Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ACA-Sec1 ACA Cloud Security Associate Questions and Answers

Questions 4

Which of the following statements about WAF data risk control feature is NOT true?

Options:

A.

this feature can only used for single page, can ' t be used to protect the whole domain

name

B.

WAF need to inject JavaScript piece into all pages under the same protected domain

name to decide if the client side is worth to trust

C.

direct access URL protected by this feature will have slider verification pop out

D.

this feature is not suitable for scenario needs to call API directly

Buy Now
Questions 5

Which service in RedHat Linux OS can be used to build network firewall functionality?

Score 2

Options:

A.

iptables

B.

ipfirewall

C.

linuxfw

D.

netstat

Buy Now
Questions 6

Which web server is default one in Windows OS?

Options:

A.

HTTPD

B.

IIS

C.

Web Daemon

D.

Apache

Buy Now
Questions 7

Which of the following Alibaba Cloud products need to be considered to use if you want to build

an elastic computing cluster to provide web service together and also with dynamic data and static

data separately stored

Options:

A.

ECS

B.

SLB

C.

RDS

D.

OSS

E.

KMS

Buy Now
Questions 8

Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)

Options:

A.

Brute Force password hacking

B.

Trojan planting

C.

Content Compliance Requirement

D.

Vulnerability scanning

E.

Lack of storage resource

Buy Now
Questions 9

CC customized protection rule supports you to define customized configuration setting.

Which of following items can be self-defined? (the number of correct answers: 3)

Options:

A.

Source IP

B.

URI

C.

How long the detection should last

D.

How frequently the page is visited by one single source IP

E.

Target IP

Buy Now
Questions 10

What design flaw of TCP/IP protocol does SYN flood attack use?

Options:

A.

UDP stateless connectio

B.

DNS 3 times hands shake

C.

TCP 3 times hands shake

D.

HTTP plain text transmission

Buy Now
Questions 11

Which of the following statements about cloud security shared responsibilities model are

true? (the number of correct answers: 2)

Options:

A.

for users who is using IAAS service, they should be responsible for their business system

which is on top of cloud infrastructure

B.

cloud service provider should guarantee the security of all physical infrastructure

C.

the damage caused by attacks leveraging security vulnerability in customers ' application

server should be charged to cloud service provider

D.

cloud user should also take care of some of the hardware maintenance and operation

work

Buy Now
Questions 12

Which of the following options is the top 1 web application security risk based on OWASP 2017

report?

Options:

A.

XSS Attack

B.

Server Information Theft

C.

Code Execution

D.

SQL Injection

Buy Now
Questions 13

Which of the following protocols is not an application level protocol in ISO/OSI 7 layer

networking model?

Options:

A.

FTP

B.

TCP

C.

HTTP

D.

SNMP

Buy Now
Questions 14

Which of the following products is designed to provide secured and stable network

connection among different VPCs?

Options:

A.

ECS

B.

SLB

C.

Security Group

D.

Express Connect

Buy Now
Questions 15

For an IP subnet like 192.168.0.0/24, which of the following statements is true?

Options:

A.

Every IP address inside this subnet can be assigned as a HOST IP

B.

The broadcast address of this subnet is 192.168.0.0

C.

The network address of this subnet is 192.168.0.255

D.

IP communication between the hosts inside this subnet will not go through the gateway

Buy Now
Questions 16

Which of the following issues would not happen if ECS server is under attack by hackers?

Options:

A.

sensitive data leak

B.

service running on that server is not available

C.

physical server damage

D.

compromise the reputation of service provider on that server

Buy Now
Questions 17

Which of the following service may under anti-DDOS attack?(the number of correct answers:

3)

Score 1

Options:

A.

servers in VPC only configured with private network

B.

any device internet reachable

C.

government website

D.

public DNS service

E.

offline servers

Buy Now
Questions 18

What type of attack is likely occuring if you see a significant increase in network traffic and users

complain that the web server is hung up?

