Exam4Training

AliCloud ACA-Sec1 ACA Cloud Security Associate Online Training

Question #1

From which of the following attacks WAF will not provide protection?

  • A . SYN Flood
  • B . Web Server vulnerability attack
  • C . Core files unauthorized access
  • D . HTTP Flood

Reveal Solution Hide Solution

Correct Answer: A
Question #2

Alibaba Cloud offers different security protection plans to different tenant accounts .

Which of the following is NOT a security plan offered by Alibaba Cloud?

  • A . Password-free login
  • B . Two-factor authentication
  • C . Phone number binding
  • D . Phone or email verification for password resetting

Reveal Solution Hide Solution

Correct Answer: A
Question #3

Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web Application Security Risks

  • A . Cross-Site Request Forgery (CSRF)
  • B . Cross-Site Scripting (XSS)
  • C . Unvalidated Redirects and Forwards
  • D . Injection

Reveal Solution Hide Solution

Correct Answer: A,C
Question #4

Which of the following protocols will not be used for a SYN Flood attack?

  • A . UDP
  • B . TCP
  • C . IPX/SPX
  • D . AppleTalk

Reveal Solution Hide Solution

Correct Answer: A,C,D
Question #5

Which of the following protocols is not an application level protocol in ISO/OSI 7 layer networking model?

  • A . FTP
  • B . TCP
  • C . HTTP
  • D . SNMP

Reveal Solution Hide Solution

Correct Answer: B
Question #6

In Windows OS you can turn off a service through: Score 2

  • A . Control Panel->Management Tool->Stop the running service
  • B . Control Panel->windows update->Stop
  • C . Create new firewall rule to stop service
  • D . Delete administrator role and related accounts

Reveal Solution Hide Solution

Correct Answer: A
Question #7

Which of the following issues would not happen if ECS server is under attack by hackers?

  • A . sensitive data leak
  • B . service running on that server is not available
  • C . physical server damage
  • D . compromise the reputation of service provider on that server

Reveal Solution Hide Solution

Correct Answer: C
Question #8

Which protocol is a ‘data link’ layer protocol in ISO/OSI 7 layer network model? Score 2

  • A . ICMP
  • B . ARP
  • C . FTP
  • D . UDP

Reveal Solution Hide Solution

Correct Answer: B
Question #9

Which of the following statements about the supported way of MySQL DB for backup are true? (the number of correct answers: 2)

  • A . you can use ‘mysqldump’ do logical backup
  • B . you can copy files directly to do physical backup
  • C . you can use ‘binlog’ to do real time backup
  • D . you must stop accessing to DB before you do logical backup

Reveal Solution Hide Solution

Correct Answer: A,B
Question #10

CC attacks can cause serious damages .

Which of the following statements about CC attack is not correct? Score 2

  • A . CC attack will simulate real user requests
  • B . Will consume massive sever side resource
  • C . CC attack is done on network layer
  • D . The request generated by CC attack is hard to be distinguished from normal requests

Reveal Solution Hide Solution

Correct Answer: C

Question #11

You are planning on hosting an eCommerce Web server. You are intent on making the server secure against all external attacks possible .

Which of the following would be the best way to test your server for its weaknesses? Choose the best answer.

  • A . Ping to the server
  • B . Simulate a DDoS attack on that server
  • C . Simulate a DoS attack on the server
  • D . Check if all the patches and required antivirus software has been loaded o the server

Reveal Solution Hide Solution

Correct Answer: B
Question #12

Which of the following statements is true about HTTP protocol? Score 2

  • A . HTTP is a network layer protocol
  • B . the data transmitted by this protocol is auto-encrypted
  • C . default service port is 80
  • D . HTTP protocol can’t be used to transmit file

Reveal Solution Hide Solution

Correct Answer: C
Question #13

Which of the following items can’t be set in ECS security group configuration? Score 2

  • A . OS type
  • B . network interface
  • C . authorization policy
  • D . authorization object

