Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Alibaba Cloud ACA-Sec1 ACA Cloud Security Associate Exam Practice Test

Page: 1 / 15
Total 147 questions

ACA Cloud Security Associate Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Using ECS security group can help you achieve:

Options:

A.

better CPU usage

B.

fine grained access control to you server

C.

enlarge your network bandwidth

D.

apply QOS to a specific IP

Question 2

In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?

Options:

A.

disable port 445

B.

set a highly complexed administrator password

C.

encrypt all data on server side

D.

put sensitive data in some hidden directory

Question 3

What type of attack is likely occuring if you see a significant increase in network traffic and users

complain that the web server is hung up?

Options:

A.

MITM

B.

DNS spoofing

C.

Ping sweep

D.

DoS

Question 4

Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation

permissions these user accounts possess for resources under your account. Which of the following

descriptions of a RAM usage scenario is NOT correct?

Options:

A.

Enterprise sub-account management and permission assignment

B.

Resource operation and authorization management between enterprises

C.

Temporary authorization management for untrusted client apps

D.

Prevention of network attacks on enterprises

Question 5

If your company's official website is tampered, the consequence of such attack could NOTbe:

Options:

A.

Website is used for some illegal attempts

B.

Public image or reputation of your company is damaged

C.

Business is impacted

D.

Physical server is damaged

Question 6

Which of the following protocol can be considered as 'application' layer protocol in ISO/OSI 7 layer model?

Options:

A.

TCP

B.

UDP

C.

IP

D.

SMTP

Question 7

Which of the following statements about IPV6 and IPV4 are true?(the number of correct

answers: 2)

Options:

A.

IPV6 has bigger route table size

B.

IPV6 address length upper limit is 128 bits

C.

IPV6 has more simplified header

D.

No network switch device is needed when using IPV6 protocol to transfer data

Question 8

Which of the following Keys in HTTP heads are related to cache control? (the number of correct answers: 3)

Options:

A.

Cache-Control

B.

Date

C.

Age

D.

Expires

E.

Host

Question 9

In Windows OS you can turn off a service through: Score 2

Options:

A.

Control Panel->Management Tool->Stop the running service

B.

Control Panel->windows update->Stop

C.

Create new firewall rule to stop service

D.

Delete administrator role and related accounts

Question 10

Which of the following methods can't be used against CC attack?

Options:

A.

use WAF

B.

change HTTP service to HTTPS service

C.

resolve domain name to a disguised IP

D.

change the service providing port

Question 11

Which of following statements is NOT true about anti-DDOS basics and anti-DDOS Pro?

Options:

A.

both can defend DDOS attack

B.

anti-DDOS pro is free to charge

C.

anti-DDOS pro has more capabilities to defend against DDOS attacks

D.

anti-DDOS pro can protect both inside and outside Alibaba Cloud servers

Question 12

What of the followings will happen if encounter DoS or DDoS attack?

Options:

A.

Data received successfully

B.

Delay of data reception

C.

Slow access web resources

D.

unauthorized access control

Question 13

Security risk may caused by 'Cloud platform', 'ISV' or 'End user', which of the following options

are the possible risks may caused by Cloud Platform?

Options:

A.

Software development cycle is not formalized

B.

Security system overall solutions are not complete

C.

Administration tools on Cloud Platform may have some flaws

D.

Cloud platform console and API may lack of security hardenning

Question 14

Which of the following statements is the possible reason that might lead to system vulnerabilities?

Options:

A.

software logic flaw or mistakes made during software development cycle

B.

hardware devices are not up to date

C.

system administrator didn't follow the operation manual exactly

D.

The proprietary software that is safer than open source one should be installed

Question 15

Which of the following statements is NOT true about EIP and NAT gateway?

Options:

A.

NAT gateway can support multi servers inside VPC to access public internet through one

public IP

B.

EIP can be bind to different ECS servers at the same time

C.

Different EIP can't share bandwidth

D.

NAT gateway can support shared bandwidth between several ips

Question 16

What design flaw of TCP/IP protocol does SYN flood attack use?

Options:

A.

UDP stateless connectio

B.

DNS 3 times hands shake

C.

TCP 3 times hands shake

D.

HTTP plain text transmission

Question 17

Alibaba Cloud will provide hot fix to address existing vulnerabilities. Which of the following

statements is true about this 'hot fix'?

Options:

A.

hot fix doesn't need to reboot physical host

B.

service will not be available during the hot fix

C.

hot fix means the host need to reach some temperature upper limit to be able to

proceed

D.

hot fix is transparent to end user

Question 18

Which version of WAF will provide advisor customized protection rule?

Score 2

Options:

A.

Advanced Version

B.

Enterprise Version

C.

Ultimate Version

D.

Standard Version

Question 19

In making cloud accounts more secure, which of the following is NOT a guiding principle?

Options:

A.

Anonymous logins

B.

Login verification

C.

Account permissions

D.

Authorization distribution

Question 20

Which of the following statements about the supported way of MySQL DB for backup are

true?(the number of correct answers: 2)

Options:

A.

you can use 'mysqldump' do logical backup

B.

you can copy files directly to do physical backup

C.

you can use 'binlog' to do real time backup

D.

you must stop accessing to DB before you do logical backup

Question 21

Which of the following statements about VLAN are NOT true?(the number of correct

answers: 3)

Score 1

Options:

A.

users in different VLAN can connect each other directly without pre-configuration

B.

different VLAN means different physical location of switches

C.

VLAN configuration can be done through an TCP/IP router device

D.

VlAN can enhance the network security and data isolation

Question 22

Which protocol is a 'data link' layer protocol in ISO/OSI 7 layer network model?

Score 2

Options:

A.

ICMP

B.

ARP

C.

FTP

D.

UDP

Page: 1 / 15
Total 147 questions