Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Alibaba Cloud ACA-Sec1 - ACA Cloud Security Associate

Page: 4 / 5
Total 147 questions

Which web server is default one in Windows OS?

A.

HTTPD

B.

IIS

C.

Web Daemon

D.

Apache

Which of the following statements about the supported way of MySQL DB for backup are

true?(the number of correct answers: 2)

A.

you can use 'mysqldump' do logical backup

B.

you can copy files directly to do physical backup

C.

you can use 'binlog' to do real time backup

D.

you must stop accessing to DB before you do logical backup

What is the correct action sequence of WAF protection strategy: (1) CC detection (2) Web

application attack detection (3) Access control

Score 2

A.

213

B.

312

C.

132

D.

231

Which of the following descriptions of the shared responsibilities security model is CORRECT?

A.

After beginning to use cloud service, the cloud service provider will become responsible for all of

the user’s security.

B.

After beginning to use cloud service, the user and the cloud service provider will be jointly

responsible for cloud security, with each responsible for different layers of security.

C.

After beginning to use cloud service, users must still take care of physical and environmental

security.

D.

After beginning to use cloud service, users only need to pay attention to the security of their own

apps and data. All other security will be the responsibility of the cloud service provider.

Alibaba Cloud offers different security protection plans to different tenant accounts. Which of the

following is NOT a security plan offered by Alibaba Cloud?

A.

Password-free login

B.

Two-factor authentication

C.

Phone number binding

D.

Phone or email verification for password resetting

In the Alibaba Cloud, which services can satisfy client user identity management requirements?

A.

Security group

B.

Server Guard

C.

Resource Access Management (RAM)

D.

Situational awareness

Which of the following scenarios is the one that 'Server Guard' will support for brute force

password hacking detection?

A.

RDS remote connection

B.

ECS server remote logon or inside DB remote logon

C.

Windows shared directory access

D.

Linux CRM application remote logon

CC attacks can cause serious damages. Which of the following statements about CC attack is

not correct?

Score 2

A.

CC attack will simulate real user requests

B.

Will consume massive sever side resource

C.

CC attack is done on network layer

D.

The request generated by CC attack is hard to be distinguished from normal requests

Which of the following risks are considered as common network security risk? (the number

of correct answers: 2)

A.

Massive traffic flood attack

B.

Software version is not up to date

C.

Data under transferring is being sniffed

D.

Physical Fiber Channel Cable is broken

Which of the following scenarios are suitable to use CC emergency mode protection? (the

number of correct answers: 2)

A.

Web page

B.

HTML 5 page

C.

API

D.

Native APPs