Reveal Solution Hide Solution

Correct Answer: A
Question #14

Which of following statement about ‘Server Guard’ Trojan scanning functionality is NOT correct? Score 2

  • A . Server Guard Agent will automatically scan your web pages directories and look for any webshell file.
  • B . A change to a file in the web pages directories will trigger a scan for that file
  • C . you can log on to the Server Guard console to isolate webshell files with one click.
  • D . Server Guard will delete any suspicious webshell file immediately My Answer, B. Other file says D

Reveal Solution Hide Solution

Correct Answer: D
Question #15

Which of the following statements about VLAN are NOT true? (the number of correct answers: 3) Score 1

  • A . users in different VLAN can connect each other directly without pre-configuration
  • B . different VLAN means different physical location of switches
  • C . VLAN configuration can be done through an TCP/IP router device
  • D . VLAN can enhance the network security and data isolation

Reveal Solution Hide Solution

Correct Answer: A,B,C
Question #16

Reliable server daily operation and security management are essential for continuous service running .

Which of the following statement is NOT correct regarding to this scenario?

  • A . set easy to remember password to help administrator quickly login and solve problems
  • B . patch system timely and frequently
  • C . enable build-in OS firewall and configure it properly
  • D . disable the ports which are not providing service anymore

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Which of the following HTTP status code does reflect that the requested page does not exist?

  • A . 403
  • B . 404
  • C . 201
  • D . 304

Reveal Solution Hide Solution

Correct Answer: B
Question #18

Which of the following function is provided by ‘server guard’ patch management service?

  • A . fix vulnerability found in open source software using Alibaba self-developed patch
  • B . detect any vulnerability before it bursts
  • C . release official patches for any exposed vulnerability
  • D . stop hacker’s vulnerabilities probing

Reveal Solution Hide Solution

Correct Answer: B
Question #19

What are the advantages of anti-DDOS pro comparing to anti-DDOS basics service?

(the number of correct answers: 3)

  • A . stronger defending attacks capability
  • B . elastic protection bandwidth
  • C . no upper limit to the attack traffic need to be handled
  • D . can do anti-fraud protection
  • E . can protect IDC outside Alibaba Cloud

Reveal Solution Hide Solution

Correct Answer: A,B,E
Question #20

By default, servers in VPC can’t communicate with internet. By implementing which of the following products these servers can gain the capability to communicate with internet? (the number of correct answers: 3)

  • A . Elastic Public IP
  • B . CDN
  • C . EIP + SLB
  • D . EIP + NAT Gateway
  • E . DNS service

Reveal Solution Hide Solution

Correct Answer: A,C,D

Question #21

Which of the following protocol is dedicated to resolve IP and MAC addresses?

  • A . TCP
  • B . ARP
  • C . DNS
  • D . ICMP

Reveal Solution Hide Solution

Correct Answer: B
Question #22

Which of following statements about the possible reasons that cause web server vulnerabilities are true? (the number of correct answers: 2) Score 1

  • A . Bugs generated during common component development
  • B . Hardware configuration is not up to date
  • C . Software used or OS itself contain some logic flaw
  • D . End user didn’t follow the user manual

Reveal Solution Hide Solution

Correct Answer: A,C
Question #23

Which web server is default one in Windows OS?

  • A . HTTPD
  • B . IIS
  • C . Web Daemon
  • D . Apache

Reveal Solution Hide Solution

Correct Answer: B
Question #24

In a regular server maintenance operation, the purpose of installing a patch on the operating system is?

  • A . To improve server resource usage
  • B . to improve system usability
  • C . to enhance system functionality
  • D . to avoid existing system vulnerabilities being used by some hackers

Reveal Solution Hide Solution

Correct Answer: D
Question #25

Regarding the ‘Shared Security Responsibilities’ on Alibaba Cloud, which of the following options are the responsibilities Cloud user need to take care of?

