Alibaba ACP-CLOUD1 Exam
ACP Cloud Computing Certification (Page 9 )

Updated On: 1-Feb-2026

SQL injection is a common attack on the application layer. It builds special input as a parameter to pass into a web application to steal or destroy the application dat

  1. Which of the following is the target that SQL injection eventually destroys or steals from?
  2. Web applications
  3. Redis database
  4. Confidential files on the server
  5. Pictures on the server

Answer(s): A

Explanation:

SQL injection attacks primarily target databases by exploiting vulnerabilities in web applications. Attackers manipulate SQL queries to gain unauthorized access to the application's backend database, which may lead to data leakage or destruction. Although SQL injection affects the data stored in databases and not directly files or images on the server, the primary target remains the application layer through which the attack is conducted.


Reference:

Alibaba Cloud SQL Injection Prevention



You have set an alert policy for the disk usage of an ECS instance by using Alibaba Cloud CloudMonitor. Each measurement cycle lasts for 5 minutes, during which the average disk usage is measured. If the average disk usage exceeds 80% for five consecutive measurement cycles, an alert will be reported. After your average disk usage exceeds 80%, how long will it take to receive an alert?

  1. 0 minutes
  2. 30 minutes
  3. 40 minutes
  4. 20 minutes

Answer(s): B

Explanation:

With a measurement cycle of 5 minutes and a requirement for five consecutive cycles where disk confirm the condition. After confirmation, CloudMonitor typically processes and sends the alert, which may take an additional 5 minutes, totaling approximately 30 minutes before you receive the alert.


Reference:

Alibaba Cloud CloudMonitor Alert Documentation



Alibaba Cloud will check source IP addresses that connect to ApsaraDB for RDS through the public internet.
When Alibaba Cloud Situation Awareness detects an alert reporting "a seldom-used IP address connecting to the database," which of the following is the safest way to handle this alert?

  1. This alert does not matter and can be ignored
  2. Log on to Alibaba Cloud console, modify the IP address whitelist for authorized access to RDS, and retain the IP addresses that need to connect to RDS
  3. Modify the security group policies for ECS instances, and allow only specified IP addresses to connect to the server
  4. Log on to RDS console, and view the SQL audit logs to check whether any destructive operation has been performed. If no, you do not need to handle the alert

Answer(s): B

Explanation:

The safest response to a seldom-used IP alert connecting to ApsaraDB for RDS is to adjust the IP whitelist to allow only trusted IP addresses. By limiting the IP addresses in the whitelist, unauthorized or unfamiliar IP addresses cannot access the database. This approach provides direct control over access to RDS and minimizes potential security risks. Checking SQL audit logs (as suggested in option D) is useful but not sufficient on its own for a comprehensive security response.


Reference:

Alibaba Cloud RDS Security Best Practices



An enterprise uses a public cloud service to lease several virtual machines and places these virtual machines in an isolated virtual network. They have full control over their virtual network, including choosing their IP address range, specifying the CIDR block, configuring the routing table, and gateway, etc.

In Alibaba Cloud, the _____________ can work as described above.

  1. SDN service
  2. NFV service
  3. VPC service
  4. VPN service

Answer(s): C

Explanation:

In Alibaba Cloud, a Virtual Private Cloud (VPC) provides isolated virtual networking environments where users can configure their own IP address ranges, CIDR blocks, routing tables, gateways, and other network elements. This functionality is critical for users who require an isolated, customizable network environment for their virtual machines in the public cloud. SDN (Software-Defined Networking) and NFV (Network Functions Virtualization) are underlying technologies, while VPN offers secure connectivity but not full virtual network management.


Reference:

Alibaba Cloud VPC Documentation



When adopting cloud computing and taking advantage of its convenience, you will also face challenges in information security.

Using cloud computing does not increase security risks, but your active engagement is still a must.
Which of the following is not included in the security principles recommended by Alibaba Cloud?

  1. Users have the same security management responsibility
  2. Users should keep the same data attribution
  3. Users have the same security management standards
  4. Users should keep the same O&M methods

Answer(s): D

Explanation:

In cloud environments, Alibaba Cloud emphasizes that security responsibilities, data ownership (data attribution), and security standards remain with the user. However, O&M (Operations and Maintenance) methods often change due to the distinct management tools, automated processes, and distributed nature of cloud infrastructure. Cloud environments typically use different O&M approaches, so option D is not aligned with Alibaba Cloud's security principles.


Reference:

Alibaba Cloud Security Best Practices



Viewing page 9 of 37
Viewing questions 41 - 45 out of 176 questions



Post your Comments and Discuss Alibaba ACP-CLOUD1 exam prep with other Community members:

Join the ACP-CLOUD1 Discussion