1 / 11

ACP Cloud Security Professional ACP-Sec1 Practice Test Questions

If you have prepared with PassQuestion ACP Cloud Security Professional ACP-Sec1 Practice Test Questions, then you are ready for your exam preparation.

Download Presentation

ACP Cloud Security Professional ACP-Sec1 Practice Test Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ACP-Sec1 Free Questions ACP-Sec1 Free Questions ACP Cloud Security Professional ACP Cloud Security Professional https://www.passquestion.com/ https://www.passquestion.com/ACP-Sec1 ACP-Sec1.html .html

  2. Question 1 Question 1 Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications Internet applications Which of the following functions are currently provided by CloudMonitor? (Number of Which of the following functions are currently provided by CloudMonitor? (Number of correct answers: 4) correct answers: 4) A. Custom firewall A. Custom firewall B. Alerting B. Alerting C. Site monitoring C. Site monitoring D. Cloud service monitoring D. Cloud service monitoring E. Custom monitoring E. Custom monitoring Answer: B,C,D,E Answer: B,C,D,E

  3. Question 2 Question 2 More than one CNAME record is generated for the same domain name when Alibaba Cloud Anti- More than one CNAME record is generated for the same domain name when Alibaba Cloud Anti- DDoS Premium Service Instance is purchased for load balancing purpose. DDoS Premium Service Instance is purchased for load balancing purpose. A. True A. True B. False B. False Answer: B Answer: B

  4. Question 3 Question 3 Data Risk Control feature has been integrated into Alibaba Cloud WAF. When this function is Data Risk Control feature has been integrated into Alibaba Cloud WAF. When this function is activated, a script must be embedded into the page that wishes to be protected under the activated, a script must be embedded into the page that wishes to be protected under the corresponding domain name to check whether a client is trustworthy. corresponding domain name to check whether a client is trustworthy. Which type of script is it? Which type of script is it? A. JavaScript A. JavaScript B. C++ B. C++ C. Vbscript C. Vbscript D. Java D. Java Answer: A Answer: A

  5. Question 4 Question 4 When using Alibaba Cloud Anti-DDoS Service/WAF in China Mainland, you must finish ICP Filing When using Alibaba Cloud Anti-DDoS Service/WAF in China Mainland, you must finish ICP Filing beforehand. beforehand. A. True A. True B. False B. False Answer: A Answer: A

  6. Question 5 Question 5 The ScheduleKeyDeletion function lets you schedule a time to delete Key Management Service (KMS) The ScheduleKeyDeletion function lets you schedule a time to delete Key Management Service (KMS) keys. keys. How far in the future can a key deletion event be scheduled? How far in the future can a key deletion event be scheduled? A. 7 days A. 7 days B. 30 days B. 30 days C. 15 days C. 15 days D. 60 days D. 60 days Answer: C Answer: C

  7. Question 6 Question 6 User A is the system administrator of a company, who often takes business trips to Shanghai Each User A is the system administrator of a company, who often takes business trips to Shanghai Each time when he remotely logs on to the Shanghai an alert is reported, prompting "Someone is remotely time when he remotely logs on to the Shanghai an alert is reported, prompting "Someone is remotely logging on to the server Please pay attention to your server security" logging on to the server Please pay attention to your server security" Which of the following methods can be used to quickly and automatically resolve this issue? Which of the following methods can be used to quickly and automatically resolve this issue? A. Open a ticket immediately to consult Alibaba Cloud engineers A. Open a ticket immediately to consult Alibaba Cloud engineers B. Log on to the Alibaba Cloud Security Center, and add a frequent logon location to the B. Log on to the Alibaba Cloud Security Center, and add a frequent logon location to the configuration item of Security Center. configuration item of Security Center. C. Ask the company leaders for help C. Ask the company leaders for help D. Call a friend, who is a famous hacker in the industry, for help. D. Call a friend, who is a famous hacker in the industry, for help. Answer: B Answer: B

  8. Question 7 Question 7 A customer built his website on Alibaba Cloud- To defend against Web attacks he activated Alibaba A customer built his website on Alibaba Cloud- To defend against Web attacks he activated Alibaba Cloud WAF However, a week later, the customer finds that his website has suffered intrusion. Cloud WAF However, a week later, the customer finds that his website has suffered intrusion. Which of the following actions should he take to ensure that WAF functions correctly and enhance Which of the following actions should he take to ensure that WAF functions correctly and enhance system security? (Number of correct answers: 4) system security? (Number of correct answers: 4) A. Use Security Center to remove Trojans and fix vulnerabilities A. Use Security Center to remove Trojans and fix vulnerabilities B. Delete all snapshots and clear the server B. Delete all snapshots and clear the server C. Secure other HTTP services on the ECS instance using WAF C. Secure other HTTP services on the ECS instance using WAF D. Configure a security group for the ECS instance. D. Configure a security group for the ECS instance. E. Check whether or not the DNS resolution results point to the WAF address E. Check whether or not the DNS resolution results point to the WAF address F. Resolve the website domain name to the site s source IP address F. Resolve the website domain name to the site s source IP address Answer: A,C,D,E Answer: A,C,D,E

  9. Question 8 Question 8 Border Gateway Protocol (BGP) is mainly used for interconnection between autonomous systems Border Gateway Protocol (BGP) is mainly used for interconnection between autonomous systems (AS) on the Internet It. Controlling route transmission and selecting the best route Alibaba Cloud (AS) on the Internet It. Controlling route transmission and selecting the best route Alibaba Cloud uses a BGP multi-line access mechanism for all its IDCs in China. uses a BGP multi-line access mechanism for all its IDCs in China. Which of the followings are advantages of a BGP multi-line IDC? (Number of correct answers 2) Which of the followings are advantages of a BGP multi-line IDC? (Number of correct answers 2) A. Larger bandwidth A. Larger bandwidth B. High-speed interconnection B. High-speed interconnection C. Low bandwidth cost C. Low bandwidth cost D. Elimination of access barriers between North China and South China because China is big and D. Elimination of access barriers between North China and South China because China is big and North China and South China has different telecom operators North China and South China has different telecom operators Answer: B,D Answer: B,D

  10. Question 9 Question 9 Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML injection to insert malicious scripts so as to control the user's browser when the user browses the injection to insert malicious scripts so as to control the user's browser when the user browses the webpage XSS vulnerabilities may be used for user identity stealing (particularly the administrator webpage XSS vulnerabilities may be used for user identity stealing (particularly the administrator identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing A. True A. True B. False B. False Answer: A Answer: A

  11. Question 10 Question 10 Alibaba Cloud WAF is a security protection product based on Alibaba Group's web security defense Alibaba Cloud WAF is a security protection product based on Alibaba Group's web security defense experience accumulated over more than a decade By defending against common OWASP attacks, experience accumulated over more than a decade By defending against common OWASP attacks, providing patches to fix vulnerabilities, and allowing users to customize protection policies for providing patches to fix vulnerabilities, and allowing users to customize protection policies for website services, WAF can successfully safeguard the security and availability of websites and web website services, WAF can successfully safeguard the security and availability of websites and web applications. applications. Which of the following types of security configurations does WAF provide? (Number of correct Which of the following types of security configurations does WAF provide? (Number of correct answers 3) answers 3) A. Port access control A. Port access control B. CC protection B. CC protection C. Web application attack protection C. Web application attack protection D. Precision access control D. Precision access control Answer: A,B,C Answer: A,B,C

More Related