  • A . Data security inside ECS
  • B . Physical servers water proof
  • C . Application vulnerabilities
  • D . ECS network configuration

Reveal Solution Hide Solution

Correct Answer: A,C,D
Question #26

Which of the following methods CANNOT increase account security?

  • A . Strong password policies
  • B . Periodically reset the user login passwords
  • C . Adhere to the minimum authorization principle
  • D . Unite user management, permission management and resource management into a single management process

Reveal Solution Hide Solution

Correct Answer: D
Question #27

In order to stop the service provided through a particular port in Windows OS, which of the following methods can be used to achieve this objective? (the number of correct answers: 3)

  • A . adjust firewall rule
  • B . adjust local security policy
  • C . update OS patch
  • D . stop the service itself
  • E . stop all guest role access

Reveal Solution Hide Solution

Correct Answer: A,B,D
Question #28

If user is using anti-DDOS Pro service, but the original server has rule to limit access to the client IPs, which of the following actions is the most proper one to take?

  • A . enable CDN and change anti-DDOS pro IP to CDN address
  • B . add anti-DDOS pro IP into customer firewall white list
  • C . disable original server firewall
  • D . enable SLB for original server

Reveal Solution Hide Solution

Correct Answer: B
Question #29

Which of the following shell command can be used to check disk usage in a Linux OS ECS

  • A . Df Ch
  • B . Echo
  • C . Free Cm
  • D . Ps Ce Co

Reveal Solution Hide Solution

Correct Answer: A
Question #30

User A rented 2 ECS server and one RDS in Alibaba Cloud to setup his company public website.

After the web site will become available online, the security risks he/she will face will include: (the number of correct answers: 3)

  • A . physical cable is cut by someone
  • B . ECS admin password is hacked
  • C . website codes has some vulnerability
  • D . RDS DB got unknown remote logon
  • E . the disk in ECS is broken

Reveal Solution Hide Solution

Correct Answer: B,C,D

Question #31

ECS cloud server is one of the service provided by Alibaba Cloud.

If it is attacked by some internet hacker, which of the following consequences such attack could cause? (the number of correct answers: 2)

  • A . Physical Server Damage
  • B . Leak of customer sensitive data
  • C . Service running on this ECS become not available
  • D . The datacenter where the ECS belongs to need to shutdown

Reveal Solution Hide Solution

Correct Answer: B,C
Question #32

Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)

  • A . Adding more search request together with the original one
  • B . adding an absolute true condition to bypass original request
  • C . use incorrect SQL function
  • D . use selfmade variable
  • E . adding ";" or "–" to change the original request purpose with new request attached

Reveal Solution Hide Solution

Correct Answer: A,B,D
Question #33

Which of the following statements is TRUE about Anti-DDOS basics?

  • A . it can only protect servers outside of Alibaba Cloud
  • B . it is free to charge
  • C . need to turn on manually
  • D . There is no service limitation for peak traffic

Reveal Solution Hide Solution

Correct Answer: B
Question #34

Which of the followings are not the reasons for a DDoS attack?

  • A . Destroying of integrity
  • B . Destroying of confidentiality
  • C . Destroying of availability
  • D . Destroying of business credit

Reveal Solution Hide Solution

Correct Answer: A,B,D
Question #35

Which of the following products won’t be a DDOS attack target?

  • A . offline backup tape devices
  • B . enterprise major website
  • C . router device
  • D . online banking system

Reveal Solution Hide Solution

Correct Answer: A
Question #36

When ‘Server Guard’ detects remote logon behavior, what information will be shown on ‘Server Guard’ console?

  • A . Illegal Logon!
  • B . Migrated Already!
  • C . Logon Successfully!
  • D . Remote Logon Detected!

