Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ACA-Developer Exam Dumps - ACA Developer Certification

Go to page:
Question # 4

Which of the following statements describe the trace/D and spanID in a service tracking system (such as Zipkin) correctly? (Number of correct answers: 3)

A.

When the user's request enters the system, a globally unique traceld will be generated on the first layer of the calling network.

B.

The tracelD will be called with each layer and passed back continuously, so through traceld, the path of a user request in the system can be connected in series.

C.

Spanld can locate the position of a request in the system call, and who its upstream and downstream dependencies are respectively.

D.

Traceld is used to distinguish the sequence of calls between different services of the system, spanld is used to concatenate all the paths that a certain request traverses in the system.

Full Access
Question # 5

For business scenarios with strong data reliability requirements or financial business scenarios with regulatory requirements related to data durability and availability, RDS MySQL provides a remote backup mechanism to improve reliability. Which of the following is correct, regarding RDS's remote disaster recovery capabilities? (Number of correct answers: 3)

A.

The primary database (the one to be backed up) must have an Alibaba Cloud Intranet address

B.

RDS realizes real-time synchronization between the master instance and the remote disaster recovery instance through Data Transmission Service (DTS)

C.

When an outage occurs in the area where the primary instance is located, and neither the primary instance (Master) nor the standby instance (Slave) can be connected to, the remote disaster recovery instance can be switched to the primary instance

D.

When the database deletion operation is performed on the master instance, the operation will also be synchronized to the disaster recovery instance

Full Access
Question # 6

Which of the following options correctly describes CloudMonitor Custom Monitoring and Custom Events? (Number of correct answers; 2)

A.

Custom Events are used for collection of continuous event type data, queries, and alarms.

B.

Custom Events is for periodic and continuous collection of time series monitoring data, queries, and alarms.

C.

Custom Monitoring is used for periodic and continuous collection of time series monitoring data, queries, and alarms.

D.

Custom Monitoring is used for collection of non-continuous event data, such as information about ECS instance restarts.

Full Access
Question # 7

A developer accesses logs in a Log Service Logstore via the API. The error code returned by the server is 404. Which of these could be the cause?

A.

The log project (Project) does not exist

B.

The requested digital signature does not match

C.

Server internal error

D.

Server is busy: please try later

Full Access
Question # 8

Alibaba Cloud's ECS disk snapshotting tool can create crash-consistent snapshots for all types of Cloud Disks. It is a convenient and efficient disaster recovery method. It is often used for data backup, custom mirroring, application disaster recovery, etc. Which of the following is NOT a correct description of disk snapshots?

A.

A snapshot is a backup file of the cloud disk data state at a certain point in time. The first snapshot of the cloud disk is a full snapshot of the ac usage. Empty data blocks are not backed up. All subsequent snapshots are incremental snapshots, and only changed data blocks are stored.

B.

Snapshots can be created manually through the web console or command line tools, or automatically according to a schedule.

C.

In the event of a system failure, you can use a snapshot to roll back the Cloud Disk to an earlier point in time.

D.

Snapshot rollbacks can be performed while the ECS instance is running.

Full Access
Go to page: