ACA-Operator Dumps ACA-Operator Braindumps

ACA-Operator Real Questions ACA-Operator Practice Test ACA-Operator Actual Questions


killexams.com


Alibaba


ACA-Operator


ACA System Operator certification


https://killexams.com/pass4sure/exam-detail/ACA-Operator

Question: 130


Which command is used to get the Docker daemon information?


  1. docker info

  2. docker version

  3. docker pull

  4. docker image


Answer: A


Explanation: https://docs.docker.com/engine/reference/commandline/info/


Question: 131


When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database's resources.


Which of the following options are best practices when creating database indexes? (Number of correct answers: 3)


  1. Add an index to a field that is frequently queried but does not frequently perform add, delete, or modify operations.

  2. Applies indices to fields to contain many records.

  3. A table should not contaiiAiore than 6 indexed fields.

  4. Apply indexing to fields of fixed length (preferably not long fields).

  5. Adhere to the rightmost prefix principle when using composite indexes


Answer: A,C,D Question: 132

Which of the following steps is NOT mandatory when creating an API through Alibaba Cloud API Gateway?


  1. Define basic API information

  2. Attach a domain name

  3. Define API Request parameters

  4. Define the API backend service


Answer: B


Explanation:


https://www.alibabacloud.com/help/doc-detail/29478.htm


Question: 133

Which of the following statements about ECS Snapshot is NOT correct?


  1. You can manually create snapshots

  2. You can create automatic snapshots

  3. You can roll back a disk by using a snapshot

  4. You can create an ECS instance from a snapshot


Answer: D


Explanation:


You can create a custom image from a snapshot that contains the operating system and data of an ECS instance. Then, you can use the custom image to create multiple instances that have identical application environments.


https://www.alibabacloud.com/help/doc-detail/25391.htm


Question: 134


Your company decided to replicate the whole cloud environment in another region and use it as a cross-region failover in disaster recovery scenarios.


Your current environment includes Elastic Compute Service (ECS) instances, Server Load Balancer (SLB) instances and Relational Database Service (RDS) instances.


Which of the following statements is correct?


  1. You can provision multiple ECS instances in multiple regions, thereby leveraging automatic high availability across regions

  2. You can provision multiple SLB instances in multiple regions, thereby leveraging automatic high availability across regions

  3. You can use DNS to resolve domain names to the IP addresses of multiple ECS instances running in different regions

  4. You can use DNS to resolve domain names to the IP addresses of multiple SLB instances running in different regions


Answer: D


Explanation:


https://cloudacademy.com/course/alibaba-server-load-balancer-1066/alibabas-high-availability/


Question: 135


Which Alibaba Cloud service is an automated operations and maintenance (O&M) service to execute O&M tasks?


  1. Operation Orchestration Service (OOS)

  2. Maintenance Orchestration Service (MOS)

  3. Resource Orchestration Service (ROS)

  4. Resource Access Management (RAM)

Answer: A


Explanation:


https://www.alibabacloud.com/help/doc-detail/120556.htm


Question: 136


ApsaraDB for HBase is a cost-effective cloud-based intelligent SQL service that is of high scalability and compatible with the open source HBase.


  1. True

  2. False


Answer: B


Explanation:


https://www.alibabacloud.com/help/doc-detail/49501.htm


Question: 137


Which of the following options correctly describes Cloud Monitor Custom Monitoring and Custom Events? (Number of correct answers: 2)


  1. Custom Events is used for collection of continuous event type data, queries, and alarms

  2. Custom Events is for periodic and continuous collection of time series monitoring data, queries, and alarms

  3. Custom Monitoring is used for periodic and continuous collection of time series monitoring data, queries, and alarms

  4. Custom Monitoring is used for collection of non-continuous event data, such as information about ECS instance restarts


Answer: A,C


Explanation:


https://www.alibabacloud.com/help/doc-detail/35170.htm


Question: 138


is a fully-managed event-driven computing service that allows you to run code in an elastic and reliable way?


