Various profit-oriented hacker groups exist on the Internet. They control a large number of server resources and can launch network attacks against a target server at any time Among those, one type of attack is common and destructive, which completely consumes resources of the target server so that normal customers cannot connect to the server Which of the following belongs to this type of attack?
If you install Alibaba Cloud Security Center client on a non-Alibaba Cloud server, which of the following statements allows you to check the server-related reports on the Security Center?
Which of the following methods can be used to download the metric data of Alibaba Cloud CloudMonitor?
Alibaba Cloud's Content Moderation service cannot detect advertising or spam content.
Which of the following configurations is NOT a feature provided by Alibaba Cloud Web Application Firewall product?
Anti-DDoS is one of the major products of Alibaba Cloud Security service Many websites have suffered DDoS attacks of different types. Therefore, accurate understanding of DDoS attacks is critical to the website security protection. Which of the following statements about DDoS attacks is the MOST accurate?
Alibaba Cloud's CloudMonitor can not only monitor ECS instances in a secure and efficient way, but also monitor HTTP sites of clients' servers in data centers However, in the latter case, Alibaba Cloud does not provide monitor agent so users need to develop their own scripts to collect data
Alibaba Cloud WAF is a security protection product based on Alibaba Group's web security defense experience accumulated over more than a decade By defending against common OWASP attacks, providing patches to fix vulnerabilities, and allowing users to customize protection policies for website services, WAF can successfully safeguard the security and availability of websites and web applications. Which of the following types of security configurations does WAF provide? (Number of correct answers 3)
More and more blackmail attacks (using hacking tools or ransomware) have been detected among recent network security events, causing ever greater damage and financial loss. Which of the following measures can help Alibaba Cloud customers reduce risks in blackmail attacks? (Number of correct answers 3)
If an ECS instance needs to be accessed by other applications from internet, a corresponding "port" must be enabled For example, HTTP applications work on port 80, while FTP applications work on port 21 If an administrator configures network security policies for this ECS instance, which of the following policies is the safest?
The ScheduleKeyDeletion function lets you schedule a time to delete Key Management Service (KMS) keys. How far in the future can a key deletion event be scheduled?
Which of the following services can be protected by the Alibaba Cloud Security Center's anti-brute force password cracking function? (Number of answers 3)
You applied for an SSL certificate through Alibaba Cloud's SSL Certificates Service During the application, you selected "Manual" at the "CSR "" step. You now want to install your certificate on a server running Apache What must you do?
Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications. Which of the following statements about CloudMonitor is accurate'?
Users can detach the Security Center client on Alibaba Cloud ECS instances, and reinstall it later when necessary.
In a public cloud environment Alibaba Cloud is responsible for security of cloud computing infrastructure (such as the IDC environment, physical server O&M, and virtualization layer of cloud products). However, you still need to perform necessary security optimization measures for the Cloud products you purchased Which of the following actions do you think are safe?
After you install the Alibaba Cloud Security center agent on a non with your Alibaba Cloud account*?
To improve system security and protect the system from DDoS attacks, you can use Alibaba Cloud Anti-DDoS Premium Service. Which of the following products can be used together with Alibaba Cloud Anti-DDoS Service to improve the system access capabilities? (Number of correct answers 3)
Before using the HTTPS protection feature in Alibaba Cloud WAF, you must upload the server certificate and private key beforehand.
Cloud computing service security requires the joint effort of the cloud service supplier (such as Alibaba Cloud), independent software vendor (ISV), and users The failure of any party to fulfill their responsibilities may lead to security risks. Which of the following are the responsibilities of the cloud computing service users? (Number of correct answers 2)
You are importing your own key material in to Key Management Service (KMS). Which of the following is the correct sequence of steps to follow?