Pass the Alibaba Cloud Alibaba Security ACA-Sec1 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

In a regular server maintenance operation, the purpose of installing a patch on the operating system is?

Options:

A.

To improve server resource usage


B.

to improve system usability


C.

to enhance system functionality


D.

to avoid existing system vulnerabilities being used by some hackers


Questions # 32:

Which of the following 4 functions can be achieved through ECS security group

configuration?

Options:

A.

allow specific IP to remote access ECS server


B.

make ECS server be able to defend 15Gb/s DDOS attack


C.

fix XSS vulnerability


D.

assign customized IP address to ECS


Questions # 33:

Which of the following issues would not happen if ECS server is under attack by hackers?

Options:

A.

sensitive data leak


B.

service running on that server is not available


C.

physical server damage


D.

compromise the reputation of service provider on that server


Questions # 34:

CC attacks can cause serious damages. Which of the following statements about CC attack is

not correct?

Score 2

Options:

A.

CC attack will simulate real user requests


B.

Will consume massive sever side resource


C.

CC attack is done on network layer


D.

The request generated by CC attack is hard to be distinguished from normal requests


Questions # 35:

Which of the following services can suffer from DDoS attack?

Options:

A.

Servers in VPC only configured with private network


B.

Any device internet reachable


C.

Government website


D.

Public DNS service


E.

Offline servers


Questions # 36:

Which of the following scenarios is the one that 'Server Guard' will support for brute force

password hacking detection?

Options:

A.

RDS remote connection


B.

ECS server remote logon or inside DB remote logon


C.

Windows shared directory access


D.

Linux CRM application remote logon


Questions # 37:

Which of the following functions does not belong to what WAF can provide?

Options:

A.

DB encryption


B.

SQL injection detection


C.

XSS attack detection


D.

unauthorized resource access blocking


Questions # 38:

Which of the following shell command can be used to check disk usage in a Linux OS ECS

Options:

A.

Df –h


B.

Echo


C.

Free –m


D.

Ps –e –o


Questions # 39:

In the Alibaba Cloud, which services can satisfy client user identity management requirements?

Options:

A.

Security group


B.

Server Guard


C.

Resource Access Management (RAM)


D.

Situational awareness


Questions # 40:

If your company's official website is tampered, the consequence of such attack could NOTbe:

Options:

A.

Website is used for some illegal attempts


B.

Public image or reputation of your company is damaged


C.

Business is impacted


D.

Physical server is damaged


Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions