Which of the following statements are true for how to login to different ECS operating
system? (the number of correct answers: 2)
Score 1
When we talk about 'security vulnerability' of ECS server, we are referring to: (the number of
correct answers: 3)
Which of the following benefit cannot be provided by 'Server Guard'?
Score 2
Which of the following Alibaba Cloud products need to be considered to use if you want to build
an elastic computing cluster to provide web service together and also with dynamic data and static
data separately stored
ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by
some internet hacker, which of the following consequences such attack could cause? (the
number of correct answers: 2)
If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?
Which of the following statements are true about the difference between HTTP and HTTPS
? (the number of correct answers: 2)
Inside cloud, hypervisor vulnerability could cause the following possible consequences: (the
number of correct answers: 3)
Please list the correct order of the following 4 steps to enable a WAF service : (1) upload
HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be
protected (3) select the original IP address (4) add CNAME DNS record
Score 2
Which of the following statements about HTTP protocol are true?(the number of correct
answers: 2