Free ACP-Sec1 Exam Braindumps (page: 10)

Page 10 of 21

Content Moderation service is useful m a wide variety of scenarios. Which of the following are the *most* suited to Content Moderation's capabilities? (Number of correct answers 2)

  1. Deleting porn on a social networking site
  2. Detecting spam posts on a forum
  3. Detecting faces in images
  4. Detecting sensitive customer information such as credit card numbers in uploaded images

Answer(s): A,B



More and more blackmail attacks (using hacking tools or ransomware) have been detected among recent network security events, causing ever greater damage and financial loss. Which of the following measures can help Alibaba Cloud customers reduce risks in blackmail attacks? (Number of correct answers 3)

  1. Enable images and snapshots for ECS instances, back up data every day, and keep more than three redundant copies
  2. Deploy different service applications on servers with the same security level and security domain, and ensure unified policy management and defense
  3. Use strong passwords with more than 15 characters for the accounts of all types of cloud services
  4. When remotely operating and maintaining an ECS instance use the superuser account for login at all times
  5. If remote O&M is required use IpsecVPN or SSL VPN remote solutions

Answer(s): A,C,E



A large Internet company has services running on physical machines, as well as self-built monitoring and alert system Recently, the company wants to migrate part of the services to Alibaba Cloud and use CloudMonitor to monitor ECS instances and set alerts

What should the company do to quickly interconnect CloudMonitor alerts with the self-built alert system, and handle both alerts (alerts about the physical machines and ECS instances) in self-built alert system?

  1. Use the Event Monitoring function provided by CloudMonitor to consume alerts sent from self-built alert system
  2. Call the API for querying data provided by CloudMonitor. regularly query data, and write a code to check whether indicators are abnormal
  3. Call the API for obtaining messages and alerts that are sent to self-build alert system
  4. This cannot be implemented.

Answer(s): B



Among various types of network attacks, "phishing" is one of the most common attacks. A phishing website looks exactly the same as the real website It asks visitors to login with their accounts and passwords; at the same time, record these privacy information for illegal purpose. Which of the following statements about how phishing websites are spread is FALSE?

  1. Banks publish phishing website links in prominent positions on their official websites
  2. Phishing website links are sent through Facebook. Twitter and other IM(instant Messenger) applications.
  3. Advertisements are pushed to search engines and small and medium websites, attracting users to click the phishing website links.
  4. Phishing website links are published in batches through emails forums, blogs, and SNS(Social Network Sites).

Answer(s): A



Page 10 of 21



Post your Comments and Discuss Alibaba ACP-Sec1 exam with other Community members:

Smart commented on September 01, 2023
Very good and helpful thank u
Anonymous
upvote