Exam4Training

AliCloud ACA-Operator ACA System Operator Certification Online Training

Question #1

Which command is used to get the Docker daemon information?

  • A . docker info
  • B . docker version
  • C . docker pull
  • D . docker image

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

https://docs.docker.com/engine/reference/commandline/info/

Question #2

When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database’s resources.

Which of the following options are best practices when creating database indexes? (Number of correct answers: 3)

  • A . Add an index to a field that is frequently queried but does not frequently perform add, delete, or modify operations.
  • B . Applies indices to fields to contain many records.
  • C . A table should not contaiiAiore than 6 indexed fields.
  • D . Apply indexing to fields of fixed length (preferably not long fields).
  • E . Adhere to the rightmost prefix principle when using composite indexes

Reveal Solution Hide Solution

Correct Answer: A,C,D
Question #3

Which of the following steps is NOT mandatory when creating an API through Alibaba Cloud API Gateway?

  • A . Define basic API information
  • B . Attach a domain name
  • C . Define API Request parameters
  • D . Define the API backend service

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

https://www.alibabacloud.com/help/doc-detail/29478.htm

Question #4

Which of the following statements about ECS Snapshot is NOT correct?

  • A . You can manually create snapshots
  • B . You can create automatic snapshots
  • C . You can roll back a disk by using a snapshot
  • D . You can create an ECS instance from a snapshot

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

You can create a custom image from a snapshot that contains the operating system and data of an ECS instance. Then, you can use the custom image to create multiple instances that have identical application environments.

https://www.alibabacloud.com/help/doc-detail/25391.htm

Question #5

Your company decided to replicate the whole cloud environment in another region and use it as a cross-region failover in disaster recovery scenarios.

Your current environment includes Elastic Compute Service (ECS) instances, Server Load Balancer (SLB) instances and Relational Database Service (RDS) instances.

Which of the following statements is correct?

  • A . You can provision multiple ECS instances in multiple regions, thereby leveraging automatic high availability across regions
  • B . You can provision multiple SLB instances in multiple regions, thereby leveraging automatic high availability across regions
  • C . You can use DNS to resolve domain names to the IP addresses of multiple ECS instances running in different regions
  • D . You can use DNS to resolve domain names to the IP addresses of multiple SLB instances running in different regions

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

https://cloudacademy.com/course/alibaba-server-load-balancer-1066/alibabas-high-availability/

Question #6

Which Alibaba Cloud service is an automated operations and maintenance (O&M) service to execute O&M tasks?

  • A . Operation Orchestration Service (OOS)
  • B . Maintenance Orchestration Service (MOS)
  • C . Resource Orchestration Service (ROS)
  • D . Resource Access Management (RAM)

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

https://www.alibabacloud.com/help/doc-detail/120556.htm

Question #7

ApsaraDB for HBase is a cost-effective cloud-based intelligent SQL service that is of high scalability and compatible with the open source HBase.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

https://www.alibabacloud.com/help/doc-detail/49501.htm

Question #8

Which of the following options correctly describes Cloud Monitor Custom Monitoring and Custom Events? (Number of correct answers: 2)

  • A . Custom Events is used for collection of continuous event type data, queries, and alarms
  • B . Custom Events is for periodic and continuous collection of time series monitoring data, queries, and alarms
  • C . Custom Monitoring is used for periodic and continuous collection of time series monitoring data, queries, and alarms
  • D . Custom Monitoring is used for collection of non-continuous event data, such as information about ECS instance restarts

Reveal Solution Hide Solution

Correct Answer: A,C
A,C

Explanation:

https://www.alibabacloud.com/help/doc-detail/35170.htm

Question #9

________________ is a fully-managed event-driven computing service that allows you to run code in an elastic and reliable way?

  • A . Function Compute
  • B . Serverless Workflow
  • C . Elastic Compute Service (ECS)
  • D . Batch Compute

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

https://www.alibabacloud.com/help/doc-detail/52895.htm

Question #10

Which configuration language does Terraform support?

