Exam Details

  • Exam Code
    :ACP-SEC1
  • Exam Name
    :ACP Cloud Security Professional
  • Certification
    :Alibaba Cloud Security
  • Vendor
    :Alibaba
  • Total Questions
    :80 Q&As
  • Last Updated
    :May 11, 2024

Alibaba Alibaba Cloud Security ACP-SEC1 Questions & Answers

  • Question 41:

    Among various types of network attacks, "phishing" is one of the most common attacks. A phishing website looks exactly the same as the real website It asks visitors to login with their accounts and passwords; at the same time, record these privacy information for illegal purpose. Which of the following statements about how phishing websites are spread is FALSE?

    A. Banks publish phishing website links in prominent positions on their official websites

    B. Phishing website links are sent through Facebook. Twitter and other IM(instant Messenger) applications.

    C. Advertisements are pushed to search engines and small and medium websites, attracting users to click the phishing website links.

    D. Phishing website links are published in batches through emails forums, blogs, and SNS(Social Network Sites).

  • Question 42:

    A large Internet company has services running on physical machines, as well as self-built monitoring and alert system Recently, the company wants to migrate part of the services to Alibaba Cloud and use CloudMonitor to monitor ECS instances and set alerts

    What should the company do to quickly interconnect CloudMonitor alerts with the self-built alert system, and handle both alerts (alerts about the physical machines and ECS instances) in self-built alert system?

    A. Use the Event Monitoring function provided by CloudMonitor to consume alerts sent from self-built alert system

    B. Call the API for querying data provided by CloudMonitor. regularly query data, and write a code to check whether indicators are abnormal

    C. Call the API for obtaining messages and alerts that are sent to self-build alert system

    D. This cannot be implemented.

  • Question 43:

    More and more blackmail attacks (using hacking tools or ransomware) have been detected among recent

    network security events, causing ever greater damage and financial loss.

    Which of the following measures can help Alibaba Cloud customers reduce risks in blackmail attacks?

    (Number of correct answers 3)

    A. Enable images and snapshots for ECS instances, back up data every day, and keep more than three redundant copies

    B. Deploy different service applications on servers with the same security level and security domain, and ensure unified policy management and defense

    C. Use strong passwords with more than 15 characters for the accounts of all types of cloud services

    D. When remotely operating and maintaining an ECS instance use the superuser account for login at all times

    E. If remote OandM is required use IpsecVPN or SSL VPN remote solutions

  • Question 44:

    Content Moderation service is useful m a wide variety of scenarios. Which of the following are the *most* suited to Content Moderation's capabilities? (Number of correct answers 2)

    A. Deleting porn on a social networking site

    B. Detecting spam posts on a forum

    C. Detecting faces in images

    D. Detecting sensitive customer information such as credit card numbers in uploaded images

  • Question 45:

    To improve ECS instance security, the administrator does not want users on public network to check whether an ECS instance is online using the ping command. Which of the following reinforcement measures designed by the administrator is NOT feasible?

    A. Resolve the IP address of the ECS instance to an uncommon level 4 domain name, and point the promotional domain name to the level 4 domain name through CNAME

    B. Enable a security group and only allow access from ports 80 and 25 of the public network through TCP

    C. Enable a security group, and reject ICMP for public network access.

    D. Enable an operating system firewall for the ECS instance, and reject ICMP for public network access.

  • Question 46:

    In a public cloud environment Alibaba Cloud is responsible for security of cloud computing infrastructure (such as the IDC environment, physical server OandM, and virtualization layer of cloud products). However, you still need to perform necessary security optimization measures for the Cloud products you purchased. Which of the following actions do you think are safe?

    A. To reduce the communication cost, five administrators of the company use the root account to log on to the ECS instance.

    B. After buying an ECS instance, enable the security group firewall for the ECS instance through the console, and only allow a management IP address to remotely log on to the ECS instance.

    C. For easy management, change the administrator password for the ECS instance to 123456.

    D. To enable colleagues working at home to update data, open public IP addresses for ApsaraDB for RDS instances, and allow all IP addresses to connect to the instances

  • Question 47:

    A website is built using open-source software To prevent hacker attacks and fix vulnerabilities in a timely manner, the administrator of the website wants to use the patch management feature in Security Center. Which of the following statements about patch management is FALSE?

    A. Before patches for most common Web vulnerabilities are released, the Alibaba Cloud Security OandM team will have fixed the vulnerabilities using self-developed patches

    B. Rollback of Web vulnerabilities means to restore the original files, while rollback of Windows vulnerabilities means to uninstall the patch upgrade

    C. Patch management can operate machines in batches in the cloud. For large-scale vulnerabilities, it supports one-key patch upgrade, which is easy and convenient

    D. Vulnerabilities are automatically fixed Once a self-developed paten is released, it automatically fixes vulnerabilities for all customers who have enabled patch management.

  • Question 48:

    Cloud computing service security requires the joint effort of the cloud service supplier (such as Alibaba Cloud), independent software vendor (ISV), and users The failure of any party to fulfill their responsibilities may lead to security risks. Which of the following are the responsibilities of the cloud computing service users? (Number of correct answers 2)

    A. Ensure multi-channel power supply in the Cloud data center

    B. Provide security protection for physical infrastructure

    C. Regularly change the service system password

    D. Strengthen information security management in the company to prevent sensitive information leakage

  • Question 49:

    Which of the following permissions is required to manually install the Alibaba Cloud Security center agent on the server?

    A. System administrator privilege

    B. FTP service permission

    C. Common user permission

    D. Database permission

  • Question 50:

    When applying for an SSL certificate through Alibaba Cloud's SSL Certificates Service, there is an offline review process which can take 3-5 business days or 5-7 business days depending on the type of certificate you have applied for:

    A. True

    B. False

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Alibaba exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ACP-SEC1 exam preparations and Alibaba certification application, do not hesitate to visit our Vcedump.com to find your solutions here.