Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Alibaba Cloud ACA-Sec1 - ACA Cloud Security Associate

Page: 1 / 5
Total 147 questions

What design flaw of TCP/IP protocol does SYN flood attack use?

A.

UDP stateless connectio

B.

DNS 3 times hands shake

C.

TCP 3 times hands shake

D.

HTTP plain text transmission

Which of the following 4 functions can be achieved through ECS security group

configuration?

A.

allow specific IP to remote access ECS server

B.

make ECS server be able to defend 15Gb/s DDOS attack

C.

fix XSS vulnerability

D.

assign customized IP address to ECS

What are the advantages of anti-DDOS pro comparing to anti-DDOS basics service?

(the number of correct answers: 3)

A.

stronger defending attacks capability

B.

elastic protection bandwidth

C.

no upper limit to the attack traffic need to be handled

D.

can do anti-fraud protection

E.

can protect IDC outside Alibaba Cloud

Alibaba Cloud will provide hot fix to address existing vulnerabilities. Which of the following

statements is true about this 'hot fix'?

A.

hot fix doesn't need to reboot physical host

B.

service will not be available during the hot fix

C.

hot fix means the host need to reach some temperature upper limit to be able to

proceed

D.

hot fix is transparent to end user

Which of the following DDoS descriptions are correct?

A.

In order to get admin password

B.

Steal confidential information

C.

Causes the target server unable to process legitimate requests

D.

If the target server has no vulnerabilities, the remote attack may still succeed.

Which service in RedHat Linux OS can be used to build network firewall functionality?

Score 2

A.

iptables

B.

ipfirewall

C.

linuxfw

D.

netstat

Which of the following protocols is not an application level protocol in ISO/OSI 7 layer

networking model?

A.

FTP

B.

TCP

C.

HTTP

D.

SNMP

18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?

A.

Ppart

B.

Fdisk

C.

Du

D.

mount

Which of the following statements about HTTP protocol are true?(the number of correct

answers: 2

A.

HTTP protocol support state keeping

B.

HTTP is based on TCP/IP protocol

C.

HTTP request supports methods like: GET, POST, PUT, HEAD, etc.

D.

Response code 200 in HTTP protocol means exception on server side

Which of the following scenarios should be handled by anti-DDOS service? (the number of

correct answers: 3)

A.

Server is under syn flood attack, and is not reachable

B.

online game service which is suffering with too many empty connections and slow

connections

C.

DNS server is under udp flood attack and got no response anymore

D.

website is under SQL injection attack

E.

website is under XSS attacks