Alibaba Cloud ACA-Sec1 - ACA Cloud Security Associate
What design flaw of TCP/IP protocol does SYN flood attack use?
Which of the following 4 functions can be achieved through ECS security group
configuration?
What are the advantages of anti-DDOS pro comparing to anti-DDOS basics service?
(the number of correct answers: 3)
Alibaba Cloud will provide hot fix to address existing vulnerabilities. Which of the following
statements is true about this 'hot fix'?
Which of the following DDoS descriptions are correct?
Which service in RedHat Linux OS can be used to build network firewall functionality?
Score 2
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer
networking model?
18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?
Which of the following statements about HTTP protocol are true?(the number of correct
answers: 2
Which of the following scenarios should be handled by anti-DDOS service? (the number of
correct answers: 3)