3 Months Free Update
3 Months Free Update
3 Months Free Update
Apart from technical approaches, the proper data security management rules can be applied
in daily operations to lower the risk of information leakage. Which of the following risks can
be mitigated setting a strong data security management policy for company's employees?
Score 2
You configure a computer to act as a zombie set in order to attack a web server on a specific date.
What would this contaminated computer be part of?
Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation
permissions these user accounts possess for resources under your account. Which of the following
descriptions of a RAM usage scenario is NOT correct?
If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?
Which of the following statements about ECS, VPC, security groups are NOT true?
(the number of correct answers: 2)
In Windows OS which command can be used to track IP route, including involved node and spent time on each hop?
When 'Server Guard' detects remote logon behavior, what information will be
shown on 'Server Guard' console?
The Alibaba Cloud WAF protection strategy provides the following: (the number of correct
answers: 3)
Score 1
After WAF was purchased, users need to add one DNS record to map their domain name to WAF provided IP. What is the type of that DNS record?
ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by
some internet hacker, which of the following consequences such attack could cause? (the
number of correct answers: 2)
User A rented 2 ECS server and one RDS in Alibaba Cloud to setup his company public
website. After the web site will become available online, the security risks he/she will face
will include: (the number of correct answers: 3)
In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?
You just physically attached one new disk to a Linux server. Before you can write data into
that disk with shell command, which of the following steps you have to finish? (the number
of correct answers: 4)
Score 1
Which of the following service may under anti-DDOS attack?(the number of correct answers:
3)
Score 1
Which of the following statements are true for how to login to different ECS operating
system? (the number of correct answers: 2)
Score 1
Which of the following logs can be accessed through ECS logs provided by Alibaba Cloud?
(the number of correct answers: 2)
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer
networking model?