Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

ACA System Operator Certification

Last Update 4 hours ago Total Questions : 62

The ACA System Operator Certification content is now fully updated, with all current exam questions added 4 hours ago. Deciding to include ACA-Operator practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ACA-Operator exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ACA-Operator sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any ACA System Operator Certification practice test comfortably within the allotted time.

Question # 11

In order to deal with sudden spikes in traffic, Company A uses Alibaba Cloud

Auto Scaling to set up an alarm trigger task (growing the Scaling Group when

the average memory utilization on ECS instances exceeds 80%). During the

test, it was found that the alarm task was not executed successfully. Which of

these could be possible causes? (Number of correct answers: 3)

A.

The ECS instances in the Scaling Group have not yet installed the CloudMonitor monitoring agent

B.

Before triggering the alarm task, the number of instances in the group has reached the maximum number of instances allowed (MaxSize)

C.

The instance types chosen in the Scaling Configuration are out-of-stock in the Alibaba Cloud Region where the Scaling Group is located

D.

The number of instances in the current group exceeds the “expected number of instances” for the Scaling Group

Question # 12

A developer needs to use some sensitive business data and operational data in the process of developing a program, but the data should be protected (encrypted or anonymized) as much as possible. In order to facilitate and secure management of data encryption keys, the developer can use Alibaba Cloud Key Management Service (KMS) envelope encryption technology. Which of these statements is NOT correct, regarding KMS?

A.

Developers can generate a plaintext data key and a ciphertext data key by calling the GenerateDataKey interface.

B.

Envelope encryption is an encryption mechanism similar to digital envelope technology. The technology allows you to store, transfer and use encrypted data by encapsulating their Data Keys (DKs) in an envelope, instead of \y encrypting/decrypting data directly with Customer Master Keys (CMKs).

C.

The user uses the master key created on KMS to encrypt and decrypt the generated data key.

D.

The master key generated by KMS is also kept by the user.

Question # 13

Which of these Alibaba Cloud services are used for security (either credentials management, logging, or auditing?) (Number of correct answers: 3)

A.

ActionTrail

B.

Log Service

C.

Key Management Service (KMS)

D.

Table store

Question # 14

If you have a Node.js based application and you plan to migrate it to Alibaba Cloud Function Compute, which of the following steps is unnecessary?

A.

Manually install the Node.js in the Function Compute console

B.

Create a single web application and upload the corresponding code package via the Function Compute console (or fcli)

C.

Configure program startup commands and access ports in the Function Compute console

D.

Start and verify the application in the Function Compute console

Question # 15

Which of the following descriptions of the principles of Alibaba Cloud SSL certificate private key protection is correct?

A.

Alibaba Cloud uses the built-in functionality of the SSL certificate service to encrypt and store the private key to ensure the security of your certificate's private key

B.

The plaintext of Alibaba Cloud's private key is usually stored on disk and backed up regularly

C.

Alibaba Cloud Certificate Service uses symmetric encryption to save the certificate private key.

D.

Alibaba Cloud Certificate Service keys are loaded into memory in plaintext format ONLY when needed.

Question # 16

RAM supports custom policies.

A.

True

B.

False

Question # 17

Which of the following descriptions describes the (Security Token Service) STS service correctly? (Number of correct answers: 3)

A.

Through the STS service, RAM users or RAM roles can obtain a temporary token that allows them to call the Alibaba Cloud API or use the web console

B.

A STS request consists of an access address, communication protocol, request method, request parameters and character encoding

C.

When calling the STS API, in order to ensure the safe calling of the API, Alibaba Cloud will authenticate each API request through a signature when each API call is made

D.

The STS service supports the use of both HTTP and HTTPS protocols

Question # 18

A developer has written a web application using a microservice architecture,

in such an architecture, the client (web browser or mobile application) first initiates a request. The request first reaches the load balancer, then goes through an authentication service, a billing service, then requests a resource, and finally a result is returned. How many spans does such a call chain

consist of?

A.

3

B.

4

C.

5

D.

6

Go to page: