Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ACP-Sec1 ACP Cloud Security Professional Questions and Answers

Questions 4

Data transfer between Internet devices requires specific specifications, which are called " protocols " Among those, the invention of a certain protocol played a decisive role in the creation of the Internet. By using those protocols, tens of thousands of computers can be connected and communicate with each other What is the following protocol is not defined in OSI 7 layer model?

Options:

A.

HTTP

B.

TCP

C.

UDP

D.

SOAP

Buy Now
Questions 5

After a customer uses Alibaba Cloud Anti-DDoS Premium Service, a 502 error is prompted. Which of the followings are the possible causes of the error? (Number of correct answers 3)

Options:

A.

Network congestion or jitter occurred

B.

The IP address of the origin site is exposed and suffered an attack

C.

The service was configured using the IP address method instead of the CI

D.

The Anti-DDoS Service IP range was not released As a result, the origin site is blocked.

Buy Now
Questions 6

Alibaba Cloud Anti-DDoS Premium can be used only when the origin site IP address is in Alibaba Cloud.

Options:

A.

True

B.

False

Buy Now
Questions 7

Anti-DDoS Premium Service is a value-added service intended to address the problem of service interruption caused by DDoS attack to servers

including non-Alibaba Cloud hosts)

Users can configure a protected IP address so that the attack traffic can be redirected to this IP address, thereby ensuring the stability and reliability of the origin site. When a user configures Anti-DDoS Premium Service and imports an HTTPS certificate, the system prompts an " incorrect parameter format " error Which of the following is NOT the reason of this error?

Options:

A.

The certificate contains strings like " -— "

B.

The name of the certificate contains invalid letters

C.

The certificate contains nonstandard content

D.

The name of the certificate is too long to be accepted

Buy Now
Questions 8

Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications. Which of the following statements about CloudMonitor is accurate ' ?

Options:

A.

CloudMonitor cannot be used through the Alibaba Cloud console

B.

CloudMonitor must be independently bought and paid for activation

C.

CloudMonitor can monitor websites that are not deployed in Alibaba Cloud products.

D.

To use CloudMonitor for ECS monitoring, there no agent needs to be installed in ECS.

Buy Now
Questions 9

Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML injection to insert malicious scripts so as to control the user ' s browser when the user browses the webpage XSS vulnerabilities may be used for user identity stealing (particularly the administrator identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing

Options:

A.

True

B.

False

Buy Now
Questions 10

Border Gateway Protocol (BGP) is mainly used for interconnection between autonomous systems (AS) on the Internet It. Controlling route transmission and selecting the best route Alibaba Cloud uses a BGP multi-line access mechanism for all its IDCs in China. Which of the followings are advantages of a BGP multi-line IDC? (Number of correct answers 2)

Options:

A.

Larger bandwidth

B.

High-speed interconnection

C.

Low bandwidth cost

D.

Elimination of access barriers between North China and South China because China is big and North China and South China has different telecom operators

Buy Now
Questions 11

Alibaba Cloud ' s Content Moderation service cannot detect advertising or spam content.

Options:

A.

True

B.

False

Buy Now
Questions 12

For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)

Options:

A.

Data leakage prevention

B.

Defense against website trojans and tampering

C.

Virtual vulnerability patches

D.

Protection against malicious CC attacks

E.

Brute force cracking protection

F.

Protection against SMS refresh and service data crawling

Buy Now
Questions 13

Which of the following methods can be used to download the metric data of Alibaba Cloud CloudMonitor?

Options:

A.

Download the data through Open APIs

B.

You can download the data through both the console and Open APIs

C.

You can only view the reports, but cannot download them.

D.

Download the data from the console

Buy Now
Questions 14

Alibaba Cloud Security Center provides patch management service, where are the patches published from?

Options:

A.

Contributed by netizens from open-source communities

B.

Officially published by operating system vendors

C.

Officially published by application vendors

D.

Developed by Alibaba Cloud

Buy Now
Questions 15

Alibaba Cloud WAF cannot protect against large traffic DDoS attacks which can be solved by Alibaba Cloud Ant-DDoS Service.

Options:

A.

True

B.

