Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Alibaba Cloud ACA-Sec1 - ACA Cloud Security Associate

Page: 2 / 5
Total 147 questions

Which of the following reasons is the least possible reason leading to a network attack?

A.

technical skills show off of hacker

B.

business competition

C.

blackmail

D.

help to find system vulnerability

In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the

attacker manipulate?

A.

The version field

B.

The source address field

C.

The source port field

D.

The destination address field

In Windows OS which command can be used to track IP route, including involved node and spent time on each hop?

A.

Wroute

B.

Route

C.

Tracert

D.

Traceroute

ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by

some internet hacker, which of the following consequences such attack could cause? (the

number of correct answers: 2)

A.

Physical Server Damage

B.

Leak of customer sensitive data

C.

Service running on this ECS become not available

D.

The datacenter where the ECS belongs to need to shutdown

When we talk about 'security vulnerability' of ECS server, we are referring to: (the number of

correct answers: 3)

A.

OS vulnerability

B.

Hardware fault

C.

Application Vulnerability

D.

Hypervisor Vulnerability

E.

Data Center Serviceability

Which of the following options can be considered as Data and Application security risks in IT

infrastructure

A.

Data integrity

B.

Data access control

C.

Data readiness

D.

Data encryption

After using WAF, if you find there are many user input data in the network traffic, you should apply:

A.

Loose protection policy

B.

Normal protection policy

C.

Strict protection policy

D.

Progression protection policy

Which of the following application vulnerabilities are not as popular as others?

A.

SQL Injection

B.

XSS exploit

C.

File uploading vulnerability

D.

Kernel privilege breaking

Security risk may caused by 'Cloud platform', 'ISV' or 'End user', which of the following options

are the possible risks may caused by Cloud Platform?

A.

Software development cycle is not formalized

B.

Security system overall solutions are not complete

C.

Administration tools on Cloud Platform may have some flaws

D.

Cloud platform console and API may lack of security hardenning

Which of the following functions can be provided by Alibaba Cloud Server Guard

product?(the number of correct answers: 3)

A.

brute Force password hacking detection and defense

B.

suspicious remote login detection and warning

C.

security vulnerability scanning and patching

D.

anti-ddos

E.

anti SQL injection