Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

ACA-Sec1 Sample Questions Answers

Questions 4

Which of the following benefit cannot be provided by 'Server Guard'?

Score 2

Options:

A.

lower the risk of sensitive data leak

B.

improve the usage of system resource

C.

lower the cost of security protection

D.

get instant alerts after attacks are detected

Buy Now
Questions 5

Which of the following protocol is dedicated for time sync up? Score 2

Options:

A.

HTTP

B.

ICMP

C.

NTP

D.

UDP

Buy Now
Questions 6

Which of the following DDoS descriptions are correct?

Options:

A.

In order to get admin password

B.

Steal confidential information

C.

Causes the target server unable to process legitimate requests

D.

If the target server has no vulnerabilities, the remote attack may still succeed.

Buy Now
Questions 7

Which of the following statements is TRUE about Anti-DDOS basics?

Options:

A.

it can only protect servers outside of Alibaba Cloud

B.

it is free to charge

C.

need to turn on manually

D.

There is no service limitation for peak traffic

Buy Now
Questions 8

When we talk about 'security vulnerability' of ECS server, we are referring to: (the number of

correct answers: 3)

Options:

A.

OS vulnerability

B.

Hardware fault

C.

Application Vulnerability

D.

Hypervisor Vulnerability

E.

Data Center Serviceability

Buy Now
Questions 9

Which of following attacks could serve as a CC attack? (the number of correct answers: 3)

Score 1

Options:

A.

SYN flood

B.

ICMP flood

C.

One host simulate many IP addresses

D.

Attack through agent

E.

Zombie network

Buy Now
Questions 10

Which web server is default one in Windows OS?

Options:

A.

HTTPD

B.

IIS

C.

Web Daemon

D.

Apache

Buy Now
Questions 11

Which of the following security vulnerability is not a 'Server Side' security issue?

Options:

A.

SQL injection

B.

System Command Execution vulnerability

C.

CSRF(cross site request fraud)vulnerability

D.

File uploading vulnerability

Buy Now
Questions 12

Which of the following statements are true about the difference between HTTP and HTTPS

? (the number of correct answers: 2)

Options:

A.

HTTP must use port 80 and HTTPS must use port 443 to provide service

B.

HTTPS is more secure than HTTP regarding the way they transfer data

C.

Data transferred through HTTPs is under encryption

D.

You must buy commercial CA before you setup your own web server with HTTPS service

Buy Now
Questions 13

In the Alibaba Cloud, which services can satisfy client user identity management requirements?

Options:

A.

Security group

B.

Server Guard

C.

Resource Access Management (RAM)

D.

Situational awareness

Buy Now
Questions 14

Please list the correct order of the following 4 steps to enable a WAF service : (1) upload

HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be

protected (3) select the original IP address (4) add CNAME DNS record

Score 2

Options:

A.

2314

B.

2341

C.

2431

D.

2413

Buy Now
Questions 15

Which of the following security issues is considered by the OWASP to be the most dangerous issue

facing cloud computing?

Options:

A.

Injection

B.

Account or service flow hijacking

C.

Denial of service

D.

Multi-tenant isolation failure

Buy Now
Questions 16

What modes Alibaba Cloud WAF will provide to defend SQL injection? (the number of

correct answers: 2)

Score 1

Options:

A.

Normal Mode

B.

Protection Mode

C.

Warning Mode

D.

Restriction Mode

Buy Now
Questions 17

Which command in Windows OS can be used to open a terminal?

Options:

A.

Painter.exe

B.

Cmd.exe

C.

Batch.exe

D.

Term.exe

Buy Now
Questions 18

Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?

Options:

A.

Watch

B.

Find

C.

Grep

D.

Ca

Buy Now
Questions 19

Which of the following functions can be provided by Alibaba Cloud Server Guard

product?(the number of correct answers: 3)

Options:

A.

brute Force password hacking detection and defense

B.

suspicious remote login detection and warning

C.

security vulnerability scanning and patching

D.

anti-ddos

E.

anti SQL injection

Buy Now
Questions 20

Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)

Options:

A.

Brute Force password hacking

B.

Trojan planting

C.

Content Compliance Requirement

D.

Vulnerability scanning

E.

Lack of storage resource

Buy Now
Questions 21

Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)

Options:

A.

Adding more search request together with the original one

B.

adding an absolute true condition to bypass original request

C.

use incorrect SQL function

D.

use selfmade variable

E.

adding ";" or "--" to change the original request purpose with new request attached

Buy Now
Questions 22

Which of the following methods can't be used against CC attack?

Options:

A.

use WAF

B.

change HTTP service to HTTPS service

C.

resolve domain name to a disguised IP

D.

change the service providing port

Buy Now
Questions 23

For internet communication, to setup the connection and data transition between source

and destination, which of the following information you will need? (the number of correct

answers: 3)

Score 1

Options:

A.

IP address

B.

Port

C.

Encryption algorism

D.

Protocol

E.

Router Location

Buy Now
Questions 24

Which of the following statements is true about classic network and VPC?

Options:

A.

they can do same thing

B.

you can customize your private IP in a classic network

C.

you can customize your private IP in VPC

D.

servers inside VPC can only communicate to other VPC network

Buy Now
Questions 25

Using ECS security group can help you achieve:

Options:

A.

better CPU usage

B.

fine grained access control to you server

C.

enlarge your network bandwidth

D.

apply QOS to a specific IP

Buy Now
Questions 26

Which of the following statements about IPV6 and IPV4 are true?(the number of correct

answers: 2)

Options:

A.

