AliCloud ACA-Sec1 ACA Cloud Security Associate Online Training
AliCloud ACA-Sec1 Online Training
The questions for ACA-Sec1 were last updated at Dec 26,2024.
- Exam Code: ACA-Sec1
- Exam Name: ACA Cloud Security Associate
- Certification Provider: AliCloud
- Latest update: Dec 26,2024
ECS cloud server is one of the service provided by Alibaba Cloud.
If it is attacked by some internet hacker, which of the following consequences such attack could cause? (the number of correct answers: 2)
- A . Physical Server Damage
- B . Leak of customer sensitive data
- C . Service running on this ECS become not available
- D . The datacenter where the ECS belongs to need to shutdown
Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)
- A . Adding more search request together with the original one
- B . adding an absolute true condition to bypass original request
- C . use incorrect SQL function
- D . use selfmade variable
- E . adding ";" or "–" to change the original request purpose with new request attached
Which of the following statements is TRUE about Anti-DDOS basics?
- A . it can only protect servers outside of Alibaba Cloud
- B . it is free to charge
- C . need to turn on manually
- D . There is no service limitation for peak traffic
Which of the followings are not the reasons for a DDoS attack?
- A . Destroying of integrity
- B . Destroying of confidentiality
- C . Destroying of availability
- D . Destroying of business credit
Which of the following products won’t be a DDOS attack target?
- A . offline backup tape devices
- B . enterprise major website
- C . router device
- D . online banking system
When ‘Server Guard’ detects remote logon behavior, what information will be shown on ‘Server Guard’ console?
- A . Illegal Logon!
- B . Migrated Already!
- C . Logon Successfully!
- D . Remote Logon Detected!
Which of the following scenarios should be handled by anti-DDOS service? (the number of correct answers: 3)
- A . Server is under syn flood attack, and is not reachable
- B . online game service which is suffering with too many empty connections and slow
connections - C . DNS server is under udp flood attack and got no response anymore
- D . website is under SQL injection attack
- E . website is under XSS attacks
Which of the following Alibaba Cloud products need to be considered to use if you want to build an elastic computing cluster to provide web service together and also with dynamic data and static data separately stored
- A . ECS
- B . SLB
- C . RDS
- D . OSS
- E . KMS
Which of the following can be termed as the Denial of Service Attack? Choose the best answer.
- A . A computer on your network has crashed
- B . Your router is unable to find a destination outside of your network
- C . Your Web server has gone into a loop trying to service a client request
- D . You keyboard is no longer responding
What type of attack is likely occuring if you see a significant increase in network traffic and users complain that the web server is hung up?
- A . MITM
- B . DNS spoofing
- C . Ping sweep
- D . DoS