Options:

A.

MITM

B.

DNS spoofing

C.

Ping sweep

D.

DoS

Buy Now
Questions 19

Anti-DDOS basic is provided by Alibaba Cloud for free. Which of the following statements

about this service are NOT true? (the number of correct answers: 2)

Score 1

Options:

A.

basic anti-DDOS service can detect attack traffic and migrate them automatically

B.

basic anti-DDOS service can protect any server connect to internet

C.

no protection upper limit to the rate of attack traffic

D.

CC attack protection need to be turned on manually

Buy Now
Questions 20

By default, servers in VPC can ' t communicate with internet. By implementing which of the

following products these servers can gain the capability to communicate with internet? (the

number of correct answers: 3)

Options:

A.

Elastic Public IP

B.

CDN

C.

EIP + SLB

D.

EIP + NAT Gateway

E.

DNS service

Buy Now
Questions 21

Inside cloud, hypervisor vulnerability could cause the following possible consequences: (the

number of correct answers: 3)

Options:

A.

One client host can access another client ' s data

B.

User service become unavailable

C.

Hacker can access host server directly

D.

Incorrect client resource usage calculating

Buy Now
Questions 22

Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web

Application Security Risks

Options:

A.

Cross-Site Request Forgery(CSRF)

B.

Cross-Site Scripting(XSS)

C.

Unvalidated Redirects and Forwards

D.

Injection

Buy Now
Questions 23

Please list the correct order of the following 4 steps to enable a WAF service : (1) upload

HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be

protected (3) select the original IP address (4) add CNAME DNS record

Score 2

Options:

A.

2314

B.

2341

C.

2431

D.

2413

Buy Now
Questions 24

Which of the followings are not the reasons for a DDoS attack?

Options:

A.

Destroying of integrity

B.

Destroying of confidentiality

C.

Destroying of availability

D.

Destroying of business credit

Buy Now
Questions 25

In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?

Options:

A.

disable port 445

B.

set a highly complexed administrator password

C.

encrypt all data on server side

D.

put sensitive data in some hidden directory

Buy Now
Questions 26

Which of the following scenarios should be handled by anti-DDOS service? (the number of

correct answers: 3)

Options:

A.

Server is under syn flood attack, and is not reachable

B.

online game service which is suffering with too many empty connections and slow

connections

C.

DNS server is under udp flood attack and got no response anymore

D.

website is under SQL injection attack

E.

website is under XSS attacks

Buy Now
Questions 27

Which of the following statements about ECS, VPC, security groups are NOT true?

(the number of correct answers: 2)

Options:

A.

rule setting for security group supports both in and out direction configuration

B.

default security group rule is safe enough, please don ' t change it too much

C.

by default, ECS in different security group can communicate with each other

D.

one ECS can be in several different security group

Buy Now
Questions 28

Which of the following reasons is the least possible reason leading to a network attack?

Options:

A.

technical skills show off of hacker

B.

business competition

C.

blackmail

D.

help to find system vulnerability

Buy Now
Questions 29

In making cloud accounts more secure, which of the following is NOT a guiding principle?

Options:

A.

Anonymous logins

B.

Login verification

C.

Account permissions

D.

Authorization distribution

Buy Now
Questions 30

If your company ' s official website is tampered, the consequence of such attack could NOTbe:

Options:

A.

Website is used for some illegal attempts

B.

Public image or reputation of your company is damaged

C.

Business is impacted

D.

Physical server is damaged

Buy Now
Questions 31

If your company has a lot of employees who would try to simultaneously access ECS server protected by ' Server Guard ' using your company ' s intranet, the ' Sever Guard ' may

mistakenly identify those access requests as attacks. Which of the following methods is the best way to solve this problem? Score 2

Options:

A.

set a highly complexed administrator password

B.

change the rule of security group to unblock all company internal ips

C.

add those IPs which need to access ECS server into ' Server Guard ' logon white list

D.

ask employees to access that ECS server not very frequently

Buy Now
Questions 32

Which of the following benefit cannot be provided by ' Server Guard ' ?

