New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Alibaba ACA-Database Exam - Topic 2 Question 31 Discussion

Actual exam question for Alibaba's ACA-Database exam
Question #: 31
Topic #: 2
[All ACA-Database Questions]

Which type of the following logs is used to synchronize data between primary and secondary databases in RDS for MySQL?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Marvel
4 months ago
Definitely Binary log, no doubt about it!
upvoted 0 times
...
Reynalda
4 months ago
I thought it was the Rollback log for some reason.
upvoted 0 times
...
Diane
4 months ago
Wait, are we sure it's not the Redo log?
upvoted 0 times
...
Tamala
4 months ago
Totally agree, Binary log is the way to go.
upvoted 0 times
...
Josue
4 months ago
It's the Binary log that does the syncing!
upvoted 0 times
...
Aliza
5 months ago
I’m confused because I remember error logs being important for troubleshooting, but I don’t think they sync data.
upvoted 0 times
...
Mindy
5 months ago
I'm leaning towards the binary log too, but I feel like I need to double-check what the rollback log does.
upvoted 0 times
...
Tamesha
5 months ago
I remember practicing a question about logs in MySQL, and I think the redo log was mentioned, but it might not be the right answer here.
upvoted 0 times
...
Mable
5 months ago
I think the binary log is the one used for replication, but I'm not entirely sure.
upvoted 0 times
...
Glendora
5 months ago
This looks like a tricky security configuration question. I'll need to carefully analyze the exhibit and the requirements to determine the best approach.
upvoted 0 times
...
Ezekiel
5 months ago
This question seems straightforward, but I want to make sure I understand the indicators of compromise correctly before selecting my answers.
upvoted 0 times
...
Lindsey
5 months ago
Okay, for this type of question, I'd focus on features like access controls, data encryption, and auditing. Those are usually good ways to prevent accidental PII leaks. I'll review my Citrix security knowledge and try to narrow it down.
upvoted 0 times
...

Save Cancel