Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Alibaba Cloud ACA-Developer Practice Exam with Questions & Answers | Set: 2

Questions 11

Function Compute supports one-way triggers and two-way triggers. Which of the following triggers is a one-way trigger? That is to say you only need to configure the trigger in the event source, not in Function Compute?.

Options:
A.

OSS event trigger(s)

B.

CloudMonitor trigger(s)

C.

MNS topic trigger(s)

D.

SLS trigger(s)

Questions 12

Which of the following options describes the basic concepts of Alibaba Cloud Tracing Analysis correctly? (Number of correct answers: 3)

Options:
A.

Alibaba Cloud Tracing Analysis model relies on OpenTracing

B.

In the OpenTracing standard, a call chain can be regarded as a directed acyclic graph (DAG) composed of multiple Spans. The relationship between spans is named References

C.

In the OpenTracing standard, each Span represents a named and timed non-continuous execution segment in the call chain

D.

In some cases, timing diagrams based on the timeline are used to show the call chain

Questions 13

Which of the following operations can be performed through Log Service sAPI? (Number of correct answers: 3)

Options:
A.

Collect logs based on Logtail configuration and Logtail machine group information

B.

Create a Logstore, write and read logs to the Logstore

C.

Access control for different users

D.

Deliver logs to OSS for storage and analysis

Questions 14

Alibaba Cloud Link Tracing Analysis supports call link reporting based on the Open Tracing standard. Which of the following client types does link tracing support? (Number of correct answers:3)

Options:
A.

Jaeger

B.

Zipkln

C.

Skywalklng

D.

Pinpoint

Questions 15

Which of the following options is correct, regarding Object ACL in Alibaba Cloud's Object Storage Service (OSS)?

Options:
A.

Object ACL is an object-level (not bucket level) permission control mechanism. There are currently three levels of access rights: private, public-read, and public-read-write.

B.

"Private" indicates that an object is a private resource, that is, only the owner of the object has read and write permissions on the object, and other users can read but have no permission to modify or delete the object.

C.

If the permissions of an object are not set, the permissions of the object are inherited from the bucket.

D.

You can set the ACL associated with an object by examining the X-OSS-Object-ACL header in the HEAD request, when making the PutObjectACL API call.

Questions 16

A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store the end user data for their app, and to ensure data isolation between each user of the app, to prevent one user from obtaining another's data. Which method can be done to meet these requirements?

Options:
A.

RAM Policy

B.

STS authorization

C.

Bucket Policy

D.

Object Policy

Questions 17

Which of the following options correctly describes CloudMonitor Custom Monitoring and Custom Events? (Number of correct answers; 2)

Options:
A.

Custom Events are used for collection of continuous event type data, queries, and alarms.

B.

Custom Events is for periodic and continuous collection of time series monitoring data, queries, and alarms.

C.

Custom Monitoring is used for periodic and continuous collection of time series monitoring data, queries, and alarms.

D.

Custom Monitoring is used for collection of non-continuous event data, such as information about ECS instance restarts.

Questions 18

Assume that a company uses ApsaraDB for PolarDB. The company commonly queries users based on their basic information, including: addresses, company names, and ID numbers. In this scenario, what is the best practice for creating a database index (or indexes)?

Options:
A.

Create a b-tree index on each column to be searched.

B.

Create a hash index on each column to be searched.

C.

Create a gin index for multiple fields.

D.

Create a gist index for multiple fields.

Questions 19

As more businesses move online and collect more data about their users, databases are beginning to grow very large, affecting table query performance and business operations. In order to solve these problems, in addition to sub-database sub-table transformation, we can also use Data Management Service (DMS)'s archiving function to regularly archive large table data. We can then remove the archived records from the original table to improve query performance. Which of these statements about this feature of DMS is NOT correct?

Options:
A.

The supported database types are RDS MySQL and PolarDB MySQL

B.

Before you can use this feature of DMS, you must first enable Alibaba Cloud's Database Backup Service (DBS)

C.

Backup data can be stored In OSS

D.

The user role of this operation must be 'administrator" or "DBA"

Questions 20

Which of the following statements are correct, with regard to Alibaba Cloud Log Service? (Number of correct answers: 3)

Options:
A.

As an agent for collecting logs, Logtail can collect logs from existing system log files in a non-intrusive manner

B.

The Log Service frontend service adopts an LVS + NGINX architecture

C.

The Logstore backend service is deployed on a single machine to complete the real-time persistence, indexing, query and delivery of Logstore data to MaxCompute

D.

Each log written to the Log Service backend will be saved in triplicate (across three separate physical servers)