Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ACP-Sec1 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ACP-Sec1 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ACP Cloud Security Professional
  • Last Update: Sep 12, 2025
  • Questions and Answers: 80
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ACP-Sec1 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ACP-Sec1 Practice Exam Questions with Answers ACP Cloud Security Professional Certification

Question # 6

When users log on to ECS instances through SSH or remote desktop from public Internet, Alibaba Cloud Security Center will monitor the log on behaviors

If an IP address uses incorrect password to log on to an ECS instance for too many times, an alert "ECS instance suffers brute force password cracking" will be prompted If you receive this alert, which of the following is the safest way to handle this alert?

A.

This alert does not matter and can be ignored.

B.

Inform all users on the service platform of changing their passwords, and eliminate simple passwords using technical measures

C.

Log on immediately to the ECS instance and check the logon logs If no abnormal logon success record is found ignore this alert.

D.

Update the system user password immediately for the ECS instance, and enable the security group firewall to allow only specified IP addresses to connect to the ECS instance

Full Access
Question # 7

After opening the Task Manager in Windows, you can easily see abnormal processes whose names do not comply with English grammar or computer naming conventions or contain random strings. Which of the following processes may be abnormal? (Number of correct answers: 4)

A.

svchost exe

B.

nihao exe

C.

Ikdhpec exe

D.

RegSrvc exe

E.

eeosec exe

F.

466363.exe

Full Access
Question # 8

For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)

A.

Data leakage prevention

B.

Defense against website trojans and tampering

C.

Virtual vulnerability patches

D.

Protection against malicious CC attacks

E.

Brute force cracking protection

F.

Protection against SMS refresh and service data crawling

Full Access
Question # 9

Cloud computing service security requires the joint effort of the cloud service supplier (such as Alibaba Cloud), independent software vendor (ISV), and users The failure of any party to fulfill their responsibilities may lead to security risks. Which of the following are the responsibilities of the cloud computing service users? (Number of correct answers 2)

A.

Ensure multi-channel power supply in the Cloud data center

B.

Provide security protection for physical infrastructure

C.

Regularly change the service system password

D.

Strengthen information security management in the company to prevent sensitive information leakage

Full Access
Question # 10

Products like ECS and Server Load Balancer it will be automatically protected by Anti-DDoS Basic service

A.

True

B.

False

Full Access
Question # 11

When submitting requests to the Content Moderation service API, which HTTP method should you use?

A.

HEAD

B.

PUT

C.

GET

D.

POST

Full Access
Question # 12

A large Internet company has services running on physical machines, as well as self-built monitoring and alert system Recently, the company wants to migrate part of the services to Alibaba Cloud and use CloudMonitor to monitor ECS instances and set alerts

What should the company do to quickly interconnect CloudMonitor alerts with the self-built alert system, and handle both alerts (alerts about the physical machines and ECS instances) in self-built alert system?

A.

Use the Event Monitoring function provided by CloudMonitor to consume alerts sent from self-built alert system

B.

Call the API for querying data provided by CloudMonitor. regularly query data, and write a code to check whether indicators are abnormal

C.

Call the API for obtaining messages and alerts that are sent to self-build alert system

D.

This cannot be implemented.

Full Access
Question # 13

Alibaba Cloud WAF cannot protect against large traffic DDoS attacks which can be solved by Alibaba Cloud Ant-DDoS Service.

A.

True

B.

False

Full Access
Question # 14

Alibaba Cloud Anti-DDoS Premium can be used only when the origin site IP address is in Alibaba Cloud.

A.

True

B.

False

Full Access
Question # 15

Your applications are deployed on Alibaba Cloud ECS instances. You want to collect indicators by yourself for application layer monitoring. Which of the following functions provided by Alibaba Cloud CloudMonitor can be used for indicator collection, aggregation, and alerting?

A.

CloudMonitor cannot meet these requirements

B.

Cloud service monitoring

C.

Site monitoring

D.

