Alibaba Cloud WAF identifies attacks using human/robot detection, Big Data analysis, model analysis, and other related techniques. Which of the following CC attack defense modes does WAF provide to meet the protection requirements of users? (Number of correct answers 2)
A. Normal
B. Exception
C. Attack emergency
D. Threat
正解:A,C
質問 2:
If you activate Alibaba Cloud Security Center on an ECS Linux instance and change the default SSH port (22) to another port, you will no longer receive SMS or email notification related to brute force password cracking
A. False
B. True
正解:A
質問 3:
If a user has multiple ECS instances on Alibaba Cloud but has no professional O&M team or is unwilling to put efforts in O&M, the user can activate Alibaba Cloud Security Center which provides security expert services like manual security checking, Trojan removing and hosted service monitoring.
A. False
B. True
正解:B
質問 4:
You want to buy an SSL certificate using Alibaba Cloud's SSL Certificates Service and deploy it in front of an Alibaba Cloud resource (such as Elastic Compute Service) What is the coned sequence of steps to follow?
A. 1 Enter request information and submit for review 2. Select a certificate
3 Deploy the certificate in front of your Alibaba Cloud resources
4 Manage the certificate
B. 1 Select a certificate
2 Enter request information and submit for review
3 Manage the certificate
4 Deploy the certificate in front of your Alibaba Cloud resources
C. 1 Select a certificate
2 Enter request information and submit for review
3. Deploy the certificate in front of your Alibaba Cloud resources
4. Manage the certificate
D. 1 Select a certificate
2. Deploy the certificate in front of your Alibaba Cloud resources
3. Enter request information and submit for review
4. Manage the certificate
正解:B
質問 5:
After you activate the button Data Risk Control feature in Alibaba Cloud WAF. Which of the following risk control verification modes m displayed if you directly request for a risk control protection URL?
A. Digit verification
B. QR code verification
C. Image verification
D. Slider verification
正解:D
質問 6:
Alibaba Cloud ECS instances are common targets of hacker attacks. There are many types of attacks against ECS instances. Which of the following attacks specifically target the operating system of an ECS instance?
(Number of correct answers: 3)
A. Brute force SSH password cracking
B. Brute force RDP password cracking
C. Trojan or Webshell installation
D. SQL injection
正解:A,B,C
質問 7:
There is a limit on the number of Customer Master Keys (CMKs) that users can create using Key Management Service (KMS), but users can raise this limit by submitting a support ticket to Alibaba Cloud.
A. False
B. True
正解:B
質問 8:
To improve system security and protect the system from DDoS attacks, you can use Alibaba Cloud Anti-DDoS Premium Service. Which of the following products can be used together with Alibaba Cloud Anti-DDoS Service to improve the system access capabilities? (Number of correct answers 3)
A. RDS
B. WAF
C. CDN
D. Server Load Balancer
正解:B,C,D
Yuui -
こちらの問題集から、9割以上出ました。大変助かりました。予測問題が大幅に的中されました。本当に感謝です。