Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ACA-Sec1 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ACA-Sec1 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ACA Cloud Security Associate
  • Last Update: Sep 12, 2025
  • Questions and Answers: 147
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ACA-Sec1 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ACA-Sec1 Practice Exam Questions with Answers ACA Cloud Security Associate Certification

Question # 6

Which of the following statements about cloud security shared responsibilities model are true? (the

number of correct answers: 2)

A.

for users who is using IAAS service, they should be responsible for their business system which is

on top of cloud infrastructure

B.

cloud service provider should guarantee the security of all physical infrastructure

C.

the damage caused by attacks leveraging security vulnerability in customers' application server

should be charged to cloud service provider

D.

cloud user should also take care of some of the hardware maintenance and operation work

Full Access
Question # 7

Which of the following statements is NOT true about EIP and NAT gateway?

A.

NAT gateway can support multi servers inside VPC to access public internet through one

public IP

B.

EIP can be bind to different ECS servers at the same time

C.

Different EIP can't share bandwidth

D.

NAT gateway can support shared bandwidth between several ips

Full Access
Question # 8

Please list the correct order of the following 4 steps to enable a WAF service : (1) upload

HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be

protected (3) select the original IP address (4) add CNAME DNS record

Score 2

A.

2314

B.

2341

C.

2431

D.

2413

Full Access
Question # 9

Which of the following statements about ECS, VPC, security groups are NOT true?

(the number of correct answers: 2)

A.

rule setting for security group supports both in and out direction configuration

B.

default security group rule is safe enough, please don't change it too much

C.

by default, ECS in different security group can communicate with each other

D.

one ECS can be in several different security group

Full Access
Question # 10

Which of following statement about 'Server Guard' Trojan scanning functionality is NOT

correct?

Score 2

A.

Server Guard Agent will automatically scan your web pages directories and look for any

webshell file.

B.

A change to a file in the web pages directories will trigger a scan for that file

C.

you can log on to the Server Guard console to isolate webshell files with one click.

D.

Server Guard will delete any suspicious webshell file immediately

My Answer: B. Other file says D

Full Access
Question # 11

Which of the following reasons is the least possible reason leading to a network attack?

A.

technical skills show off of hacker

B.

business competition

C.

blackmail

D.

help to find system vulnerability

Full Access
Question # 12

If Server Guard (product provided by Alibaba Cloud) report some brute force password hacking

attacks, the reporting information will include? (the number of correct answers: 3)

A.

Attack initiated time

B.

Attack type

C.

Tools attacker used

D.

Attack source IP

E.

Physical location of attacker

Full Access
Question # 13

Which command in Windows OS can be used to open a terminal?

A.

Painter.exe

B.

Cmd.exe

C.

Batch.exe

D.

Term.exe

Full Access
Question # 14

Which of the following risks are considered as common network security risk? (the number

of correct answers: 2)

A.

Massive traffic flood attack

B.

Software version is not up to date

C.

Data under transferring is being sniffed

D.

Physical Fiber Channel Cable is broken

Full Access
Question # 15

May, 2017. New blackmail virus WannaCry burst globally. This virus leveraged

Windows OS opened port 445 to initiate the attack, so the quickest way to prevent this kind

of attack is?

A.

Change 'Administrator' to some other name

B.

With 'Server Guard' protection in Alibaba Cloud, you can set password to some easy to

remember words.

C.

Except some necessary accounts for system management, disable or delete other useless

accounts

D.

Always set password with highly complex combination of number, letter and other

characters

Full Access
Question # 16

Which of the following methods CANNOT increase account security?

A.

Strong password policies

B.

Periodically reset the user login passwords

C.

Adhere to the minimum authorization principle

D.

Unite user management, permission management and resource management into a single

management process

Full Access
Question # 17

Which of the following statements are true about the difference between HTTP and HTTPS

? (the number of correct answers: 2)

A.

HTTP must use port 80 and HTTPS must use port 443 to provide service

B.

HTTPS is more secure than HTTP regarding the way they transfer data

C.

Data transferred through HTTPs is under encryption

D.

You must buy commercial CA before you setup your own web server with HTTPS service

Full Access
Question # 18

. In the ISO/OSI 7 layers networking model, which of the following functions are provided for

the 'network layer'? (the number of correct answers: 2)

A.

Routing

B.

congestion handling

C.

end to end reliable and transparent data transition

D.

physical connection

Full Access
Question # 19

If user is using anti-DDOS Pro service, but the original server has rule to limit access

to the client IPs, which of the following actions is the most proper one to take?

A.

enable CDN and change anti-DDOS pro IP to CDN address

B.

add anti-DDOS pro IP into customer firewall white list

C.

disable original server firewall

D.

enable SLB for original server

Full Access
Question # 20

Which of the following 4 functions can be achieved through ECS security group

configuration?

A.

allow specific IP to remote access ECS server

B.

make ECS server be able to defend 15Gb/s DDOS attack

C.

fix XSS vulnerability

D.

assign customized IP address to ECS

Full Access
Question # 21

Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options

are the responsibilities Cloud user need to take care of ?

A.

Data security inside ECS

B.

Physical servers water proof

C.

Application vulnerabilities

D.

