Tuesday, December 22, 2020

Alibaba ACA-Sec1 Dumps | ACA-Sec1 Practice Test Questions | Realexamdumps.com


Question: 1


Which of the following shell command can be used to check disk usage in a Linux OS ECS


A. Df –h

B. Echo

C. Free –m

D. Ps –e –o


Answer: A 


Question: 2


Which of the following application vulnerabilities are not as popular as others?


A. SQL Injection

B. XSS exploit

C. File uploading vulnerability

D. Kernel privilege breaking


Answer: D 


Question: 3


In a regular server maintenance operation, the purpose of installing a patch on the operating system is?


A. To improve server resource usage

B. to improve system usability

C. to enhance system functionality

D. to avoid existing system vulnerabilities being used by some hackers


Answer: D 


Question: 4


Which of the following statements is NOT true about web application security protection best practices?


A. enforce security management to any public service

B. keep installing official released patches will be good enough

C. keep monitoring system processes , performance and status

D. always scan input by user through web application


Answer: B


Question: 5


Which of the following function is provided by 'server guard' patch management service?


A. fix vulnerability found in open source software using Alibaba self-developed patch

B. detect any vulnerability before it bursts

C. release official patches for any exposed vulnerability

D. stop hacker's vulnerabilities probing


Answer: B 


Question: 6


In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate

its attacks. What is the quickest way to prevent this kind of attacks?


A. disable port 445

B. set a highly complexed administrator password

C. encrypt all data on server side

D. put sensitive data in some hidden directory


Answer: A 


Question: 7


Which of the following function is NOT provided by 'Server Guard' vulnerability detection?


A. Trojan detection

B. weak password detection

C. sensitive data encryption

D. Linux system vulnerability scanning


Answer: C


Question: 8


Reliable server daily operation and security management are essential for continuous service running.

Which of the following statement is NOT correct regarding to this scenario?


A. set easy to remember password to help administrator quickly login and solve problems

B. patch system timely and frequently

C. enable build-in OS firewall and configure it properly

D. disable the ports which are not providing service anymore


Answer: A 


Question: 9


Which of the following statements is the possible reason that might lead to system vulnerabilities?


A. software logic flaw or mistakes made during software development cycle

B. hardware devices are not up to date

C. system administrator didn't follow the operation manual exactly

D. The proprietary software that is safer than open source one should be installed


Answer: A 


Question: 10


Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch

of text files?


A. Watch

B. Find

C. Grep

D. Ca


Answer: C 


No comments:

Post a Comment