Which of the following statements about WAF data risk control feature is NOT true?
Which service in RedHat Linux OS can be used to build network firewall functionality?
Score 2
Which of the following Alibaba Cloud products need to be considered to use if you want to build
an elastic computing cluster to provide web service together and also with dynamic data and static
data separately stored
Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)
CC customized protection rule supports you to define customized configuration setting.
Which of following items can be self-defined? (the number of correct answers: 3)
Which of the following statements about cloud security shared responsibilities model are
true? (the number of correct answers: 2)
Which of the following options is the top 1 web application security risk based on OWASP 2017
report?
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer
networking model?
Which of the following products is designed to provide secured and stable network
connection among different VPCs?
For an IP subnet like 192.168.0.0/24, which of the following statements is true?
Which of the following issues would not happen if ECS server is under attack by hackers?
Which of the following service may under anti-DDOS attack?(the number of correct answers:
3)
Score 1
What type of attack is likely occuring if you see a significant increase in network traffic and users
complain that the web server is hung up?
Anti-DDOS basic is provided by Alibaba Cloud for free. Which of the following statements
about this service are NOT true? (the number of correct answers: 2)
Score 1
By default, servers in VPC can ' t communicate with internet. By implementing which of the
following products these servers can gain the capability to communicate with internet? (the
number of correct answers: 3)
Inside cloud, hypervisor vulnerability could cause the following possible consequences: (the
number of correct answers: 3)
Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web
Application Security Risks
Please list the correct order of the following 4 steps to enable a WAF service : (1) upload
HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be
protected (3) select the original IP address (4) add CNAME DNS record
Score 2
In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?
Which of the following scenarios should be handled by anti-DDOS service? (the number of
correct answers: 3)
Which of the following statements about ECS, VPC, security groups are NOT true?
(the number of correct answers: 2)
Which of the following reasons is the least possible reason leading to a network attack?
In making cloud accounts more secure, which of the following is NOT a guiding principle?
If your company ' s official website is tampered, the consequence of such attack could NOTbe:
If your company has a lot of employees who would try to simultaneously access ECS server protected by ' Server Guard ' using your company ' s intranet, the ' Sever Guard ' may
mistakenly identify those access requests as attacks. Which of the following methods is the best way to solve this problem? Score 2
Which of the following shell command can be used to check disk usage in a Linux OS ECS
In the Alibaba Cloud, which services can satisfy client user identity management requirements?
When ' Server Guard ' detects remote logon behavior, what information will be
shown on ' Server Guard ' console?
Which of following statement about ' Server Guard ' Trojan scanning functionality is NOT
correct?
Score 2
Which of following attacks could serve as a CC attack? (the number of correct answers: 3)
Score 1
Which of these options contains the three basic target categories for a DoS or a DDoS?
Which of following elements are included in a TCP/IP based route table ? (the number of
correct answers: 3)
In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the
attacker manipulate?
If Server Guard (product provided by Alibaba Cloud) report some brute force password
hacking attacks, the reporting information will include ? (the number of correct answers: 3)
Which of the following descriptions of the shared responsibilities security model is CORRECT?