AliCloud ACA-Sec1 ACA Cloud Security Associate Online Training
AliCloud ACA-Sec1 Online Training
The questions for ACA-Sec1 were last updated at Dec 24,2024.
- Exam Code: ACA-Sec1
- Exam Name: ACA Cloud Security Associate
- Certification Provider: AliCloud
- Latest update: Dec 24,2024
From which of the following attacks WAF will not provide protection?
- A . SYN Flood
- B . Web Server vulnerability attack
- C . Core files unauthorized access
- D . HTTP Flood
Alibaba Cloud offers different security protection plans to different tenant accounts .
Which of the following is NOT a security plan offered by Alibaba Cloud?
- A . Password-free login
- B . Two-factor authentication
- C . Phone number binding
- D . Phone or email verification for password resetting
Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web Application Security Risks
- A . Cross-Site Request Forgery (CSRF)
- B . Cross-Site Scripting (XSS)
- C . Unvalidated Redirects and Forwards
- D . Injection
Which of the following protocols will not be used for a SYN Flood attack?
- A . UDP
- B . TCP
- C . IPX/SPX
- D . AppleTalk
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer networking model?
- A . FTP
- B . TCP
- C . HTTP
- D . SNMP
In Windows OS you can turn off a service through: Score 2
- A . Control Panel->Management Tool->Stop the running service
- B . Control Panel->windows update->Stop
- C . Create new firewall rule to stop service
- D . Delete administrator role and related accounts
Which of the following issues would not happen if ECS server is under attack by hackers?
- A . sensitive data leak
- B . service running on that server is not available
- C . physical server damage
- D . compromise the reputation of service provider on that server
Which protocol is a ‘data link’ layer protocol in ISO/OSI 7 layer network model? Score 2
- A . ICMP
- B . ARP
- C . FTP
- D . UDP
Which of the following statements about the supported way of MySQL DB for backup are true? (the number of correct answers: 2)
- A . you can use ‘mysqldump’ do logical backup
- B . you can copy files directly to do physical backup
- C . you can use ‘binlog’ to do real time backup
- D . you must stop accessing to DB before you do logical backup
CC attacks can cause serious damages .
Which of the following statements about CC attack is not correct? Score 2
- A . CC attack will simulate real user requests
- B . Will consume massive sever side resource
- C . CC attack is done on network layer
- D . The request generated by CC attack is hard to be distinguished from normal requests