False

Buy Now
Questions 16

User A is the system administrator of a company, who often takes business trips to Shanghai Each time when he remotely logs on to the Shanghai an alert is reported, prompting " Someone is remotely logging on to the server Please pay attention to your server security " Which of the following methods can be used to quickly and automatically resolve this issue?

Options:

A.

Open a ticket immediately to consult Alibaba Cloud engineers

B.

Log on to the Alibaba Cloud Security Center, and add a frequent logon location to the configuration item of Security Center.

C.

Ask the company leaders for help

D.

Call a friend, who is a famous hacker in the industry, for help.

Buy Now
Questions 17

What are some of the products that support integration with Alibaba Cloud ' s SSL Certificates Service (Number of correct answers: 3)

Options:

A.

ApsaraDB for RDS

B.

Content Distribution Network (CDN)

C.

Secure Content Distribution Network (SCDN)

D.

Server Load Balancer (SLB)

Buy Now
Questions 18

Users can detach the Security Center client on Alibaba Cloud ECS instances, and reinstall it later when necessary.

Options:

A.

True

B.

False

Buy Now
Questions 19

When submitting requests to the Content Moderation service API, which HTTP method should you use?

Options:

A.

HEAD

B.

PUT

C.

GET

D.

POST

Buy Now
Questions 20

If a user has multiple ECS instances on Alibaba Cloud but has no professional O & M team or is unwilling to put efforts in O & M, the user can activate Alibaba Cloud Security Center which provides security expert services like manual security checking, Trojan removing and hosted service monitoring.

Options:

A.

True

B.

False

Buy Now
Questions 21

More and more blackmail attacks (using hacking tools or ransomware) have been detected among recent network security events, causing ever greater damage and financial loss. Which of the following measures can help Alibaba Cloud customers reduce risks in blackmail attacks? (Number of correct answers 3)

Options:

A.

Enable images and snapshots for ECS instances, back up data every day, and keep more than three redundant copies

B.

Deploy different service applications on servers with the same security level and security domain, and ensure unified policy management and defense

C.

Use strong passwords with more than 15 characters for the accounts of all types of cloud services

D.

When remotely operating and maintaining an ECS instance use the superuser account for login at all times

E.

If remote O & M is required use IpsecVPN or SSL VPN remote solutions

Buy Now
Questions 22

To improve system security and protect the system from DDoS attacks, you can use Alibaba Cloud Anti-DDoS Premium Service. Which of the following products can be used together with Alibaba Cloud Anti-DDoS Service to improve the system access capabilities? (Number of correct answers 3)

Options:

A.

Server Load Balancer

B.

CDN

C.

WAF

D.

RDS

Buy Now
Questions 23

A customer built his website on Alibaba Cloud- To defend against Web attacks he activated Alibaba Cloud WAF However, a week later, the customer finds that his website has suffered intrusion. Which of the following actions should he take to ensure that WAF functions correctly and enhance system security? (Number of correct answers: 4)

Options:

A.

Use Security Center to remove Trojans and fix vulnerabilities

B.

Delete all snapshots and clear the server

C.

Secure other HTTP services on the ECS instance using WAF

D.

Configure a security group for the ECS instance.

E.

Check whether or not the DNS resolution results point to the WAF address

F.

Resolve the website domain name to the site s source IP address

Buy Now
Questions 24

You have helped a customer set up a content filtering solution based on Content Moderation service However, the customer is complaining that certain images are getting incorrectly flagged as pornographic content. What can you do to help fix this?

Options:

A.

Create an " Image Library " from the Content Moderation console and add the images to the Image Library ' s whitelist

B.

Ask your customer to use different images on their site

C.

Modify the images until Content Moderation service starts marking them as pornographic.

D.

Open a ticket with Alibaba Cloud support, and send them a copy of the images, so that they can tune Content Moderation ' s detection algorithms

Buy Now
Exam Code: ACP-Sec1
Exam Name: ACP Cloud Security Professional
Last Update: Apr 30, 2026
Questions: 80

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now ACP-Sec1 testing engine

PDF (Q&A)

$43.57  $124.49
buy now ACP-Sec1 pdf