Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Alibaba Cloud ACA-Sec1 Practice Exam with Questions & Answers | Set: 3

Questions 21

Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)

Options:
A.

Adding more search request together with the original one

B.

adding an absolute true condition to bypass original request

C.

use incorrect SQL function

D.

use selfmade variable

E.

adding ";" or "--" to change the original request purpose with new request attached

Alibaba Cloud ACA-Sec1 Premium Access
Questions 22

Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?

Options:
A.

Watch

B.

Find

C.

Grep

D.

Ca

Questions 23

Reliable server daily operation and security management are essential for continuous service running. Which of the following statement is NOT correct regarding to this scenario?

Options:
A.

set easy to remember password to help administrator quickly login and solve problems

B.

patch system timely and frequently

C.

enable build-in OS firewall and configure it properly

D.

disable the ports which are not providing service anymore

Questions 24

CC attacks can cause serious damages. Which of the following statements about CC attack is

not correct?

Score 2

Options:
A.

CC attack will simulate real user requests

B.

Will consume massive sever side resource

C.

CC attack is done on network layer

D.

The request generated by CC attack is hard to be distinguished from normal requests

Questions 25

Which of the following protocol is dedicated for time sync up? Score 2

Options:
A.

HTTP

B.

ICMP

C.

NTP

D.

UDP

Questions 26

Which web server is default one in Windows OS?

Options:
A.

HTTPD

B.

IIS

C.

Web Daemon

D.

Apache

Questions 27

The Alibaba Cloud WAF protection strategy provides the following: (the number of correct

answers: 3)

Score 1

Options:
A.

Loose

B.

Strict

C.

Normal

D.

Regular

E.

Early Warning

Questions 28

When we talk about 'security vulnerability' of ECS server, we are referring to: (the number of

correct answers: 3)

Options:
A.

OS vulnerability

B.

Hardware fault

C.

Application Vulnerability

D.

Hypervisor Vulnerability

E.

Data Center Serviceability

Questions 29

Which of the following DDoS descriptions are correct?

Options:
A.

In order to get admin password

B.

Steal confidential information

C.

Causes the target server unable to process legitimate requests

D.

If the target server has no vulnerabilities, the remote attack may still succeed.

Questions 30

Which of the following cloud services are the most common ones when we talk about different

types of Cloud service

Options:
A.

IaaS

B.

PaaS

C.

SaaS

D.

DaaS