Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Alibaba Cloud ACA-Sec1 Practice Exam with Questions & Answers | Set: 4

Questions 31

Inside cloud, hypervisor vulnerability could cause the following possible consequences: (the

number of correct answers: 3)

Options:
A.

One client host can access another client's data

B.

User service become unavailable

C.

Hacker can access host server directly

D.

Incorrect client resource usage calculating

Alibaba Cloud ACA-Sec1 Premium Access
Questions 32

In making cloud accounts more secure, which of the following is NOT a guiding principle?

Options:
A.

Anonymous logins

B.

Login verification

C.

Account permissions

D.

Authorization distribution

Questions 33

For internet communication, to setup the connection and data transition between source

and destination, which of the following information you will need? (the number of correct

answers: 3)

Score 1

Options:
A.

IP address

B.

Port

C.

Encryption algorism

D.

Protocol

E.

Router Location

Questions 34

If your company has a lot of employees who would try to simultaneously access ECS server protected by 'Server Guard' using your company's intranet, the 'Sever Guard' may

mistakenly identify those access requests as attacks. Which of the following methods is the best way to solve this problem? Score 2

Options:
A.

set a highly complexed administrator password

B.

change the rule of security group to unblock all company internal ips

C.

add those IPs which need to access ECS server into 'Server Guard' logon white list

D.

ask employees to access that ECS server not very frequently

Questions 35

Which of the following statements about WAF data risk control feature is NOT true?

Options:
A.

this feature can only used for single page, can't be used to protect the whole domain

name

B.

WAF need to inject JavaScript piece into all pages under the same protected domain

name to decide if the client side is worth to trust

C.

direct access URL protected by this feature will have slider verification pop out

D.

this feature is not suitable for scenario needs to call API directly

Questions 36

Which of the following scenarios can be considered as business fraud? (the number of

correct answers: 2)

Options:
A.

massive accounts registration for new user benefits gain

B.

data leak because of data transmission with plain text

C.

post massive comments with bots to some e-commerce website

D.

page content including some porn pictures

Questions 37

Which of the following risks are considered as common network security risk? (the number

of correct answers: 2)

Options:
A.

Massive traffic flood attack

B.

Software version is not up to date

C.

Data under transferring is being sniffed

D.

Physical Fiber Channel Cable is broken

Questions 38

Which of the following steps is not a valid step for using anti-DDOS pro?

Options:
A.

configure to be protected domain name

B.

add new DNS record

C.

change source IP

D.

if original server is using its own firewall, then need to add Anti-DDOS pro IP to its white

list

E.

bind real customer identity to anti-DDOS pro IP

Questions 39

Which of the following statements is true about HTTP protocol?

Score 2

Options:
A.

HTTP is a network layer protocol

B.

the data transmitted by this protocol is auto-encrypted

C.

default service port is 80

D.

HTTP protocol can't be used to transmit file

Questions 40

Which command in Windows OS can be used to open a terminal?

Options:
A.

Painter.exe

B.

Cmd.exe

C.

Batch.exe

D.

Term.exe