Inspirational journeys
Follow the stories of academics and their research expeditions
Alibaba ACA Cloud Security Practice Questions 2023 - Part 8
1. Which of the following functions does not belong to what WAF can provide?
A) DB encryption
B) SQL injection detection
C) XSS attack detection
D) unauthorized resource access blocking
2. After using WAF, if you find there are many user input data in the network traffic, you should apply:
A) Loose protection policy
B) Normal protection policy
C) Strict protection policy
D) Progression protection policy
3. After WAF was purchased, users need to add one DNS record to map their domain name to WAF provided IP. What is the type of that DNS record?
A) A record
B) CNAME Record
C) TXT Record
D) MX Record
4. From which of the following attacks WAF will not provide protection?
A) SYN Flood
B) Web Server vulneraility attack
C) Core files unauthorized access
D) HTTP Flood
5. Which of the following security vulnerability is not a 'Server Side' security issue?
A) SQL injection
B) System Command Execution vulnerability
C) CSRF(cross site request fraud)vulnerability
D) File uploading vulnerability
1. Right Answer: A
Explanation:
2. Right Answer: C
Explanation:
3. Right Answer: B
Explanation:
4. Right Answer: A
Explanation:
5. Right Answer: C
Explanation:
0 Comments
Leave a comment