Alibaba ACA-Sec1 Exam
ACA Cloud Security Certification Exam (Page 3 )

Updated On: 26-Jan-2026

Which command in Windows OS can be used to open a terminal?

  1. Painter.exe
  2. Cmd.exe
  3. Batch.exe
  4. Term.exe

Answer(s): B



Which of the following statements about cloud security shared responsibilities model are true? (the number of correct answers: 2)

  1. for users who is using IAAS service, they should be responsible for their business system
    which is on top of cloud infrastructure
  2. cloud service provider should guarantee the security of all physical infrastructure
  3. the damage caused by attacks leveraging security vulnerability in customers' application server should be charged to cloud service provider
  4. cloud user should also take care of some of the hardware maintenance and operation work

Answer(s): A,B



Which of the following protocol is dedicated for time sync up? Score 2

  1. HTTP
  2. ICMP
  3. NTP
  4. UDP

Answer(s): C



When we talk about 'security vulnerability' of ECS server, we are referring to: (the number of correct answers: 3)

  1. OS vulnerability
  2. Hardware fault
  3. Application Vulnerability
  4. Hypervisor Vulnerability
  5. Data Center Serviceability

Answer(s): A,C,D



In Linux OS, if you want to set a file access privilege to read, write, and execute for the
owner only, what octal number will reflect such settings correctly?

  1. 755
  2. 700
  3. 777
  4. 766

Answer(s): B



Viewing page 3 of 31
Viewing questions 11 - 15 out of 147 questions



Post your Comments and Discuss Alibaba ACA-Sec1 exam prep with other Community members:

Join the ACA-Sec1 Discussion