Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

ACA-Sec1 ACA Cloud Security Associate Questions and Answers

Questions 4

Which of the following issues will NOT be an issue anymore using Alibaba Cloud ECS server? Score 2

Options:

A.

server is under brute force password hacking

B.

hardware disk or memory broken

C.

infection by Trojan Virus

D.

application vulnerability being leveraged by hackers

Buy Now
Questions 5

After WAF was purchased, users need to add one DNS record to map their domain name to WAF provided IP. What is the type of that DNS record?

Options:

A.

A record

B.

CNAME Record

C.

TXT Record

D.

MX Record

Buy Now
Questions 6

Which of the following security issues is considered by the OWASP to be the most dangerous issue

facing cloud computing?

Options:

A.

Injection

B.

Account or service flow hijacking

C.

Denial of service

D.

Multi-tenant isolation failure

Buy Now
Questions 7

Which of the following protocols is not an application level protocol in ISO/OSI 7 layer

networking model?

Options:

A.

FTP

B.

TCP

C.

HTTP

D.

SNMP

Buy Now
Questions 8

Which of following statements is NOT true about anti-DDOS basics and anti-DDOS Pro?

Options:

A.

both can defend DDOS attack

B.

anti-DDOS pro is free to charge

C.

anti-DDOS pro has more capabilities to defend against DDOS attacks

D.

anti-DDOS pro can protect both inside and outside Alibaba Cloud servers

Buy Now
Questions 9

In Windows OS what command can be used to open registry table and edit it?

Options:

A.

Gpedit

B.

Regedit

C.

Gedit

D.

Zedit

Buy Now
Questions 10

What of the followings will happen if encounter DoS or DDoS attack?

Options:

A.

Data received successfully

B.

Delay of data reception

C.

Slow access web resources

D.

unauthorized access control

Buy Now
Questions 11

In Linux OS, if you want to set a file access privilege to read, write, and execute for the

owner only, what octal number will reflect such settings correctly?

Score 2

Options:

A.

755

B.

700

C.

777

D.

766

Buy Now
Questions 12

In Windows OS you can turn off a service through: Score 2

Options:

A.

Control Panel->Management Tool->Stop the running service

B.

Control Panel->windows update->Stop

C.

Create new firewall rule to stop service

D.

Delete administrator role and related accounts

Buy Now
Questions 13

By default, servers in VPC can't communicate with internet. By implementing which of the

following products these servers can gain the capability to communicate with internet? (the

number of correct answers: 3)

Options:

A.

Elastic Public IP

B.

CDN

C.

EIP + SLB

D.

EIP + NAT Gateway

E.

DNS service

Buy Now
Questions 14

Which of the following reasons is the least possible reason leading to a network attack?

Options:

A.

technical skills show off of hacker

B.

business competition

C.

blackmail

D.

help to find system vulnerability

Buy Now
Questions 15

Which Internet protocol is used to implement Linux shell command 'ping'?

Score 2

Options:

A.

ICMP

B.

UDP

C.

PING

D.

TCP

Buy Now
Questions 16

Which of the following statements about the supported way of MySQL DB for backup are

true?(the number of correct answers: 2)

Options:

A.

you can use 'mysqldump' do logical backup

B.

you can copy files directly to do physical backup

C.

you can use 'binlog' to do real time backup

D.

you must stop accessing to DB before you do logical backup

Buy Now
Questions 17

Which of the following statements about cloud security shared responsibilities model are true? (the

number of correct answers: 2)

Options:

A.

for users who is using IAAS service, they should be responsible for their business system which is

on top of cloud infrastructure

B.

cloud service provider should guarantee the security of all physical infrastructure

C.

the damage caused by attacks leveraging security vulnerability in customers' application server

should be charged to cloud service provider

D.

cloud user should also take care of some of the hardware maintenance and operation work

Buy Now
Questions 18

Which of the following can be termed as the Denial of Service Attack? Choose the best answer.

Options:

A.

A computer on your network has crashed

B.

Your router is unable to find a destination outside of your network

C.

Your Web server has gone into a loop trying to service a client request

D.

You keyboard is no longer responding

Buy Now
Questions 19

Which of the following service may under anti-DDOS attack?(the number of correct answers:

3)

Score 1

Options:

A.

servers in VPC only configured with private network

B.

any device internet reachable

C.

government website

D.

public DNS service

E.

offline servers

Buy Now
Questions 20

Identify the attack where the purpose is to stop a workstation or service from functioning?

Options:

A.

This attack is known as non-repudiation

B.

This attack is known as TCP/IP hijacking

C.

This attack is known as denial of service (DoS)

D.

This attack is known as brute force

Buy Now
Questions 21

Regarding the 'Shared Security Responsibilities' on Alibaba Cloud, which of the following options

are the responsibilities Cloud user need to take care of ?

Options:

A.

Data security inside ECS

B.

Physical servers water proof

C.

Application vulnerabilities

D.

ECS network configuration

Buy Now
Questions 22

Which of the following Alibaba Cloud products need to be considered to use if you want to build

an elastic computing cluster to provide web service together and also with dynamic data and static

data separately stored

Options:

A.

ECS

B.

SLB

C.

RDS

D.

OSS

E.

KMS

Buy Now
Exam Code: ACA-Sec1
Exam Name: ACA Cloud Security Associate
Last Update: May 21, 2024
Questions: 147

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80