View Mode
Q: 1
Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)
Options
Q: 2
Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)
Options
Q: 3
In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?
Options
Q: 4
What will the correct stops the traffic will flow through if the user used all following cloud service: WAF, Anti-DDOS pro, CDN.
Options
Q: 5
Which of the following benefit cannot be provided by 'Server Guard'? Score 2
Options
Q: 6
CC customized protection rule supports you to define customized configuration setting. Which of following items can be self-defined? (the number of correct answers: 3)
Options
Q: 7
In Linux OS, if access control to a file is shown as '-rwxrw-r--' in shell command, which of the following statements are true? Score 2
Options
Q: 8
By default, servers in VPC can't communicate with internet. By implementing which of the following products these servers can gain the capability to communicate with internet? (the number of correct answers: 3)
Options
Q: 9
Which of the following logs can be accessed through ECS logs provided by Alibaba Cloud? (the number of correct answers: 2)
Options
Q: 10
For an IP subnet like 192.168.0.0/24, which of the following statements is true?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE