Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

ACA-Operator ACA System Operator Certification Questions and Answers

Questions 4

Which of the following fields should be defined in the Alibaba Cloud Terraform

Provider Configuration? (Number of correct answers: 3)

Options:

A.

image_id

B.

access_key

C.

ecret_key

D.

region

Buy Now
Questions 5

A company is developing a music application based on OSS and ECS, their users can download mp3 files after signing up for the application. Recently, the public network traffic to the OSS has doubled but the increase of registered users is less than 10%. After in-depth analysis, system operators find that many download requests are requested from the external search engine. In this case, which of the following measures is thought to be able to address this issue?

Options:

A.

Migrate music files from the OSS to the data disks for ECS instances

B.

Change the website access mode to HTTPS

C.

Enable “Hotlink protection” of OSS and use an HTTP Referer whitelist to prevent unauthorized users from accessing your data

D.

Use SLB for extra protection

Buy Now
Questions 6

In order to deal with sudden spikes in traffic, Company A uses Alibaba Cloud

Auto Scaling to set up an alarm trigger task (growing the Scaling Group when

the average memory utilization on ECS instances exceeds 80%). During the

test, it was found that the alarm task was not executed successfully. Which of

these could be possible causes? (Number of correct answers: 3)

Options:

A.

The ECS instances in the Scaling Group have not yet installed the CloudMonitor monitoring agent

B.

Before triggering the alarm task, the number of instances in the group has reached the maximum number of instances allowed (MaxSize)

C.

The instance types chosen in the Scaling Configuration are out-of-stock in the Alibaba Cloud Region where the Scaling Group is located

D.

The number of instances in the current group exceeds the “expected number of instances” for the Scaling Group

Buy Now
Questions 7

A developer needs to use some sensitive business data and operational data in the process of developing a program, but the data should be protected (encrypted or anonymized) as much as possible. In order to facilitate and secure management of data encryption keys, the developer can use Alibaba Cloud Key Management Service (KMS) envelope encryption technology. Which of these statements is NOT correct, regarding KMS?

Options:

A.

Developers can generate a plaintext data key and a ciphertext data key by calling the GenerateDataKey interface.

B.

Envelope encryption is an encryption mechanism similar to digital envelope technology. The technology allows you to store, transfer and use encrypted data by encapsulating their Data Keys (DKs) in an envelope, instead of \y encrypting/decrypting data directly with Customer Master Keys (CMKs).

C.

The user uses the master key created on KMS to encrypt and decrypt the generated data key.

D.

The master key generated by KMS is also kept by the user.

Buy Now
Questions 8

Which of the following is NOT required for SMC (Server Migration Center) to

migrate a server to Alibaba Cloud?

Options:

A.

Import the migration source information to the SMC console

B.

From the SMC console, configure the type of disk image to be generated during the migration

C.

The SMC client transfers the source data to an intermediate ECS instance

D.

The SMC backend service generates a target Alibaba Cloud image based on the migration source

Buy Now
Questions 9

Which of the following descriptions describes the (Security Token Service) STS service correctly? (Number of correct answers: 3)

Options:

A.

Through the STS service, RAM users or RAM roles can obtain a temporary token that allows them to call the Alibaba Cloud API or use the web console

B.

A STS request consists of an access address, communication protocol, request method, request parameters and character encoding

C.

When calling the STS API, in order to ensure the safe calling of the API, Alibaba Cloud will authenticate each API request through a signature when each API call is made

D.

The STS service supports the use of both HTTP and HTTPS protocols

Buy Now
Exam Code: ACA-Operator
Exam Name: ACA System Operator Certification
Last Update: Apr 23, 2024
Questions: 62

PDF + Testing Engine

$66.4  $165.99

Testing Engine

$46  $114.99
buy now ACA-Operator testing engine

PDF (Q&A)

$42  $104.99
buy now ACA-Operator pdf