Alibaba Cloud ACA-Sec1 - ACA Cloud Security Associate
If your company has a lot of employees who would try to simultaneously access ECS server protected by 'Server Guard' using your company's intranet, the 'Sever Guard' may
mistakenly identify those access requests as attacks. Which of the following methods is the best way to solve this problem? Score 2
Which Internet protocol is used to implement Linux shell command 'ping'?
Score 2
Which of the following options could NOT be the reason that causes website
tampering
In Linux OS, if you want to set a file access privilege to read, write, and execute for the
owner only, what octal number will reflect such settings correctly?
Score 2
Which of the following benefit cannot be provided by 'Server Guard'?
Score 2
Which of following statement about 'Server Guard' Trojan scanning functionality is NOT
correct?
Score 2
Which of the following protocols will not be used for a SYN Flood attack?
If Server Guard (product provided by Alibaba Cloud) report some brute force password
hacking attacks, the reporting information will include? (the number of correct answers: 3)
Which of the following options is the top 1 web application security risk based on OWASP 2017
report?
Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?