Pass the Alibaba Cloud Alibaba Security ACA-Sec1 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following options does not belong to 5 key elements of network

communication?

Options:

A.

Encryption Algorism


B.

Source IP


C.

Destination IP


D.

Communication Protocol


Questions # 22:

Which of the following items can't be set in ECS security group configuration?

Score 2

Options:

A.

OS type


B.

network interface


C.

authorization policy


D.

authorization object


Questions # 23:

Which of the following statements about the supported way of MySQL DB for backup are

true?(the number of correct answers: 2)

Options:

A.

you can use 'mysqldump' do logical backup


B.

you can copy files directly to do physical backup


C.

you can use 'binlog' to do real time backup


D.

you must stop accessing to DB before you do logical backup


Questions # 24:

Which of the following benefit cannot be provided by 'Server Guard'?

Score 2

Options:

A.

lower the risk of sensitive data leak


B.

improve the usage of system resource


C.

lower the cost of security protection


D.

get instant alerts after attacks are detected


Questions # 25:

Apart from technical approaches, the proper data security management rules can be applied

in daily operations to lower the risk of information leakage. Which of the following risks can

be mitigated setting a strong data security management policy for company's employees?

Score 2

Options:

A.

information is sniffed during network transition


B.

under http flood attack


C.

sensitive information is taken away by former employee


D.

email phishing


Questions # 26:

When 'Server Guard' detects remote logon behavior, what information will be

shown on 'Server Guard' console?

Options:

A.

Illegal Logon!


B.

Migrated Already!


C.

Logon Successfully!


D.

Remote Logon Detected!


Questions # 27:

Which web server is default one in Windows OS?

Options:

A.

HTTPD


B.

IIS


C.

Web Daemon


D.

Apache


Questions # 28:

Which of following attacks could serve as a CC attack? (the number of correct answers: 3)

Score 1

Options:

A.

SYN flood


B.

ICMP flood


C.

One host simulate many IP addresses


D.

Attack through agent


E.

Zombie network


Questions # 29:

Which of the following Keys in HTTP heads are related to cache control? (the number of correct answers: 3)

Options:

A.

Cache-Control


B.

Date


C.

Age


D.

Expires


E.

Host


Questions # 30:

In Windows OS which command can be used to track IP route, including involved node and spent time on each hop?

Options:

A.

Wroute


B.

Route


C.

Tracert


D.

Traceroute


Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions