Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Alibaba Cloud ACA-Developer Practice Exam with Questions & Answers

Questions 1

You can use Alibaba Cloud Data transmission service (DTS) or the open source tool Redis-shake to migrate and synchronize data from a local Redis instance to an Alibaba Cloud Redis instance. What is one feature which DTS has but Redis-shake does not?

Options:
A.

Full data migration

B.

Incremental data migration

C.

One-way data synchronization

D.

Two-way data synchronization

Questions 2

Which of these are good ways to secure access to your API deployed on Alibaba Cloud API Gateway?

(Number of correct answers: 3)

Options:
A.

Enable API Gateway to connect to backend services in an Alibaba Cloud VPC network group. This guarantees the security of API requests.

B.

Configure security keys for API Gateway.

C.

Use HTTPS to encrypt requests.

D.

Use OpenID Connect to authenticate requests.

E.

Allow only internal IP addresses to call the API.

Questions 3

Alibaba Cloud Log Service is a Pay-As-You-Go service. The billing unit is 7 day, and the configuration can be adjusted at any time: fees are charged according to actual usage. Which of the following are the main charges for Log Service? (Number of correct answers: 3)

Options:
A.

Read and write traffic

B.

Storage capacity

C.

Index traffic after index configuration

D.

Query analysis

Questions 4

What are the benefits of creating indexes on PolarDB? (Number of correct answers: 2)

Options:
A.

Improve the query efficiency SELECT statements.

B.

Improve the efficiency of DML operations such as UPDATE.

C.

Improve the efficiency of DDL operations.

D.

Reduce invalid data scanning.

Questions 5

When connecting to the Alibaba Cloud RDS database, in order to improve the completeness and integrity of the connection, you can enable SSL encryption and install an SSL CA certificate for the required application service. Which of the following statements are correct? (Number of correct answers: 3)

Options:
A.

Due to the way in which SSL encryption is implemented, enabling SSL encryption will significantly increase the CPU usage rate. Enable SSL encryption when there is an encryption requirement for the external network link. The intranet link is relatively safe, and generally no link encryption is required.

B.

If the RDS instance is a multi-node instance, the system will trigger the active/standby switch after the SSL service is disabled.

C.

When using read/write splitting, you can also enable SSL encryption to improve the security of the connection.

D.

It is discovered that an Alibaba Cloud RDS SSL certificate is about to expire, and the validity period needs to be updated, requiring that the certificate be updated, then reinstalled. This will restart the RDS instance.

Questions 6

Which of the following statements describe the trace/D and spanID in a service tracking system (such as Zipkin) correctly? (Number of correct answers: 3)

Options:
A.

When the user's request enters the system, a globally unique traceld will be generated on the first layer of the calling network.

B.

The tracelD will be called with each layer and passed back continuously, so through traceld, the path of a user request in the system can be connected in series.

C.

Spanld can locate the position of a request in the system call, and who its upstream and downstream dependencies are respectively.

D.

Traceld is used to distinguish the sequence of calls between different services of the system, spanld is used to concatenate all the paths that a certain request traverses in the system.

Questions 7

A Developer is creating a Function Compute function. This function requires around 1 GB of temporary storage for files while executing. These files will not be needed after the function is completed for a fixed period. How can this developer MOST efficiently handle the temporary files?

Options:
A.

Store the files in Cloud Disk and delete the files when Function Compute function call completes.

B.

Copy the files to NFS and delete the files when the Function Compute function call completes.

C.

Store the files in the /tmp directory on a temporary ECS instance, and delete the files at when the Function Compute function call completes.

D.

Copy the files to an OSS bucket with a lifecycle policy configured to delete the files automatically.

Questions 8

Which of the following is NOT a feature of Alibaba Cloud's Cassandra database service?

Options:
A.

Centerless distributed architecture

B.

Supports both narrow and wide tables, providing flexible schema functions

C.

Cluster storage, strong expansion of read and write capabilities

D.

Enterprise-level capabilities such as disaster tolerance, backup and recovery, security, and monitoring across data centers

Questions 9

A developer is writing logs through the Log Service API, and can see via the Logstore monitorin metrics that write traffic is about 10 MB/s, but a 403 error is reported during the writing process. Which of these is a possible cause?

Options:
A.

There is significant network delay

B.

The write throughput of a single partition is limited, and the 10 MB/s write traffic exceeds

C.

There is not enough space in the Logstore partition

D.

The target partition in the Logstore is not specified

Questions 10

A developer is making the ModifyDDInstanceSpec API call to change the specifications of an RDS instance, but the operation fails. Why could this be? (Number of correct answers: 3)

Options:
A.

The instance is in the running state

B.

No instance type (specification) was included in the request parameters

C.

The instance has a backup task being executed

D.

The targeted RDS instance is a disaster recovery instance