You are planning on hosting an eCommerce Web server. You are intent on making the server
secure against all external attacks possible. Which of the following would be the best way to test your
server for its weaknesses? Choose the best answer.
Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)
Which of following elements are included in a TCP/IP based route table? (the number of
correct answers: 3)
Which of the following application vulnerabilities are not as popular as others?
Please list the correct order of the following 4 steps to enable a WAF service : (1) upload
HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be
protected (3) select the original IP address (4) add CNAME DNS record
Score 2
Which of the following statements is NOT true about daily operation on server account
andpassword maintenance?
If Server Guard (product provided by Alibaba Cloud) report some brute force password hacking
attacks, the reporting information will include? (the number of correct answers: 3)
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer
networking model?
Identify the attack where the purpose is to stop a workstation or service from functioning?
By default, servers in VPC can't communicate with internet. By implementing which of the
following products these servers can gain the capability to communicate with internet? (the
number of correct answers: 3)
What will the correct stops the traffic will flow through if the user used all following cloud service: WAF, Anti-DDOS pro, CDN.
In Linux OS, if you want to set a file access privilege to read, write, and execute for the
owner only, what octal number will reflect such settings correctly?
Score 2
Which of following attacks could serve as a CC attack? (the number of correct answers: 3)
Score 1
Customer who bought ECS server doesn't need to worry about :
CC attacks can cause serious damages. Which of the following statements about CC attack is
not correct?
Score 2
Which of the following function is NOT provided by 'Server Guard' vulnerability detection?
The Alibaba Cloud WAF protection strategy provides the following: (the number of correct
answers: 3)
Score 1
In Windows OS what command can be used to open registry table and edit it?
In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?
In Linux OS, if access control to a file is shown as '-rwxrw-r--' in shell command, which of the
following statements are true?
Score 2
Which of the following protocol can be considered as 'application' layer protocol in ISO/OSI 7 layer model?