When we talk about 'security vulnerability' of ECS server, we are referring to: (the number of
correct answers: 3)
Which of following attacks could serve as a CC attack? (the number of correct answers: 3)
Score 1
Which of the following security vulnerability is not a 'Server Side' security issue?
Which of the following statements are true about the difference between HTTP and HTTPS
? (the number of correct answers: 2)
In the Alibaba Cloud, which services can satisfy client user identity management requirements?
Please list the correct order of the following 4 steps to enable a WAF service : (1) upload
HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be
protected (3) select the original IP address (4) add CNAME DNS record
Score 2
Which of the following security issues is considered by the OWASP to be the most dangerous issue
facing cloud computing?
What modes Alibaba Cloud WAF will provide to defend SQL injection? (the number of
correct answers: 2)
Score 1
Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?
Which of the following functions can be provided by Alibaba Cloud Server Guard
product?(the number of correct answers: 3)
Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)
Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)
For internet communication, to setup the connection and data transition between source
and destination, which of the following information you will need? (the number of correct
answers: 3)
Score 1
Which of the following statements about IPV6 and IPV4 are true?(the number of correct
answers: 2)
What is the correct action sequence of WAF protection strategy: (1) CC detection (2) Web
application attack detection (3) Access control
Score 2
In order to stop the service provided through a particular port in Windows OS, which
of the following methods can be used to achieve this objective? (the number of correct
answers: 3)
Which of the following application vulnerabilities are not as popular as others?
CC customized protection rule supports you to define customized configuration setting.
Which of following items can be self-defined? (the number of correct answers: 3)
Which of the following logs can be accessed through ECS logs provided by Alibaba Cloud?
(the number of correct answers: 2)
Which of the following statements is NOT true about daily operation on server account
andpassword maintenance?
After WAF was purchased, users need to add one DNS record to map their domain name to WAF provided IP. What is the type of that DNS record?
CC attacks can cause serious damages. Which of the following statements about CC attack is
not correct?
Score 2
In Linux OS, if access control to a file is shown as '-rwxrw-r--' in shell command, which of the
following statements are true?
Score 2
Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation
permissions these user accounts possess for resources under your account. Which of the following
descriptions of a RAM usage scenario is NOT correct?
If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?
Which of the following service may under anti-DDOS attack?(the number of correct answers:
3)
Score 1
If your company's official website is tampered, the consequence of such attack could NOTbe:
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer
networking model?
Which of the following reasons is the least possible reason leading to a network attack?