Pass the Alibaba Cloud Alibaba Security ACA-Sec1 Questions and answers with CertsForce

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

You configure a computer to act as a zombie set in order to attack a web server on a specific date.

What would this contaminated computer be part of?

Options:

A.

The computer is part of a DDoS attack


B.

The computer is part of a TCP/IP hijacking


C.

The computer is part of a spoofing attack


D.

The computer is part of a man-in-the-middle attack


Questions # 42:

Which of the following protocol can be considered as 'application' layer protocol in ISO/OSI 7 layer model?

Options:

A.

TCP


B.

UDP


C.

IP


D.

SMTP


Questions # 43:

Which of the following descriptions of the shared responsibilities security model is CORRECT?

Options:

A.

After beginning to use cloud service, the cloud service provider will become responsible for all of

the user’s security.


B.

After beginning to use cloud service, the user and the cloud service provider will be jointly

responsible for cloud security, with each responsible for different layers of security.


C.

After beginning to use cloud service, users must still take care of physical and environmental

security.


D.

After beginning to use cloud service, users only need to pay attention to the security of their own

apps and data. All other security will be the responsibility of the cloud service provider.


Questions # 44:

What modes Alibaba Cloud WAF will provide to defend SQL injection? (the number of

correct answers: 2)

Score 1

Options:

A.

Normal Mode


B.

Protection Mode


C.

Warning Mode


D.

Restriction Mode


Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions