Free ACA-Sec1 Exam Braindumps (page: 8)

Page 8 of 37

Which of the following shell command can be used to check disk usage in a Linux OS ECS

  1. Df ­h
  2. Echo
  3. Free ­m
  4. Ps ­e ­o

Answer(s): A



User A rented 2 ECS server and one RDS in Alibaba Cloud to setup his company public website. After the web site will become available online, the security risks he/she will face will include: (the number of correct answers: 3)

  1. physical cable is cut by someone
  2. ECS admin password is hacked
  3. website codes has some vulnerability
  4. RDS DB got unknown remote logon
  5. the disk in ECS is broken

Answer(s): B,C,D



ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by some internet hacker, which of the following consequences such attack could cause? (the number of correct answers: 2)

  1. Physical Server Damage
  2. Leak of customer sensitive data
  3. Service running on this ECS become not available
  4. The datacenter where the ECS belongs to need to shutdown

Answer(s): B,C



Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)

  1. Adding more search request together with the original one
  2. adding an absolute true condition to bypass original request
  3. use incorrect SQL function
  4. use selfmade variable
  5. adding ";" or "--" to change the original request purpose with new request attached

Answer(s): A,B,D



Page 8 of 37



Post your Comments and Discuss Alibaba ACA-Sec1 exam with other Community members:

Rian commented on October 23, 2024
Good night comment
Anonymous
upvote