Which of following statements about the possible reasons that cause web server vulnerabilities are true? (the number of correct answers: 2) Score 1
Which of following statements about the possible reasons that cause web server vulnerabilities are true? (the number of correct answers: 2) Score 1A . Bugs generated during common component developmentB . Hardware configuration is not up to dateC . Software used or OS itself contain some logic flawD . End...
Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)
Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)A . Adding more search request together with the original oneB . adding an absolute true condition to bypass original requestC . use incorrect SQL functionD . use selfmade variableE...
Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options are the responsibilities Cloud user need to take care of?
Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options are the responsibilities Cloud user need to take care of?A . Data security inside ECSB . Physical servers water proofC . Application vulnerabilitiesD . ECS network configurationView AnswerAnswer: A,C,D
Which of following statement about 'Server Guard' Trojan scanning functionality is NOT correct? Score 2
Which of following statement about 'Server Guard' Trojan scanning functionality is NOT correct? Score 2A . Server Guard Agent will automatically scan your web pages directories and look for any webshell file.B . A change to a file in the web pages directories will trigger a scan for that fileC...
Which of the following is NOT a security plan offered by Alibaba Cloud?
Alibaba Cloud offers different security protection plans to different tenant accounts . Which of the following is NOT a security plan offered by Alibaba Cloud?A . Password-free loginB . Two-factor authenticationC . Phone number bindingD . Phone or email verification for password resettingView AnswerAnswer: A
If it is attacked by some internet hacker, which of the following consequences such attack could cause?
ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by some internet hacker, which of the following consequences such attack could cause? (the number of correct answers: 2)A . Physical Server DamageB . Leak of customer sensitive dataC . Service running on this...
Which of the following methods CANNOT increase account security?
Which of the following methods CANNOT increase account security?A . Strong password policiesB . Periodically reset the user login passwordsC . Adhere to the minimum authorization principleD . Unite user management, permission management and resource management into a single management processView AnswerAnswer: D
User A rented 2 ECS server and one RDS in Alibaba Cloud to setup his company public website.
User A rented 2 ECS server and one RDS in Alibaba Cloud to setup his company public website. After the web site will become available online, the security risks he/she will face will include: (the number of correct answers: 3)A . physical cable is cut by someoneB . ECS admin...
Which of the following products won't be a DDOS attack target?
Which of the following products won't be a DDOS attack target?A . offline backup tape devicesB . enterprise major websiteC . router deviceD . online banking systemView AnswerAnswer: A
Which web server is default one in Windows OS?
Which web server is default one in Windows OS?A . HTTPDB . IISC . Web DaemonD . ApacheView AnswerAnswer: B