Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Alibaba Cloud ACP-Sec1 - ACP Cloud Security Professional

Page: 1 / 3
Total 80 questions

When the agent of Alibaba Cloud Security Center running on a server, it normally uses less than 1% of the CPU and 10 MB of memory, which can void affecting the server's performance

A.

True

B.

False

When using Alibaba Cloud Anti-DDoS Service/WAF in China Mainland, you must finish ICP Filing beforehand.

A.

True

B.

False

When you receive a security alert from Alibaba Cloud Security Center, which of the following actions should you do?

A.

The alert is dangerous You must immediately report it to the police

B.

Shield the alert because it is not important

C.

Once you receive an alert, you need to determine the specific risk and perform troubleshooting For example, change the password, or upgrade application software

D.

There is no need to care about the alert Alibaba Cloud Security Center will handle it.

Which of the following services can be protected by the Alibaba Cloud Security Center's anti-brute force password cracking function? (Number of answers 3)

A.

Windows remote desktop service (RDP) Linux remote control service (SSH)

B.

Web service (HTTP)

C.

MySQL database service SQLServer database service

D.

File transfer service (FTP)

Alibaba Cloud ECS instances are common targets of hacker attacks. There are many types of attacks against ECS instances. Which of the following attacks specifically target the operating system of an ECS instance? (Number of correct answers: 3)

A.

SQL injection

B.

Trojan or Webshell installation

C.

Brute force RDP password cracking

D.

Brute force SSH password cracking

In which of the following scenarios is Alibaba Cloud Security Center applicable? (Number of correct answers 3)

A.

Setting up web server to provide web service to public

B.

Penetration testing

C.

Creating an ECS with generic software

D.

Batch server security O&M

E.

Network security protection for ad campaigns or other activities

After opening the Task Manager in Windows, you can easily see abnormal processes whose names do not comply with English grammar or computer naming conventions or contain random strings. Which of the following processes may be abnormal? (Number of correct answers: 4)

A.

svchost exe

B.

nihao exe

C.

Ikdhpec exe

D.

RegSrvc exe

E.

eeosec exe

F.

466363.exe

You want to buy an SSL certificate using Alibaba Cloud's SSL Certificates Service and deploy it in front of an Alibaba Cloud resource (such as Elastic Compute Service) What is the coned sequence of steps to follow?

A.

1 Select a certificate

2. Deploy the certificate in front of your Alibaba Cloud resources

3. Enter request information and submit for review

4. Manage the certificate

B.

1 Select a certificate

2 Enter request information and submit for review

3 Manage the certificate

4 Deploy the certificate in front of your Alibaba Cloud resources

C.

1 Select a certificate

2 Enter request information and submit for review

3. Deploy the certificate in front of your Alibaba Cloud resources

4. Manage the certificate

D.

1 Enter request information and submit for review 2. Select a certificate

3 Deploy the certificate in front of your Alibaba Cloud resources

4 Manage the certificate

The protection rules of Alibaba Cloud WAF are updated in real time after a user makes changes in WAF configuration page.

A.

True

B.

False

Alibaba Cloud Security's Data R.sk Control can effectively resolve junk registration, database hacking, and other service risk identification problems To use this service. you need to first collect service data. Which of the following methods can be used to collect information off Web application

systems?

A.

JavaScript

B.

SDK

C.

JavaScript, SDK

D.

HTML5