1. When 'Server Guard' detects remote logon behavior, what information will be shown on 'Server Guard' console?
A) Remote Logon Detected! B) Illegal Logon! C) Migrated Already! D) Logon Successfully!
2. If your company has a lot of employees who would try to simultaneously access ECS server protected by 'Server Guard' using your company's intranet, the 'Sever Guard' may mistakenly identify those access requests as attacks. Which of the following methods is the best way to solve this problem?
A) add those IPs which need to access ECS server into 'Server Guard' logon white list B) set a highly complexed administrator password C) ask employees to access that ECS server not very frequently D) change the rule of security group to unblock all company internal ips
3. By default, servers in VPC can't communicate with internet. By implementing which of the following products these servers can gain the capability to communicate with internet? (the number of correct answers: 3)(Select 2answers)
A) EIP + NAT Gateway B) EIP + SLB C) CDN D) Elastic Public IP E) DNS service
4. Which of following attacks could serve as a CC attack? (the number of correct answers: 3)(Select 3answers)
A) Attack through agent B) SYN flood C) Zombie network D) ICMP flood E) One host simulate many IP addresses
5. Which of the following statements about the supported way of MySQL DB for backup are true? (the number of correct answers: 2)(Select 2answers)
A) you can use 'mysqldump' do logical backup B) you can use 'binlog' to do real time backup C) you can copy files directly to do physical backup D) you must stop accessing to DB before you do logical backup
Leave a comment