Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications
Which of the following functions are currently provided by CloudMonitor? (Number of correct answers: 4)
- A . Custom firewall
- B . Alerting
- C . Site monitoring
- D . Cloud service monitoring
- E . Custom monitoring
More than one CNAME record is generated for the same domain name when Alibaba Cloud Anti-DDoS Premium Service Instance is purchased for load balancing purpose.
- A . True
- B . False
Data Risk Control feature has been integrated into Alibaba Cloud WAF. When this function is activated, a script must be embedded into the page that wishes to be protected under the corresponding domain name to check whether a client is trustworthy.
Which type of script is it?
- A . JavaScript
- B . C++
- C . Vbscript
- D . Java
When using Alibaba Cloud Anti-DDoS Service/WAF in China Mainland, you must finish ICP Filing beforehand.
- A . True
- B . False
The ScheduleKeyDeletion function lets you schedule a time to delete Key Management Service (KMS) keys.
How far in the future can a key deletion event be scheduled?
- A . 7 days
- B . 30 days
- C . 15 days
- D . 60 days
User A is the system administrator of a company, who often takes business trips to Shanghai Each time when he remotely logs on to the Shanghai an alert is reported, prompting "Someone is remotely logging on to the server Please pay attention to your server security"
Which of the following methods can be used to quickly and automatically resolve this issue?
- A . Open a ticket immediately to consult Alibaba Cloud engineers
- B . Log on to the Alibaba Cloud Security Center, and add a frequent logon location to the configuration item of Security Center.
- C . Ask the company leaders for help
- D . Call a friend, who is a famous hacker in the industry, for help.
There is a limit on the number of Customer Master Keys (CMKs) that users can create using Key Management Service (KMS), but users can raise this limit by submitting a support ticket to Alibaba Cloud.
- A . True
- B . False
A customer built his website on Alibaba Cloud- To defend against Web attacks he activated Alibaba Cloud WAF However, a week later, the customer finds that his website has suffered intrusion.
Which of the following actions should he take to ensure that WAF functions correctly and enhance system security? (Number of correct answers: 4)
- A . Use Security Center to remove Trojans and fix vulnerabilities
- B . Delete all snapshots and clear the server
- C . Secure other HTTP services on the ECS instance using WAF
- D . Configure a security group for the ECS instance.
- E . Check whether or not the DNS resolution results point to the WAF address
- F . Resolve the website domain name to the site s source IP address
Border Gateway Protocol (BGP) is mainly used for interconnection between autonomous systems (AS) on the Internet It. Controlling route transmission and selecting the best route Alibaba Cloud uses a BGP multi-line access mechanism for all its IDCs in China.
Which of the followings are advantages of a BGP multi-line IDC? (Number of correct answers 2)
- A . Larger bandwidth
- B . High-speed interconnection
- C . Low bandwidth cost
- D . Elimination of access barriers between North China and South China because China is big and North China and South China has different telecom operators
Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML injection to insert malicious scripts so as to control the user’s browser when the user browses the webpage XSS vulnerabilities may be used for user identity stealing (particularly the administrator identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing
- A . True
- B . False
Alibaba Cloud WAF is a security protection product based on Alibaba Group’s web security defense experience accumulated over more than a decade By defending against common OWASP attacks, providing patches to fix vulnerabilities, and allowing users to customize protection policies for website services, WAF can successfully safeguard the security and availability of websites and web applications.
Which of the following types of security configurations does WAF provide? (Number of correct answers 3)
- A . Port access control
- B . CC protection
- C . Web application attack protection
- D . Precision access control
You have helped a customer set up a content filtering solution based on Content Moderation service However, the customer is complaining that certain images are getting incorrectly flagged as pornographic content.
What can you do to help fix this?
- A . Create an "Image Library" from the Content Moderation console and add the images to the Image Library’s whitelist
- B . Ask your customer to use different images on their site
- C . Modify the images until Content Moderation service starts marking them as pornographic.
- D . Open a ticket with Alibaba Cloud support, and send them a copy of the images, so that they can tune Content Moderation’s detection algorithms
You have helped a customer set up a content filtering solution based on Content Moderation service However, the customer is complaining that certain images are getting incorrectly flagged as pornographic content.
What can you do to help fix this?
- A . Create an "Image Library" from the Content Moderation console and add the images to the Image Library’s whitelist
- B . Ask your customer to use different images on their site
- C . Modify the images until Content Moderation service starts marking them as pornographic.
