1. Using RAM, Alibaba Cloud users can create and manage user accounts and control the operation permissions these user accounts possess for resources under your account. Which of the following descriptions of a RAM usage scenario is NOT correct?
A) Temporary authorization management for untrusted client apps B) Prevention of network attacks on enterprises C) Enterprise sub-account management and permission assignment D) Resource operation and authorization management between enterprises
2. Which of the following statements about VLAN are NOT true? (the number of correct answers: 3)(Select 3answers)
A) different VLAN means different physical location of switches B) VLAN configuration can be done through an TCP/IP router device C) VLAN can enhance the network security and data isolation D) users in different VLAN can connect each other directly without pre-configuration
3. Which of the following methods can't be used against CC attack?
A) change HTTP service to HTTPS service B) use WAF C) resolve domain name to a disguised IP D) change the service providing port
4. Alibaba Cloud will provide hot fix to address existing vulnerabilities. Which of the following statements is true about this 'hot fix'?
A) service will not be available during the hot fix B) hot fix means the host need to reach some temperature upper limit to be able to proceed C) hot fix is transparent to end user D) hot fix doesn't need to reboot physical host
5. Which of the following security issues is considered by the OWASP to be the most dangerous issue facing cloud computing?
A) Account or service flow hijacking B) Denial of service C) Multi-tenant isolation failure D) Injection
Leave a comment