Latest ACA-Operator Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : ACA-Operator
Exam Name : ACA System Operator certification
Vendor Name : "Alibaba"







ACA-Operator Dumps ACA-Operator Braindumps

ACA-Operator Real Questions ACA-Operator Practice Test ACA-Operator Actual Questions


killexams.com


Alibaba


ACA-Operator


ACA System Operator certification


https://killexams.com/pass4sure/exam-detail/ACA-Operator


Question: 130


Which command is used to get the Docker daemon information?


  1. docker info

  2. docker version

  3. docker pull

  4. docker image




Answer: A



Explanation: https://docs.docker.com/engine/reference/commandline/info/



Question: 131


When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database's resources.


Which of the following options are best practices when creating database indexes? (Number of correct answers: 3)


  1. Add an index to a field that is frequently queried but does not frequently perform add, delete, or modify operations.

  2. Applies indices to fields to contain many records.

  3. A table should not contaiiAiore than 6 indexed fields.

  4. Apply indexing to fields of fixed length (preferably not long fields).

  5. Adhere to the rightmost prefix principle when using composite indexes




Answer: A,C,D
Question: 132

Which of the following steps is NOT mandatory when creating an API through Alibaba Cloud API Gateway?


  1. Define basic API information

  2. Attach a domain name

  3. Define API Request parameters

  4. Define the API backend service




Answer: B



Explanation:


https://www.alibabacloud.com/help/doc-detail/29478.htm



Question: 133

Which of the following statements about ECS Snapshot is NOT correct?


  1. You can manually create snapshots

  2. You can create automatic snapshots

  3. You can roll back a disk by using a snapshot

  4. You can create an ECS instance from a snapshot




Answer: D



Explanation:


You can create a custom image from a snapshot that contains the operating system and data of an ECS instance. Then, you can use the custom image to create multiple instances that have identical application environments.


https://www.alibabacloud.com/help/doc-detail/25391.htm



Question: 134


Your company decided to replicate the whole cloud environment in another region and use it as a cross-region failover in disaster recovery scenarios.


Your current environment includes Elastic Compute Service (ECS) instances, Server Load Balancer (SLB) instances and Relational Database Service (RDS) instances.


Which of the following statements is correct?


  1. You can provision multiple ECS instances in multiple regions, thereby leveraging automatic high availability across regions

  2. You can provision multiple SLB instances in multiple regions, thereby leveraging automatic high availability across regions

  3. You can use DNS to resolve domain names to the IP addresses of multiple ECS instances running in different regions

  4. You can use DNS to resolve domain names to the IP addresses of multiple SLB instances running in different regions




Answer: D



Explanation:


https://cloudacademy.com/course/alibaba-server-load-balancer-1066/alibabas-high-availability/



Question: 135


Which Alibaba Cloud service is an automated operations and maintenance (O&M) service to execute O&M tasks?


  1. Operation Orchestration Service (OOS)

  2. Maintenance Orchestration Service (MOS)

  3. Resource Orchestration Service (ROS)

  4. Resource Access Management (RAM)



Answer: A



Explanation:


https://www.alibabacloud.com/help/doc-detail/120556.htm



Question: 136


ApsaraDB for HBase is a cost-effective cloud-based intelligent SQL service that is of high scalability and compatible with the open source HBase.


  1. True

  2. False




Answer: B



Explanation:


https://www.alibabacloud.com/help/doc-detail/49501.htm



Question: 137


Which of the following options correctly describes Cloud Monitor Custom Monitoring and Custom Events? (Number of correct answers: 2)


  1. Custom Events is used for collection of continuous event type data, queries, and alarms

  2. Custom Events is for periodic and continuous collection of time series monitoring data, queries, and alarms

  3. Custom Monitoring is used for periodic and continuous collection of time series monitoring data, queries, and alarms

  4. Custom Monitoring is used for collection of non-continuous event data, such as information about ECS instance restarts




Answer: A,C



Explanation:


https://www.alibabacloud.com/help/doc-detail/35170.htm



Question: 138


is a fully-managed event-driven computing service that allows you to run code in an elastic and reliable way?


