Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?

A.

Ppart

B.

Fdisk

C.

Du

D.

mount

Full Access
Question # 5

If your company has a lot of employees who would try to simultaneously access ECS server protected by 'Server Guard' using your company's intranet, the 'Sever Guard' may

mistakenly identify those access requests as attacks. Which of the following methods is the best way to solve this problem? Score 2

A.

set a highly complexed administrator password

B.

change the rule of security group to unblock all company internal ips

C.

add those IPs which need to access ECS server into 'Server Guard' logon white list

D.

ask employees to access that ECS server not very frequently

Full Access
Question # 6

What will the correct stops the traffic will flow through if the user used all following cloud service: WAF, Anti-DDOS pro, CDN.

A.

CDN- >Anti-DDOS Pro->WAF->Original Website

B.

Anti-DDOS Pro->CDN->WAF->Original website

C.

CDN- >WAF->Anti-DDOS Pro->Original website

D.

Anti-DDOS Pro->WAF->CDN->Original website

Full Access
Question # 7

Which of the following Keys in HTTP heads are related to cache control? (the number of correct answers: 3)

A.

Cache-Control

B.

Date

C.

Age

D.

Expires

E.

Host

Full Access
Question # 8

Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options

are the responsibilities Cloud user need to take care of ?

A.

Data security inside ECS

B.

Physical servers water proof

C.

Application vulnerabilities

D.

ECS network configuration

Full Access
Question # 9

In order to stop the service provided through a particular port in Windows OS, which

of the following methods can be used to achieve this objective? (the number of correct

answers: 3)

A.

adjust firewall rule

B.

adjust local security policy

C.

update OS patch

D.

stop the service itself

E.

stop all guest role access

Full Access
Question # 10

If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?

A.

Update cache

B.

turn on protection switch manually

C.

add one protection rule

D.

restart the whole WAF service

Full Access
Question # 11

Which of the following statements is TRUE about Anti-DDOS basics?

A.

it can only protect servers outside of Alibaba Cloud

B.

it is free to charge

C.

need to turn on manually

D.

There is no service limitation for peak traffic

Full Access
Question # 12

For internet communication, to setup the connection and data transition between source

and destination, which of the following information you will need? (the number of correct

answers: 3)

Score 1

A.

IP address

B.

Port

C.

Encryption algorism

D.

Protocol

E.

Router Location

Full Access
Question # 13

Apart from technical approaches, the proper data security management rules can be applied

in daily operations to lower the risk of information leakage. Which of the following risks can

be mitigated setting a strong data security management policy for company's employees?

Score 2

A.

information is sniffed during network transition

B.

under http flood attack

C.

sensitive information is taken away by former employee

D.

email phishing

Full Access
Question # 14

Which of the following statements about 'webshell' detection feature of WAF is NOT true?

A.

It will totally block any file to be able to upload to the web server

B.

cache will be enabled only after you turn on the protection switch

C.

there is a switch need to be turned on first

D.

If you changed some page content, you can use 'cache update' button to manually update the cache

Full Access
Question # 15

In making cloud accounts more secure, which of the following is NOT a guiding principle?

A.

Anonymous logins

B.

Login verification

C.

Account permissions

D.

Authorization distribution

Full Access
Question # 16

Which of the following shell command can be used to check disk usage in a Linux OS ECS

A.

Df –h

B.

Echo

C.

Free –m

D.

Ps –e –o

Full Access
Question # 17

Which of the following service may under anti-DDOS attack?(the number of correct answers:

3)

Score 1

A.

servers in VPC only configured with private network

B.

any device internet reachable

C.

government website

D.

public DNS service

E.

offline servers

Full Access
Question # 18

If Server Guard (product provided by Alibaba Cloud) report some brute force password

hacking attacks, the reporting information will include? (the number of correct answers: 3)

A.

Attack initiated time

B.

Attack type

C.

Tools attacker used

D.

Attack source IP

E.

Physical location of attacker

Full Access
Question # 19

In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?

A.

disable port 445

B.

set a highly complexed administrator password

C.

encrypt all data on server side

D.

put sensitive data in some hidden directory

Full Access
Question # 20

Which of the following options is the top 1 web application security risk based on OWASP 2017

report?

A.

XSS Attack

B.

Server Information Theft

C.

Code Execution

D.

SQL Injection

Full Access
Question # 21

Which of the following statements is NOT true about EIP and NAT gateway?

A.

NAT gateway can support multi servers inside VPC to access public internet through one

public IP

B.

EIP can be bind to different ECS servers at the same time

C.

Different EIP can't share bandwidth

D.

NAT gateway can support shared bandwidth between several ips

Full Access
Question # 22

Which of the following issues would not happen if ECS server is under attack by hackers?

A.

sensitive data leak

B.

service running on that server is not available

C.

physical server damage

D.

compromise the reputation of service provider on that server

Full Access