Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Alibaba Cloud ACA-Sec1 Practice Exam with Questions & Answers

Questions 1

Which of the following methods can't be used to prevent SQL injection attack?

Options:
A.

Strict input check

B.

Use secured function call

C.

SQL precompiling and variable binding

D.

Warning message for abnormal input

Questions 2

If Server Guard (product provided by Alibaba Cloud) report some brute force password

hacking attacks, the reporting information will include? (the number of correct answers: 3)

Options:
A.

Attack initiated time

B.

Attack type

C.

Tools attacker used

D.

Attack source IP

E.

Physical location of attacker

Questions 3

Which of the following statements is NOT true about web application security protection best practices?

Options:
A.

enforce security management to any public service

B.

keep installing official released patches will be good enough

C.

keep monitoring system processes , performance and status

D.

always scan input by user through web application

Questions 4

What design flaw of TCP/IP protocol does SYN flood attack use?

Options:
A.

UDP stateless connectio

B.

DNS 3 times hands shake

C.

TCP 3 times hands shake

D.

HTTP plain text transmission

Questions 5

Which of the following items can't be set in ECS security group configuration?

Score 2

Options:
A.

OS type

B.

network interface

C.

authorization policy

D.

authorization object

Questions 6

CC customized protection rule supports you to define customized configuration setting.

Which of following items can be self-defined? (the number of correct answers: 3)

Options:
A.

Source IP

B.

URI

C.

How long the detection should last

D.

How frequently the page is visited by one single source IP

E.

Target IP

Questions 7

ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by

some internet hacker, which of the following consequences such attack could cause? (the

number of correct answers: 2)

Options:
A.

Physical Server Damage

B.

Leak of customer sensitive data

C.

Service running on this ECS become not available

D.

The datacenter where the ECS belongs to need to shutdown

Questions 8

In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the

attacker manipulate?

Options:
A.

The version field

B.

The source address field

C.

The source port field

D.

The destination address field

Questions 9

Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation

permissions these user accounts possess for resources under your account. Which of the following

descriptions of a RAM usage scenario is NOT correct?

Options:
A.

Enterprise sub-account management and permission assignment

B.

Resource operation and authorization management between enterprises

C.

Temporary authorization management for untrusted client apps

D.

Prevention of network attacks on enterprises

Questions 10

After WAF was purchased, users need to add one DNS record to map their domain name to WAF provided IP. What is the type of that DNS record?

Options:
A.

A record

B.

CNAME Record

C.

TXT Record

D.

MX Record