Free ACA-Sec1 Exam Braindumps (page: 13)

Page 12 of 37

Which of the following application vulnerabilities are not as popular as others?

  1. SQL Injection
  2. XSS exploit
  3. File uploading vulnerability
  4. Kernel privilege breaking

Answer(s): D



In the ISO/OSI 7 layers networking model, which of the following functions are provided for the 'network layer'? (the number of correct answers: 2)

  1. Routing
  2. congestion handling
  3. end to end reliable and transparent data transition
  4. physical connection

Answer(s): A,B



Which of the following functions does not belong to what WAF can provide?

  1. DB encryption
  2. SQL injection detection
  3. XSS attack detection
  4. unauthorized resource access blocking

Answer(s): A



Which command in RedHat Linux shell can be used to check disk usage?

  1. ls
  2. df
  3. diskUsage
  4. diskSpace

Answer(s): B






Post your Comments and Discuss Alibaba ACA-Sec1 exam with other Community members:

ACA-Sec1 Discussions & Posts