We at Crack4sure are committed to giving students who are preparing for the Alibaba Cloud ACA-Sec1 Exam the most current and reliable questions . To help people study, we've made some of our ACA Cloud Security Associate exam materials available for free to everyone. You can take the Free ACA-Sec1 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
Which of the following statements about cloud security shared responsibilities model are true? (the
number of correct answers: 2)
Which of the following statements is NOT true about EIP and NAT gateway?
Please list the correct order of the following 4 steps to enable a WAF service : (1) upload
HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be
protected (3) select the original IP address (4) add CNAME DNS record
Score 2
Which of the following statements about ECS, VPC, security groups are NOT true?
(the number of correct answers: 2)
Which of following statement about 'Server Guard' Trojan scanning functionality is NOT
correct?
Score 2
Which of the following reasons is the least possible reason leading to a network attack?
If Server Guard (product provided by Alibaba Cloud) report some brute force password hacking
attacks, the reporting information will include? (the number of correct answers: 3)
Which command in Windows OS can be used to open a terminal?
Which of the following risks are considered as common network security risk? (the number
of correct answers: 2)
May, 2017. New blackmail virus WannaCry burst globally. This virus leveraged
Windows OS opened port 445 to initiate the attack, so the quickest way to prevent this kind
of attack is?
Which of the following methods CANNOT increase account security?
Which of the following statements are true about the difference between HTTP and HTTPS
? (the number of correct answers: 2)
. In the ISO/OSI 7 layers networking model, which of the following functions are provided for
the 'network layer'? (the number of correct answers: 2)
If user is using anti-DDOS Pro service, but the original server has rule to limit access
to the client IPs, which of the following actions is the most proper one to take?
Which of the following 4 functions can be achieved through ECS security group
configuration?
Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options
are the responsibilities Cloud user need to take care of ?
After using WAF, if you find there are many user input data in the network traffic, you should apply:
For internet communication, to setup the connection and data transition between source
and destination, which of the following information you will need? (the number of correct
answers: 3)
Score 1
Which of the following options is the top 1 web application security risk based on OWASP 2017
report?
In order to stop the service provided through a particular port in Windows OS, which
of the following methods can be used to achieve this objective? (the number of correct
answers: 3)
Which of the following statements are NOT true about 'Server Guard' remote logon detection functionality?
Which of the following function is NOT provided by 'Server Guard' vulnerability detection?
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer
networking model?
In Windows OS what command can be used to open registry table and edit it?
By default, servers in VPC can't communicate with internet. By implementing which of the
following products these servers can gain the capability to communicate with internet? (the
number of correct answers: 3)
Customer who bought ECS server doesn't need to worry about :
Which of the following application vulnerabilities are not as popular as others?
The Alibaba Cloud WAF protection strategy provides the following: (the number of correct
answers: 3)
Score 1
In a regular server maintenance operation, the purpose of installing a patch on the operating system is?
ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by
some internet hacker, which of the following consequences such attack could cause? (the
number of correct answers: 2)
Which of the following protocol is dedicated to resolve IP and MAC addresses?
Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)
Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?
Which of the following statements is true about classic network and VPC?
Which of the following products won't be a DDOS attack target?
When 'Server Guard' detects remote logon behavior, what information will be
shown on 'Server Guard' console?
Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation
permissions these user accounts possess for resources under your account. Which of the following
descriptions of a RAM usage scenario is NOT correct?
In Windows OS you can turn off a service through: Score 2
18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?
3 Months Free Update
3 Months Free Update
3 Months Free Update