Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Cross Site Script (XSS) attacks refer to a kind of attack by tampering the webpage using HTML injection to insert malicious scripts so as to control the user's browser when the user browses the webpage XSS vulnerabilities may be used for user identity stealing (particularly the administrator identity), behavior hijacking, Trojan insertion and worm spreading, and also phishing

A.

True

B.

False

You want to buy an SSL certificate using Alibaba Cloud's SSL Certificates Service and deploy it in front of an Alibaba Cloud resource (such as Elastic Compute Service) What is the coned sequence of steps to follow?

A.

1 Select a certificate

2. Deploy the certificate in front of your Alibaba Cloud resources

3. Enter request information and submit for review

4. Manage the certificate

B.

1 Select a certificate

2 Enter request information and submit for review

3 Manage the certificate

4 Deploy the certificate in front of your Alibaba Cloud resources

C.

1 Select a certificate

2 Enter request information and submit for review

3. Deploy the certificate in front of your Alibaba Cloud resources

4. Manage the certificate

D.

1 Enter request information and submit for review 2. Select a certificate

3 Deploy the certificate in front of your Alibaba Cloud resources

4 Manage the certificate

The ScheduleKeyDeletion function lets you schedule a time to delete Key Management Service (KMS) keys. How far in the future can a key deletion event be scheduled?

A.

7 days

B.

30 days

C.

15 days

D.

60 days

Alibaba Cloud Anti-DDoS Premium can be used only when the origin site IP address is in Alibaba Cloud.

A.

True

B.

False

An Alibaba Cloud user buys an ECS instance and deploys Tomcat on it Which of the following is the easiest way for the user to monitor whether port 8080 (used by Tomcat) on this ECS instance is functioning normally or not?

A.

Log on to the ECS instance every hour to check the port using the command line.

B.

Buy a third-party monitoring tool

C.

Write a script for detection and report the data to CloudMonitor.

D.

Use Alibaba Cloud CloudMonitor s site monitor feature to create a new Monitoring Task to monitor the port status.

Alibaba Cloud Data Risk Control utilizes Alibaba Group's Big Data computing capabilities and industry-leading, risk decision making engine to address fraud threats in key service processes (such as account log on, online activity, payment) and avoid financial loss

Which of the following is NOT an application scenario of Data Risk Control?

A.

Account registration

B.

Application installation

C.

Goods payment

D.

Transaction rating

What are some of the products that support integration with Alibaba Cloud's SSL Certificates Service (Number of correct answers: 3)

A.

ApsaraDB for RDS

B.

Content Distribution Network (CDN)

C.

Secure Content Distribution Network (SCDN)

D.

Server Load Balancer (SLB)

When the agent of Alibaba Cloud Security Center running on a server, it normally uses less than 1% of the CPU and 10 MB of memory, which can void affecting the server's performance

A.

True

B.

False

After a customer uses Alibaba Cloud Anti-DDoS Premium Service, a 502 error is prompted. Which of the followings are the possible causes of the error? (Number of correct answers 3)

A.

Network congestion or jitter occurred

B.

The IP address of the origin site is exposed and suffered an attack

C.

The service was configured using the IP address method instead of the CI

D.

The Anti-DDoS Service IP range was not released As a result, the origin site is blocked.

Alibaba Cloud WAF is a security protection product based on Alibaba Group's web security defense experience accumulated over more than a decade By defending against common OWASP attacks, providing patches to fix vulnerabilities, and allowing users to customize protection policies for website services, WAF can successfully safeguard the security and availability of websites and web applications. Which of the following types of security configurations does WAF provide? (Number of correct answers 3)

A.

Port access control

B.

CC protection

C.

Web application attack protection

D.

Precision access control