Products like ECS and Server Load Balancer it will be automatically protected by Anti-DDoS Basic service
In a public cloud environment Alibaba Cloud is responsible for security of cloud computing infrastructure (such as the IDC environment, physical server O&M, and virtualization layer of cloud products). However, you still need to perform necessary security optimization measures for the Cloud products you purchased Which of the following actions do you think are safe?
Users can detach the Security Center client on Alibaba Cloud ECS instances, and reinstall it later when necessary.
When applying for an SSL certificate through Alibaba Cloud's SSL Certificates Service, there is an offline review process which can take 3-5 business days or 5-7 business days depending on the type of certificate you have applied for:
A large Internet company has services running on physical machines, as well as self-built monitoring and alert system Recently, the company wants to migrate part of the services to Alibaba Cloud and use CloudMonitor to monitor ECS instances and set alerts
What should the company do to quickly interconnect CloudMonitor alerts with the self-built alert system, and handle both alerts (alerts about the physical machines and ECS instances) in self-built alert system?
When the agent of Alibaba Cloud Security Center running on a server, it normally uses less than 1% of the CPU and 10 MB of memory, which can void affecting the server's performance
You have bought an ECS instance on Alibaba Cloud After deploying a Python environment on it, which of the following is the easiest and quickest way to monitor whether the Python process is running normally and report an alert if the process is accidentally terminated?
Alibaba Cloud WAF is a security protection product based on Alibaba Group's web security defense experience accumulated over more than a decade By defending against common OWASP attacks, providing patches to fix vulnerabilities, and allowing users to customize protection policies for website services, WAF can successfully safeguard the security and availability of websites and web applications. Which of the following types of security configurations does WAF provide? (Number of correct answers 3)
After you activate the button Data Risk Control feature in Alibaba Cloud WAF. Which of the following risk control verification modes m displayed if you directly request for a risk control protection URL?
If an ECS instance needs to be accessed by other applications from internet, a corresponding "port" must be enabled For example, HTTP applications work on port 80, while FTP applications work on port 21 If an administrator configures network security policies for this ECS instance, which of the following policies is the safest?