Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following scenarios should be handled by anti-DDOS service? (the number of

correct answers: 3)

A.

Server is under syn flood attack, and is not reachable

B.

online game service which is suffering with too many empty connections and slow

connections

C.

DNS server is under udp flood attack and got no response anymore

D.

website is under SQL injection attack

E.

website is under XSS attacks

Which of the following logs can be accessed through ECS logs provided by Alibaba Cloud?

(the number of correct answers: 2)

A.

OS system log

B.

Application log

C.

Hypervisor log

D.

Cloud platform log

Which of the following statements about 'webshell' detection feature of WAF is NOT true?

A.

It will totally block any file to be able to upload to the web server

B.

cache will be enabled only after you turn on the protection switch

C.

there is a switch need to be turned on first

D.

If you changed some page content, you can use 'cache update' button to manually update the cache

Which command in RedHat Linux shell can be used to check disk usage?

A.

ls

B.

df

C.

diskUsage

D.

diskSpace