Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ACA Cloud Security Associate Question and Answers

ACA Cloud Security Associate

Last Update Apr 29, 2024
Total Questions : 147

We are offering FREE ACA-Sec1 Alibaba Cloud exam questions. All you do is to just go and sign up. Give your details, prepare ACA-Sec1 free exam questions and then go for complete pool of ACA Cloud Security Associate test questions that will help you more.

ACA-Sec1 pdf

ACA-Sec1 PDF

$35  $99.99
ACA-Sec1 Engine

ACA-Sec1 Testing Engine

$42  $119.99
ACA-Sec1 PDF + Engine

ACA-Sec1 PDF + Testing Engine

$56  $159.99
Questions 1

Reliable server daily operation and security management are essential for continuous service running. Which of the following statement is NOT correct regarding to this scenario?

Options:

A.  

set easy to remember password to help administrator quickly login and solve problems

B.  

patch system timely and frequently

C.  

enable build-in OS firewall and configure it properly

D.  

disable the ports which are not providing service anymore

Discussion 0
Questions 2

Which of the following scenarios can be considered as business fraud? (the number of

correct answers: 2)

Options:

A.  

massive accounts registration for new user benefits gain

B.  

data leak because of data transmission with plain text

C.  

post massive comments with bots to some e-commerce website

D.  

page content including some porn pictures

Discussion 0
Questions 3

Which of the following statements are true about the difference between HTTP and HTTPS

? (the number of correct answers: 2)

Options:

A.  

HTTP must use port 80 and HTTPS must use port 443 to provide service

B.  

HTTPS is more secure than HTTP regarding the way they transfer data

C.  

Data transferred through HTTPs is under encryption

D.  

You must buy commercial CA before you setup your own web server with HTTPS service

Discussion 0
Questions 4

After WAF was purchased, users need to add one DNS record to map their domain name to WAF provided IP. What is the type of that DNS record?

Options:

A.  

A record

B.  

CNAME Record

C.  

TXT Record

D.  

MX Record

Discussion 0
Questions 5

You are planning on hosting an eCommerce Web server. You are intent on making the server

secure against all external attacks possible. Which of the following would be the best way to test your

server for its weaknesses? Choose the best answer.

Options:

A.  

Ping to the server

B.  

Simulate a DDoS attack on that server

C.  

Simulate a DoS attack on the server

D.  

Check if all the patches and required antivirus software has been loaded o the server

Discussion 0
Questions 6

Which of the following statements is TRUE about Anti-DDOS basics?

Options:

A.  

it can only protect servers outside of Alibaba Cloud

B.  

it is free to charge

C.  

need to turn on manually

D.  

There is no service limitation for peak traffic

Discussion 0
Questions 7

If your company's official website is tampered, the consequence of such attack could NOTbe:

Options:

A.  

Website is used for some illegal attempts

B.  

Public image or reputation of your company is damaged

C.  

Business is impacted

D.  

Physical server is damaged

Discussion 0
Questions 8

User A rented 2 ECS server and one RDS in Alibaba Cloud to setup his company public

website. After the web site will become available online, the security risks he/she will face

will include: (the number of correct answers: 3)

Options:

A.  

physical cable is cut by someone

B.  

ECS admin password is hacked

C.  

website codes has some vulnerability

D.  

RDS DB got unknown remote logon

E.  

the disk in ECS is broken

Discussion 0
Questions 9

ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by

some internet hacker, which of the following consequences such attack could cause? (the

number of correct answers: 2)

Options:

A.  

Physical Server Damage

B.  

Leak of customer sensitive data

C.  

Service running on this ECS become not available

D.  

The datacenter where the ECS belongs to need to shutdown

Discussion 0
Questions 10

Which of the following security vulnerability is not a 'Server Side' security issue?

Options:

A.  

SQL injection

B.  

System Command Execution vulnerability

C.  

CSRF(cross site request fraud)vulnerability

D.  

File uploading vulnerability

Discussion 0
Questions 11

Which of the following service may under anti-DDOS attack?(the number of correct answers:

3)

Score 1

Options:

A.  

servers in VPC only configured with private network

B.  

any device internet reachable

C.  

government website

D.  

public DNS service

E.  

offline servers

Discussion 0
Questions 12

Which commands can be used to reload the operation system? (Correct Answers: 2)

Options:

A.  

reload

B.  

shutdown

C.  

init

D.  

restart

Discussion 0
Questions 13

Which of the following logs can be accessed through ECS logs provided by Alibaba Cloud?

(the number of correct answers: 2)

Options:

A.  

OS system log

B.  

Application log

C.  

Hypervisor log

D.  

Cloud platform log

Discussion 0
Questions 14

Which of the following functions can be provided by Alibaba Cloud Server Guard

product?(the number of correct answers: 3)

Options:

A.  

brute Force password hacking detection and defense

B.  

suspicious remote login detection and warning

C.  

security vulnerability scanning and patching

D.  

anti-ddos

E.  

anti SQL injection

Discussion 0
Questions 15

Which of the following functions does not belong to what WAF can provide?

Options:

A.  

DB encryption

B.  

SQL injection detection

C.  

XSS attack detection

D.  

unauthorized resource access blocking

Discussion 0
Questions 16

18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?

Options:

A.  

Ppart

B.  

Fdisk

C.  

Du

D.  

mount

Discussion 0
Questions 17

Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web

Application Security Risks

Options:

A.  

Cross-Site Request Forgery(CSRF)

B.  

Cross-Site Scripting(XSS)

C.  

Unvalidated Redirects and Forwards

D.  

Injection

Discussion 0
Questions 18

Which of the following protocols will not be used for a SYN Flood attack?

Options:

A.  

UDP

B.  

TCP

C.  

IPX/SPX

D.  

AppleTalk

Discussion 0
Questions 19

In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?

Options:

A.  

disable port 445

B.  

set a highly complexed administrator password

C.  

encrypt all data on server side

D.  

put sensitive data in some hidden directory

Discussion 0
Questions 20

Which of following attacks could serve as a CC attack? (the number of correct answers: 3)

Score 1

Options:

A.  

SYN flood

B.  

ICMP flood

C.  

One host simulate many IP addresses

D.  

Attack through agent

E.  

Zombie network

Discussion 0
Questions 21

Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation

permissions these user accounts possess for resources under your account. Which of the following

descriptions of a RAM usage scenario is NOT correct?

Options:

A.  

Enterprise sub-account management and permission assignment

B.  

Resource operation and authorization management between enterprises

C.  

Temporary authorization management for untrusted client apps

D.  

Prevention of network attacks on enterprises

Discussion 0
Questions 22

Which of the following statements is NOT true about web application security protection best practices?

Options:

A.  

enforce security management to any public service

B.  

keep installing official released patches will be good enough

C.  

keep monitoring system processes , performance and status

D.  

always scan input by user through web application

Discussion 0