IPV6 has bigger route table size

B.

IPV6 address length upper limit is 128 bits

C.

IPV6 has more simplified header

D.

No network switch device is needed when using IPV6 protocol to transfer data

Buy Now
Questions 27

What is the correct action sequence of WAF protection strategy: (1) CC detection (2) Web

application attack detection (3) Access control

Score 2

Options:

A.

213

B.

312

C.

132

D.

231

Buy Now
Questions 28

In order to stop the service provided through a particular port in Windows OS, which

of the following methods can be used to achieve this objective? (the number of correct

answers: 3)

Options:

A.

adjust firewall rule

B.

adjust local security policy

C.

update OS patch

D.

stop the service itself

E.

stop all guest role access

Buy Now
Questions 29

Which of the following application vulnerabilities are not as popular as others?

Options:

A.

SQL Injection

B.

XSS exploit

C.

File uploading vulnerability

D.

Kernel privilege breaking

Buy Now
Questions 30

In Windows OS you can turn off a service through: Score 2

Options:

A.

Control Panel->Management Tool->Stop the running service

B.

Control Panel->windows update->Stop

C.

Create new firewall rule to stop service

D.

Delete administrator role and related accounts

Buy Now
Questions 31

CC customized protection rule supports you to define customized configuration setting.

Which of following items can be self-defined? (the number of correct answers: 3)

Options:

A.

Source IP

B.

URI

C.

How long the detection should last

D.

How frequently the page is visited by one single source IP

E.

Target IP

Buy Now
Questions 32

Which of the following logs can be accessed through ECS logs provided by Alibaba Cloud?

(the number of correct answers: 2)

Options:

A.

OS system log

B.

Application log

C.

Hypervisor log

D.

Cloud platform log

Buy Now
Questions 33

Which of the following statements is NOT true about daily operation on server account

andpassword maintenance?

Options:

A.

change'Administrator' to some other name

B.

with'Server Guard protection In Allbaba Cloud,you can set password to some easy to

remember words.

C.

except for some necessary accounts for system manogement,.dlsoble or delete other

seldomly used accounts

D.

always set a complexed passwcwd using combination of numbers,letters and other

characters

Buy Now
Questions 34

After WAF was purchased, users need to add one DNS record to map their domain name to WAF provided IP. What is the type of that DNS record?

Options:

A.

A record

B.

CNAME Record

C.

TXT Record

D.

MX Record

Buy Now
Questions 35

CC attacks can cause serious damages. Which of the following statements about CC attack is

not correct?

Score 2

Options:

A.

CC attack will simulate real user requests

B.

Will consume massive sever side resource

C.

CC attack is done on network layer

D.

The request generated by CC attack is hard to be distinguished from normal requests

Buy Now
Questions 36

In Linux OS, if access control to a file is shown as '-rwxrw-r--' in shell command, which of the

following statements are true?

Score 2

Options:

A.

This file is a text file

B.

The access privilege of this user group is read only

C.

The owner of this file has read/write/execution privilege to this file

D.

Other users (outside of this user group) can execute this file

Buy Now
Questions 37

Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation

permissions these user accounts possess for resources under your account. Which of the following

descriptions of a RAM usage scenario is NOT correct?

Options:

A.

Enterprise sub-account management and permission assignment

B.

Resource operation and authorization management between enterprises

C.

Temporary authorization management for untrusted client apps

D.

Prevention of network attacks on enterprises

Buy Now
Questions 38

What design flaw of TCP/IP protocol does SYN flood attack use?

Options:

A.

UDP stateless connectio

B.

DNS 3 times hands shake

C.

TCP 3 times hands shake

D.

HTTP plain text transmission

Buy Now
Questions 39

What of the followings will happen if encounter DoS or DDoS attack?

Options:

A.

Data received successfully

B.

Delay of data reception

C.

Slow access web resources

D.

unauthorized access control

Buy Now
Questions 40

If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?

Options:

A.

Update cache

B.

turn on protection switch manually

C.

add one protection rule

D.

restart the whole WAF service

Buy Now
Questions 41

Which of the following service may under anti-DDOS attack?(the number of correct answers:

3)

Score 1

Options:

A.

servers in VPC only configured with private network

B.

any device internet reachable

C.

government website

D.

public DNS service

E.

offline servers

Buy Now
Questions 42

If your company's official website is tampered, the consequence of such attack could NOTbe:

Options:

A.

Website is used for some illegal attempts

B.

Public image or reputation of your company is damaged

C.

Business is impacted

D.

Physical server is damaged

Buy Now
Questions 43

Which of the following protocols is not an application level protocol in ISO/OSI 7 layer

networking model?

Options:

A.

FTP

B.

TCP

C.

HTTP

D.

SNMP

Buy Now
Questions 44

Which of the following reasons is the least possible reason leading to a network attack?

Options:

A.

technical skills show off of hacker

B.

business competition

C.

blackmail

D.

help to find system vulnerability

Buy Now
Exam Code: ACA-Sec1
Exam Name: ACA Cloud Security Associate
Last Update: May 16, 2024
Questions: 147
$64  $159.99
$48  $119.99
$40  $99.99
buy now ACA-Sec1