Score 2

Options:

A.

lower the risk of sensitive data leak

B.

improve the usage of system resource

C.

lower the cost of security protection

D.

get instant alerts after attacks are detected

Buy Now
Questions 33

Which of the following shell command can be used to check disk usage in a Linux OS ECS

Options:

A.

Df –h

B.

Echo

C.

Free –m

D.

Ps –e –o

Buy Now
Questions 34

In the Alibaba Cloud, which services can satisfy client user identity management requirements?

Options:

A.

Security group

B.

Server Guard

C.

Resource Access Management (RAM)

D.

Situational awareness

Buy Now
Questions 35

When ' Server Guard ' detects remote logon behavior, what information will be

shown on ' Server Guard ' console?

Options:

A.

Illegal Logon!

B.

Migrated Already!

C.

Logon Successfully!

D.

Remote Logon Detected!

Buy Now
Questions 36

Which of following statement about ' Server Guard ' Trojan scanning functionality is NOT

correct?

Score 2

Options:

A.

Server Guard Agent will automatically scan your web pages directories and look for any

webshell file.

B.

A change to a file in the web pages directories will trigger a scan for that file

C.

you can log on to the Server Guard console to isolate webshell files with one click.

D.

Server Guard will delete any suspicious webshell file immediately

My Answer: B. Other file says D

Buy Now
Questions 37

Which of following attacks could serve as a CC attack? (the number of correct answers: 3)

Score 1

Options:

A.

SYN flood

B.

ICMP flood

C.

One host simulate many IP addresses

D.

Attack through agent

E.

Zombie network

Buy Now
Questions 38

Which of these options contains the three basic target categories for a DoS or a DDoS?

Options:

A.

Resources, printers and storage devices

B.

Networks, systems and applications

C.

Systems, memory, network access card

D.

Network access card, applications, peripheral devices

Buy Now
Questions 39

Which of the following damages can ' t be caused by a DDOS attack

Score 2

Options:

A.

DNS service down

B.

physical server broken

C.

military commander system down

D.

web service down

Buy Now
Questions 40

Which of following elements are included in a TCP/IP based route table ? (the number of

correct answers: 3)

Options:

A.

Network Destination

B.

Netmask

C.

Mac Address

D.

Gateway IP

E.

Port

Buy Now
Questions 41

Which command in Windows OS can be used to open a terminal?

Options:

A.

Painter.exe

B.

Cmd.exe

C.

Batch.exe

D.

Term.exe

Buy Now
Questions 42

In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the

attacker manipulate?

Options:

A.

The version field

B.

The source address field

C.

The source port field

D.

The destination address field

Buy Now
Questions 43

If Server Guard (product provided by Alibaba Cloud) report some brute force password

hacking attacks, the reporting information will include ? (the number of correct answers: 3)

Options:

A.

Attack initiated time

B.

Attack type

C.

Tools attacker used

D.

Attack source IP

E.

Physical location of attacker

Buy Now
Questions 44

Which of the following descriptions of the shared responsibilities security model is CORRECT?

Options:

A.

After beginning to use cloud service, the cloud service provider will become responsible for all of

the user’s security.

B.

After beginning to use cloud service, the user and the cloud service provider will be jointly

responsible for cloud security, with each responsible for different layers of security.

C.

After beginning to use cloud service, users must still take care of physical and environmental

security.

D.

After beginning to use cloud service, users only need to pay attention to the security of their own

apps and data. All other security will be the responsibility of the cloud service provider.

Buy Now
Exam Code: ACA-Sec1
Exam Name: ACA Cloud Security Associate
Last Update: Apr 30, 2026
Questions: 147

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now ACA-Sec1 testing engine

PDF (Q&A)

$43.57  $124.49
buy now ACA-Sec1 pdf