Pass the Alibaba Cloud Alibaba Security ACP-Sec1 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Products like ECS and Server Load Balancer it will be automatically protected by Anti-DDoS Basic service

Options:

A.

True


B.

False


Expert Solution
Questions # 12:

In a public cloud environment Alibaba Cloud is responsible for security of cloud computing infrastructure (such as the IDC environment, physical server O&M, and virtualization layer of cloud products). However, you still need to perform necessary security optimization measures for the Cloud products you purchased Which of the following actions do you think are safe?

Options:

A.

To reduce the communication cost, five administrators of the company use the root account to log on to the ECS instance.


B.

After buying an ECS instance, enable the security group firewall for the ECS instance through the console, and only allow a management IP address to remotely log on to the ECS instance.


C.

For easy management, change the administrator password for the ECS instance to 123456.


D.

To enable colleagues working at home to update data, open public IP addresses for ApsaraDB for RDS instances, and allow all IP addresses to connect to the instances


Expert Solution
Questions # 13:

Users can detach the Security Center client on Alibaba Cloud ECS instances, and reinstall it later when necessary.

Options:

A.

True


B.

False


Expert Solution
Questions # 14:

When applying for an SSL certificate through Alibaba Cloud's SSL Certificates Service, there is an offline review process which can take 3-5 business days or 5-7 business days depending on the type of certificate you have applied for:

Options:

A.

True


B.

False


Expert Solution
Questions # 15:

A large Internet company has services running on physical machines, as well as self-built monitoring and alert system Recently, the company wants to migrate part of the services to Alibaba Cloud and use CloudMonitor to monitor ECS instances and set alerts

What should the company do to quickly interconnect CloudMonitor alerts with the self-built alert system, and handle both alerts (alerts about the physical machines and ECS instances) in self-built alert system?

Options:

A.

Use the Event Monitoring function provided by CloudMonitor to consume alerts sent from self-built alert system


B.

Call the API for querying data provided by CloudMonitor. regularly query data, and write a code to check whether indicators are abnormal


C.

Call the API for obtaining messages and alerts that are sent to self-build alert system


D.

This cannot be implemented.


Expert Solution
Questions # 16:

When the agent of Alibaba Cloud Security Center running on a server, it normally uses less than 1% of the CPU and 10 MB of memory, which can void affecting the server's performance

Options:

A.

True


B.

False


Expert Solution
Questions # 17:

You have bought an ECS instance on Alibaba Cloud After deploying a Python environment on it, which of the following is the easiest and quickest way to monitor whether the Python process is running normally and report an alert if the process is accidentally terminated?

Options:

A.

Use site monitoring


B.

Log on to the ECS instance console


C.

Utilize process monitoring feature (can be found in ECS instance


D.

Write a script for monitoring by yourself.


Expert Solution
Questions # 18:

Alibaba Cloud WAF is a security protection product based on Alibaba Group's web security defense experience accumulated over more than a decade By defending against common OWASP attacks, providing patches to fix vulnerabilities, and allowing users to customize protection policies for website services, WAF can successfully safeguard the security and availability of websites and web applications. Which of the following types of security configurations does WAF provide? (Number of correct answers 3)

Options:

A.

Port access control


B.

CC protection


C.

Web application attack protection


D.

Precision access control


Expert Solution
Questions # 19:

After you activate the button Data Risk Control feature in Alibaba Cloud WAF. Which of the following risk control verification modes m displayed if you directly request for a risk control protection URL?

Options:

A.

Slider verification


B.

QR code verification


C.

Image verification


D.

Digit verification


Expert Solution
Questions # 20:

If an ECS instance needs to be accessed by other applications from internet, a corresponding "port" must be enabled For example, HTTP applications work on port 80, while FTP applications work on port 21 If an administrator configures network security policies for this ECS instance, which of the following policies is the safest?

Options:

A.

After buying an ECS instance, the administrator immediately enables the security group firewall on the console and opens ports 0-1024 for public networks


B.

After buying an ECS instance, the administrator immediately enables the security group firewall on the console and opens only the required service ports for public networks


C.

The administrator wants to build multiple applications on an ECS instance. For easy management, the administrator uses default settings and allows any IP address to access required service ports


D.

After buying an ECS instance, the administrator immediately enables the security group firewall on the console and opens all ports for public networks


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions