Free ACA-Developer Exam Braindumps (page: 8)

Page 7 of 24

Which of the following programming languages are supported by the Alibaba Cloud SDK? (Number of correct answers: 3)

  1. Java
  2. Swift
  3. PHP
  4. Python
  5. Bash shell

Answer(s): A,C,D


Reference:

https://www.alibabacloud.com/help/doc-detail/74712.htm



Company A has a large number of files store in Alibaba Cloud OSS that need to be deleted (numbering in the tens of thousands).
What is the fastest, easiest way to delete these files?

  1. Manually delete them one by one
  2. Configure a life cycle rule that matches the entire bucket, and delete all files after one day
  3. Call the API from a script, deleting files in batches
  4. Directly delete the bucket

Answer(s): A



you have a Node.js based application and you plan to migrate it to Alibaba Cloud Function Compute, which of the following steps is unnecessary?

  1. Manually install the Node. Js package in the Function Compute console
  2. Create a single web application and upload the corresponding code package via the Function Compute console (or fcli)
  3. Configure program startup commands and access ports in the Function Compute console
  4. Start and verify the application in the Function Compute console

Answer(s): A



A certain project of Enterprise A (called Project-X) moves to the cloud and will need to use a variety of s Alibaba Cloud resources, such as ECS instances, RDS instances, SLB instances, and OSS storage space. There are multiple employees on the project who need to operate these cloud resources.
Because each employee has different job responsibilities and requires different permissions, what is the WRONG approach to resource management?

  1. Create RAM users each employee, and set login passwords or create AccessKey credentials as needed
  2. When creating RAM for users, give each user both web console AND AccessKey credentials: there is no need to keep these separate
  3. When there are multiple RAM users under a cloud account, create user groups to classify and authorize RAM users with the same responsibilities
  4. Use system policies to bind reasonable permissions policies to users or user groups, and customize policies for more fine-grained control

Answer(s): A






Post your Comments and Discuss Alibaba ACA-Developer exam with other Community members:

ACA-Developer Discussions & Posts