Inspirational journeys

Follow the stories of academics and their research expeditions

Alibaba ACA Cloud Security Practice Questions 2023 - Part 25

Mary Smith

Mon, 20 Apr 2026

Alibaba ACA Cloud Security Practice Questions 2023 - Part 25

1. Which of the following descriptions of the shared responsibilities security model is CORRECT?

A) After beginning to use cloud service, the cloud service provider will become responsible for all of the userâ??s security.
B) After beginning to use cloud service, the user and the cloud service provider will be jointly responsible for cloud security, with each responsible for different layers of security.
C) After beginning to use cloud service, users must still take care of physical and environmental security.
D) After beginning to use cloud service, users only need to pay attention to the security of their own apps and data. All other security will be the responsibility of the cloud service provider.



2. Which of the following options is the top 1 web application security risk based on OWASP 2017 report?

A) XSS Attack
B) Server Information Theft
C) Code Execution
D) SQL Injection



3. Which of the following methods CANNOT increase account security?

A) Strong password policies
B) Periodically reset the user login passwords
C) Adhere to the minimum authorization principle
D) Unite user management, permission management and resource management into a single management process



4. Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web Application Security Risks(Select 2answers)

A) Cross-Site Request Forgery(CSRF)
B) Injection
C) Cross-Site Scripting(XSS)
D) Unvalidated Redirects and Forwards



5. Security risk may caused by 'Cloud platform', 'ISV' or 'End user', which of the following options are the possible risks may caused by Cloud Platform?(Select 3answers)

A) Software development cycel is not formalized
B) Security system overall solutions are not complete
C) Administration tools on Cloud Platform may have some flaws
D) Cloud platform console and API may lack of security hardenning



1. Right Answer: B
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: A,D
Explanation:

5. Right Answer: B,C,D
Explanation:

0 Comments

Leave a comment