You are planning on hosting an eCommerce Web server. You are intent on making the server
secure against all external attacks possible. Which of the following would be the best way to test your
server for its weaknesses? Choose the best answer.
Which of the following statements are true for how to login to different ECS operating
system? (the number of correct answers: 2)
Score 1
Which of the following service may under anti-DDOS attack?(the number of correct answers:
3)
Score 1
When 'Server Guard' detects remote logon behavior, what information will be
shown on 'Server Guard' console?
After using WAF, if you find there are many user input data in the network traffic, you should apply:
Which of the following statements about WAF data risk control feature is NOT true?
Which of the following statements about cloud security shared responsibilities model are
true? (the number of correct answers: 2)
Which of following attacks could serve as a CC attack? (the number of correct answers: 3)
Score 1
The Alibaba Cloud WAF protection strategy provides the following: (the number of correct
answers: 3)
Score 1
Which of the following options is the top 1 web application security risk based on OWASP 2017
report?
By default, servers in VPC can't communicate with internet. By implementing which of the
following products these servers can gain the capability to communicate with internet? (the
number of correct answers: 3)
Which of the following Keys in HTTP heads are related to cache control? (the number of correct answers: 3)
Identify the attack where the purpose is to stop a workstation or service from functioning?
Inside cloud, hypervisor vulnerability could cause the following possible consequences: (the
number of correct answers: 3)
Which commands can be used to reload the operation system? (Correct Answers: 2)
CC attacks can cause serious damages. Which of the following statements about CC attack is
not correct?
Score 2
Which of the following options could NOT be the reason that causes website
tampering
Alibaba Cloud will provide hot fix to address existing vulnerabilities. Which of the following
statements is true about this 'hot fix'?