Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements are true for how to login to different ECS operating

system? (the number of correct answers: 2)

Score 1

A.

use 'remote desktop connection' for windows

B.

use 'ssh' tool for windows

C.

use 'remote desktop connection' for Linux

D.

use 'ssh' tool for Linux

When we talk about 'security vulnerability' of ECS server, we are referring to: (the number of

correct answers: 3)

A.

OS vulnerability

B.

Hardware fault

C.

Application Vulnerability

D.

Hypervisor Vulnerability

E.

Data Center Serviceability

Which of the following benefit cannot be provided by 'Server Guard'?

Score 2

A.

lower the risk of sensitive data leak

B.

improve the usage of system resource

C.

lower the cost of security protection

D.

get instant alerts after attacks are detected

Which of the following Alibaba Cloud products need to be considered to use if you want to build

an elastic computing cluster to provide web service together and also with dynamic data and static

data separately stored

A.

ECS

B.

SLB

C.

RDS

D.

OSS

E.

KMS

ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by

some internet hacker, which of the following consequences such attack could cause? (the

number of correct answers: 2)

A.

Physical Server Damage

B.

Leak of customer sensitive data

C.

Service running on this ECS become not available

D.

The datacenter where the ECS belongs to need to shutdown

If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?

A.

Update cache

B.

turn on protection switch manually

C.

add one protection rule

D.

restart the whole WAF service

Which of the following statements are true about the difference between HTTP and HTTPS

? (the number of correct answers: 2)

A.

HTTP must use port 80 and HTTPS must use port 443 to provide service

B.

HTTPS is more secure than HTTP regarding the way they transfer data

C.

Data transferred through HTTPs is under encryption

D.

You must buy commercial CA before you setup your own web server with HTTPS service

Inside cloud, hypervisor vulnerability could cause the following possible consequences: (the

number of correct answers: 3)

A.

One client host can access another client's data

B.

User service become unavailable

C.

Hacker can access host server directly

D.

Incorrect client resource usage calculating

Please list the correct order of the following 4 steps to enable a WAF service : (1) upload

HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be

protected (3) select the original IP address (4) add CNAME DNS record

Score 2

A.

2314

B.

2341

C.

2431

D.

2413

Which of the following statements about HTTP protocol are true?(the number of correct

answers: 2

A.

HTTP protocol support state keeping

B.

HTTP is based on TCP/IP protocol

C.

HTTP request supports methods like: GET, POST, PUT, HEAD, etc.

D.

Response code 200 in HTTP protocol means exception on server side