2022年最新の更新のAlibaba Securityが有効なACP-Sec1問題集を無料提供しています
最新のJPNTest ACP-Sec1PDF問題集をダウンロードしちゃおう:https://www.jpntest.com/shiken/ACP-Sec1-mondaishu(82問題と解答)
Alibaba ACP-Sec1 認定試験の出題範囲:
トピック | 出題範囲 |
---|---|
トピック 1 |
|
トピック 2 |
|
トピック 3 |
|
トピック 4 |
|
トピック 5 |
|
トピック 6 |
|
トピック 7 |
|
トピック 8 |
|
質問 38
What are some of the products that support integration with Alibaba Cloud's SSL Certificates Service (Number of correct answers: 3)
- A. Server Load Balancer (SLB)
- B. Content Distribution Network (CDN)
- C. ApsaraDB for RDS
- D. Secure Content Distribution Network (SCDN)
正解: A,B,D
質問 39
Alibaba Cloud WAF currently supports web security protection for HTTP and HTTPS. Which of the following ports are usually used for HTTP and HTTPS protocols? (Number of correct answers: 2)
- A. 0
- B. 1
- C. 2
- D. 3
正解: B,C
質問 40
When applying for an SSL certificate through Alibaba Cloud's SSL Certificates Service, there is an offline review process which can take 3-5 business days or 5-7 business days depending on the type of certificate you have applied for:
- A. False
- B. True
正解: B
質問 41
Which of the following configurations is NOT a feature provided by Alibaba Cloud Web Application Firewall product?
- A. Crawler Detection
- B. HTTP ACL Policy
- C. Data Leakage Prevention
- D. Blocked Regions
正解: D
質問 42
The protection rules of Alibaba Cloud WAF are updated in real time after a user makes changes in WAF configuration page.
- A. False
- B. True
正解: B
質問 43
Before using the HTTPS protection feature in Alibaba Cloud WAF, you must upload the server certificate and private key beforehand.
- A. False
- B. True
正解: B
質問 44
After a customer uses Alibaba Cloud Anti-DDoS Premium Service, a 502 error is prompted. Which of the followings are the possible causes of the error? (Number of correct answers 3)
- A. Network congestion or jitter occurred
- B. The IP address of the origin site is exposed and suffered an attack
- C. The service was configured using the IP address method instead of the CI
- D. The Anti-DDoS Service IP range was not released As a result, the origin site is blocked.
正解: A,B,D
質問 45
There is a limit on the number of Customer Master Keys (CMKs) that users can create using Key Management Service (KMS), but users can raise this limit by submitting a support ticket to Alibaba Cloud.
- A. False
- B. True
正解: B
質問 46
Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications Which of the following functions are currently provided by CloudMonitor? (Number of correct answers: 4)
- A. Alerting
- B. Cloud service monitoring
- C. Site monitoring
- D. Custom firewall
- E. Custom monitoring
正解: A,B,C,E
質問 47
A website is built using open-source software To prevent hacker attacks and fix vulnerabilities in a timely manner, the administrator of the website wants to use the patch management feature in Security Center. Which of the following statements about patch management is FALSE.
- A. Before patches for most common Web vulnerabilities are released, the Alibaba Cloud Security O&M team will have fixed the vulnerabilities using self-developed patches
- B. Rollback of Web vulnerabilities means to restore the original files, while rollback of Windows vulnerabilities means to uninstall the patch upgrade
- C. Vulnerabilities are automatically fixed Once a self-developed paten is released, it automatically fixes vulnerabilities for all customers who have enabled patch management.
- D. Patch management can operate machines in batches in the cloud. For large-scale vulnerabilities, it supports one-key patch upgrade, which is easy and convenient
正解: C
質問 48
Clean bandwidth refers to the maximum normal clean bandwidth that can be processed by Anti-DDoS Premium instances when your business is not under attack. Make sure that the Clean bandwidth of the instance is greater than the peak value of the inbound or outbound traffic of all services connected to the Anti-DDoS Premium instances If the actual traffic volume exceeds the maximum Clean bandwidth, your business may be subject to traffic restrictions or random packet losses, and your normal business may be unavailable, slowed, or delayed for a certain period of time
- A. False
- B. True
正解: B
質問 49
Alibaba Cloud Anti-DDoS Premium can be used only when the origin site IP address is in Alibaba Cloud.
