Alibaba aca-developer online test

ACA Developer Exam Exam

What students need to know about the aca-developer exam

  • Total 95 Questions & Answers

Question 1

Which of the following detection protocol is NOT supported by CloudMonitor's Site Monitoring
feature?

  • A. HTTP(S) B.TCP/UDP
  • C. DNS D.SNMP
Answer:

D

Discussions

Question 2

A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server
is 404. Which of these could be the cause?

  • A. The log project (Project) does not exist
  • B. The requested digital signature does not match
  • C. Server internal error
  • D. Server is busy: please try later
Answer:

A

Discussions

Question 3

A developer have written a web application using a microservice architecture, in such a architecture,
the client (web browser or mobile application) first initiates a request. The request first reaches the
load balancer, then goes through an authentication service, a billing service, then requests a
resource, and finally a result is returned. How many spans does such a call chain consist of?

  • A. 3
  • B. 4
  • C. 5
  • D. 6
Answer:

A

Discussions

Question 4

Which of the following statements about PolarDB's endpoint(s) is NOT correct?

  • A. The endpoint of the PolarDB MySQL database includes the cluster endpoint and the primary endpoint.
  • B. Through a cluster endpoint, applications can connect to data nodes.
  • C. The primary endpoint supports read/write splitting.
  • D. Cluster endpoints support read/write splitting.
Answer:

D

Discussions

Question 5

A game company is developing a game application for the Apple and Android platforms. Currently,
this application stores user data (as flat files) securely on the local storage of a user's device. The
game company wants to provide a new feature that allows customers to play the same game on
different devices, which requires synchronizing user data between different devices. Which of the
following cloud services supports this requirement without creating a new back-end application?

  • A. Function Compute
  • B. Object Storage Service (OSS)
  • C. Table Store
  • D. Log service
Answer:

A

Discussions

Question 6

Which of the following options is not included in Object Storage Service (OSS) object URLs?

  • A. Region name
  • B. Zone name
  • C. Bucket name
  • D. Filename
Answer:

A

Discussions

Question 7

When a developer uses the LogGroup function to package multiple logs and writes data through the
API/SDK of the Log Service, it receives error code 403 or 500 continiously. What are the possible
reasons?

  • A. The "Topic" data field is empty
  • B. The log size written to log group is less than 5MB
  • C. The target partition in the Logstore is not specified
  • D. Insufficient space in the Logstore partition
Answer:

D

Discussions

Question 8

To meet data analytics requirements on large datasets, which of these databases can meet the
demand for structured and semi-structured storage for almost all types of data, albeit with limited
support for strong transactions?

  • A. HBase
  • B. OceanBase
  • C. RDSMariaDB D.TSDB
Answer:

C

Discussions

Question 9

A mobile application developer intends to use Alibaba Cloud Object Storage Service (OSS) to store
the end user data for their app, and to ensure data isolation between each user of the app, to
prevent one user from obtaining another's dat
a. Which method can be done to meet these requirements?

  • A. RAM Policy
  • B. STS authorization
  • C. Bucket Policy
  • D. Object Policy
Answer:

B

Discussions

Question 10

A certain project of Enterprise A (called Project-X) moves to the cloud and will need to use a variety
of s Alibaba Cloud resources, such as ECS instances, RDS instances, SLB instances, and OSS storage
space. There are multiple employees on the project who need to operate these cloud resources.
Because each employee has different job responsibilities and requires different permissions, what is
the WRONG approach to resource management?

  • A. Create RAM users each employee, and set login passwords or create AccessKey credentials as needed
  • B. When creating RAM for users, give each user both web console AND AccessKey credentials: there is no need to keep these separate
  • C. When there are multiple RAM users under a cloud account, create user groups to classify and authorize RAM users with the same responsibilities
  • D. Use system policies to bind reasonable permissions policies to users or user groups, and customize policies for more fine-grained control
Answer:

A

Discussions
To page 2