Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Alibaba Cloud ACA-Operator - ACA System Operator Certification

Page: 2 / 2
Total 62 questions

Which command is used to get the Docker daemon information?

A.

docker info

B.

docker version

C.

docker pull

D.

docker image

You need to log all actions taken by users of your Alibaba Cloud account,

whether via the command line tools or the web console. Which Alibaba Cloud

product can you use to create a log of user operations?

A.

CloudMonitor

B.

ActionTrail

C.

Cloud Configo

D.

Resource Group

Which of the following engines is NOT supported by PolarDB?

A.

Oracle

B.

MongoDB

C.

MySQLo

D.

PostgreSQL

Which database utility is suitable for managing databases in a centralized manner?

A.

DMS

B.

DBS

C.

DTS

D.

DAS

When you use SQL statements to access tables in a database without an index configured, a full table scan will be performed. If a table contains a large amount of data, this kind of scan will access a large amount of data and consume a lot of the database's resources. Which of the following options are best practices when creating database indexes? (Number of correct answers: 3)

A.

Add an index to a field that is frequently queried but does not frequently perform add, delete, or modify operations.

B.

Applies indices to fields to contain many records.

C.

A table should not contaiiAiore than 6 indexed fields.

D.

Apply indexing to fields of fixed length (preferably not long fields).

E.

Adhere to the rightmost prefix principle when using composite indexes

Which of the following descriptions describes the (Security Token Service) STS service correctly? (Number of correct answers: 3)

A.

Through the STS service, RAM users or RAM roles can obtain a temporary token that allows them to call the Alibaba Cloud API or use the web console

B.

A STS request consists of an access address, communication protocol, request method, request parameters and character encoding

C.

When calling the STS API, in order to ensure the safe calling of the API, Alibaba Cloud will authenticate each API request through a signature when each API call is made

D.

The STS service supports the use of both HTTP and HTTPS protocols

________________ is a fully-managed event-driven computing service that allows you to run code in an elastic and reliable way?

A.

Function Compute

B.

Serverless Workflow

C.

Elastic Compute Service (ECS)

D.

Batch Compute

Which command should you run to create the resources described in the Terraform scripts?

A.

terraform init

B.

terraform plan

C.

terraform destroy

D.

terraform apply