- D . Open a ticket with Alibaba Cloud support, and send them a copy of the images, so that they can tune Content Moderation’s detection algorithms
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
- A . Data leakage prevention
- B . Defense against website trojans and tampering
- C . Virtual vulnerability patches
- D . Protection against malicious CC attacks
- E . Brute force cracking protection
- F . Protection against SMS refresh and service data crawling
Alibaba Cloud’s Content Moderation service cannot detect advertising or spam content.
- A . True
- B . False
Content Moderation Service is an API-based service Like many API services, it employs throttling to make sure that the service cannot be overwhelmed by a large number of simultaneous requests.
What is the maximum number of requests per minute you can make against the Content Moderation API?
- A . 300
- B . 100
- C . 1000
- D . 600
Alibaba Cloud Security Center can record source IP addresses that remotely access a server, and shield suspicious IP addresses that frequently connect to the server. During routine O&M.
Which of the following functions can be used to set the IP address that are commonly used by the system administrator’?
- A . Security group
- B . Valid Login IP list
- C . Frequent logon location management
- D . Webshell detection
You have set an alert policy for the disk usage of an ECS instance by using Alibaba Cloud CloudMonitor Each measurement cycle lasts for 5 minutes, during which the average disk usage is measured If the average disk usage exceeds 80% for five consecutive measurement cycles, an alert will be reported.
After your average disk usage exceeds 80%, how long will it take to receive an alert with the best case scenario?
- A . 30 minutes
- B . 0 minutes
- C . 40 minutes
- D . 20 minutes
Alibaba Cloud Anti-DDoS Premium can be used only when the origin site IP address is in Alibaba Cloud.
- A . True
- B . False
Alibaba Cloud WAF cannot protect against large traffic DDoS attacks which can be solved by Alibaba Cloud Ant-DDoS Service.
- A . True
- B . False
Clean bandwidth refers to the maximum normal clean bandwidth that can be processed by Anti-DDoS Premium instances when your business is not under attack. Make sure that the Clean bandwidth of the instance is greater than the peak value of the inbound or outbound traffic of all services connected to the Anti-DDoS Premium instances
If the actual traffic volume exceeds the maximum Clean bandwidth, your business may be subject to traffic restrictions or random packet losses, and your normal business may be unavailable, slowed, or delayed for a certain period of time
- A . True
- B . False
Alibaba Cloud WAF currently supports web security protection for HTTP and HTTPS.
Which of the following ports are usually used for HTTP and HTTPS protocols? (Number of correct answers: 2)
- A . 80
- B . 443
- C . 22
- D . 21
After a customer uses Alibaba Cloud Anti-DDoS Premium Service, a 502 error is prompted.
Which of the followings are the possible causes of the error? (Number of correct answers 3)
- A . Network congestion or jitter occurred
- B . The IP address of the origin site is exposed and suffered an attack
- C . The service was configured using the IP address method instead of the CI
- D . The Anti-DDoS Service IP range was not released As a result, the origin site is blocked.
You have bought an ECS instance on Alibaba Cloud After deploying a Python environment on it, which of the following is the easiest and quickest way to monitor whether the Python process is running normally and report an alert if the process is accidentally terminated?
- A . Use site monitoring
- B . Log on to the ECS instance console
- C . Utilize process monitoring feature (can be found in ECS instance
- D . Write a script for monitoring by yourself.
Which of the following methods can be used to download the metric data of Alibaba Cloud CloudMonitor?
- A . Download the data through Open APIs
- B . You can download the data through both the console and Open APIs
- C . You can only view the reports, but cannot download them.
- D . Download the data from the console
Alibaba Cloud Data Risk Control utilizes Alibaba Group’s Big Data computing capabilities and industry-leading, risk decision making engine to address fraud threats in key service processes (such as account log on, online activity, payment) and avoid financial loss
Which of the following is NOT an application scenario of Data Risk Control?
- A . Account registration
- B . Application installation
- C . Goods payment
- D . Transaction rating
If you activate Alibaba Cloud Security Center on an ECS Linux instance and change the default SSH port (22) to another port, you will no longer receive SMS or email notification related to brute force password cracking
- A . True
- B . False
Alibaba Cloud’s CloudMonitor can not only monitor ECS instances in a secure and efficient way, but also monitor HTTP sites of clients’ servers in data centers However, in the latter case, Alibaba Cloud does not provide monitor agent so users need to develop their own scripts to collect data
- A . True
- B . False
Which of the following services can be protected by the Alibaba Cloud Security Center’s anti-brute force password cracking function? (Number of answers 3)
- A . Windows remote desktop service (RDP) Linux remote control service (SSH)
- B . Web service (HTTP)
- C . MySQL database service SQL Server database service
- D . File transfer service (FTP)