Free ACP-CLOUD1 Exam Braindumps (page: 24)

Page 24 of 45

SQL injection is a common attack on the application layer. It builds special input as a parameter to pass into a web application to steal or destroy the application dat

  1. Which of the following is the target that SQL injection eventually destroys or steals from?
  2. Web applications
  3. Redis database
  4. Confidential files on the server
  5. Pictures on the server

Answer(s): A

Explanation:

SQL injection attacks primarily target databases by exploiting vulnerabilities in web applications. Attackers manipulate SQL queries to gain unauthorized access to the application's backend database, which may lead to data leakage or destruction. Although SQL injection affects the data stored in databases and not directly files or images on the server, the primary target remains the application layer through which the attack is conducted.


Reference:

Alibaba Cloud SQL Injection Prevention



You have set an alert policy for the disk usage of an ECS instance by using Alibaba Cloud CloudMonitor. Each measurement cycle lasts for 5 minutes, during which the average disk usage is measured. If the average disk usage exceeds 80% for five consecutive measurement cycles, an alert will be reported. After your average disk usage exceeds 80%, how long will it take to receive an alert?

  1. 0 minutes
  2. 30 minutes
  3. 40 minutes
  4. 20 minutes

Answer(s): B

Explanation:

With a measurement cycle of 5 minutes and a requirement for five consecutive cycles where disk confirm the condition. After confirmation, CloudMonitor typically processes and sends the alert, which may take an additional 5 minutes, totaling approximately 30 minutes before you receive the alert.


Reference:

Alibaba Cloud CloudMonitor Alert Documentation



Alibaba Cloud will check source IP addresses that connect to ApsaraDB for RDS through the public internet.
When Alibaba Cloud Situation Awareness detects an alert reporting "a seldom-used IP address connecting to the database," which of the following is the safest way to handle this alert?

  1. This alert does not matter and can be ignored
  2. Log on to Alibaba Cloud console, modify the IP address whitelist for authorized access to RDS, and retain the IP addresses that need to connect to RDS
  3. Modify the security group policies for ECS instances, and allow only specified IP addresses to connect to the server
  4. Log on to RDS console, and view the SQL audit logs to check whether any destructive operation has been performed. If no, you do not need to handle the alert

Answer(s): B

Explanation:

The safest response to a seldom-used IP alert connecting to ApsaraDB for RDS is to adjust the IP whitelist to allow only trusted IP addresses. By limiting the IP addresses in the whitelist, unauthorized or unfamiliar IP addresses cannot access the database. This approach provides direct control over access to RDS and minimizes potential security risks. Checking SQL audit logs (as suggested in option D) is useful but not sufficient on its own for a comprehensive security response.


Reference:

Alibaba Cloud RDS Security Best Practices



An enterprise uses a public cloud service to lease several virtual machines and places these virtual machines in an isolated virtual network. They have full control over their virtual network, including choosing their IP address range, specifying the CIDR block, configuring the routing table, and gateway, etc.

In Alibaba Cloud, the _____________ can work as described above.

  1. SDN service
  2. NFV service
  3. VPC service
  4. VPN service

Answer(s): C

Explanation:

In Alibaba Cloud, a Virtual Private Cloud (VPC) provides isolated virtual networking environments where users can configure their own IP address ranges, CIDR blocks, routing tables, gateways, and other network elements. This functionality is critical for users who require an isolated, customizable network environment for their virtual machines in the public cloud. SDN (Software-Defined Networking) and NFV (Network Functions Virtualization) are underlying technologies, while VPN offers secure connectivity but not full virtual network management.


Reference:

Alibaba Cloud VPC Documentation



Page 24 of 45



Post your Comments and Discuss Alibaba ACP-CLOUD1 exam with other Community members:

Mr.Linh commented on June 16, 2024
Thank for exam
Anonymous
upvote

DANIEL SHEWAREGA BEYEN commented on March 22, 2024
Gteat cloud engines
Anonymous
upvote

anomymous commented on March 20, 2024
userfull material
INDONESIA
upvote

Emmanuel commented on February 18, 2024
the previous exam and the updated one are both exactly the same, how does it work that you guys say updated yet its the same copy?????????? and what is reffreed to the 132 questions when you can only access 70, what exactly is goijg on here? i would like my refund, as i have downloaded the same exam twice
Anonymous
upvote

Ko Htet commented on October 17, 2023
thanks for your support.
Anonymous
upvote

Tai commented on August 28, 2023
wonderful material
SOUTH AFRICA
upvote

Ko Htet commented on October 17, 2023
thanks for your support.
Anonymous
upvote

zzz_sleep commented on September 26, 2023
nice question
Anonymous
upvote

Tai commented on August 28, 2023
Wonderful material
SOUTH AFRICA
upvote

Nasir khan commented on August 21, 2023
Some answers are not correct.
Anonymous
upvote