Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

ACA-Sec1 Alibaba Cloud ACA Cloud Security Associate Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Alibaba Cloud ACA-Sec1 ACA Cloud Security Associate certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 147 questions

Which of the following security issues is considered by the OWASP to be the most dangerous issue

facing cloud computing?

A.

Injection

B.

Account or service flow hijacking

C.

Denial of service

D.

Multi-tenant isolation failure

Which directory is the home directory of root user?

A.

/home/root

B.

/root

C.

/

D.

/boot

Which of the following protocols will not be used for a SYN Flood attack?

A.

UDP

B.

TCP

C.

IPX/SPX

D.

AppleTalk

In Windows OS users can set software update configuration in various modes. Which

software update configuration listed here is not supported at all?

A.

Set a fixed upgrade schedule

B.

Automatically install any upgrade if available

C.

Always ask for user’s permission before installation

D.

never check for upgrade

In order to stop the service provided through a particular port in Windows OS, which

of the following methods can be used to achieve this objective? (the number of correct

answers: 3)

A.

adjust firewall rule

B.

adjust local security policy

C.

update OS patch

D.

stop the service itself

E.

stop all guest role access

In Windows OS which command can be used to track IP route, including involved node and spent time on each hop?

A.

Wroute

B.

Route

C.

Tracert

D.

Traceroute

Please list the correct order of the following 4 steps to enable a WAF service : (1) upload

HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be

protected (3) select the original IP address (4) add CNAME DNS record

Score 2

A.

2314

B.

2341

C.

2431

D.

2413

Which of following statement about 'Server Guard' Trojan scanning functionality is NOT

correct?

Score 2

A.

Server Guard Agent will automatically scan your web pages directories and look for any

webshell file.

B.

A change to a file in the web pages directories will trigger a scan for that file

C.

you can log on to the Server Guard console to isolate webshell files with one click.

D.

Server Guard will delete any suspicious webshell file immediately

My Answer: B. Other file says D

In Windows OS what command can be used to open registry table and edit it?

A.

Gpedit

B.

Regedit

C.

Gedit

D.

Zedit

What type of attack is likely occuring if you see a significant increase in network traffic and users

complain that the web server is hung up?

A.

MITM

B.

DNS spoofing

C.

Ping sweep

D.

DoS

Which of the following statements is TRUE about Anti-DDOS basics?

A.

it can only protect servers outside of Alibaba Cloud

B.

it is free to charge

C.

need to turn on manually

D.

There is no service limitation for peak traffic

Which of the following statements is true about classic network and VPC?

A.

they can do same thing

B.

you can customize your private IP in a classic network

C.

you can customize your private IP in VPC

D.

servers inside VPC can only communicate to other VPC network

Which of the following scenarios should be handled by anti-DDOS service? (the number of

correct answers: 3)

A.

Server is under syn flood attack, and is not reachable

B.

online game service which is suffering with too many empty connections and slow

connections

C.

DNS server is under udp flood attack and got no response anymore

D.

website is under SQL injection attack

E.

website is under XSS attacks

Which of the following protocol can be considered as 'application' layer protocol in ISO/OSI 7 layer model?

A.

TCP

B.

UDP

C.

IP

D.

SMTP

Which version of WAF will provide advisor customized protection rule?

Score 2

A.

Advanced Version

B.

Enterprise Version

C.

Ultimate Version

D.

Standard Version

In Windows OS you can turn off a service through: Score 2

A.

Control Panel->Management Tool->Stop the running service

B.

Control Panel->windows update->Stop

C.

Create new firewall rule to stop service

D.

Delete administrator role and related accounts

Which of the following statements about HTTP protocol are true?(the number of correct

answers: 2

A.

HTTP protocol support state keeping

B.

HTTP is based on TCP/IP protocol

C.

HTTP request supports methods like: GET, POST, PUT, HEAD, etc.

D.

Response code 200 in HTTP protocol means exception on server side

After using WAF, if you find there are many user input data in the network traffic, you should apply:

A.

Loose protection policy

B.

Normal protection policy

C.

Strict protection policy

D.

Progression protection policy

Which of the following benefit cannot be provided by 'Server Guard'?

Score 2

A.

lower the risk of sensitive data leak

B.

improve the usage of system resource

C.

lower the cost of security protection

D.

get instant alerts after attacks are detected

What modes Alibaba Cloud WAF will provide to defend SQL injection? (the number of

correct answers: 2)

Score 1

A.

Normal Mode

B.

Protection Mode

C.

Warning Mode

D.

Restriction Mode

Page: 2 / 3
Total 147 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved