You have helped a customer set up a content filtering solution based on Content Moderation service However, the customer is complaining that certain images are getting incorrectly flagged as pornographic content. What can you do to help fix this?
A. Create an "Image Library" from the Content Moderation console and add the images to the Image Library's whitelist
B. Ask your customer to use different images on their site
C. Modify the images until Content Moderation service starts marking them as pornographic.
D. Open a ticket with Alibaba Cloud support, and send them a copy of the images, so that they can tune Content Moderation's detection algorithms
Alibaba Cloud Security Center can record source IP addresses that remotely access a server, and shield
suspicious IP addresses that frequently connect to the server. During routine OandM.
Which of the following functions can be used to set the IP address that are commonly used by the system
administrator'?
A. Security group
B. Valid Login IP list
C. Frequent logon location management
D. Webshell detection
Alibaba Cloud WAF currently supports web security protection for HTTP and HTTPS. Which of the following ports are usually used for HTTP and HTTPS protocols? (Number of correct answers: 2)
A. 80
B. 443
C. 22
D. 21
Alibaba Cloud Data Risk Control utilizes Alibaba Group's Big Data computing capabilities and industry-leading, risk decision making engine to address fraud threats in key service processes (such as account log on, online activity, payment) and avoid financial loss.
Which of the following is NOT an application scenario of Data Risk Control?
A. Account registration
B. Application installation
C. Goods payment
D. Transaction rating
After you install the Alibaba Cloud Security center agent on a non with your Alibaba Cloud account*?
A. The user name and password
B. Your AccessKey
C. Your account ID
D. The installation verification key generated on the console
In which of the following scenarios is Alibaba Cloud Security Center applicable? (Number of correct answers 3)
A. Setting up web server to provide web service to public
B. Penetration testing
C. Creating an ECS with generic software
D. Batch server security OandM
E. Network security protection for ad campaigns or other activities
When a Layer-4 forwarding rule is configured with multiple origin site IP addresses, Alibaba Cloud Anti-ODoS Premium Service will perform load balancing for Layer-4 requests using balancing algorithm.
A. True
B. False
Anti-DDoS is one of the major products of Alibaba Cloud Security service Many websites have suffered DDoS attacks of different types. Therefore, accurate understanding of DDoS attacks is critical to the website security protection. Which of the following statements about DDoS attacks is the MOST accurate?
A. The main purpose of a DDoS attack is to prevent the target server from providing normal services
B. A DDoS attack cracks the servers logon password by means of numerous attempts
C. The purpose of a DDoS attack is to steal confidential information
D. DDoS attacks primarily target a database
When importing key material into Key Management Service (KMS), you will be given an import token and
public encryption key valid for 24 hours. The public key KMS provides must be used to encrypt your key
material before upload KMS allows you to choose different public key encryption algorithms.
Which ones are supported? (Number of correct answers; 3)
A. RSAES_OAEP_SHA_1
B. RSAES_ECDHE_V1 _5
C. RSAES_OAEP_SHA_256
D. RSAES PKCS1 V1 5
What are some of the products that support integration with Alibaba Cloud's SSL Certificates Service? (Number of correct answers: 3)
A. ApsaraDB for RDS
B. Content Distribution Network (CDN)
C. Secure Content Distribution Network (SCDN)
D. Server Load Balancer (SLB)