Which of the following 4 functions can be achieved through ECS security group
configuration?
18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?
In a regular server maintenance operation, the purpose of installing a patch on the operating system is?
Which of the following options does not belong to 5 key elements of network
communication?
CC attacks can cause serious damages. Which of the following statements about CC attack is
not correct?
Score 2
In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?
Which of the following descriptions of the shared responsibilities security model is CORRECT?
Which of the following benefit cannot be provided by 'Server Guard'?
Score 2
Which of the following statements is NOT true about daily operation on server account
andpassword maintenance?
Which of the following scenarios can be considered as business fraud? (the number of
correct answers: 2)
Which of the following security vulnerability is not a 'Server Side' security issue?
ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by
some internet hacker, which of the following consequences such attack could cause? (the
number of correct answers: 2)
Which of the following statements is NOT true about web application security protection best practices?
Which of the following statements is true about classic network and VPC?
For internet communication, to setup the connection and data transition between source
and destination, which of the following information you will need? (the number of correct
answers: 3)
Score 1
If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?
Using ECS security group can help you achieve:
Which of the following service may under anti-DDOS attack?(the number of correct answers:
3)
Score 1
Which of the following DDoS descriptions are correct?
Which command in Windows OS can be used to open a terminal?
In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the
attacker manipulate?
Which of the following HTTP status code does reflect that the requested page does not exist?