Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Alibaba Cloud ACP-Sec1 Dumps

Page: 1 / 3
Total 80 questions

ACP Cloud Security Professional Questions and Answers

Question 1

If an ECS instance needs to be accessed by other applications from internet, a corresponding "port" must be enabled For example, HTTP applications work on port 80, while FTP applications work on port 21 If an administrator configures network security policies for this ECS instance, which of the following policies is the safest?

Options:

A.

After buying an ECS instance, the administrator immediately enables the security group firewall on the console and opens ports 0-1024 for public networks

B.

After buying an ECS instance, the administrator immediately enables the security group firewall on the console and opens only the required service ports for public networks

C.

The administrator wants to build multiple applications on an ECS instance. For easy management, the administrator uses default settings and allows any IP address to access required service ports

D.

After buying an ECS instance, the administrator immediately enables the security group firewall on the console and opens all ports for public networks

Question 2

If you install Alibaba Cloud Security Center client on a non-Alibaba Cloud server, which of the following statements allows you to check the server-related reports on the Security Center?

Options:

A.

Associate the Security Center client with your Alibaba Cloud official website account.

B.

Security Center does not support non-Alibaba Cloud servers

C.

You need to manually install the agent on the external server, and use a verification key to associate it with your account

D.

You cannot check the reports on the Alibaba Cloud console.

Question 3

If you activate Alibaba Cloud Security Center on an ECS Linux instance and change the default SSH port (22) to another port, you will no longer receive SMS or email notification related to brute force password cracking

Options:

A.

True

B.

False

Question 4

When users log on to ECS instances through SSH or remote desktop from public Internet, Alibaba Cloud Security Center will monitor the log on behaviors

If an IP address uses incorrect password to log on to an ECS instance for too many times, an alert "ECS instance suffers brute force password cracking" will be prompted If you receive this alert, which of the following is the safest way to handle this alert?

Options:

A.

This alert does not matter and can be ignored.

B.

Inform all users on the service platform of changing their passwords, and eliminate simple passwords using technical measures

C.

Log on immediately to the ECS instance and check the logon logs If no abnormal logon success record is found ignore this alert.

D.

Update the system user password immediately for the ECS instance, and enable the security group firewall to allow only specified IP addresses to connect to the ECS instance

Question 5

To improve system security and protect the system from DDoS attacks, you can use Alibaba Cloud Anti-DDoS Premium Service. Which of the following products can be used together with Alibaba Cloud Anti-DDoS Service to improve the system access capabilities? (Number of correct answers 3)

Options:

A.

Server Load Balancer

B.

CDN

C.

WAF

D.

RDS

Question 6

Border Gateway Protocol (BGP) is mainly used for interconnection between autonomous systems (AS) on the Internet It. Controlling route transmission and selecting the best route Alibaba Cloud uses a BGP multi-line access mechanism for all its IDCs in China. Which of the followings are advantages of a BGP multi-line IDC? (Number of correct answers 2)

Options:

A.

Larger bandwidth

B.

High-speed interconnection

C.

Low bandwidth cost

D.

Elimination of access barriers between North China and South China because China is big and North China and South China has different telecom operators

Question 7

What are some of the products that support integration with Alibaba Cloud's SSL Certificates Service (Number of correct answers: 3)

Options:

A.

ApsaraDB for RDS

B.

Content Distribution Network (CDN)

C.

Secure Content Distribution Network (SCDN)

D.

Server Load Balancer (SLB)

Question 8

When a Layer-4 forwarding rule is configured with multiple origin site IP addresses, Alibaba Cloud Anti-ODoS Premium Service will perform load balancing for Layer-4 requests using balancing algorithm

Options:

A.

True

B.

False

Question 9

Alibaba Cloud Security Center Agent is installed in ECS instances by default, no need to install it manually Users can detach Security Center Agent at any time they desire.

Options:

A.

True

B.

False

Question 10

You want to buy an SSL certificate using Alibaba Cloud's SSL Certificates Service and deploy it in front of an Alibaba Cloud resource (such as Elastic Compute Service) What is the coned sequence of steps to follow?

Options:

A.

1 Select a certificate

2. Deploy the certificate in front of your Alibaba Cloud resources

3. Enter request information and submit for review

4. Manage the certificate

B.

1 Select a certificate

2 Enter request information and submit for review

3 Manage the certificate

4 Deploy the certificate in front of your Alibaba Cloud resources

C.

1 Select a certificate

2 Enter request information and submit for review

3. Deploy the certificate in front of your Alibaba Cloud resources

4. Manage the certificate

D.

1 Enter request information and submit for review 2. Select a certificate

3 Deploy the certificate in front of your Alibaba Cloud resources

4 Manage the certificate

Question 11

Your applications are deployed on Alibaba Cloud ECS instances. You want to collect indicators by yourself for application layer monitoring. Which of the following functions provided by Alibaba Cloud CloudMonitor can be used for indicator collection, aggregation, and alerting?

Options:

A.

CloudMonitor cannot meet these requirements

B.

Cloud service monitoring

C.

Site monitoring

D.

Custom monitoring

Question 12

Content Moderation Service is an API-based service Like many API services, it employs throttling to make sure that the service cannot be overwhelmed by a large number of simultaneous requests. What is the maximum number of requests per minute you can make against the Content Moderation API?

Options:

A.

300

B.

100

C.

1000

D.

600

Page: 1 / 3
Total 80 questions