Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Alibaba Cloud ACA-Operator Practice Exam with Questions & Answers | Set: 2

Questions 11

A developer needs to use some sensitive business data and operational data in the process of developing a program, but the data should be protected (encrypted or anonymized) as much as possible. In order to facilitate and secure management of data encryption keys, the developer can use Alibaba Cloud Key Management Service (KMS) envelope encryption technology. Which of these statements is NOT correct, regarding KMS?

Options:
A.

Developers can generate a plaintext data key and a ciphertext data key by calling the GenerateDataKey interface.

B.

Envelope encryption is an encryption mechanism similar to digital envelope technology. The technology allows you to store, transfer and use encrypted data by encapsulating their Data Keys (DKs) in an envelope, instead of \y encrypting/decrypting data directly with Customer Master Keys (CMKs).

C.

The user uses the master key created on KMS to encrypt and decrypt the generated data key.

D.

The master key generated by KMS is also kept by the user.

Alibaba Cloud ACA-Operator Premium Access
Questions 12

You are responsible for the system operations of a product and have implemented the cloud infrastructure in the Alibaba Cloud platform. When

business loads increase, _______ automatically adds ECS instances to

ensure sufficient computing capabilities. When business loads decrease, the

same service automatically removes ECS instances to save costs. Which

service are you using?

Options:
A.

Server Load Balancer (SLB)

B.

Auto Scaling

C.

Resource Orchestration Service (ROS)

D.

Resource Access Management (RAM)

Questions 13

Which of the following options are correct for Multipart Upload and Resumable Upload in Object Storage Service (OSS)? (Number of correct answers: 3)

Options:
A.

Use Multipart Upload to upload multiple parts of a file in parallel to speed up the upload process

B.

Multipart Upload is usually used when the size of the file to be uploaded is large

C.

If the upload fails due to an accident during the uploading of fragments, you need to upload all the fragments again

D.

After an upload is interrupted, the portions of the file which have successfully uploaded prior to the interruption will be saved in the OSS bucket

Questions 14

Which of these metrics are collected by CloudMonitor’s Host Monitoring function? (Number of correct answers: 3)

Options:
A.

CPU status of the ECS instance

B.

Running processes on the ECS instance

C.

Storage space used by OSS buckets

D.

ECS network I/O

Questions 15

Serverless Workflow allow you to orchestrate distributed tasks in sequence, branch, and parallel modes, and ensure that tasks are reliably coordinated according to your workflow logic. Which of the following service integration modes is not supported by Serverless Workflow?

Options:
A.

Request response mode

B.

Synchronization mode

C.

Asynchronous mode

D.

Waiting for callback mode

Questions 16

Which of the following options correctly describes CloudMonitor Custom Monitoring and Custom Events? (Number of correct answers: 2)

Options:
A.

Custom Events is used for collection of continuous event type data, queries, and alarms

B.

Custom Events is for periodic and continuous collection of time series monitoring data, queries, and alarms

C.

Custom Monitoring is used for periodic and continuous collection of time series monitoring data, queries, and alarms

D.

Custom Monitoring is used for collection of non-continuous event data, such as information about ECS instance restarts

Questions 17

Which of these are important concepts in Terraform’s configuration language, HCL? (Number of correct answers: 3)

Options:
A.

Provider

B.

Variable

C.

Resource

D.

Service Mesh

Questions 18

A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server is 404. Which of these could be the cause?

Options:
A.

The log project (Project) does not exist

B.

The requested digital signature does not match

C.

Server internal error

D.

Server is busy: please try later