최신 ACA-Sec1 무료덤프 - Alibaba ACA Cloud Security Certification
Which of the following steps is not a valid step for using anti-DDOS pro?
정답: D
In making cloud accounts more secure, which of the following is NOT a guiding principle?
정답: C
Apart from technical approaches, the proper data security management rules can be applied in daily operations to lower the risk of information leakage. Which of the following risks can be mitigated setting a strong data security management policy for company's employees?
Score 2
Score 2
정답: C
Please list the correct order of the following 4 steps to enable a WAF service : (1) upload HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be protected (3) select the original IP address (4) add CNAME DNS record Score 2
정답: C
Which of the following statements about 'webshell' detection feature of WAF is NOT true?
정답: D
Which of the following protocols will not be used for a SYN Flood attack?
정답: B,C,D
18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?
정답: A
When 'Server Guard' detects remote logon behavior, what information will be shown on 'Server Guard' console?
정답: B
Which of the following risks are considered as common network security risk? (the number of correct answers: 2)
정답: C,D
Which of the following statements are true about the difference between HTTP and HTTPS
? (the number of correct answers: 2)
? (the number of correct answers: 2)
정답: A,B