AliCloud ACA-Sec1 ACA Cloud Security Associate Online Training
AliCloud ACA-Sec1 Online Training
The questions for ACA-Sec1 were last updated at Dec 29,2024.
- Exam Code: ACA-Sec1
- Exam Name: ACA Cloud Security Associate
- Certification Provider: AliCloud
- Latest update: Dec 29,2024
Which of the following DDoS descriptions are correct?
- A . In order to get admin password
- B . Steal confidential information
- C . Causes the target server unable to process legitimate requests
- D . If the target server has no vulnerabilities, the remote attack may still succeed.
What design flaw of TCP/IP protocol does SYN flood attack use?
- A . UDP stateless connectio
- B . DNS 3 times hands shake
- C . TCP 3 times hands shake
- D . HTTP plain text transmission
Which of following attacks could serve as a CC attack? (the number of correct answers: 3) Score 1
- A . SYN flood
- B . ICMP flood
- C . One host simulate many IP addresses
- D . Attack through agent
- E . Zombie network
What of the followings will happen if encounter DoS or DDoS attack?
- A . Data received successfully
- B . Delay of data reception
- C . Slow access web resources
- D . unauthorized access control
Which of the following application vulnerabilities are not as popular as others?
- A . SQL Injection
- B . XSS exploit
- C . File uploading vulnerability
- D . Kernel privilege breaking
In the ISO/OSI 7 layers networking model, which of the following functions are provided for the ‘network layer’? (the number of correct answers: 2)
- A . Routing
- B . congestion handling
- C . end to end reliable and transparent data transition
- D . physical connection
Which of the following functions does not belong to what WAF can provide?
- A . DB encryption
- B . SQL injection detection
- C . XSS attack detection
- D . unauthorized resource access blocking
Which command in RedHat Linux shell can be used to check disk usage?
- A . ls
- B . df
- C . diskUsage
- D . diskSpace
Which of the following statements is the possible reason that might lead to system vulnerabilities?
- A . software logic flaw or mistakes made during software development cycle
- B . hardware devices are not up to date
- C . system administrator didn’t follow the operation manual exactly
- D . The proprietary software that is safer than open source one should be installed
If your company’s official website is tampered, the consequence of such attack could NOT be:
- A . Website is used for some illegal attempts
- B . Public image or reputation of your company is damaged
- C . Business is impacted
- D . Physical server is damaged