1. Which of the following issues would not happen if ECS server is under attack by hackers?
A) service running on that server is not available B) sensitive data leak C) compromise the reputation of service provider on that server D) physical server damage
2. Which of the following products won't be a DDOS attack target?
A) router device B) offline backup tape devices C) enterprise major website D) online banking system
3. In Linux OS, if access control to a file is shown as '-rwxrw-r--' in shell command, which of the following statements are true?
A) The access privilege of this user group is read only B) Other users (outside of this user group) can execute this file C) This file is a text file D) The owner of this file has read/write/execution privilege to this file
4. In the Alibaba Cloud, which services can satisfy client user identity management requirements?
A) Security group B) Server Guard C) Situational awareness D) Resource Access Management (RAM)
5. Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation permissions these user accounts possess for resources under your account. Which of the following descriptions of a RAM usage scenario is NOT correct?
A) Temporary authorization management for untrusted client apps B) Prevention of network attacks on enterprises C) Enterprise sub-account management and permission assignment D) Resource operation and authorization management between enterprises
Leave a comment