Custom monitoring

Full Access
Question # 16

After you activate the button Data Risk Control feature in Alibaba Cloud WAF. Which of the following risk control verification modes m displayed if you directly request for a risk control protection URL?

A.

Slider verification

B.

QR code verification

C.

Image verification

D.

Digit verification

Full Access
Question # 17

More and more blackmail attacks (using hacking tools or ransomware) have been detected among recent network security events, causing ever greater damage and financial loss. Which of the following measures can help Alibaba Cloud customers reduce risks in blackmail attacks? (Number of correct answers 3)

A.

Enable images and snapshots for ECS instances, back up data every day, and keep more than three redundant copies

B.

Deploy different service applications on servers with the same security level and security domain, and ensure unified policy management and defense

C.

Use strong passwords with more than 15 characters for the accounts of all types of cloud services

D.

When remotely operating and maintaining an ECS instance use the superuser account for login at all times

E.

If remote O&M is required use IpsecVPN or SSL VPN remote solutions

Full Access
Question # 18

Data Risk Control feature has been integrated into Alibaba Cloud WAF. When this function is activated, a script must be embedded into the page that wishes to be protected under the corresponding domain name to check whether a client is trustworthy. Which type of script is it?

A.

JavaScript

B.

C++

C.

Vbscript

D.

Java

Full Access
Question # 19

An Alibaba Cloud user buys an ECS instance and deploys Tomcat on it Which of the following is the easiest way for the user to monitor whether port 8080 (used by Tomcat) on this ECS instance is functioning normally or not?

A.

Log on to the ECS instance every hour to check the port using the command line.

B.

Buy a third-party monitoring tool

C.

Write a script for detection and report the data to CloudMonitor.

D.

Use Alibaba Cloud CloudMonitor s site monitor feature to create a new Monitoring Task to monitor the port status.

Full Access
Question # 20

Border Gateway Protocol (BGP) is mainly used for interconnection between autonomous systems (AS) on the Internet It. Controlling route transmission and selecting the best route Alibaba Cloud uses a BGP multi-line access mechanism for all its IDCs in China. Which of the followings are advantages of a BGP multi-line IDC? (Number of correct answers 2)

A.

Larger bandwidth

B.

High-speed interconnection

C.

Low bandwidth cost

D.

Elimination of access barriers between North China and South China because China is big and North China and South China has different telecom operators

Full Access
Question # 21

User A is the system administrator of a company, who often takes business trips to Shanghai Each time when he remotely logs on to the Shanghai an alert is reported, prompting "Someone is remotely logging on to the server Please pay attention to your server security" Which of the following methods can be used to quickly and automatically resolve this issue?

A.

Open a ticket immediately to consult Alibaba Cloud engineers

B.

Log on to the Alibaba Cloud Security Center, and add a frequent logon location to the configuration item of Security Center.

C.

Ask the company leaders for help

D.

Call a friend, who is a famous hacker in the industry, for help.

Full Access
Question # 22

To improve system security and protect the system from DDoS attacks, you can use Alibaba Cloud Anti-DDoS Premium Service. Which of the following products can be used together with Alibaba Cloud Anti-DDoS Service to improve the system access capabilities? (Number of correct answers 3)

A.

Server Load Balancer

B.

CDN

C.

WAF

D.

RDS

Full Access
Question # 23

Which of the following methods can be used to download the metric data of Alibaba Cloud CloudMonitor?

A.

Download the data through Open APIs

B.

You can download the data through both the console and Open APIs

C.

You can only view the reports, but cannot download them.

D.

Download the data from the console

Full Access
Question # 24

Alibaba Cloud WAF is a security protection product based on Alibaba Group's web security defense experience accumulated over more than a decade By defending against common OWASP attacks, providing patches to fix vulnerabilities, and allowing users to customize protection policies for website services, WAF can successfully safeguard the security and availability of websites and web applications. Which of the following types of security configurations does WAF provide? (Number of correct answers 3)

A.

Port access control

B.

CC protection

C.

Web application attack protection

D.

Precision access control

Full Access