3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following statements about cloud security shared responsibilities model are true? (the
number of correct answers: 2)
Please list the correct order of the following 4 steps to enable a WAF service : (1) upload
HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be
protected (3) select the original IP address (4) add CNAME DNS record
Score 2
Which of the following statements about ECS, VPC, security groups are NOT true?
(the number of correct answers: 2)
Which of following statement about 'Server Guard' Trojan scanning functionality is NOT
correct?
Score 2
Which of the following reasons is the least possible reason leading to a network attack?
If Server Guard (product provided by Alibaba Cloud) report some brute force password hacking
attacks, the reporting information will include? (the number of correct answers: 3)
Which of the following risks are considered as common network security risk? (the number
of correct answers: 2)
May, 2017. New blackmail virus WannaCry burst globally. This virus leveraged
Windows OS opened port 445 to initiate the attack, so the quickest way to prevent this kind
of attack is?
Which of the following statements are true about the difference between HTTP and HTTPS
? (the number of correct answers: 2)
. In the ISO/OSI 7 layers networking model, which of the following functions are provided for
the 'network layer'? (the number of correct answers: 2)
If user is using anti-DDOS Pro service, but the original server has rule to limit access
to the client IPs, which of the following actions is the most proper one to take?
Which of the following 4 functions can be achieved through ECS security group
configuration?
Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options
are the responsibilities Cloud user need to take care of ?
After using WAF, if you find there are many user input data in the network traffic, you should apply:
For internet communication, to setup the connection and data transition between source
and destination, which of the following information you will need? (the number of correct
answers: 3)
Score 1
Which of the following options is the top 1 web application security risk based on OWASP 2017
report?
In order to stop the service provided through a particular port in Windows OS, which
of the following methods can be used to achieve this objective? (the number of correct
answers: 3)
Which of the following statements are NOT true about 'Server Guard' remote logon detection functionality?
Which of the following function is NOT provided by 'Server Guard' vulnerability detection?
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer
networking model?
In Windows OS what command can be used to open registry table and edit it?
By default, servers in VPC can't communicate with internet. By implementing which of the
following products these servers can gain the capability to communicate with internet? (the
number of correct answers: 3)
Which of the following application vulnerabilities are not as popular as others?
The Alibaba Cloud WAF protection strategy provides the following: (the number of correct
answers: 3)
Score 1
In a regular server maintenance operation, the purpose of installing a patch on the operating system is?
ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by
some internet hacker, which of the following consequences such attack could cause? (the
number of correct answers: 2)
Which of the following protocol is dedicated to resolve IP and MAC addresses?
Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)
Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?
When 'Server Guard' detects remote logon behavior, what information will be
shown on 'Server Guard' console?
Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation
permissions these user accounts possess for resources under your account. Which of the following
descriptions of a RAM usage scenario is NOT correct?
18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?