Free ACA-Sec1 Exam Braindumps (page: 11)

Page 11 of 37

Which of the following DDoS descriptions are correct?

  1. In order to get admin password
  2. Steal confidential information
  3. Causes the target server unable to process legitimate requests
  4. If the target server has no vulnerabilities, the remote attack may still succeed.

Answer(s): C,D



What design flaw of TCP/IP protocol does SYN flood attack use?

  1. UDP stateless connectio
  2. DNS 3 times hands shake
  3. TCP 3 times hands shake
  4. HTTP plain text transmission

Answer(s): C



Which of following attacks could serve as a CC attack? (the number of correct answers: 3)

  1. SYN flood
  2. ICMP flood
  3. One host simulate many IP addresses
  4. Attack through agent
  5. Zombie network

Answer(s): C,D,E



What of the followings will happen if encounter DoS or DDoS attack?

  1. Data received successfully
  2. Delay of data reception
  3. Slow access web resources
  4. unauthorized access control

Answer(s): B,C



Page 11 of 37



Post your Comments and Discuss Alibaba ACA-Sec1 exam with other Community members:

Rian commented on October 23, 2024
Good night comment
Anonymous
upvote