  1. Function Compute

  2. Serverless Workflow

  3. Elastic Compute Service (ECS)

  4. Batch Compute


Question: 139


Which configuration language does Terraform support?


  1. Python

  2. XML

  3. HCL

  4. YAML


Answer: C


Explanation: https://www.terraform.io/docs/language/syntax/configuration.html


Question: 140


A developer needs to use some sensitive business data and operational data in the process of developing a program, but the data should be protected (encrypted or anonymized) as much as possible. In order to facilitate and secure management of data encryption keys, the developer can use Alibaba Cloud Key Management Service (KMS) envelope encryption technology.


Which of these statements is NOT correct, regarding KMS?


  1. Developers can generate a plaintext data key and a ciphertext data key by calling the Generate Data Key interface.

  2. Envelope encryption is an encryption mechanism similar to digital envelope technology. The technology allows you to store, transfer and use encrypted data by encapsulating their Data Keys (DKs) in an envelope, instead of y encrypting/decrypting data directly with Customer Master Keys (CMKs).

  3. The user uses the master key created on KMS to encrypt and decrypt the generated data key.

  4. The master key generated by KMS is also kept by the user.


Answer: A,B,C Question: 141

Which of these Alibaba Cloud services are used for security (either credentials management, logging, or auditing?) (Number of correct answers: 3)


  1. ActionTrail

  2. Log Service

  3. Key Management Service (KMS)

  4. Table store


Question: 142


You need to log all actions taken by users of your Alibaba Cloud account, whether via the command line tools or the web console.


Which Alibaba Cloud product can you use to create a log of user operations?


  1. CloudMonitor

  2. ActionTrail

  3. Cloud Configo

  4. Resource Group


Answer: B


Explanation:


https://www.alibabacloud.com/help/doc-detail/28804.htm


Question: 143


Which of these are important concepts in Terraformâs configuration language, HCL? (Number of correct answers: 3)


  1. Provider

  2. Variable

  3. Resource

  4. Service Mesh


Answer: A,B,C Question: 144

Which database utility is suitable for automate perception, healing, optimization, O&M, and security assurance for databases?


  1. DMS

  2. DBS

  3. DTS

  4. DAS


Answer: D


Question: 145


Which of the following services is used to establish private network connections between virtual private clouds (VPCs) in different regions, or between VPCs and data centers?


  1. CEN (Cloud Enterprise Network)

  2. Express Connect

  3. VPN Gateway

  4. NAT Gateway


Answer: A


Explanation:


https://www.alibabacloud.com/help/doc-detail/59870.htm


Question: 146


Alibaba Cloud Cloud Monitor is a service that monitors Alibaba Cloud resources and internet applications. Which of the following functions are provided by Cloud Monitor? (Number of correct answers: 4)

  1. Site monitoring

  2. Cloud product monitoring

  3. Custom monitoring

  4. Alerts

  5. Custom firewall


Answer: A,B,C,D


Explanation:


https://www.alibabacloud.com/help/doc-detail/35170.htm


Question: 147


A system operator can tag resources for costing and billing purposes.


  1. True

  2. False


Answer: A

Question: 148


As the system administrator of a multinational company, you are responsible for the accounts and resources management on the cloud.


Which of the following solutions are suitable for your companyâs IT Governance? (Number of correct answers: 3)


  1. Use role-based SSO for Identities access, use resource directory to manage the resources in shared service account and master account

  2. Use CEN for interconnecting different networks globally, use shared VPC to share services between different organizations

  3. Use Cloud Config and Action Trail for compliance and audit

  4. Use one single VPC for all the resources to have the best performance

  5. Stop using Action Trail and Cloud Config to save the storage cost


Answer: A,B,C


Explanation: https://www.alibabacloud.com/solutions/it-governance


Question: 149


Alibaba Cloud Action Trail is a service that monitors and records the actions of your Alibaba Cloud account, including the access to and use of cloud products and services through the Alibaba Cloud console, API operations, and SDKs.


  1. True

  2. False


Answer: A


Explanation:


https://www.alibabacloud.com/help/doc-detail/28804.htm