Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Alibaba Cloud ACP-Sec1 - ACP Cloud Security Professional

Page: 2 / 3
Total 80 questions

Anti-DDoS is one of the major products of Alibaba Cloud Security service Many websites have suffered DDoS attacks of different types. Therefore, accurate understanding of DDoS attacks is critical to the website security protection. Which of the following statements about DDoS attacks is the MOST accurate?

A.

The main purpose of a DDoS attack is to prevent the target server from providing normal services

B.

A DDoS attack cracks the servers logon password by means of numerous attempts

C.

The purpose of a DDoS attack is to steal confidential information

D.

DDoS attacks primarily target a database

User A is the system administrator of a company, who often takes business trips to Shanghai Each time when he remotely logs on to the Shanghai an alert is reported, prompting "Someone is remotely logging on to the server Please pay attention to your server security" Which of the following methods can be used to quickly and automatically resolve this issue?

A.

Open a ticket immediately to consult Alibaba Cloud engineers

B.

Log on to the Alibaba Cloud Security Center, and add a frequent logon location to the configuration item of Security Center.

C.

Ask the company leaders for help

D.

Call a friend, who is a famous hacker in the industry, for help.

Alibaba Cloud Anti-DDoS Premium Service can be used to protect against DDoS attacks larger than 100 Gbps. It can be used to protect both Alibaba Cloud hosts and non-Alibaba Cloud hosts

A.

True

B.

False

Users can detach the Security Center client on Alibaba Cloud ECS instances, and reinstall it later when necessary.

A.

True

B.

False

If you activate Alibaba Cloud Security Center on an ECS Linux instance and change the default SSH port (22) to another port, you will no longer receive SMS or email notification related to brute force password cracking

A.

True

B.

False

When importing key material into Key Management Service (KMS), you will be given an import token and public encryption key valid for 24 hours. The public key KMS provides must be used to encrypt your key material before upload KMS allows you to choose different public key encryption algorithms Which ones are supported? (Number of correct answers; 3)

A.

RSAES_OAEP_SHA_1

B.

RSAES_ECDHE_V1 _5

C.

RSAES_OAEP_SHA_256

D.

RSAES PKCS1 V1 5

Clean bandwidth refers to the maximum normal clean bandwidth that can be processed by Anti-DDoS Premium instances when your business is not under attack. Make sure that the Clean bandwidth of the instance is greater than the peak value of the inbound or outbound traffic of all services connected to the Anti-DDoS Premium instances

If the actual traffic volume exceeds the maximum Clean bandwidth, your business may be subject to traffic restrictions or random packet losses, and your normal business may be unavailable, slowed, or delayed for a certain period of time

A.

True

B.

False

Alibaba Cloud Security Center Agent is installed in ECS instances by default, no need to install it manually Users can detach Security Center Agent at any time they desire.

A.

True

B.

False

A website is built using open-source software To prevent hacker attacks and fix vulnerabilities in a timely manner, the administrator of the website wants to use the patch management feature in Security Center. Which of the following statements about patch management is FALSE.

A.

Before patches for most common Web vulnerabilities are released, the Alibaba Cloud Security O&M team will have fixed the vulnerabilities using self-developed patches

B.

Rollback of Web vulnerabilities means to restore the original files, while rollback of Windows vulnerabilities means to uninstall the patch upgrade

C.

Patch management can operate machines in batches in the cloud. For large-scale vulnerabilities, it supports one-key patch upgrade, which is easy and convenient

D.

Vulnerabilities are automatically fixed Once a self-developed paten is released, it automatically fixes vulnerabilities for all customers who have enabled patch management.

Among various types of network attacks, "phishing" is one of the most common attacks. A phishing website looks exactly the same as the real website It asks visitors to login with their accounts and passwords; at the same time, record these privacy information for illegal purpose. Which of the following statements about how phishing websites are spread is FALSE?

A.

Banks publish phishing website links in prominent positions on their official websites

B.

Phishing website links are sent through Facebook. Twitter and other IM(instant Messenger) applications.

C.

Advertisements are pushed to search engines and small and medium websites, attracting users to click the phishing website links.

D.

Phishing website links are published in batches through emails forums, blogs, and SNS(Social Network Sites).