PdfPrep.com

ACA-Sec1 AliCloud Online Prep Questions

Our AliCloud ACA-Sec1 practice exam questions can help you fit the atmosphere of actual test in advance, which enable you to improve your ability with minimum time spent on ACA-Sec1 exam prep and maximum knowledge gained. We are a group of experienced IT experts and certified trainers and created the ACA-Sec1 exam dumps to help our customer pass ACA-Sec1 real exam with high rate in an effective way.

Page 1 of 6

Loading... Loading...
1. Which of the following options can be considered as Physical environment security risks in IT infrastructure?

Loading... Loading...
2. Which version of WAF will provide advisor customized protection rule? Score 2

Loading... Loading...
3. In Windows OS users can set software update configuration in various modes .

Which software update configuration listed here is not supported at all?

Loading... Loading...
4. For an IP subnet like 192.168.0.0/24, which of the following statements is true?

Loading... Loading...
5. Which directory is the home directory of root user?

Loading... Loading...
6. In Windows OS what command can be used to open registry table and edit it?

Loading... Loading...
7. Which of the following protection rules are provided by WAF to better protect from CC attack? (the number of correct answers: 2)

Loading... Loading...
8. In Linux OS, if access control to a file is shown as '-rwxrw-r--' in shell command, which of the following statements are true? Score 2

Loading... Loading...
9. Identify the attack where the purpose is to stop a workstation or service from functioning?

Loading... Loading...
10. Which of the following options can be considered as Data and Application security risks in IT infrastructure?

Page 2 of 6

Loading... Loading...
11. Which of following statements is NOT true about anti-DDOS basics and anti-DDOS Pro?

Loading... Loading...
12. What status transition flow a TCP client will go through in order to proactively establish connection and disconnect it?

Loading... Loading...
13. Which of the following security vulnerability is not a 'Server Side' security issue?

Loading... Loading...
14. A DoS attack that sends a flood of synchronization (SYN) requests and never sends the final acknowledgement (ACK) is typically known as which of the following?

Loading... Loading...
15. Which of the following statements are true for how to login to different ECS operating system? (the number of correct answers: 2) Score 1

Loading... Loading...
16. You configure a computer to act as a zombie set in order to attack a web server on a specific date.

What would this contaminated computer be part of?

Loading... Loading...
17. Which of the following steps is not a valid step for using anti-DDOS pro?

Loading... Loading...
18. For internet communication, to setup the connection and data transition between source and destination, which of the following information you will need (the number of correct answers: 3) Score 1

Loading... Loading...
19. Which of the following 4 functions can be achieved through ECS security group configuration?

Loading... Loading...
20. Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation permissions these user accounts possess for resources under your account .

Which of the following descriptions of a RAM usage scenario is NOT correct?

Page 3 of 6

Loading... Loading...
21. After using WAF, if you find there are many user input data in the network traffic, you should apply:

Loading... Loading...
22. Using ECS security group can help you achieve:

Loading... Loading...
23. CC customized protection rule supports you to define customized configuration setting .

Which of following items can be self-defined? (the number of correct answers: 3)

Loading... Loading...
24. If Server Guard (product provided by Alibaba Cloud) report some brute force password hacking attacks, the reporting information will include (the number of correct answers: 3)

Loading... Loading...
25. May, 2017. New blackmail virus WannaCry burst globally.

This virus leveraged Windows OS opened port 445 to initiate the attack, so the quickest way to prevent this kind of attack is?

Loading... Loading...
26. Which of following elements are included in a TCP/IP based route table (the number of correct answers: 3)

Loading... Loading...
27. Which of the following statements about ECS, VPC, security groups are NOT true? (the number of correct answers: 2)

Loading... Loading...
28. Which of these options contains the three basic target categories for a DoS or a DDoS?

Loading... Loading...
29. What will the correct stops the traffic will flow through if the user used all following cloud service: WAF, Anti-DDOS pro, CDN.

Loading... Loading...
30. From which of the following attacks WAF will not provide protection?

Page 4 of 6

Loading... Loading...
31. Alibaba Cloud offers different security protection plans to different tenant accounts .

Which of the following is NOT a security plan offered by Alibaba Cloud?

Loading... Loading...
32. Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web Application Security Risks

Loading... Loading...
33. Which of the following protocols will not be used for a SYN Flood attack?

Loading... Loading...
34. Which of the following protocols is not an application level protocol in ISO/OSI 7 layer networking model?

Loading... Loading...
35. In Windows OS you can turn off a service through: Score 2

Loading... Loading...
36. Which of the following issues would not happen if ECS server is under attack by hackers?

Loading... Loading...
37. Which protocol is a 'data link' layer protocol in ISO/OSI 7 layer network model? Score 2

Loading... Loading...
38. Which of the following statements about the supported way of MySQL DB for backup are true? (the number of correct answers: 2)

Loading... Loading...
39. CC attacks can cause serious damages .

Which of the following statements about CC attack is not correct? Score 2

Loading... Loading...
40. You are planning on hosting an eCommerce Web server. You are intent on making the server secure against all external attacks possible .

Which of the following would be the best way to test your server for its weaknesses? Choose the best answer.

Page 5 of 6

Loading... Loading...
41. Which of the following statements is true about HTTP protocol? Score 2

Loading... Loading...
42. Which of the following items can't be set in ECS security group configuration? Score 2

Loading... Loading...
43. Which of following statement about 'Server Guard' Trojan scanning functionality is NOT correct? Score 2

Loading... Loading...
44. Which of the following statements about VLAN are NOT true? (the number of correct answers: 3) Score 1

Loading... Loading...
45. Reliable server daily operation and security management are essential for continuous service running .

Which of the following statement is NOT correct regarding to this scenario?

Loading... Loading...
46. Which of the following HTTP status code does reflect that the requested page does not exist?

Loading... Loading...
47. Which of the following function is provided by 'server guard' patch management service?

Loading... Loading...
48. What are the advantages of anti-DDOS pro comparing to anti-DDOS basics service?

(the number of correct answers: 3)

Loading... Loading...
49. By default, servers in VPC can't communicate with internet. By implementing which of the following products these servers can gain the capability to communicate with internet? (the number of correct answers: 3)

Loading... Loading...
50. Which of the following protocol is dedicated to resolve IP and MAC addresses?

Page 6 of 6

Loading... Loading...
51. Which of following statements about the possible reasons that cause web server vulnerabilities are true? (the number of correct answers: 2) Score 1

Loading... Loading...
52. Which web server is default one in Windows OS?

Loading... Loading...
53. In a regular server maintenance operation, the purpose of installing a patch on the operating system is?

Loading... Loading...
54. Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options are the responsibilities Cloud user need to take care of?

Loading... Loading...
55. Which of the following methods CANNOT increase account security?

Loading... Loading...
56. In order to stop the service provided through a particular port in Windows OS, which of the following methods can be used to achieve this objective? (the number of correct answers: 3)

Loading... Loading...
57. If user is using anti-DDOS Pro service, but the original server has rule to limit access to the client IPs, which of the following actions is the most proper one to take?

Loading... Loading...
58. Which of the following shell command can be used to check disk usage in a Linux OS ECS

Loading... Loading...

 

Exit mobile version