Free ACP-Sec1 Exam Braindumps

Cloud computing service security requires the joint effort of the cloud service supplier (such as Alibaba Cloud), independent software vendor (ISV), and users The failure of any party to fulfill their responsibilities may lead to security risks. Which of the following are the responsibilities of the cloud computing service users? (Number of correct answers 2)

  1. Ensure multi-channel power supply in the Cloud data center
  2. Provide security protection for physical infrastructure
  3. Regularly change the service system password
  4. Strengthen information security management in the company to prevent sensitive information leakage

Answer(s): C,D



A website is built using open-source software To prevent hacker attacks and fix vulnerabilities in a timely manner, the administrator of the website wants to use the patch management feature in Security Center. Which of the following statements about patch management is FALSE.

  1. Before patches for most common Web vulnerabilities are released, the Alibaba Cloud Security O&M team will have fixed the vulnerabilities using self-developed patches
  2. Rollback of Web vulnerabilities means to restore the original files, while rollback of Windows vulnerabilities means to uninstall the patch upgrade
  3. Patch management can operate machines in batches in the cloud. For large-scale vulnerabilities, it supports one-key patch upgrade, which is easy and convenient
  4. Vulnerabilities are automatically fixed Once a self-developed paten is released, it automatically fixes vulnerabilities for all customers who have enabled patch management.

Answer(s): D



In a public cloud environment Alibaba Cloud is responsible for security of cloud computing infrastructure (such as the IDC environment, physical server O&M, and virtualization layer of cloud products). However, you still need to perform necessary security optimization measures for the Cloud products you purchased Which of the following actions do you think are safe?

  1. To reduce the communication cost, five administrators of the company use the root account to log on to the ECS instance.
  2. After buying an ECS instance, enable the security group firewall for the ECS instance through the console, and only allow a management IP address to remotely log on to the ECS instance.
  3. For easy management, change the administrator password for the ECS instance to 123456.
  4. To enable colleagues working at home to update data, open public IP addresses for ApsaraDB for RDS instances, and allow all IP addresses to connect to the instances

Answer(s): B



To improve ECS instance security, the administrator does not want users on public network to check whether an ECS instance is online using the ping command. Which of the following reinforcement measures designed by the administrator is NOT feasible?

  1. Resolve the IP address of the ECS instance to an uncommon level 4 domain name, and point the promotional domain name to the level 4 domain name through CNAME
  2. Enable a security group and only allow access from ports 80 and 25 of the public network through TCP
  3. Enable a security group, and reject ICMP for public network access.
  4. Enable an operating system firewall for the ECS instance, and reject ICMP for public network access.

Answer(s): A






Post your Comments and Discuss Alibaba ACP-Sec1 exam with other Community members:

Smart commented on September 01, 2023
Very good and helpful thank u
Anonymous
upvote