New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

ACA-Developer ACA Developer Certification Questions and Answers

Questions 4

CloudMonitor's "Event Monitoring" feature provides you with event reporting, query, and alarm functions, Score 2 so that you can collect metrics on your running Alibaba Cloud systems, and receive alerts when something goes wrong. Which of these is NOT a correct description of the monitoring event types supported by CloudMonitor?

Options:

A.

For ECS, CloudMonitor supports the collection and reporting of important ECS operating system level events, such as application crashes.

B.

For Object Storage Service (OSS), CloudMonitor supports the collection and reporting of bucket upstream and downstream bandwidth which exceeds the flow control threshold or the user-selected reporting threshold.

C.

For Server Load Balancer (SLB), CloudMonitor supports the collection and reporting of HTTPS certificate expiration events, for certificates installed on SLB.

D.

For E-MapReduce, CloudMonitor supports the collection and reporting of service component status, cluster creation failure, and timeout events.

Buy Now
Questions 5

A job hunting website stores user's resumes in Object Storage Service (OSS) The current resume upload process is as follows:

7. Users upload resumes

2. The server responds to the upload request

3. The resume is uploaded to the server

4. 1 he server uploads the resume to OSS

Which of the following methods can be used to upload objects to OSS without requiring Step 3?

Options:

A.

Simple Upload

B.

Form Upload

C.

Multipart Upload

D.

Append Upload

Buy Now
Questions 6

Which of the following options are correct for Multipart Upload and Resumable Upload in Object Storage Service (OSS)? (Number of correct answers: 3)

Options:

A.

Use Multipart Upload to upload parts of a file in parallel to speed up the upload process

B.

Multipart Upload is usually used when the size of the file to be uploaded is large

C.

If the upload fails due to an accident during the uploading of fragments, you need to upload all the fragments again

D.

After an upload is interrupted, the portions of the file which have successfully uploaded prior to the interruption will be saved in the OSS bucket

Buy Now
Questions 7

When using Alibaba Cloud CDN, a visitor's request will first be routed to a CDN edge node, and in the event of a cache miss at this edge node, the node will fetch data from the origin site (back-to-source request). Even with this redirection, it is possible for the origin site to see the visitors real IP address. Which of the following statements about obtaining the visitor's real IP address are correct? (Number of correct answers: 2)

Options:

A.

A visitor's real IP address can only be obtained by modifying the site or web application.

B.

A visitor's real IP address is stored in the "X-Forwarded-For" HTTP header It can be directly obtained via Apache or NGINX logs.

C.

In Windows, if IIS is used, after installing the "F5XForwardedFor" extension module, the visitor's real IP address can be seen via IIS logs.

D.

You can activate the "record visitor's real IP" function in the Alibaba Cloud CDN console, then you can directly view visitor's IP addresses from the Alibaba Cloud CDN access logs.

Buy Now
Questions 8

By default Function Compute cannot access resources within a VPC network group. To enable Function Compute to access resources located in a VPC, which of the following parameters needs to be configured? (Number of correct answers: 3)

Options:

A.

vpcld

B.

vSwitchlds

C.

securityGroupId

D.

ENIID

Buy Now
Questions 9

Which of the following cloud services can be integrated with Alibaba Cloud KMS (Key Managed Service)? (Number of correct answers: 3)

Options:

A.

Elastic Compute Service (ECS)

B.

Object Storage Service (OSS)

C.

Relational Database Service (RDS)

D.

Server Load Balancer (SLB)

Buy Now
Questions 10

When a developer calls the Alibaba Cloud SDK to access Elastic Compute Service (ECS), the following error is returned; RealNameAuthenticationError What is the possible cause?

Options:

A.

The ECS instance name violates the ECS service's naming conventions.

B.

The ECS instance name conflicts with other instance names.

C.

The user's Alibaba Cloud account has not passed real name authentication

D.

The API callers account and password are not authorized for ECS access.

Buy Now
Questions 11

Alibaba Cloud RabbitMQ is typically used in scenarios where message publishing and consumption performance requirements are high. Which of the following are supported message types in Alibaba Cloud Rabbit MQ? (Number of correct answers: 3)

Options:

A.

Scheduled message

B.

Ordered message

C.

Batched message

D.

Transactional message

E.

Retried message

Buy Now
Questions 12

Which of the following configurations cannot improve the stability, reliability or availability of an Alibaba Cloud Scaling Group? (Number of correct answers: 3)

Options:

A.

Select multiple VPCs when creating the scaling group

B.

When creating the scaling group, select multiple Vswitches in multiple Zone within a Region

C.

Choose a variety of different ECS types when creating your Scaling Configuration

D.

In the process of creating a Scaling Group, associate multiple Server Load Balancers

Buy Now
Questions 13

What are the required parameters for the Python SDK to create a client to access Alibaba Cloud's API? (Number of correct answers: 3)

Options:

A.

access.keyjd

B.

access.key.secret

C.

regionjd

D.

zone jd

E.

vpcjd

Buy Now
Questions 14

A developer recently discovered that their company's application is beginning to suffer performance degradation as a result of increased user demand for the application. After some analysis, the major bottleneck is discovered to be the RDS database instance which hosts the company's databases, "A" and "B". The developer plans to use the DTS data migration solution to move one of the databases to a new RDS instance. Which of the following statements is correct? (Number of correct answers: 3)

Options:

A.

The code for the application will have to be rewritten once this migration is complete.

B.

The database account used for data migration must have read and write permissions. To ensure database security, please delete the database account used for data migration or reclaim related write permissions after data migration is completed.

C.

After disconnecting the connection between the source instance database B and the application, you need to log in to the source database B to check the session messages to ensure that no new sessions performed write operations.

D.

Create a reverse data migration task and start it to migrate subsequent incremental data from target Instance database B to source instance database B.

Buy Now
Exam Code: ACA-Developer
Exam Name: ACA Developer Certification
Last Update: Dec 25, 2024
Questions: 95
ACA-Developer pdf

ACA-Developer PDF

$25.5  $84.99
ACA-Developer Engine

ACA-Developer Testing Engine

$30  $99.99
ACA-Developer PDF + Engine

ACA-Developer PDF + Testing Engine

$40.5  $134.99