Reveal Solution Hide Solution

Correct Answer: D
Question #37

Which of the following scenarios should be handled by anti-DDOS service? (the number of correct answers: 3)

  • A . Server is under syn flood attack, and is not reachable
  • B . online game service which is suffering with too many empty connections and slow
    connections
  • C . DNS server is under udp flood attack and got no response anymore
  • D . website is under SQL injection attack
  • E . website is under XSS attacks

Reveal Solution Hide Solution

Correct Answer: A,B,C
Question #38

Which of the following Alibaba Cloud products need to be considered to use if you want to build an elastic computing cluster to provide web service together and also with dynamic data and static data separately stored

  • A . ECS
  • B . SLB
  • C . RDS
  • D . OSS
  • E . KMS

Reveal Solution Hide Solution

Correct Answer: A,B,C,D
Question #39

Which of the following can be termed as the Denial of Service Attack? Choose the best answer.

  • A . A computer on your network has crashed
  • B . Your router is unable to find a destination outside of your network
  • C . Your Web server has gone into a loop trying to service a client request
  • D . You keyboard is no longer responding

Reveal Solution Hide Solution

Correct Answer: C
Question #40

What type of attack is likely occuring if you see a significant increase in network traffic and users complain that the web server is hung up?

  • A . MITM
  • B . DNS spoofing
  • C . Ping sweep
  • D . DoS

Reveal Solution Hide Solution

Correct Answer: D

Question #41

Which of the following DDoS descriptions are correct?

  • A . In order to get admin password
  • B . Steal confidential information
  • C . Causes the target server unable to process legitimate requests
  • D . If the target server has no vulnerabilities, the remote attack may still succeed.

Reveal Solution Hide Solution

Correct Answer: C,D
Question #42

What design flaw of TCP/IP protocol does SYN flood attack use?

  • A . UDP stateless connectio
  • B . DNS 3 times hands shake
  • C . TCP 3 times hands shake
  • D . HTTP plain text transmission

Reveal Solution Hide Solution

Correct Answer: C
Question #43

Which of following attacks could serve as a CC attack? (the number of correct answers: 3) Score 1

  • A . SYN flood
  • B . ICMP flood
  • C . One host simulate many IP addresses
  • D . Attack through agent
  • E . Zombie network

Reveal Solution Hide Solution

Correct Answer: C,D,E
Question #44

What of the followings will happen if encounter DoS or DDoS attack?

  • A . Data received successfully
  • B . Delay of data reception
  • C . Slow access web resources
  • D . unauthorized access control

Reveal Solution Hide Solution

Correct Answer: B,C
Question #45

Which of the following application vulnerabilities are not as popular as others?

  • A . SQL Injection
  • B . XSS exploit
  • C . File uploading vulnerability
  • D . Kernel privilege breaking

Reveal Solution Hide Solution

Correct Answer: D
Question #46

In the ISO/OSI 7 layers networking model, which of the following functions are provided for the ‘network layer’? (the number of correct answers: 2)

  • A . Routing
  • B . congestion handling
  • C . end to end reliable and transparent data transition
  • D . physical connection

Reveal Solution Hide Solution

Correct Answer: A,B
Question #47

Which of the following functions does not belong to what WAF can provide?

  • A . DB encryption
  • B . SQL injection detection
  • C . XSS attack detection
  • D . unauthorized resource access blocking

Reveal Solution Hide Solution

Correct Answer: A
Question #48

Which command in RedHat Linux shell can be used to check disk usage?

  • A . ls
  • B . df
  • C . diskUsage
  • D . diskSpace

Reveal Solution Hide Solution

Correct Answer: B
Question #49

Which of the following statements is the possible reason that might lead to system vulnerabilities?

  • A . software logic flaw or mistakes made during software development cycle
  • B . hardware devices are not up to date
  • C . system administrator didn’t follow the operation manual exactly
  • D . The proprietary software that is safer than open source one should be installed

Reveal Solution Hide Solution

Correct Answer: A
Question #50

If your company’s official website is tampered, the consequence of such attack could NOT be:

  • A . Website is used for some illegal attempts
  • B . Public image or reputation of your company is damaged
  • C . Business is impacted
  • D . Physical server is damaged

Reveal Solution Hide Solution

Correct Answer: D
Exit mobile version