Free ACP Cloud Security Certification Exam ACP-Sec1 Exam Practice Test

UNLOCK FULL
ACP-Sec1 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 16
Total Questions: 80
  • When the agent of Alibaba Cloud Security Center running on a server, it normally uses less than 1% of the CPU and 10 MB of memory, which can void affecting the server's performance

    Answer: 1 Next Question
  • Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications Which of the following functions are currently provided by CloudMonitor? (Number of correct answers: 4)

    Answer: 2, 3, 4, 5 Next Question
  • When a Layer-4 forwarding rule is configured with multiple origin site IP addresses, Alibaba Cloud Anti-ODoS Premium Service will perform load balancing for Layer-4 requests using balancing algorithm

    Answer: 1 Next Question
  • Users can detach the Security Center client on Alibaba Cloud ECS instances, and reinstall it later when necessary.

    Answer: 1 Next Question
  • You want to buy an SSL certificate using Alibaba Cloud's SSL Certificates Service and deploy it in front of an Alibaba Cloud resource (such as Elastic Compute Service) What is the coned sequence of steps to follow?

    Answer: 2 Next Question
  • Alibaba Cloud Security Center provides patch management service, where are the patches published from?

    Answer: 1 Next Question
  • Content Moderation Service is an API-based service Like many API services, it employs throttling to make sure that the service cannot be overwhelmed by a large number of simultaneous requests. What is the maximum number of requests per minute you can make against the Content Moderation API?

    Answer: 4 Next Question
  • If you install Alibaba Cloud Security Center client on a non-Alibaba Cloud server, which of the following statements allows you to check the server-related reports on the Security Center?

    Answer: 3 Next Question
  • Various profit-oriented hacker groups exist on the Internet. They control a large number of server resources and can launch network attacks against a target server at any time Among those, one type of attack is common and destructive, which completely consumes resources of the target server so that normal customers cannot connect to the server Which of the following belongs to this type of attack?

    Answer: 3 Next Question
  • When importing key material into Key Management Service (KMS), you will be given an import token and public encryption key valid for 24 hours. The public key KMS provides must be used to encrypt your key material before upload KMS allows you to choose different public key encryption algorithms Which ones are supported? (Number of correct answers; 3)

    Answer: 1, 2, 4 Next Question
Page: 1 / 16
Total Questions: 80