Free ACP Cloud Security Certification Exam ACP-Sec1 Exam Practice Test
ACP-Sec1 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 80
-
Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML injection to insert malicious scripts so as to control the user's browser when the user browses the webpage XSS vulnerabilities may be used for user identity stealing (particularly the administrator identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing
Answer: 1 Next Question -
Among various types of network attacks, 'phishing' is one of the most common attacks. A phishing website looks exactly the same as the real website It asks visitors to login with their accounts and passwords; at the same time, record these privacy information for illegal purpose. Which of the following statements about how phishing websites are spread is FALSE?
Answer: 1 Next Question -
Various profit-oriented hacker groups exist on the Internet. They control a large number of server resources and can launch network attacks against a target server at any time Among those, one type of attack is common and destructive, which completely consumes resources of the target server so that normal customers cannot connect to the server Which of the following belongs to this type of attack?
Answer: 3 Next Question -
Products like ECS and Server Load Balancer it will be automatically protected by Anti-DDoS Basic service
Answer: 1 Next Question -
If an ECS instance needs to be accessed by other applications from internet, a corresponding 'port' must be enabled For example, HTTP applications work on port 80, while FTP applications work on port 21 If an administrator configures network security policies for this ECS instance, which of the following policies is the safest?
Answer: 2 Next Question -
Users can detach the Security Center client on Alibaba Cloud ECS instances, and reinstall it later when necessary.
Answer: 1 Next Question -
Alibaba Cloud Ant.-DDoS Premium Service is an advanced DDoS protection product It can defend against layer 4 and layer 7 attacks. Which of the following statements about Alibaba Cloud Anti-DDoS Premium Service is FALSE?
Answer: 3 Next Question -
Alibaba Cloud Security's Data R.sk Control can effectively resolve junk registration, database hacking, and other service risk identification problems To use this service. you need to first collect service data. Which of the following methods can be used to collect information off Web applicationsystems?
Answer: 1 Next Question -
Alibaba Cloud's Content Moderation service cannot detect advertising or spam content.
Answer: 2 Next Question -
For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)
Answer: 1, 2, 3, 4, 5 Next Question
Total Questions: 80
