Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Alibaba Cloud ACA-Operator Dumps

ACA System Operator Certification Questions and Answers

Question 1

When using Alibaba Cloud CDN, a visitor's request will first be routed to a CDN edge node, and in the event of a cache miss at this edge node, the node will fetch data from the origin site (back-to-source request). Even with this redirection, it is possible for the origin site to see the visitor's real IP address. Which of the following statements about obtaining the visitor's real IP address are correct? (Number of correct answers: 2)

A visitor's real IP address can only be obtained by modifying the site or web application.

B. visitor's real IP address is stored in the "X-Forwarded-For" HTTP header. It can be directly obtained via Apache or NGINX logs.

C. In Windows, if IIS is used, after installing the "F5XForwardedFor" extension module, the visitor's real IP address can be seen via IIS logs.

D. You can activate the "record visitor's real IP" function in the Alibaba Cloud CDN console, then you can directly view visitor's IP addresses from the Alibaba Cloud CDN access logs.

Options:

Question 2

Which configuration language does Terraform support?

Options:

A.

Python

B.

XML

C.

HCL

D.

YAML

Question 3

A Developer is creating a Function Compute function. This function requires around 1 GB of temporary storage for files while executing. These files will not be needed after the function is completed for a fixed period. How can this developer MOST efficiently handle the temporary files?

Options:

A.

Store the files in Cloud Disk and delete the files when Function Compute function call completes.

B.

Copy the files to NFS and delete the files when the Function Compute function call completes.

C.

Store the files in the /tmp directory on a temporary ECS instance, and delete the files at when the Function Compute function call completes.

D.

Copy the files to an OSS bucket with a lifecycle policy configured to delete the files automatically.

Question 4

Which of the following descriptions describes the (Security Token Service) STS service correctly? (Number of correct answers: 3)

Options:

A.

Through the STS service, RAM users or RAM roles can obtain a temporary token that allows them to call the Alibaba Cloud API or use the web console

B.

A STS request consists of an access address, communication protocol, request method, request parameters and character encoding

C.

When calling the STS API, in order to ensure the safe calling of the API, Alibaba Cloud will authenticate each API request through a signature when each API call is made

D.

The STS service supports the use of both HTTP and HTTPS protocols

Question 5

You need to log all actions taken by users of your Alibaba Cloud account,

whether via the command line tools or the web console. Which Alibaba Cloud

product can you use to create a log of user operations?

Options:

A.

CloudMonitor

B.

ActionTrail

C.

Cloud Configo

D.

Resource Group

Question 6

ApsaraDB for HBase is a cost-effective cloud-based intelligent SQL service that is of high scalability and compatible with the open source HBase.

Options:

A.

True

B.

False

Question 7

Which of these Alibaba Cloud services are used for security (either credentials management, logging, or auditing?) (Number of correct answers: 3)

Options:

A.

ActionTrail

B.

Log Service

C.

Key Management Service (KMS)

D.

Table store

Question 8

Which of these log formats is currently supported by Alibaba Cloud’s ActionTrail?

Options:

A.

XML

B.

HTML

C.

JSON

D.

Markdown

Question 9

Which of the following statements about ECS Snapshot is NOT correct?

Options:

A.

You can manually create snapshots

B.

You can create automatic snapshots

C.

You can roll back a disk by using a snapshot

D.

You can create an ECS instance from a snapshot