Data transfer between Internet devices requires specific specifications, which are called " protocols " Among those, the invention of a certain protocol played a decisive role in the creation of the Internet. By using those protocols, tens of thousands of computers can be connected and communicate with each other What is the following protocol is not defined in OSI 7 layer model?
After a customer uses Alibaba Cloud Anti-DDoS Premium Service, a 502 error is prompted. Which of the followings are the possible causes of the error? (Number of correct answers 3)
Alibaba Cloud Anti-DDoS Premium can be used only when the origin site IP address is in Alibaba Cloud.
Anti-DDoS Premium Service is a value-added service intended to address the problem of service interruption caused by DDoS attack to servers
including non-Alibaba Cloud hosts)
Users can configure a protected IP address so that the attack traffic can be redirected to this IP address, thereby ensuring the stability and reliability of the origin site. When a user configures Anti-DDoS Premium Service and imports an HTTPS certificate, the system prompts an " incorrect parameter format " error Which of the following is NOT the reason of this error?
Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications. Which of the following statements about CloudMonitor is accurate ' ?
Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML injection to insert malicious scripts so as to control the user ' s browser when the user browses the webpage XSS vulnerabilities may be used for user identity stealing (particularly the administrator identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing
Border Gateway Protocol (BGP) is mainly used for interconnection between autonomous systems (AS) on the Internet It. Controlling route transmission and selecting the best route Alibaba Cloud uses a BGP multi-line access mechanism for all its IDCs in China. Which of the followings are advantages of a BGP multi-line IDC? (Number of correct answers 2)
Alibaba Cloud ' s Content Moderation service cannot detect advertising or spam content.
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
Which of the following methods can be used to download the metric data of Alibaba Cloud CloudMonitor?
Alibaba Cloud Security Center provides patch management service, where are the patches published from?
Alibaba Cloud WAF cannot protect against large traffic DDoS attacks which can be solved by Alibaba Cloud Ant-DDoS Service.
User A is the system administrator of a company, who often takes business trips to Shanghai Each time when he remotely logs on to the Shanghai an alert is reported, prompting " Someone is remotely logging on to the server Please pay attention to your server security " Which of the following methods can be used to quickly and automatically resolve this issue?
What are some of the products that support integration with Alibaba Cloud ' s SSL Certificates Service (Number of correct answers: 3)
Users can detach the Security Center client on Alibaba Cloud ECS instances, and reinstall it later when necessary.
When submitting requests to the Content Moderation service API, which HTTP method should you use?
If a user has multiple ECS instances on Alibaba Cloud but has no professional O & M team or is unwilling to put efforts in O & M, the user can activate Alibaba Cloud Security Center which provides security expert services like manual security checking, Trojan removing and hosted service monitoring.
More and more blackmail attacks (using hacking tools or ransomware) have been detected among recent network security events, causing ever greater damage and financial loss. Which of the following measures can help Alibaba Cloud customers reduce risks in blackmail attacks? (Number of correct answers 3)
To improve system security and protect the system from DDoS attacks, you can use Alibaba Cloud Anti-DDoS Premium Service. Which of the following products can be used together with Alibaba Cloud Anti-DDoS Service to improve the system access capabilities? (Number of correct answers 3)
A customer built his website on Alibaba Cloud- To defend against Web attacks he activated Alibaba Cloud WAF However, a week later, the customer finds that his website has suffered intrusion. Which of the following actions should he take to ensure that WAF functions correctly and enhance system security? (Number of correct answers: 4)
You have helped a customer set up a content filtering solution based on Content Moderation service However, the customer is complaining that certain images are getting incorrectly flagged as pornographic content. What can you do to help fix this?