compute console
  • B . Create a single web application and upload the corresponding code package via the Function Compute console (or fcli)
  • C . Configure program startup commands and access ports in the Function Compute console
  • D . Start and verify the application in the Function Compute console

Reveal Solution Hide Solution

Correct Answer: A
Question #35

A certain project of Enterprise A (called Project-X) moves to the cloud and will need to use a variety of s Alibaba Cloud resources, such as ECS instances, RDS instances, SLB instances, and OSS storage space. There are multiple employees on the project who need to operate these cloud resources.

Because each employee has different job responsibilities and requires different permissions, what is the WRONG approach to resource management?

  • A . Create RAM users each employee, and set login passwords or create AccessKey
    credentials as needed
  • B . When creating RAM for users, give each user both web console AND AccessKey credentials: there is no need to keep these separate
  • C . When there are multiple RAM users under a cloud account, create user groups to classify and authorize RAM users with the same responsibilities
  • D . Use system policies to bind reasonable permissions policies to users or user groups, and customize policies for more fine-grained control

Reveal Solution Hide Solution

Correct Answer: A
Question #36

A developer is writing logs through the Log Service API, and can see via the Logstore monitorin metrics that write traffic is about 10 MB/s, but a 403 error is reported during the writing process.

Which of these is a possible cause?

  • A . There is significant network delay
  • B . The write throughput of a single partition is limited, and the 10 MB/s write traffic exceeds
  • C . There is not enough space in the Logstore partition
  • D . The target partition in the Logstore is not specified

Reveal Solution Hide Solution

Correct Answer: B
Question #37

Which of the following operations can be performed through Log Service sAPI? (Number of correct answers: 3)

  • A . Collect logs based on Logtail configuration and Logtail machine group information
  • B . Create a Logstore, write and read logs to the Logstore
  • C . Access control for different users
  • D . Deliver logs to OSS for storage and analysis

Reveal Solution Hide Solution

Correct Answer: A,B,C
Exit mobile version