Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ACP Cloud Security Professional Question and Answers

ACP Cloud Security Professional

Last Update May 5, 2024
Total Questions : 80

We are offering FREE ACP-Sec1 Alibaba Cloud exam questions. All you do is to just go and sign up. Give your details, prepare ACP-Sec1 free exam questions and then go for complete pool of ACP Cloud Security Professional test questions that will help you more.

ACP-Sec1 pdf

ACP-Sec1 PDF

$35  $99.99
ACP-Sec1 Engine

ACP-Sec1 Testing Engine

$42  $119.99
ACP-Sec1 PDF + Engine

ACP-Sec1 PDF + Testing Engine

$56  $159.99
Questions 1

When importing key material into Key Management Service (KMS), you will be given an import token and public encryption key valid for 24 hours. The public key KMS provides must be used to encrypt your key material before upload KMS allows you to choose different public key encryption algorithms Which ones are supported? (Number of correct answers; 3)

Options:

A.  

RSAES_OAEP_SHA_1

B.  

RSAES_ECDHE_V1 _5

C.  

RSAES_OAEP_SHA_256

D.  

RSAES PKCS1 V1 5

Discussion 0
Questions 2

Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications Which of the following functions are currently provided by CloudMonitor? (Number of correct answers: 4)

Options:

A.  

Custom firewall

B.  

Alerting

C.  

Site monitoring

D.  

Cloud service monitoring

E.  

Custom monitoring

Discussion 0
Questions 3

Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML injection to insert malicious scripts so as to control the user's browser when the user browses the webpage XSS vulnerabilities may be used for user identity stealing (particularly the administrator identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing

Options:

A.  

True

B.  

False

Discussion 0
Questions 4

Various profit-oriented hacker groups exist on the Internet. They control a large number of server resources and can launch network attacks against a target server at any time Among those, one type of attack is common and destructive, which completely consumes resources of the target server so that normal customers cannot connect to the server Which of the following belongs to this type of attack?

Options:

A.  

XSS attack

B.  

Webshell attack

C.  

DDoS attack

D.  

SQL injection

Discussion 0
Questions 5

Alibaba Cloud Anti-DDoS Premium Service can be used to protect against DDoS attacks larger than 100 Gbps. It can be used to protect both Alibaba Cloud hosts and non-Alibaba Cloud hosts

Options:

A.  

True

B.  

False

Discussion 0
Questions 6

Alibaba Cloud Security's Data R.sk Control can effectively resolve junk registration, database hacking, and other service risk identification problems To use this service. you need to first collect service data. Which of the following methods can be used to collect information off Web application

systems?

Options:

A.  

JavaScript

B.  

SDK

C.  

JavaScript, SDK

D.  

HTML5

Discussion 0
Questions 7

You have helped a customer set up a content filtering solution based on Content Moderation service However, the customer is complaining that certain images are getting incorrectly flagged as pornographic content. What can you do to help fix this?

Options:

A.  

Create an "Image Library" from the Content Moderation console and add the images to the Image Library's whitelist

B.  

Ask your customer to use different images on their site

C.  

Modify the images until Content Moderation service starts marking them as pornographic.

D.  

Open a ticket with Alibaba Cloud support, and send them a copy of the images, so that they can tune Content Moderation's detection algorithms

Discussion 0
Questions 8

Before using the HTTPS protection feature in Alibaba Cloud WAF, you must upload the server certificate and private key beforehand.

Options:

A.  

True

B.  

False

Discussion 0
Questions 9

A large Internet company has services running on physical machines, as well as self-built monitoring and alert system Recently, the company wants to migrate part of the services to Alibaba Cloud and use CloudMonitor to monitor ECS instances and set alerts

What should the company do to quickly interconnect CloudMonitor alerts with the self-built alert system, and handle both alerts (alerts about the physical machines and ECS instances) in self-built alert system?

Options:

A.  

Use the Event Monitoring function provided by CloudMonitor to consume alerts sent from self-built alert system

B.  

Call the API for querying data provided by CloudMonitor. regularly query data, and write a code to check whether indicators are abnormal

C.  

Call the API for obtaining messages and alerts that are sent to self-build alert system

D.  

This cannot be implemented.

Discussion 0
Questions 10

Alibaba Cloud Security Center can record source IP addresses that remotely access a server, and shield suspicious IP addresses that frequently connect to the server. During routine O&M. which of the following functions can be used to set the IP address that are commonly used by the system administrator'?

Options:

A.  

Security group

B.  

Valid Login IP list

C.  

Frequent logon location management

D.  

Webshell detection

Discussion 0
Questions 11

If you install Alibaba Cloud Security Center client on a non-Alibaba Cloud server, which of the following statements allows you to check the server-related reports on the Security Center?

Options:

A.  

Associate the Security Center client with your Alibaba Cloud official website account.

B.  

Security Center does not support non-Alibaba Cloud servers

C.  

You need to manually install the agent on the external server, and use a verification key to associate it with your account

D.  

You cannot check the reports on the Alibaba Cloud console.

Discussion 0
Questions 12

Which of the following configurations is NOT a feature provided by Alibaba Cloud Web Application Firewall product?

Options:

A.  

Blocked Regions

B.  

HTTP ACL Policy

C.  

Data Leakage Prevention

D.  

Crawler Detection

Discussion 0