Pass the Alibaba Cloud Alibaba Security ACP-Sec1 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following methods can be used to download the metric data of Alibaba Cloud CloudMonitor?

Options:

A.

Download the data through Open APIs


B.

You can download the data through both the console and Open APIs


C.

You can only view the reports, but cannot download them.


D.

Download the data from the console


Expert Solution
Questions # 22:

User A is the system administrator of a company, who often takes business trips to Shanghai Each time when he remotely logs on to the Shanghai an alert is reported, prompting "Someone is remotely logging on to the server Please pay attention to your server security" Which of the following methods can be used to quickly and automatically resolve this issue?

Options:

A.

Open a ticket immediately to consult Alibaba Cloud engineers


B.

Log on to the Alibaba Cloud Security Center, and add a frequent logon location to the configuration item of Security Center.


C.

Ask the company leaders for help


D.

Call a friend, who is a famous hacker in the industry, for help.


Expert Solution
Questions # 23:

To improve ECS instance security, the administrator does not want users on public network to check whether an ECS instance is online using the ping command. Which of the following reinforcement measures designed by the administrator is NOT feasible?

Options:

A.

Resolve the IP address of the ECS instance to an uncommon level 4 domain name, and point the promotional domain name to the level 4 domain name through CNAME


B.

Enable a security group and only allow access from ports 80 and 25 of the public network through TCP


C.

Enable a security group, and reject ICMP for public network access.


D.

Enable an operating system firewall for the ECS instance, and reject ICMP for public network access.


Expert Solution
Questions # 24:

Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML injection to insert malicious scripts so as to control the user's browser when the user browses the webpage XSS vulnerabilities may be used for user identity stealing (particularly the administrator identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing

Options:

A.

True


B.

False


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions