Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ACA-Sec1 Exam Dumps - ACA Cloud Security Associate

Go to page:
Question # 17

Which of the following options could NOT be the reason that causes website

tampering

A.

Share password between different users

B.

Botnet attack

C.

system vulnerability is not fixed in time

D.

Wrong security configuration

Full Access
Question # 18

User A rented 2 ECS server and one RDS in Alibaba Cloud to setup his company public

website. After the web site will become available online, the security risks he/she will face

will include: (the number of correct answers: 3)

A.

physical cable is cut by someone

B.

ECS admin password is hacked

C.

website codes has some vulnerability

D.

RDS DB got unknown remote logon

E.

the disk in ECS is broken

Full Access
Question # 19

What status transition flow a TCP client will go through in order to proactively establish connection and disconnect it?

A.

SYNC_SENT- ->ESTABLISHED-->FIN_WAIT1-->FIN_WAIT2-->TIME_WAIT

B.

SYNC_SENT- ->ESTABLISHED-->FIN_WAIT1-->FIN_WAIT2-->CLOSE_WAIT

C.

SYNC_RCVD- ->ESTABLISHED-->CLOSE_WAIT-->TIME_WAIT-->LAST_ACK

D.

SYNC_SENT- ->SYNC_RCVD-->ESTABLISHED-->FIN_WAIT1-->FIN_WAIT2

Full Access
Question # 20

Which of the following issues will NOT be an issue anymore using Alibaba Cloud ECS server? Score 2

A.

server is under brute force password hacking

B.

hardware disk or memory broken

C.

infection by Trojan Virus

D.

application vulnerability being leveraged by hackers

Full Access
Question # 21

Which of following statements is NOT true about anti-DDOS basics and anti-DDOS Pro?

A.

both can defend DDOS attack

B.

anti-DDOS pro is free to charge

C.

anti-DDOS pro has more capabilities to defend against DDOS attacks

D.

anti-DDOS pro can protect both inside and outside Alibaba Cloud servers

Full Access
Question # 22

Which of the followings are not the reasons for a DDoS attack?

A.

Destroying of integrity

B.

Destroying of confidentiality

C.

Destroying of availability

D.

Destroying of business credit

Full Access
Go to page: