New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ACA-Developer Questions and Answers

Question # 6

Which of the following are correct, regarding RAM users? (Number of correct answers: 3)

A.

RAM users can be created under a single Alibaba Cloud account, corresponding to employees, systems, or applications.

B.

RAM users do not "own" the resources that they create (those belong to the Alibaba Cloud account itself), and RAM users cannot generate and pay their own individual bills (costs accrue to and are billed to the master Alibaba Cloud account).

C.

RAM users belong to an Alibaba Cloud account, but they can also operate as independent accounts with their own private resources, not visible to the primary Alibaba Cloud account.

D.

RAM users must be authorized by the Alibaba Cloud account to log in to the console or use the API to manage the resources owned by the Alibaba Cloud account.

Full Access
Question # 7

A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store the end user data for their app, and to ensure data isolation between each user of the app, to prevent one user from obtaining another's data. Which method can be done to meet these requirements?

A.

RAM Policy

B.

STS authorization

C.

Bucket Policy

D.

Object Policy

Full Access
Question # 8

Which of the following statements describe the trace/D and spanID in a service tracking system (such as Zipkin) correctly? (Number of correct answers: 3)

A.

When the user's request enters the system, a globally unique traceld will be generated on the first layer of the calling network.

B.

The tracelD will be called with each layer and passed back continuously, so through traceld, the path of a user request in the system can be connected in series.

C.

Spanld can locate the position of a request in the system call, and who its upstream and downstream dependencies are respectively.

D.

Traceld is used to distinguish the sequence of calls between different services of the system, spanld is used to concatenate all the paths that a certain request traverses in the system.

Full Access
Question # 9

Which of the following options describes the basic concepts of Alibaba Cloud Tracing Analysis correctly? (Number of correct answers: 3)

A.

Alibaba Cloud Tracing Analysis model relies on OpenTracing

B.

In the OpenTracing standard, a call chain can be regarded as a directed acyclic graph (DAG) composed of multiple Spans. The relationship between spans is named References

C.

In the OpenTracing standard, each Span represents a named and timed non-continuous execution segment in the call chain

D.

In some cases, timing diagrams based on the timeline are used to show the call chain

Full Access
Question # 10

You have a Java application with source code stored on GitHub. Now you want to build a container image using this code, and store it on a Container Registry instance located in Mainland China. Which of the following is the simplest, lowest maintenance option?

A.

Download the Java code from GitHub to your laptop, build the Docker image using a local Dockerfile, and use docker push to upload It to Container Registry.

B.

Upload the Dockerfile to GitHub for version control, then download it together with the Java code to your local device, compile and pack container image, and upload the image to Alibaba Cloud Container Registry via docker push .

C.

Associate your Alibaba Cloud Container Registry instance with your GitHub repository, and upload the Java code and Dockerfile to GitHub Set u Jenkins environment to automate the process of building the container image and pushing it to your Container Registry instance.

D.

Associate your Alibaba Cloud Container Registry instance with your GitHub repository, and upload the Java code and Dockerfile to GitHub Th Container Registry's built-in build service, configuring a rule that will rebuild your container image whenever your GitHub code is updated

Full Access
Question # 11

Which of the following features are unique to Alibaba Cloud Container Registry, as compared with Docker Hub? (Number of correct answers: 2)

A.

Container Registry can automatically build new Docker images when source code changes.

B.

For source code hosted on websites outside China, Container Registry can use servers outside China to build Docker images, even when you are using a Container Registry instance in Mainland China.

C.

You can create and delete image repositories in different regions based on your needs.

D.

You can set your image repository access to public or private.

Full Access
Question # 12

Which of the following permission control policies does Object Storage Service (OSS) provide for access to objects stored in a bucket? (Number of correct answers: 4)

A.

ACL

B.

RAM Policy

C.

Bucket Policy

D.

STS authorization

E.

Dynamic blacklist

F.

Object Policy

G.

IntranetAccess

Full Access
Question # 13

You want to deploy a LAMP development environment in Alibaba Cloud's Singapore region, and you want to simultaneously bind a domain name and configure HTTPS. Which of these services can help you accomplish this quickly and easily?

A.

Elastic Compute Service (ECS)

B.

Elastic Container Instance (ECI)

C.

Simple Application Server (SAS)

D.

Alibaba Cloud Container Service for Kubernetes (ACK)

Full Access
Question # 14

A developer recently discovered that their company's application is beginning to suffer performance degradation as a result of increased user demand for the application. After some analysis, the major bottleneck is discovered to be the RDS database instance which hosts the company's databases, "A" and "B". The developer plans to use the DTS data migration solution to move one of the databases to a new RDS instance. Which of the following statements is correct? (Number of correct answers: 3)

A.

The code for the application will have to be rewritten once this migration is complete.

B.

The database account used for data migration must have read and write permissions. To ensure database security, please delete the database account used for data migration or reclaim related write permissions after data migration is completed.

C.

After disconnecting the connection between the source instance database B and the application, you need to log in to the source database B to check the session messages to ensure that no new sessions performed write operations.

D.

Create a reverse data migration task and start it to migrate subsequent incremental data from target Instance database B to source instance database B.

Full Access