User A is the system administrator of a company, who often takes business trips to Shanghai Each time when he remotely logs on to the Shanghai an alert is reported, prompting "Someone is remotely logging on to the server Please pay attention to your server security" Which of the following methods can be used to quickly and automatically resolve this issue?
A. Open a ticket immediately to consult Alibaba Cloud engineers
B. Log on to the Alibaba Cloud Security Center, and add a frequent logon location to the configuration item of Security Center.
C. Ask the company leaders for help
D. Call a friend, who is a famous hacker in the industry, for help.
正解:B
質問 2:
You want to buy an SSL certificate using Alibaba Cloud's SSL Certificates Service and deploy it in front of an Alibaba Cloud resource (such as Elastic Compute Service) What is the coned sequence of steps to follow?
A. 1 Enter request information and submit for review 2. Select a certificate
3 Deploy the certificate in front of your Alibaba Cloud resources
4 Manage the certificate
B. 1 Select a certificate
2 Enter request information and submit for review
3 Manage the certificate
4 Deploy the certificate in front of your Alibaba Cloud resources
C. 1 Select a certificate
2 Enter request information and submit for review
3. Deploy the certificate in front of your Alibaba Cloud resources
4. Manage the certificate
D. 1 Select a certificate
2. Deploy the certificate in front of your Alibaba Cloud resources
3. Enter request information and submit for review
4. Manage the certificate
正解:B
質問 3:
Anti-DDoS is one of the major products of Alibaba Cloud Security service Many websites have suffered DDoS attacks of different types. Therefore, accurate understanding of DDoS attacks is critical to the website security protection. Which of the following statements about DDoS attacks is the MOST accurate?
A. The main purpose of a DDoS attack is to prevent the target server from providing normal services
B. A DDoS attack cracks the servers logon password by means of numerous attempts
C. The purpose of a DDoS attack is to steal confidential information
D. DDoS attacks primarily target a database
正解:A
質問 4:
Alibaba Cloud's CloudMonitor can not only monitor ECS instances in a secure and efficient way, but also monitor HTTP sites of clients' servers in data centers However, in the latter case, Alibaba Cloud does not provide monitor agent so users need to develop their own scripts to collect data
A. False
B. True
正解:A
質問 5:
Alibaba Cloud Security Center is consisted of light-weight Agents and cloud engine to provide functions such as webshell scanning and removal, day vulnerability repair, security baseline inspection, and host access control, to protect the server security. Which of the following processes is NOT included in Security Center Agent?
A. AliHids
B. AliYunDunUpdate
C. AliYunDun
D. All Safe
正解:D
質問 6:
Before using the HTTPS protection feature in Alibaba Cloud WAF, you must upload the server certificate and private key beforehand.
A. False
B. True
正解:B
質問 7:
A large Internet company has services running on physical machines, as well as self-built monitoring and alert system Recently, the company wants to migrate part of the services to Alibaba Cloud and use CloudMonitor to monitor ECS instances and set alerts What should the company do to quickly interconnect CloudMonitor alerts with the self-built alert system, and handle both alerts (alerts about the physical machines and ECS instances) in self-built alert system?
A. Call the API for querying data provided by CloudMonitor. regularly query data, and write a code to check whether indicators are abnormal
B. Call the API for obtaining messages and alerts that are sent to self-build alert system
C. Use the Event Monitoring function provided by CloudMonitor to consume alerts sent from self-built alert system
D. This cannot be implemented.
正解:A
質問 8:
Alibaba Cloud Security Center can record source IP addresses that remotely access a server, and shield suspicious IP addresses that frequently connect to the server. During routine O&M. which of the following functions can be used to set the IP address that are commonly used by the system administrator'?
A. Frequent logon location management
B. Security group
C. Valid Login IP list
D. Webshell detection
正解:A
Kanesaki -
今回合格出来ました。
説明が非常に分かりやすくPass4Testから最新版を送られて、それげ受験してやっぱり合格だ。すごっ