Free ACP-CLOUD1 Exam Braindumps (page: 6)

Page 5 of 45

Many websites have suffered DDoS attacks of different volumes. Therefore, accurate understanding of DDoS attacks is critical to website security protection.
Which of the following statements about DDoS attacks is the MOST accurate?

  1. The purpose of a DDoS attack is to steal confidential information.
  2. The main purpose of a DDoS attack is to prevent the target server from providing normal services.
    Currently, the DDoS attack is one of the strongest and most indefensible website attacks.
  3. A DDoS attacks crack the server's logon password by means of a massive number of attempts.
  4. DDoS attacks primarily target databases.

Answer(s): B

Explanation:

A DDoS attack is a type of cyberattack that aims to exhaust the resources of a target server or network, such as bandwidth, CPU, memory, or disk space, by sending a large amount of malicious traffic or requests. This can cause the server or network to slow down, crash, or become unavailable to legitimate users. A DDoS attack is not intended to steal confidential information, crack passwords, or target databases, although these may be secondary objectives or consequences of some attacks. A DDoS attack is one of the most common and powerful threats to website security, as it can be launched from multiple sources, use various attack methods, and evade traditional defense mechanisms. According to the DDoS Attack Statistics and Trend Report by Alibaba Cloud, the proportion of volumetric attacks at 50Gbps and above has doubled, and the resources exhaustion attack reached a peak value of 3 million QPS in 2020-2021.


Reference:

DDoS Attacks: Sources, Strategies and Practices - Alibaba Cloud, DDoS Attack Statistics and Trend Report by Alibaba Cloud, Use Alibaba Cloud Anti-DDoS Service to Defend DoS Attack, Anti-DDoS Basic - Alibaba Cloud



OSS supports multi-part uploading for large files, namely dividing a large file into multiple parts and uploading them in order. This function is suitable for scenarios such as uploading large files or uploading files with poor connectivity.

After completing all the multi-part uploading tasks, if you forget to invoke the "Complete Multipart Upload" interface, there will be fragment files left in OSS, occupying bucket storage space-To facilitate deleting those files, OSS provides the________function.

  1. OpenAPI batch deletion
  2. Online batch deletion
  3. Bucket clearing
  4. Fragment management

Answer(s): D

Explanation:

OSS provides the fragment management function to help you delete the fragment files left in OSS after you forget to invoke the "Complete Multipart Upload" interface. Fragment management allows you to list, delete, or restore the fragment files in a bucket. You can use the OSS console, OSS SDKs, or OSS APIs to perform fragment management operations. OpenAPI batch deletion, online batch deletion, and bucket clearing are not the functions provided by OSS to delete the fragment files.



Alibaba Cloud ECS provides multiple instance types to meet the needs of different business scenarios. A medium-sized enterprise user wants to use two ECS instances, one to deploy a single Tomcat service and the other one to deploy Memcache.
Which of the following configurations is most recommended?

  1. Tomcat: 4 cores. 8G, Memcache: 2 cores: 16G
  2. Tomcat: 4 cores 8G. Memcache: 2 cores 8G
  3. Tomcat: 4 cores, 4G, Memcache: 2 cores, 8G
  4. Tomcat: 4 cores: 4G, Memcache: 2 cores: 16G

Answer(s): D

Explanation:

According to the Alibaba Cloud ECS documentation1, the recommended instance type for Tomcat is ecs.c5.xlarge, which has 4 vCPUs and 4 GiB of memory. This instance type is suitable for web applications that require high performance and low latency. The recommended instance type for Memcache is ecs.r5.large, which has 2 vCPUs and 16 GiB of memory. This instance type is optimized for memory-intensive applications that require high memory bandwidth and low latency. Therefore, option D is the most recommended configuration for deploying Tomcat and Memcache on two ECS instances.


Reference:

Instance type families and Alibaba Cloud Elastic Compute Service Product Introduction



A company launched its online service just a year ago. It uses five ECS instances and does not have a full-time system administrator Over the last six months, the company's system has encountered various security problems Several high-risk vulnerabilities were exploited by hackers, leading to leakage of the company's confidential dat

  1. Which of the following Alibaba Cloud products can be used to quickly resolve this problem?
  2. Managed Security Service
  3. Cloud Firewall
  4. Anti-DDoS Pro Service
  5. Security Center

Answer(s): D

Explanation:

Security Center is a centralized security management system that dynamically identifies and analyzes security threats, and generates alerts when threats are detected. Security Center provides multiple features to ensure the security of cloud resources and servers in data centers. Security Center can help the company to quickly resolve its security problems by providing the following benefits:

Unified security management: Security Center automatically collects various log data from the company's services on the cloud, and implements control over found security threats. Security Center can also manage assets, attacks, vulnerabilities, and threats in the Security Center console.

Proactive defense: Security Center supports the proactive detection and termination of mainstream ransomware, mining programs, backdoor programs, worms, malicious programs, DDoS trojans, and trojan programs. Security Center also prevents websites from being maliciously implanted with the acts that involve terrorism, politics, dark chains, trojans, and backdoors. This ensures the normal operation of web page information.

Automated security operations: Security Center automatically traces the sources and causes of attacks. This helps the company understand the ins and outs of intrusion threats and make quick responses. Security Center also supports custom alerts and third-party data migration to the cloud in a secure manner.


Reference:

Security Center - Alibaba Cloud, Cloud Security- Alibaba Cloud, Introduction to Security Center - Alibaba Cloud Document Center






Post your Comments and Discuss Alibaba ACP-CLOUD1 exam with other Community members:

ACP-CLOUD1 Discussions & Posts