Which of these options contains the three basic target categories for a DoS or a DDoS?
Which of the following Keys in HTTP heads are related to cache control? (the number of correct answers: 3)
Which of the following statements about IPV6 and IPV4 are true?(the number of correct
answers: 2)
ECS cloud server is one of the service provided by Alibaba Cloud. If it is attacked by
some internet hacker, which of the following consequences such attack could cause? (the
number of correct answers: 2)
Which of the following HTTP status code does reflect that the requested page does not exist?
Which of the following cloud services are the most common ones when we talk about different
types of Cloud service
A DoS attack that sends a flood of synchronization (SYN) requests and never sends the final
acknowledgement (ACK) is typically known as which of the following?
In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the
attacker manipulate?
In a regular server maintenance operation, the purpose of installing a patch on the operating system is?
Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?
Which of the following protocol can be considered as 'application' layer protocol in ISO/OSI 7 layer model?
If your company has a lot of employees who would try to simultaneously access ECS server protected by 'Server Guard' using your company's intranet, the 'Sever Guard' may
mistakenly identify those access requests as attacks. Which of the following methods is the best way to solve this problem? Score 2
Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation
permissions these user accounts possess for resources under your account. Which of the following
descriptions of a RAM usage scenario is NOT correct?
If WAF service user updated web page content after turning on website tampering protection, what does user need to do on WAF console?
. In the ISO/OSI 7 layers networking model, which of the following functions are provided for
the 'network layer'? (the number of correct answers: 2)
Inside cloud, hypervisor vulnerability could cause the following possible consequences: (the
number of correct answers: 3)
Each host connecting to internet will face the potential attacks from internet as follows : ( the numbers of correct answers : 3)
Which of the following can be termed as the Denial of Service Attack? Choose the best answer.
What modes Alibaba Cloud WAF will provide to defend SQL injection? (the number of
correct answers: 2)
Score 1
What of the followings will happen if encounter DoS or DDoS attack?
Which of the following methods can't be used against CC attack?
Which of the following statements is true about classic network and VPC?