Which of the following steps is not a valid step for using anti-DDOS pro?
For internet communication, to setup the connection and data transition between source
and destination, which of the following information you will need? (the number of correct
answers: 3)
Score 1
What is the correct action sequence of WAF protection strategy: (1) CC detection (2) Web
application attack detection (3) Access control
Score 2
Which of the following protection rules are provided by WAF to better protect from CC
attack? (the number of correct answers: 2)
Which of the following statements about cloud security shared responsibilities model are
true? (the number of correct answers: 2)
Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options
are the responsibilities Cloud user need to take care of ?
Which commands can be used to reload the operation system? (Correct Answers: 2)
In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the
attacker manipulate?
Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation
permissions these user accounts possess for resources under your account. Which of the following
descriptions of a RAM usage scenario is NOT correct?
Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)