- A. False
- B. True
正解: A
質問 50
Alibaba Cloud Security Center provides patch management service, where are the patches published from?
- A. Contributed by netizens from open-source communities
- B. Officially published by application vendors
- C. Developed by Alibaba Cloud
- D. Officially published by operating system vendors
正解: A
質問 51
When submitting requests to the Content Moderation service API, which HTTP method should you use?
- A. POST
- B. GET
- C. PUT
- D. HEAD
正解: A
質問 52
Content Moderation service is useful m a wide variety of scenarios. Which of the following are the *most* suited to Content Moderation's capabilities? (Number of correct answers 2)
- A. Detecting sensitive customer information such as credit card numbers in uploaded images
- B. Deleting porn on a social networking site
- C. Detecting faces in images
- D. Detecting spam posts on a forum
正解: B,D
質問 53
When you receive a security alert from Alibaba Cloud Security Center, which of the following actions should you do?
- A. The alert is dangerous You must immediately report it to the police
- B. Once you receive an alert, you need to determine the specific risk and perform troubleshooting For example, change the password, or upgrade application software
- C. There is no need to care about the alert Alibaba Cloud Security Center will handle it.
- D. Shield the alert because it is not important
正解: B
質問 54
An Alibaba Cloud user buys an ECS instance and deploys Tomcat on it Which of the following is the easiest way for the user to monitor whether port 8080 (used by Tomcat) on this ECS instance is functioning normally or not?
- A. Log on to the ECS instance every hour to check the port using the command line.
- B. Use Alibaba Cloud CloudMonitor s site monitor feature to create a new Monitoring Task to monitor the port status.
- C. Write a script for detection and report the data to CloudMonitor.
- D. Buy a third-party monitoring tool
正解: B
質問 55
Content Moderation Service is an API-based service Like many API services, it employs throttling to make sure that the service cannot be overwhelmed by a large number of simultaneous requests. What is the maximum number of requests per minute you can make against the Content Moderation API?
- A. 0
- B. 1
- C. 2
- D. 3
正解: A
質問 56
Anti-DDoS Premium Service is a value-added service intended to address the problem of service interruption caused by DDoS attack to servers including non-Alibaba Cloud hosts) Users can configure a protected IP address so that the attack traffic can be redirected to this IP address, thereby ensuring the stability and reliability of the origin site. When a user configures Anti-DDoS Premium Service and imports an HTTPS certificate, the system prompts an "incorrect parameter format" error Which of the following is NOT the reason of this error?
- A. The name of the certificate is too long to be accepted
- B. The certificate contains nonstandard content
- C. The name of the certificate contains invalid letters
- D. The certificate contains strings like "--"
正解: B
質問 57
When a Layer-4 forwarding rule is configured with multiple origin site IP addresses, Alibaba Cloud Anti-ODoS Premium Service will perform load balancing for Layer-4 requests using balancing algorithm
- A. False
- B. True
正解: B
質問 58
You have set an alert policy for the disk usage of an ECS instance by using Alibaba Cloud CloudMonitor Each measurement cycle lasts for 5 minutes, during which the average disk usage is measured If the average disk usage exceeds 80% for five consecutive measurement cycles, an alert will be reported After your average disk usage exceeds 80%, how long will it take to receive an alert with the best case scenario?
- A. 20 minutes
- B. 0 minutes
- C. 40 minutes
- D. 30 minutes
正解: D
質問 59
Cloud computing service security requires the joint effort of the cloud service supplier (such as Alibaba Cloud), independent software vendor (ISV), and users The failure of any party to fulfill their responsibilities may lead to security risks. Which of the following are the responsibilities of the cloud computing service users? (Number of correct answers 2)
- A. Provide security protection for physical infrastructure
- B. Strengthen information security management in the company to prevent sensitive information leakage
- C. Regularly change the service system password
- D. Ensure multi-channel power supply in the Cloud data center
正解: B,C
質問 60
Which of the following attacks can Alibaba Cloud Anti-DDoS Basic defend against? (Number of coned answers 4)
- A. ACK Flood
- B. SYN Flood
- C. UDP Flood
- D. Brute force password cracking
- E. CMP Flood
正解: A,B,C,D
質問 61
......
実験された試験材料はACP-Sec1:https://www.jpntest.com/shiken/ACP-Sec1-mondaishu