  • A . Python
  • B . XML
  • C . HCL
  • D . YAML

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

https://www.terraform.io/docs/language/syntax/configuration.html

Question #11

A developer needs to use some sensitive business data and operational data in the process of developing a program, but the data should be protected (encrypted or anonymized) as much as possible. In order to facilitate and secure management of data encryption keys, the developer can use Alibaba Cloud Key Management Service (KMS) envelope encryption technology.

Which of these statements is NOT correct, regarding KMS?

  • A . Developers can generate a plaintext data key and a ciphertext data key by calling the Generate Data Key interface.
  • B . Envelope encryption is an encryption mechanism similar to digital envelope technology. The technology allows you to store, transfer and use encrypted data by encapsulating their Data Keys (DKs) in an envelope, instead of y encrypting/decrypting data directly with Customer Master Keys (CMKs).
  • C . The user uses the master key created on KMS to encrypt and decrypt the generated data key.
  • D . The master key generated by KMS is also kept by the user.

Reveal Solution Hide Solution

Correct Answer: A,B,C
Question #12

Which of these Alibaba Cloud services are used for security (either credentials management, logging, or auditing?) (Number of correct answers: 3)

  • A . ActionTrail
  • B . Log Service
  • C . Key Management Service (KMS)
  • D . Table store

Reveal Solution Hide Solution

Correct Answer: A,B,C
A,B,C

Explanation:

https://www.alibabacloud.com/help/doc-detail/27280.htm

Question #13

You need to log all actions taken by users of your Alibaba Cloud account, whether via the command line tools or the web console.

Which Alibaba Cloud product can you use to create a log of user operations?

  • A . CloudMonitor
  • B . ActionTrail
  • C . Cloud Configo
  • D . Resource Group

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

https://www.alibabacloud.com/help/doc-detail/28804.htm

Question #14

Which of these are important concepts in Terraform’s configuration language, HCL? (Number of correct answers: 3)

  • A . Provider
  • B . Variable
  • C . Resource
  • D . Service Mesh

Reveal Solution Hide Solution

Correct Answer: A,B,C
Question #15

Which database utility is suitable for automate perception, healing, optimization, O&M, and security assurance for databases?

  • A . DMS
  • B . DBS
  • C . DTS
  • D . DAS

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

https://www.alibabacloud.com/help/doc-detail/64851.htm

Question #16

Which of the following services is used to establish private network connections between virtual private clouds (VPCs) in different regions, or between VPCs and data centers?

  • A . CEN (Cloud Enterprise Network)
  • B . Express Connect
  • C . VPN Gateway
  • D . NAT Gateway

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

https://www.alibabacloud.com/help/doc-detail/59870.htm

Question #17

Alibaba Cloud Cloud Monitor is a service that monitors Alibaba Cloud resources and internet applications.

Which of the following functions are provided by Cloud Monitor? (Number of correct answers: 4)

  • A . Site monitoring
  • B . Cloud product monitoring
  • C . Custom monitoring
  • D . Alerts
  • E . Custom firewall

Reveal Solution Hide Solution

Correct Answer: A,B,C,D
A,B,C,D

Explanation:

https://www.alibabacloud.com/help/doc-detail/35170.htm

Question #18

A system operator can tag resources for costing and billing purposes.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

https://www.alibabacloud.com/help/doc-detail/25477.htm

Question #19

As the system administrator of a multinational company, you are responsible for the accounts and resources management on the cloud.

Which of the following solutions are suitable for your company’s IT Governance? (Number of correct answers: 3)

  • A . Use role-based SSO for Identities access, use resource directory to manage the resources in shared service account and master account
  • B . Use CEN for interconnecting different networks globally, use shared VPC to share services between different organizations
  • C . Use Cloud Config and Action Trail for compliance and audit
  • D . Use one single VPC for all the resources to have the best performance
  • E . Stop using Action Trail and Cloud Config to save the storage cost

Reveal Solution Hide Solution

Correct Answer: A,B,C
A,B,C

Explanation:

https://www.alibabacloud.com/solutions/it-governance

Question #20

Alibaba Cloud Action Trail is a service that monitors and records the actions of your Alibaba Cloud account, including the access to and use of cloud products and services through the Alibaba Cloud console, API operations, and SDKs.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

https://www.alibabacloud.com/help/doc-detail/28804.htm

Exit mobile version