Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Alibaba Cloud Anti-DDoS Premium Service can be used to protect against DDoS attacks larger than 100 Gbps. It can be used to protect both Alibaba Cloud hosts and non-Alibaba Cloud hosts

A.

True

B.

False

Alibaba Cloud's Content Moderation service cannot detect advertising or spam content.

A.

True

B.

False

In which of the following scenarios is Alibaba Cloud Security Center applicable? (Number of correct answers 3)

A.

Setting up web server to provide web service to public

B.

Penetration testing

C.

Creating an ECS with generic software

D.

Batch server security O&M

E.

Network security protection for ad campaigns or other activities

In a public cloud environment Alibaba Cloud is responsible for security of cloud computing infrastructure (such as the IDC environment, physical server O&M, and virtualization layer of cloud products). However, you still need to perform necessary security optimization measures for the Cloud products you purchased Which of the following actions do you think are safe?

A.

To reduce the communication cost, five administrators of the company use the root account to log on to the ECS instance.

B.

After buying an ECS instance, enable the security group firewall for the ECS instance through the console, and only allow a management IP address to remotely log on to the ECS instance.

C.

For easy management, change the administrator password for the ECS instance to 123456.

D.

To enable colleagues working at home to update data, open public IP addresses for ApsaraDB for RDS instances, and allow all IP addresses to connect to the instances

Content Moderation service is useful m a wide variety of scenarios. Which of the following are the *most* suited to Content Moderation's capabilities? (Number of correct answers 2)

A.

Deleting porn on a social networking site

B.

Detecting spam posts on a forum

C.

Detecting faces in images

D.

Detecting sensitive customer information such as credit card numbers in uploaded images

Users can detach the Security Center client on Alibaba Cloud ECS instances, and reinstall it later when necessary.

A.

True

B.

False

If an ECS instance needs to be accessed by other applications from internet, a corresponding "port" must be enabled For example, HTTP applications work on port 80, while FTP applications work on port 21 If an administrator configures network security policies for this ECS instance, which of the following policies is the safest?

A.

After buying an ECS instance, the administrator immediately enables the security group firewall on the console and opens ports 0-1024 for public networks

B.

After buying an ECS instance, the administrator immediately enables the security group firewall on the console and opens only the required service ports for public networks

C.

The administrator wants to build multiple applications on an ECS instance. For easy management, the administrator uses default settings and allows any IP address to access required service ports

D.

After buying an ECS instance, the administrator immediately enables the security group firewall on the console and opens all ports for public networks

For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)

A.

Data leakage prevention

B.

Defense against website trojans and tampering

C.

Virtual vulnerability patches

D.

Protection against malicious CC attacks

E.

Brute force cracking protection

F.

Protection against SMS refresh and service data crawling

More than one CNAME record is generated for the same domain name when Alibaba Cloud Anti-DDoS Premium Service Instance is purchased for load balancing purpose.

A.

True

B.

False

When you receive a security alert from Alibaba Cloud Security Center, which of the following actions should you do?

A.

The alert is dangerous You must immediately report it to the police

B.

Shield the alert because it is not important

C.

Once you receive an alert, you need to determine the specific risk and perform troubleshooting For example, change the password, or upgrade application software

D.

There is no need to care about the alert Alibaba Cloud Security Center will handle it.