ECS network configuration

Full Access
Question # 22

After using WAF, if you find there are many user input data in the network traffic, you should apply:

A.

Loose protection policy

B.

Normal protection policy

C.

Strict protection policy

D.

Progression protection policy

Full Access
Question # 23

For internet communication, to setup the connection and data transition between source

and destination, which of the following information you will need? (the number of correct

answers: 3)

Score 1

A.

IP address

B.

Port

C.

Encryption algorism

D.

Protocol

E.

Router Location

Full Access
Question # 24

Which of the following options is the top 1 web application security risk based on OWASP 2017

report?

A.

XSS Attack

B.

Server Information Theft

C.

Code Execution

D.

SQL Injection

Full Access
Question # 25

In order to stop the service provided through a particular port in Windows OS, which

of the following methods can be used to achieve this objective? (the number of correct

answers: 3)

A.

adjust firewall rule

B.

adjust local security policy

C.

update OS patch

D.

stop the service itself

E.

stop all guest role access

Full Access
Question # 26

Which of the following statements are NOT true about 'Server Guard' remote logon detection functionality?

A.

It needs to setup common logon location in 'Server Guard' configuration

B.

It can detect the attacking tool used by attacker

C.

It can detect the remote logon used source IP address

D.

It can send warning message to 'Server Guard' user

Full Access
Question # 27

Which of the following function is NOT provided by 'Server Guard' vulnerability detection?

A.

Trojan detection

B.

weak password detection

C.

sensitive data encryption

D.

Linux system vulnerability scanning

Full Access
Question # 28

Which of the following protocols is not an application level protocol in ISO/OSI 7 layer

networking model?

A.

FTP

B.

TCP

C.

HTTP

D.

SNMP

Full Access
Question # 29

In Windows OS what command can be used to open registry table and edit it?

A.

Gpedit

B.

Regedit

C.

Gedit

D.

Zedit

Full Access
Question # 30

By default, servers in VPC can't communicate with internet. By implementing which of the

following products these servers can gain the capability to communicate with internet? (the

number of correct answers: 3)

A.

Elastic Public IP

B.

CDN

C.

EIP + SLB

D.

EIP + NAT Gateway

E.

DNS service

Full Access
Question # 31

Customer who bought ECS server doesn't need to worry about :

A.

Cloud infrastructure security

B.

OS vulnerability inside ECS

C.

Web service security inside ECS

D.

ECS security group setting

Full Access
Question # 32

Which of the following application vulnerabilities are not as popular as others?

A.

SQL Injection

B.

XSS exploit

C.

File uploading vulnerability

D.

Kernel privilege breaking

Full Access
Question # 33

The Alibaba Cloud WAF protection strategy provides the following: (the number of correct

answers: 3)

Score 1

A.

Loose

B.

Strict

C.

Normal

D.

Regular

E.

Early Warning

Full Access
Question # 34

In a regular server maintenance operation, the purpose of installing a patch on the operating system is?

A.

To improve server resource usage

B.

to improve system usability

C.

to enhance system functionality

D.

to avoid existing system vulnerabilities being used by some hackers

Full Access
Question # 35

ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by

some internet hacker, which of the following consequences such attack could cause? (the

number of correct answers: 2)

A.

Physical Server Damage

B.

Leak of customer sensitive data

C.

Service running on this ECS become not available

D.

The datacenter where the ECS belongs to need to shutdown

Full Access
Question # 36

Which of the following protocol is dedicated to resolve IP and MAC addresses?

A.

TCP

B.

ARP

C.

DNS

D.

ICMP

Full Access
Question # 37

Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)

A.

Brute Force password hacking

B.

Trojan planting

C.

Content Compliance Requirement

D.

Vulnerability scanning

E.

Lack of storage resource

Full Access
Question # 38

Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?

A.

Watch

B.

Find

C.

Grep

D.

Ca

Full Access
Question # 39

Which of the following statements is true about classic network and VPC?

A.

they can do same thing

B.

you can customize your private IP in a classic network

C.

you can customize your private IP in VPC

D.

servers inside VPC can only communicate to other VPC network

Full Access
Question # 40

Which of the following products won't be a DDOS attack target?

A.

offline backup tape devices

B.

enterprise major website

C.

router device

D.

online banking system

Full Access
Question # 41

When 'Server Guard' detects remote logon behavior, what information will be

shown on 'Server Guard' console?

A.

Illegal Logon!

B.

Migrated Already!

C.

Logon Successfully!

D.

Remote Logon Detected!

Full Access
Question # 42

Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation

permissions these user accounts possess for resources under your account. Which of the following

descriptions of a RAM usage scenario is NOT correct?

A.

Enterprise sub-account management and permission assignment

B.

Resource operation and authorization management between enterprises

C.

Temporary authorization management for untrusted client apps

D.

Prevention of network attacks on enterprises

Full Access
Question # 43

In Windows OS you can turn off a service through: Score 2

A.

Control Panel->Management Tool->Stop the running service

B.

Control Panel->windows update->Stop

C.

Create new firewall rule to stop service

D.

Delete administrator role and related accounts

Full Access
Question # 44

18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?

A.

Ppart

B.

Fdisk

C.

Du

D.

mount

Full Access