1. Which of the following options does not belong to 5 key elements of network communication?
A) Encryption Algorism B) Source IP C) Destination IP D) Communication Protocol
2. What design flaw of TCP/IP protocol does SYN flood attack use?
A) UDP stateless connection B) DNS 3 times hands shake C) TCP 3 times hands shake D) HTTP plain text transmission
3. Customer who bought ECS server doesn't need to worry about :
A) Cloud infrastructure security B) OS vulnerability inside ECS C) Web service security inside ECS D) ECS security group setting
4. Using ECS security group can help you achieve:
A) better CPU usage B) fine grained access control to you server C) enlarge your network bandwidth D) apply QOS to a specific IP
5. Which of the following functions can be provided by Alibaba Cloud Server Guard product? (the number of correct answers: 3)(Select 3answers)
A) brute Force password hacking detection and defense B) suspicious remote login detection and warning C) security vulnerability scanning and patching D) anti-ddos E) anti SQL injection
Leave a comment