Pass4itsure > Alibaba > Alibaba Cloud Security > ACP-SEC1 > ACP-SEC1 Online Practice Questions and Answers

ACP-SEC1 Online Practice Questions and Answers

Questions 4

There is a limit on the number of Customer Master Keys (CMKs) that users can create using Key Management Service (KMS), but users can raise this limit by submitting a support ticket to Alibaba Cloud.

A. True

B. False

Buy Now
Questions 5

You have helped a customer set up a content filtering solution based on Content Moderation service However, the customer is complaining that certain images are getting incorrectly flagged as pornographic content. What can you do to help fix this?

A. Create an "Image Library" from the Content Moderation console and add the images to the Image Library's whitelist

B. Ask your customer to use different images on their site

C. Modify the images until Content Moderation service starts marking them as pornographic.

D. Open a ticket with Alibaba Cloud support, and send them a copy of the images, so that they can tune Content Moderation's detection algorithms

Buy Now
Questions 6

You want to buy an SSL certificate using Alibaba Cloud's SSL Certificates Service and deploy it in front of

an Alibaba Cloud resource (such as Elastic Compute Service) .

What is the coned sequence of steps to follow?

A. 1. Select a certificate

2.

Deploy the certificate in front of your Alibaba Cloud resources

3.

Enter request information and submit for review

4.

Manage the certificate

B. 1. Select a certificate

2.

Enter request information and submit for review

3.

Manage the certificate

4.

Deploy the certificate in front of your Alibaba Cloud resources

C. 1 Select a certificate 2 Enter request information and submit for review

3.

Deploy the certificate in front of your Alibaba Cloud resources

4.

Manage the certificate

D. 1. Enter request information and submit for review

2.

Select a certificate

3.

Deploy the certificate in front of your Alibaba Cloud resources

4.

Manage the certificate

Buy Now
Questions 7

Which of the following methods can be used to download the metric data of Alibaba Cloud CloudMonitor?

A. Download the data through Open APIs

B. You can download the data through both the console and Open APIs

C. You can only view the reports, but cannot download them.

D. Download the data from the console

Buy Now
Questions 8

After you activate the button Data Risk Control feature in Alibaba Cloud WAF. Which of the following risk control verification modes m displayed if you directly request for a risk control protection URL?

A. Slider verification

B. QR code verification

C. Image verification

D. Digit verification

Buy Now
Questions 9

Alibaba Cloud Security's Data R.sk Control can effectively resolve junk registration, database hacking, and other service risk identification problems To use this service. you need to first collect service data. Which of the following methods can be used to collect information off Web application systems?

A. JavaScript

B. SDK

C. JavaScript, SDK

D. HTML5

Buy Now
Questions 10

Various profit-oriented hacker groups exist on the Internet. They control a large number of server resources and can launch network attacks against a target server at any time Among those, one type of attack is common and destructive, which completely consumes resources of the target server so that normal customers cannot connect to the server. Which of the following belongs to this type of attack?

A. XSS attack

B. Webshell attack

C. DDoS attack

D. SQL injection

Buy Now
Questions 11

Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications. Which of the following statements about CloudMonitor is accurate'?

A. CloudMonitor cannot be used through the Alibaba Cloud console

B. CloudMonitor must be independently bought and paid for activation

C. CloudMonitor can monitor websites that are not deployed in Alibaba Cloud products.

D. To use CloudMonitor for ECS monitoring, there no agent needs to be installed in ECS.

Buy Now
Questions 12

When users log on to ECS instances through SSH or remote desktop from public Internet, Alibaba Cloud Security Center will monitor the log on behaviors

If an IP address uses incorrect password to log on to an ECS instance for too many times, an alert "ECS instance suffers brute force password cracking" will be prompted If you receive this alert, which of the following is the safest way to handle this alert?

A. This alert does not matter and can be ignored.

B. Inform all users on the service platform of changing their passwords, and eliminate simple passwords using technical measures

C. Log on immediately to the ECS instance and check the logon logs If no abnormal logon success record is found ignore this alert.

D. Update the system user password immediately for the ECS instance, and enable the security group firewall to allow only specified IP addresses to connect to the ECS instance

Buy Now
Questions 13

To improve system security and protect the system from DDoS attacks, you can use Alibaba Cloud Anti-DDoS Premium Service. Which of the following products can be used together with Alibaba Cloud Anti-DDoS Service to improve the system access capabilities? (Number of correct answers 3)

A. Server Load Balancer

B. CDN

C. WAF

D. RDS

Buy Now
Exam Code: ACP-SEC1
Exam Name: ACP Cloud Security Professional
Last Update: Apr 10, 2024
Questions: 80
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99