1. The Alibaba Cloud WAF protection strategy provides the following: (the number of correct answers: 3)(Select 3answers)
A) Strict B) Early Warning C) Normal D) Regular E) Loose
2. What modes Alibaba Cloud WAF will provide to defend SQL injection? (the number of correct answers: 2)(Select 2answers)
A) Restriction Mode B) Normal Mode C) Warning Mode D) Protection Mode
3. If user is using anti-DDOS Pro service, but the original server has rule to limit access to the client IPs, which of the following actions is the most proper one to take?
A) disable original server firewall B) add anti-DDOS pro IP into customer firewall white list C) enable CDN and change anti-DDOS pro IP to CDN address D) enable SLB for original server
4. Which of the following statements are true for how to login to different ECS operating system? (the number of correct answers: 2)(Select 2answers)
A) use 'remote desktop connection' for Linux B) use 'ssh' tool for Linux C) use 'remote desktop connection' for windows D) use 'ssh' tool for windows
5. In Linux OS, if you want to set a file access privilege to read, write, and execute for the owner only, what octal number will reflect such settings correctly?
Leave a comment