What are some of the products that support integration with Alibaba Cloud's SSL Certificates Service? (Number of correct answers: 3)
A. ApsaraDB for RDS
B. Content Distribution Network (CDN)
C. Secure Content Distribution Network (SCDN)
D. Server Load Balancer (SLB)
Before using the HTTPS protection feature in Alibaba Cloud WAF, you must upload the server certificate and private key beforehand.
A. True
B. False
When users log on to ECS instances through SSH or remote desktop from public Internet, Alibaba Cloud Security Center will monitor the log on behaviors
If an IP address uses incorrect password to log on to an ECS instance for too many times, an alert "ECS instance suffers brute force password cracking" will be prompted If you receive this alert, which of the following is the safest way to handle this alert?
A. This alert does not matter and can be ignored.
B. Inform all users on the service platform of changing their passwords, and eliminate simple passwords using technical measures
C. Log on immediately to the ECS instance and check the logon logs If no abnormal logon success record is found ignore this alert.
D. Update the system user password immediately for the ECS instance, and enable the security group firewall to allow only specified IP addresses to connect to the ECS instance
Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications. Which of the following statements about CloudMonitor is accurate'?
A. CloudMonitor cannot be used through the Alibaba Cloud console
B. CloudMonitor must be independently bought and paid for activation
C. CloudMonitor can monitor websites that are not deployed in Alibaba Cloud products.
D. To use CloudMonitor for ECS monitoring, there no agent needs to be installed in ECS.
Various profit-oriented hacker groups exist on the Internet. They control a large number of server resources and can launch network attacks against a target server at any time Among those, one type of attack is common and destructive, which completely consumes resources of the target server so that normal customers cannot connect to the server. Which of the following belongs to this type of attack?
A. XSS attack
B. Webshell attack
C. DDoS attack
D. SQL injection
Which of the following configurations is NOT a feature provided by Alibaba Cloud Web Application Firewall product?
A. Blocked Regions
B. HTTP ACL Policy
C. Data Leakage Prevention
D. Crawler Detection
When importing key material into Key Management Service (KMS), you will be given an import token and
public encryption key valid for 24 hours. The public key KMS provides must be used to encrypt your key
material before upload KMS allows you to choose different public key encryption algorithms.
Which ones are supported? (Number of correct answers; 3)
A. RSAES_OAEP_SHA_1
B. RSAES_ECDHE_V1 _5
C. RSAES_OAEP_SHA_256
D. RSAES PKCS1 V1 5
Anti-DDoS Premium Service is a value-added service intended to address the problem of service
interruption caused by DDoS attack to servers including non-Alibaba Cloud hosts)
Users can configure a protected IP address so that the attack traffic can be redirected to this IP address,
thereby ensuring the stability and reliability of the origin site. When a user configures Anti-DDoS Premium
Service and imports an HTTPS certificate, the system prompts an "incorrect parameter format" error.
Which of the following is NOT the reason of this error?
A. The certificate contains strings like "---"
B. The name of the certificate contains invalid letters
C. The certificate contains nonstandard content
D. The name of the certificate is too long to be accepted
As your business grows, you begin exceeding the maximum number of requests-per- minute supported by
the Content Moderation API and requests begin to fail.
What is the best way to resolve this issue?
A. Build a custom message queue solution which you can use to buffer requests and spread them out over time
B. Open a ticket and ask for the API request limits to be raised
C. There is nothing you can do to reoslve this problem, except to make fewer requests.
D. Open a second Alibaba Cloud account, buy Content Moderation service under that account, and split your quests between these two accounts.
If you install Alibaba Cloud Security Center client on a non-Alibaba Cloud server, which of the following statements allows you to check the server-related reports on the Security Center?
A. Associate the Security Center client with your Alibaba Cloud official website account.
B. Security Center does not support non-Alibaba Cloud servers
C. You need to manually install the agent on the external server, and use a verification key to associate it with your account
D. You cannot check the reports on the Alibaba Cloud console.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Alibaba exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ACP-SEC1 exam preparations and Alibaba certification application, do not hesitate to visit our Vcedump.com to find your solutions here.