Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ACA-Database Questions and Answers

Question # 6

Alibaba Cloud DTS (Data Transmission Service) supports both full database migration and incremental synchronization.

A.

True

B.

False

Full Access
Question # 7

Which of the following is not a relational database?

A.

Oracle

B.

DB2

C.

Teradata

D.

Redis

Full Access
Question # 8

lf Oracle databases need to be migrated to Alibaba Cloud, which of the following product solutions :an be recommended? (Number of correct answers: 3)

A.

Use PolarDB-0 that is highly compatible with Oracle.

B.

Use Advanced Database & Application Migration (ADAM) to evaluate the migration project.

C.

Use ApsaraDB for Redis as a cache service to provide acceleration capabilities.

D.

Use Data Transmission Service (DTS) to migrate data.

Full Access
Question # 9

Which of the following statements about MongoDB is NOT true?

A.

MongoDB is a relational database.

B.

MongoDB is a document database.

C.

MongoDB supports transactions.

D.

MongoDB can be deployed in cluster mode.

Full Access
Question # 10

You are using DTS to migrate from a MySQL database installed on an ECS instance to a target

database on RDS. In the DTS console, which of these is the correct "Instance Type" for the database?

A.

ECS-based Databases

B.

Express Connect DB

C.

RDS Instance

D.

ApsaraDB MongoDB

Full Access
Question # 11

When a backup file of core sensitive data is downloaded, business systems must be protected against data breaches. Which of the following capabilities must be enabled to ensure data security?

A.

Virtual private cloud (VPC)

B.

Secure Sockets Layer (SSL) encryption

C.

Transparent Data Encryption (TDE)

D.

SOL audit

Full Access
Question # 12

Which of the following is NOT true, regarding the sensitive data management feature provided by Data Management (DMS)?

A.

The rules of field metadata and data content can be automatically recognized.

B.

De-identification algorithms can be managed. Multiple algorithms are supported, such as algorithms for masking specific positions and replacing fixed characters.

C.

Field-level and row-level permissions are supported.

D.

After you configure de-identification algorithms, you can view the de-identified data.

Full Access