Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ACA-Developer Exam Dumps - ACA Developer Certification

Question # 4

Which of the following statements describe the trace/D and spanID in a service tracking system (such as Zipkin) correctly? (Number of correct answers: 3)

A.

When the user's request enters the system, a globally unique traceld will be generated on the first layer of the calling network.

B.

The tracelD will be called with each layer and passed back continuously, so through traceld, the path of a user request in the system can be connected in series.

C.

Spanld can locate the position of a request in the system call, and who its upstream and downstream dependencies are respectively.

D.

Traceld is used to distinguish the sequence of calls between different services of the system, spanld is used to concatenate all the paths that a certain request traverses in the system.

Full Access
Question # 5

For business scenarios with strong data reliability requirements or financial business scenarios with regulatory requirements related to data durability and availability, RDS MySQL provides a remote backup mechanism to improve reliability. Which of the following is correct, regarding RDS's remote disaster recovery capabilities? (Number of correct answers: 3)

A.

The primary database (the one to be backed up) must have an Alibaba Cloud Intranet address

B.

RDS realizes real-time synchronization between the master instance and the remote disaster recovery instance through Data Transmission Service (DTS)

C.

When an outage occurs in the area where the primary instance is located, and neither the primary instance (Master) nor the standby instance (Slave) can be connected to, the remote disaster recovery instance can be switched to the primary instance

D.

When the database deletion operation is performed on the master instance, the operation will also be synchronized to the disaster recovery instance

Full Access
Question # 6

Which of the following options correctly describes CloudMonitor Custom Monitoring and Custom Events? (Number of correct answers; 2)

A.

Custom Events are used for collection of continuous event type data, queries, and alarms.

B.

Custom Events is for periodic and continuous collection of time series monitoring data, queries, and alarms.

C.

Custom Monitoring is used for periodic and continuous collection of time series monitoring data, queries, and alarms.

D.

Custom Monitoring is used for collection of non-continuous event data, such as information about ECS instance restarts.

Full Access
Question # 7

A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server is 404. Which of these could be the cause?

A.

The log project (Project) does not exist

B.

The requested digital signature does not match

C.

Server internal error

D.

Server is busy: please try later

Full Access
Question # 8

Alibaba Cloud's ECS disk snapshotting tool can create crash-consistent snapshots for all types of Cloud Disks. It is a convenient and efficient disaster recovery method. It is often used for data backup, custom mirroring, application disaster recovery, etc. Which of the following is NOT a correct description of disk snapshots?

A.

A snapshot is a backup file of the cloud disk data state at a certain point in time. The first snapshot of the cloud disk is a full snapshot of the ac usage. Empty data blocks are not backed up. All subsequent snapshots are incremental snapshots, and only changed data blocks are stored.

B.

Snapshots can be created manually through the web console or command line tools, or automatically according to a schedule.

C.

In the event of a system failure, you can use a snapshot to roll back the Cloud Disk to an earlier point in time.

D.

Snapshot rollbacks can be performed while the ECS instance is running.

Full Access
Question # 9

An Elastic Compute Service (ECS) instance (private IP only) needs to read data from a RDS MySQL database in another VPC through a private IP address, and at the same time, RDS's public internet endpoint needs to be available for requests from some internet clients. Which steps must be taken to allow applications to access this RDS instance via both interfaces? (Number of correct answers: 2)

A.

Make sure that the security group of the ECS instance allows outbound access to the MySQL service port.

B.

Add the private and public IP addresses of all applications to the RDS whitelist.

C.

Connect the two VPCs through CEN.

D.

Configure a NAT gateway for the VPC to which the ECS instance belongs.

Full Access
Question # 10

When using the Alibaba Cloud CLI, what is the default data format for responses, when executing queries such as "aliyun ecs Describelnstances"?

A.

JSON

B.

YAML

C.

XML

D.

TABLE

Full Access
Question # 11

By default, Function Compute creates an instance for each request Function compute allows you to create multiple instances concurrently to reduce costs and improve execution efficiency Which of the following scenarios is NOT suitable for enabling the feature of handling multiple requests on a single instance? (Number of correct answers: 2)

A.

The function has a shared state and cannot be accessed concurrently.

B.

Requests are waiting for responses from the downstream service for an extended period of time.

C.

A request consumes a large amount of CPU and memory resources.

D.

Functions processes independent data objects.

Full Access
Question # 12

Which of the following are types of backend services that API Gateway supports? (Number of correct answers: 3)

A.

HTTP(s) service

B.

CloudMonitor Service

C.

Resources In a VPC

D.

Function Compute

E.

Log service

Full Access
Question # 13

Log Service uses a semi-structured data model to define a log. This mode contains five data fields:

Topic, Time, Content, Source, and Tags. Log Service has different requirements for the format of each field in the log. Which of the following fields cannot be empty characters? (Number of correct answers: 4)

A.

Topic

B.

Time

C.

Content

D.

Source

E.

Tags

Full Access
Question # 14

When using Alibaba Cloud CDN, a visitor's request will first be routed to a CDN edge node, and in the event of a cache miss at this edge node, the node will fetch data from the origin site (back-to-source request). Even with this redirection, it is possible for the origin site to see the visitors real IP address. Which of the following statements about obtaining the visitor's real IP address are correct? (Number of correct answers: 2)

A.

A visitor's real IP address can only be obtained by modifying the site or web application.

B.

A visitor's real IP address is stored in the "X-Forwarded-For" HTTP header It can be directly obtained via Apache or NGINX logs.

C.

In Windows, if IIS is used, after installing the "F5XForwardedFor" extension module, the visitor's real IP address can be seen via IIS logs.

D.

You can activate the "record visitor's real IP" function in the Alibaba Cloud CDN console, then you can directly view visitor's IP addresses from the Alibaba Cloud CDN access logs.

Full Access