ACA Cloud Security Associate ACA-Sec1 New Dumps

Do you know the ACA Cloud Security Associate certification ACA-Sec1 exam? ACA Cloud Security certificate is designed for engineers who can use Alibaba Cloud Security products, which covers Alibaba Cloud’s several security products like Server Guard, WAF, Anit-DDoS basic and Pro. We have released new ACA-Sec1 dumps questions online, which are based on the exam details and objectives. We ensure that you can pass ACA Cloud Security ACA-Sec1 exam successfully.

ACA-Sec1 ACA Cloud Security Free Dumps Online

1. From which of the following attacks WAF will not provide protection?

2. Alibaba Cloud offers different security protection plans to different tenant accounts .

Which of the following is NOT a security plan offered by Alibaba Cloud?

3. Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web Application Security Risks

4. Which of the following protocols will not be used for a SYN Flood attack?

5. Which of the following protocols is not an application level protocol in ISO/OSI 7 layer networking model?

6. In Windows OS you can turn off a service through: Score 2

7. Which of the following issues would not happen if ECS server is under attack by hackers?

8. Which protocol is a 'data link' layer protocol in ISO/OSI 7 layer network model? Score 2

9. Which of the following statements about the supported way of MySQL DB for backup are true? (the number of correct answers: 2)

10. CC attacks can cause serious damages .

Which of the following statements about CC attack is not correct? Score 2

11. You are planning on hosting an eCommerce Web server. You are intent on making the server secure against all external attacks possible .

Which of the following would be the best way to test your server for its weaknesses? Choose the best answer.

12. Which of the following statements is true about HTTP protocol? Score 2

13. Which of the following items can't be set in ECS security group configuration? Score 2

14. Which of following statement about 'Server Guard' Trojan scanning functionality is NOT correct? Score 2

15. Which of the following statements about VLAN are NOT true? (the number of correct answers: 3) Score 1

16. Reliable server daily operation and security management are essential for continuous service running .

Which of the following statement is NOT correct regarding to this scenario?

17. Which of the following HTTP status code does reflect that the requested page does not exist?

18. Which of the following function is provided by 'server guard' patch management service?

19. What are the advantages of anti-DDOS pro comparing to anti-DDOS basics service?

(the number of correct answers: 3)

20. By default, servers in VPC can't communicate with internet. By implementing which of the following products these servers can gain the capability to communicate with internet? (the number of correct answers: 3)

21. Which of the following protocol is dedicated to resolve IP and MAC addresses?

22. Which of following statements about the possible reasons that cause web server vulnerabilities are true? (the number of correct answers: 2) Score 1

23. Which web server is default one in Windows OS?

24. In a regular server maintenance operation, the purpose of installing a patch on the operating system is?

25. Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options are the responsibilities Cloud user need to take care of?

26. Which of the following methods CANNOT increase account security?

27. In order to stop the service provided through a particular port in Windows OS, which of the following methods can be used to achieve this objective? (the number of correct answers: 3)

28. If user is using anti-DDOS Pro service, but the original server has rule to limit access to the client IPs, which of the following actions is the most proper one to take?

29. Which of the following shell command can be used to check disk usage in a Linux OS ECS

30. User A rented 2 ECS server and one RDS in Alibaba Cloud to setup his company public website.

After the web site will become available online, the security risks he/she will face will include: (the number of correct answers: 3)

31. ECS cloud server is one of the service provided by Alibaba Cloud.

If it is attacked by some internet hacker, which of the following consequences such attack could cause? (the number of correct answers: 2)

32. Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)

33. Which of the following statements is TRUE about Anti-DDOS basics?

34. Which of the followings are not the reasons for a DDoS attack?

35. Which of the following products won't be a DDOS attack target?

36. When 'Server Guard' detects remote logon behavior, what information will be shown on 'Server Guard' console?

37. Which of the following scenarios should be handled by anti-DDOS service? (the number of correct answers: 3)

38. Which of the following Alibaba Cloud products need to be considered to use if you want to build an elastic computing cluster to provide web service together and also with dynamic data and static data separately stored

39. Which of the following can be termed as the Denial of Service Attack? Choose the best answer.

40. What type of attack is likely occuring if you see a significant increase in network traffic and users complain that the web server is hung up?

41. Which of the following DDoS descriptions are correct?

42. What design flaw of TCP/IP protocol does SYN flood attack use?

43. Which of following attacks could serve as a CC attack? (the number of correct answers: 3) Score 1

44. What of the followings will happen if encounter DoS or DDoS attack?

45. Which of the following application vulnerabilities are not as popular as others?

46. In the ISO/OSI 7 layers networking model, which of the following functions are provided for the 'network layer'? (the number of correct answers: 2)

47. Which of the following functions does not belong to what WAF can provide?

48. Which command in RedHat Linux shell can be used to check disk usage?

49. Which of the following statements is the possible reason that might lead to system vulnerabilities?

50. If your company's official website is tampered, the consequence of such attack could NOT be:


 

ACP Cloud Security Certification ACP-Sec1 Exam Dumps Questions
ACA Cloud Native Certification Exam ACA-CloudNative Real Dumps

Add a Comment

Your email address will not be published. Required fields are marked *