  1. Function Compute

  2. Serverless Workflow

  3. Elastic Compute Service (ECS)

  4. Batch Compute



Question: 139


Which configuration language does Terraform support?


  1. Python

  2. XML

  3. HCL

  4. YAML




Answer: C



Explanation:
https://www.terraform.io/docs/language/syntax/configuration.html



Question: 140


A developer needs to use some sensitive business data and operational data in the process of developing a program, but the data should be protected (encrypted or anonymized) as much as possible. In order to facilitate and secure management of data encryption keys, the developer can use Alibaba Cloud Key Management Service (KMS) envelope encryption technology.


Which of these statements is NOT correct, regarding KMS?


  1. Developers can generate a plaintext data key and a ciphertext data key by calling the Generate Data Key interface.

  2. Envelope encryption is an encryption mechanism similar to digital envelope technology. The technology allows you to store, transfer and use encrypted data by encapsulating their Data Keys (DKs) in an envelope, instead of y encrypting/decrypting data directly with Customer Master Keys (CMKs).

  3. The user uses the master key created on KMS to encrypt and decrypt the generated data key.

  4. The master key generated by KMS is also kept by the user.




Answer: A,B,C
Question: 141

Which of these Alibaba Cloud services are used for security (either credentials management, logging, or auditing?) (Number of correct answers: 3)


  1. ActionTrail

  2. Log Service

  3. Key Management Service (KMS)

  4. Table store



Question: 142


You need to log all actions taken by users of your Alibaba Cloud account, whether via the command line tools or the web console.


Which Alibaba Cloud product can you use to create a log of user operations?


  1. CloudMonitor

  2. ActionTrail

  3. Cloud Configo

  4. Resource Group




Answer: B



Explanation:


https://www.alibabacloud.com/help/doc-detail/28804.htm



Question: 143


Which of these are important concepts in Terraformâs configuration language, HCL? (Number of correct answers: 3)


  1. Provider

  2. Variable

  3. Resource

  4. Service Mesh




Answer: A,B,C
Question: 144

Which database utility is suitable for automate perception, healing, optimization, O&M, and security assurance for databases?


  1. DMS

  2. DBS

  3. DTS

  4. DAS




Answer: D



Question: 145


Which of the following services is used to establish private network connections between virtual private clouds (VPCs) in different regions, or between VPCs and data centers?


  1. CEN (Cloud Enterprise Network)

  2. Express Connect

  3. VPN Gateway

  4. NAT Gateway




Answer: A



Explanation:


https://www.alibabacloud.com/help/doc-detail/59870.htm



Question: 146


Alibaba Cloud Cloud Monitor is a service that monitors Alibaba Cloud resources and internet applications. Which of the following functions are provided by Cloud Monitor? (Number of correct answers: 4)

  1. Site monitoring

  2. Cloud product monitoring

  3. Custom monitoring

  4. Alerts

  5. Custom firewall




Answer: A,B,C,D



Explanation:


https://www.alibabacloud.com/help/doc-detail/35170.htm



Question: 147


A system operator can tag resources for costing and billing purposes.


  1. True

  2. False




Answer: A


Question: 148


As the system administrator of a multinational company, you are responsible for the accounts and resources management on the cloud.


Which of the following solutions are suitable for your companyâs IT Governance? (Number of correct answers: 3)


  1. Use role-based SSO for Identities access, use resource directory to manage the resources in shared service account and master account

  2. Use CEN for interconnecting different networks globally, use shared VPC to share services between different organizations

  3. Use Cloud Config and Action Trail for compliance and audit

  4. Use one single VPC for all the resources to have the best performance

  5. Stop using Action Trail and Cloud Config to save the storage cost




Answer: A,B,C



Explanation: https://www.alibabacloud.com/solutions/it-
governance



Question: 149


Alibaba Cloud Action Trail is a service that monitors and records the actions of your Alibaba Cloud account, including the access to and use of cloud products and services through the Alibaba Cloud console, API operations, and SDKs.


  1. True

  2. False




Answer: A



Explanation:


https://www.alibabacloud.com/help/doc-detail/28804.htm