Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ACA-Sec1 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ACA-Sec1 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ACA Cloud Security Associate
  • Last Update: May 4, 2024
  • Questions and Answers: 147
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ACA-Sec1 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ACA-Sec1 Practice Exam Questions with Answers ACA Cloud Security Associate Certification

Question # 6

Apart from technical approaches, the proper data security management rules can be applied

in daily operations to lower the risk of information leakage. Which of the following risks can

be mitigated setting a strong data security management policy for company's employees?

Score 2

A.

information is sniffed during network transition

B.

under http flood attack

C.

sensitive information is taken away by former employee

D.

email phishing

Full Access
Question # 7

You configure a computer to act as a zombie set in order to attack a web server on a specific date.

What would this contaminated computer be part of?

A.

The computer is part of a DDoS attack

B.

The computer is part of a TCP/IP hijacking

C.

The computer is part of a spoofing attack

D.

The computer is part of a man-in-the-middle attack

Full Access
Question # 8

Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation

permissions these user accounts possess for resources under your account. Which of the following

descriptions of a RAM usage scenario is NOT correct?

A.

Enterprise sub-account management and permission assignment

B.

Resource operation and authorization management between enterprises

C.

Temporary authorization management for untrusted client apps

D.

Prevention of network attacks on enterprises

Full Access
Question # 9

If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?

A.

Update cache

B.

turn on protection switch manually

C.

add one protection rule

D.

restart the whole WAF service

Full Access
Question # 10

Which of the following statements about ECS, VPC, security groups are NOT true?

(the number of correct answers: 2)

A.

rule setting for security group supports both in and out direction configuration

B.

default security group rule is safe enough, please don't change it too much

C.

by default, ECS in different security group can communicate with each other

D.

one ECS can be in several different security group

Full Access
Question # 11

In Windows OS which command can be used to track IP route, including involved node and spent time on each hop?

A.

Wroute

B.

Route

C.

Tracert

D.

Traceroute

Full Access
Question # 12

When 'Server Guard' detects remote logon behavior, what information will be

shown on 'Server Guard' console?

A.

Illegal Logon!

B.

Migrated Already!

C.

Logon Successfully!

D.

Remote Logon Detected!

Full Access
Question # 13

The Alibaba Cloud WAF protection strategy provides the following: (the number of correct

answers: 3)

Score 1

A.

Loose

B.

Strict

C.

Normal

D.

Regular

E.

Early Warning

Full Access
Question # 14

After WAF was purchased, users need to add one DNS record to map their domain name to WAF provided IP. What is the type of that DNS record?

A.

A record

B.

CNAME Record

C.

TXT Record

D.

MX Record

Full Access
Question # 15

ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by

some internet hacker, which of the following consequences such attack could cause? (the

number of correct answers: 2)

A.

Physical Server Damage

B.

Leak of customer sensitive data

C.

Service running on this ECS become not available

D.

The datacenter where the ECS belongs to need to shutdown

Full Access
Question # 16

User A rented 2 ECS server and one RDS in Alibaba Cloud to setup his company public

website. After the web site will become available online, the security risks he/she will face

will include: (the number of correct answers: 3)

A.

physical cable is cut by someone

B.

ECS admin password is hacked

C.

website codes has some vulnerability

D.

RDS DB got unknown remote logon

E.

the disk in ECS is broken

Full Access
Question # 17

In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?

A.

disable port 445

B.

set a highly complexed administrator password

C.

encrypt all data on server side

D.

put sensitive data in some hidden directory

Full Access
Question # 18

You just physically attached one new disk to a Linux server. Before you can write data into

that disk with shell command, which of the following steps you have to finish? (the number

of correct answers: 4)

Score 1

A.

Make Partitions

B.

Raw Format

C.

Format

D.

Mount

E.

Create Filesystem

Full Access
Question # 19

Which of the following service may under anti-DDOS attack?(the number of correct answers:

3)

Score 1

A.

servers in VPC only configured with private network

B.

any device internet reachable

C.

government website

D.

public DNS service

E.

offline servers

Full Access
Question # 20

Which of the following statements are true for how to login to different ECS operating

system? (the number of correct answers: 2)

Score 1

A.

use 'remote desktop connection' for windows

B.

use 'ssh' tool for windows

C.

use 'remote desktop connection' for Linux

D.

use 'ssh' tool for Linux

Full Access
Question # 21

Which of the following logs can be accessed through ECS logs provided by Alibaba Cloud?

(the number of correct answers: 2)

A.

OS system log

B.

Application log

C.

Hypervisor log

D.

Cloud platform log

Full Access
Question # 22

Which of the following protocols is not an application level protocol in ISO/OSI 7 layer

networking model?

A.

FTP

B.

TCP

C.

HTTP

D.

SNMP

Full Access