Which of the following statements about HTTP protocol are true?(the number of correct
answers: 2
What status transition flow a TCP client will go through in order to proactively establish connection and disconnect it?
Which of the following options does not belong to 5 key elements of network
communication?
Which of the following statements about WAF data risk control feature is NOT true?
Which of the following 2 security risks are not included in OWASP published 2017 Top 10 Web
Application Security Risks
In Linux OS, if you want to set a file access privilege to read, write, and execute for the
owner only, what octal number will reflect such settings correctly?
Score 2
Which protocol is a 'data link' layer protocol in ISO/OSI 7 layer network model?
Score 2
Which of the following Keys in HTTP heads are related to cache control? (the number of correct answers: 3)
Which of the following cloud services are the most common ones when we talk about different
types of Cloud service
If Server Guard (product provided by Alibaba Cloud) report some brute force password
hacking attacks, the reporting information will include? (the number of correct answers: 3)
Alibaba Cloud offers different security protection plans to different tenant accounts. Which of the
following is NOT a security plan offered by Alibaba Cloud?
After WAF was purchased, users need to add one DNS record to map their domain name to WAF provided IP. What is the type of that DNS record?
Which of the following logs can be accessed through ECS logs provided by Alibaba Cloud?
(the number of correct answers: 2)
Which of the following options can be considered as Data and Application security risks in IT
infrastructure