Alibaba aca-sec1 practice test

ACA Cloud Security Certification Exam Exam


Question 1

If Server Guard (product provided by Alibaba Cloud) report some brute force password hacking
(the number of correct answers: 3)
attacks, the reporting information will include

  • A. Attack initiated time
  • B. Attack type
  • C. Tools attacker used
  • D. Attack source IP
  • E. Physical location of attacker
Answer:

CDE

Discussions
0 / 600

Question 2

Which of the following statements about cloud security shared responsibilities model are true? (the
number of correct answers: 2)

  • A. for users who is using IAAS service, they should be responsible for their business system which is on top of cloud infrastructure
  • B. cloud service provider should guarantee the security of all physical infrastructure
  • C. the damage caused by attacks leveraging security vulnerability in customers' application server should be charged to cloud service provider
  • D. cloud user should also take care of some of the hardware maintenance and operation work
Answer:

CD

Discussions
0 / 600

Question 3

Which commands can be used to reload the operation system? (Correct Answers: 2)

  • A. reload
  • B. shutdown
  • C. init
  • D. restart
Answer:

D

Discussions
0 / 600

Question 4

Which directory is the home directory of root user?

  • A. /home/root
  • B. /root
  • C. /
  • D. /boot
Answer:

C

Discussions
0 / 600

Question 5

Which of the following DDoS descriptions are correct?

  • A. In order to get admin password
  • B. Steal confidential information
  • C. Causes the target server unable to process legitimate requests
  • D. If the target server has no vulnerabilities, the remote attack may still succeed.
Answer:

C, D

Discussions
0 / 600

Question 6

What of the followings will happen if encounter DoS or DDoS attack?

  • A. Data received successfully
  • B. Delay of data reception
  • C. Slow access web resources
  • D. unauthorized access control
Answer:

B, C

Discussions
0 / 600

Question 7

Which of the followings are not the reasons for a DDoS attack?

  • A. Destroying of integrity
  • B. Destroying of confidentiality
  • C. Destroying of availability
  • D. Destroying of business credit
Answer:

A, B, D

Discussions
0 / 600

Question 8

Which of the following protocols will not be used for a SYN Flood attack?

  • A. UDP
  • B. TCP
  • C. IPX/SPX
  • D. AppleTalk
Answer:

A, C, D

Discussions
0 / 600

Question 9

Which of the following services can suffer from DDoS attack?

  • A. Servers in VPC only configured with private network
  • B. Any device internet reachable
  • C. Government website
  • D. Public DNS service
  • E. Offline servers
Answer:

B, C, D

Discussions
0 / 600

Question 10

Identify the attack where the purpose is to stop a workstation or service from functioning?

  • A. This attack is known as non-repudiation
  • B. This attack is known as TCP/IP hijacking
  • C. This attack is known as denial of service (DoS)
  • D. This attack is known as brute force
Answer:

C

Discussions
0 / 600
To page 2