Customer who bought ECS server doesn't need to worry about :
Answer : A
Security risk may caused by 'Cloud platform', 'ISV' or 'End user', which of the following options
are the possible risks may caused by Cloud Platform?
Answer : B, C, D
Which of the following shell command can be used to check disk usage in a Linux OS ECS
Answer : A
If your company has a lot of employees who would try to simultaneously access ECS server protected by 'Server Guard' using your company's intranet, the 'Sever Guard' may
mistakenly identify those access requests as attacks. Which of the following methods is the best way to solve this problem? Score 2
Answer : C
What is the correct action sequence of WAF protection strategy: (1) CC detection (2) Web
application attack detection (3) Access control
Score 2
Answer : B
Which command in Redhat Linux shell can be used to check if some specific string is included in a bunch of text files?
Answer : C
Which of the following statements about the supported way of MySQL DB for backup are
true?(the number of correct answers: 2)
Answer : A, B