What type of attack is likely occuring if you see a significant increase in network traffic and users complain that the web server is hung up?
What type of attack is likely occuring if you see a significant increase in network traffic and users complain that the web server is hung up?A . MITMB . DNS spoofingC . Ping sweepD . DoSView AnswerAnswer: D
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer networking model?
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer networking model?A . FTPB . TCPC . HTTPD . SNMPView AnswerAnswer: B
Which of the following issues would not happen if ECS server is under attack by hackers?
Which of the following issues would not happen if ECS server is under attack by hackers?A . sensitive data leakB . service running on that server is not availableC . physical server damageD . compromise the reputation of service provider on that serverView AnswerAnswer: C
Which of the following statements is the possible reason that might lead to system vulnerabilities?
Which of the following statements is the possible reason that might lead to system vulnerabilities?A . software logic flaw or mistakes made during software development cycleB . hardware devices are not up to dateC . system administrator didn't follow the operation manual exactlyD . The proprietary software that is safer...
Which of the following statements about the supported way of MySQL DB for backup are true? (the number of correct answers: 2)
Which of the following statements about the supported way of MySQL DB for backup are true? (the number of correct answers: 2)A . you can use 'mysqldump' do logical backupB . you can copy files directly to do physical backupC . you can use 'binlog' to do real time backupD...
Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web Application Security Risks
Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web Application Security RisksA . Cross-Site Request Forgery (CSRF)B . Cross-Site Scripting (XSS)C . Unvalidated Redirects and ForwardsD . InjectionView AnswerAnswer: A,C
In the ISO/OSI 7 layers networking model, which of the following functions are provided for the 'network layer'? (the number of correct answers: 2)
In the ISO/OSI 7 layers networking model, which of the following functions are provided for the 'network layer'? (the number of correct answers: 2)A . RoutingB . congestion handlingC . end to end reliable and transparent data transitionD . physical connectionView AnswerAnswer: A,B
Which of the following statements is TRUE about Anti-DDOS basics?
Which of the following statements is TRUE about Anti-DDOS basics?A . it can only protect servers outside of Alibaba CloudB . it is free to chargeC . need to turn on manuallyD . There is no service limitation for peak trafficView AnswerAnswer: B
When 'Server Guard' detects remote logon behavior, what information will be shown on 'Server Guard' console?
When 'Server Guard' detects remote logon behavior, what information will be shown on 'Server Guard' console?A . Illegal Logon!B . Migrated Already!C . Logon Successfully!D . Remote Logon Detected!View AnswerAnswer: D
By default, servers in VPC can't communicate with internet. By implementing which of the following products these servers can gain the capability to communicate with internet? (the number of correct answers: 3)
By default, servers in VPC can't communicate with internet. By implementing which of the following products these servers can gain the capability to communicate with internet? (the number of correct answers: 3)A . Elastic Public IPB . CDNC . EIP + SLBD . EIP + NAT GatewayE . DNS serviceView...