Pass the Alibaba Cloud Alibaba Security ACA-Sec1 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following steps is not a valid step for using anti-DDOS pro?

Options:

A.

configure to be protected domain name


B.

add new DNS record


C.

change source IP


D.

if original server is using its own firewall, then need to add Anti-DDOS pro IP to its white

list


E.

bind real customer identity to anti-DDOS pro IP


Questions # 2:

For internet communication, to setup the connection and data transition between source

and destination, which of the following information you will need? (the number of correct

answers: 3)

Score 1

Options:

A.

IP address


B.

Port


C.

Encryption algorism


D.

Protocol


E.

Router Location


Questions # 3:

What is the correct action sequence of WAF protection strategy: (1) CC detection (2) Web

application attack detection (3) Access control

Score 2

Options:

A.

213


B.

312


C.

132


D.

231


Questions # 4:

Which of the following protection rules are provided by WAF to better protect from CC

attack? (the number of correct answers: 2)

Options:

A.

Loose


B.

Strict


C.

Normal


D.

Emergency


Questions # 5:

Which of the following statements about cloud security shared responsibilities model are

true? (the number of correct answers: 2)

Options:

A.

for users who is using IAAS service, they should be responsible for their business system

which is on top of cloud infrastructure


B.

cloud service provider should guarantee the security of all physical infrastructure


C.

the damage caused by attacks leveraging security vulnerability in customers' application

server should be charged to cloud service provider


D.

cloud user should also take care of some of the hardware maintenance and operation

work


Questions # 6:

Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options

are the responsibilities Cloud user need to take care of ?

Options:

A.

Data security inside ECS


B.

Physical servers water proof


C.

Application vulnerabilities


D.

ECS network configuration


Questions # 7:

Which commands can be used to reload the operation system? (Correct Answers: 2)

Options:

A.

reload


B.

shutdown


C.

init


D.

restart


Questions # 8:

In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the

attacker manipulate?

Options:

A.

The version field


B.

The source address field


C.

The source port field


D.

The destination address field


Questions # 9:

Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation

permissions these user accounts possess for resources under your account. Which of the following

descriptions of a RAM usage scenario is NOT correct?

Options:

A.

Enterprise sub-account management and permission assignment


B.

Resource operation and authorization management between enterprises


C.

Temporary authorization management for untrusted client apps


D.

Prevention of network attacks on enterprises


Questions # 10:

Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)

Options:

A.

Adding more search request together with the original one


B.

adding an absolute true condition to bypass original request


C.

use incorrect SQL function


D.

use selfmade variable


E.

adding ";" or "--" to change the original request purpose with new request attached


Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions