18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?
If your company has a lot of employees who would try to simultaneously access ECS server protected by 'Server Guard' using your company's intranet, the 'Sever Guard' may
mistakenly identify those access requests as attacks. Which of the following methods is the best way to solve this problem? Score 2
What will the correct stops the traffic will flow through if the user used all following cloud service: WAF, Anti-DDOS pro, CDN.
Which of the following Keys in HTTP heads are related to cache control? (the number of correct answers: 3)
Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options
are the responsibilities Cloud user need to take care of ?
In order to stop the service provided through a particular port in Windows OS, which
of the following methods can be used to achieve this objective? (the number of correct
answers: 3)
If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?
For internet communication, to setup the connection and data transition between source
and destination, which of the following information you will need? (the number of correct
answers: 3)
Score 1
Apart from technical approaches, the proper data security management rules can be applied
in daily operations to lower the risk of information leakage. Which of the following risks can
be mitigated setting a strong data security management policy for company's employees?
Score 2
Which of the following statements about 'webshell' detection feature of WAF is NOT true?
In making cloud accounts more secure, which of the following is NOT a guiding principle?
Which of the following shell command can be used to check disk usage in a Linux OS ECS
Which of the following service may under anti-DDOS attack?(the number of correct answers:
3)
Score 1
If Server Guard (product provided by Alibaba Cloud) report some brute force password
hacking attacks, the reporting information will include? (the number of correct answers: 3)
In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?
Which of the following options is the top 1 web application security risk based on OWASP 2017
report?
Which of the following issues would not happen if ECS server is under attack by hackers?