Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ACA-Sec1 Questions and Answers

Question # 6

Which command in Windows OS can be used to open a terminal?

A.

Painter.exe

B.

Cmd.exe

C.

Batch.exe

D.

Term.exe

Full Access
Question # 7

Reliable server daily operation and security management are essential for continuous service running. Which of the following statement is NOT correct regarding to this scenario?

A.

set easy to remember password to help administrator quickly login and solve problems

B.

patch system timely and frequently

C.

enable build-in OS firewall and configure it properly

D.

disable the ports which are not providing service anymore

Full Access
Question # 8

Security risk may caused by 'Cloud platform', 'ISV' or 'End user', which of the following options

are the possible risks may caused by Cloud Platform?

A.

Software development cycle is not formalized

B.

Security system overall solutions are not complete

C.

Administration tools on Cloud Platform may have some flaws

D.

Cloud platform console and API may lack of security hardenning

Full Access
Question # 9

Which of the following statements about 'webshell' detection feature of WAF is NOT true?

A.

It will totally block any file to be able to upload to the web server

B.

cache will be enabled only after you turn on the protection switch

C.

there is a switch need to be turned on first

D.

If you changed some page content, you can use 'cache update' button to manually update the cache

Full Access
Question # 10

Which of the following scenarios are suitable to use CC emergency mode protection? (the

number of correct answers: 2)

A.

Web page

B.

HTML 5 page

C.

API

D.

Native APPs

Full Access
Question # 11

Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?

A.

Watch

B.

Find

C.

Grep

D.

Ca

Full Access
Question # 12

Please list the correct order of the following 4 steps to enable a WAF service : (1) upload

HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be

protected (3) select the original IP address (4) add CNAME DNS record

Score 2

A.

2314

B.

2341

C.

2431

D.

2413

Full Access
Question # 13

After using WAF, if you find there are many user input data in the network traffic, you should apply:

A.

Loose protection policy

B.

Normal protection policy

C.

Strict protection policy

D.

Progression protection policy

Full Access
Question # 14

Which of the following statements about IPV6 and IPV4 are true?(the number of correct

answers: 2)

A.

IPV6 has bigger route table size

B.

IPV6 address length upper limit is 128 bits

C.

IPV6 has more simplified header

D.

No network switch device is needed when using IPV6 protocol to transfer data

Full Access
Question # 15

Customer who bought ECS server doesn't need to worry about :

A.

Cloud infrastructure security

B.

OS vulnerability inside ECS

C.

Web service security inside ECS

D.

ECS security group setting

Full Access
Question # 16

Which of the following scenarios should be handled by anti-DDOS service? (the number of

correct answers: 3)

A.

Server is under syn flood attack, and is not reachable

B.

online game service which is suffering with too many empty connections and slow

connections

C.

DNS server is under udp flood attack and got no response anymore

D.

website is under SQL injection attack

E.

website is under XSS attacks

Full Access
Question # 17

In Windows OS which command can be used to track IP route, including involved node and spent time on each hop?

A.

Wroute

B.

Route

C.

Tracert

D.

Traceroute

Full Access
Question # 18

Which of the following damages can't be caused by a DDOS attack

Score 2

A.

DNS service down

B.

physical server broken

C.

military commander system down

D.

web service down

Full Access
Question # 19

Which command in RedHat Linux shell can be used to check disk usage?

A.

ls

B.

df

C.

diskUsage

D.

diskSpace

Full Access
Question # 20

Alibaba Cloud offers different security protection plans to different tenant accounts. Which of the

following is NOT a security plan offered by Alibaba Cloud?

A.

Password-free login

B.

Two-factor authentication

C.

Phone number binding

D.

Phone or email verification for password resetting

Full Access
Question # 21

In Windows OS you can turn off a service through: Score 2

A.

Control Panel->Management Tool->Stop the running service

B.

Control Panel->windows update->Stop

C.

Create new firewall rule to stop service

D.

Delete administrator role and related accounts

Full Access
Question # 22

Which directory is the home directory of root user?

A.

/home/root

B.

/root

C.

/

D.

/boot

Full Access