Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Alibaba Cloud Language Service Center

Technical Editing Test

Technical Editing Test


Basic information:
This test assumes that you have a basic understanding of technical writing and the pitfalls that are associated
with it. The test also assumes that you possess an understanding of creating content for global audiences,
and content that can be easily localized further down the road.
The final text will be evaluated on four major components:
 Accuracy (technical and lingual)
 Clarity
 Comprehensibility
 Translatability
Aside from the four major components, the test also evaluates the following skills:
 Critical thinking
 Technical knowledge
 Independent research and study
 Attention to detail
 Logical thought process
 Social awareness
The test is based on a typical Alibaba Cloud may also contain false and misleading information to try to throw
you off. Good luck.
Directions:
1. As a technical editor, your job is to not just edit for technical and lingual accuracy, but also to point out
issues present in the text that may require the author to re-write or re-verify certain sections. Place
yourself in the shoes of an editor who has been handed a newly translated piece of text. Your job is to
clean-up and improve the text, as well as educate the translator on the issues present in the text.
2. Use the Track Changes and Comments function provided by Microsoft Word to complete this test.
3. If you make a change, use the Comments function to write a short and clear explanation of why the
change was made.
a. You can use the Comments function to provide comparisons between the meaning of the text
before and after editing.
b. You can use the Comments to explain your thought process or to draw attention to
something you think does not make sense in the test.
4. If you feel that it is necessary to switch sentences around to improve the logic or meaning of the text,
you are welcome to do so. However, you are allowed to switch only adjacent sentences.
5. You are allowed to use any resource that is available on the Internet.
6. No style guide is provided for this test. However, you are allowed to reference the style on this page.
7. You are supposed to edit both article 1 and article 2.

Alibaba Cloud Confidential Information


Alibaba Cloud Language Service Center
Technical Editing Test

Company:
Date:

Article 1
What is Alibaba Cloud WAF?
Alibaba Cloud WAF is a web application firewall that monitors, filters, and blocks HTTP traffic to and from
web applications. Based on the big data capacity of Alibaba Cloud Security, Alibaba Cloud WAF helps
you to defend against common web attacks such as SQL injections, Cross-site scripting (XSS), web
shell, Trojan, and unauthorized access, and to filter out massive HTTP flood requests. It protects your
web resources from being exposed and guarantees your website security and availability.

Alibaba Cloud WAF is easy to deploy. Users can enable WAF protection for their website by subscribing
to Alibaba Cloud WAF, configuring the website on the WAF console, and updating the website's DNS
records using the WAF. When WAF is deployed on your website, all network traffic to the website is
inspected by WAF. WAF identifies and filters out hacker traffic, and only returns valid traffic to the origin
server.

How to fix WAF blackholes?


What is a blackhole
When Web Application Firewall (WAF) suffers a heavy-traffic DDoS attack that is beyond the free-
protection capability of Anti-DDoS Basic, WAF is thrown into a blackhole.

After a WAF IP address is thrown into the blackhole, all traffic that flows through WAF (normal access or
attack) is blocked. During the blackhole period, you cannot access any domain names protected by the
WAF instance.

Note If a site is thrown into a blackhole, it can be recovered only after the blackhole period ends. The
default blackhole period lasts 150 minutes. The WAF blackhole threshold is the same as the default
threshold of the region where the ECS instance is located.

How to avoid a blackhole


By default, each WAF instance allocates an exclusive IP address to you. Once this WAF IP address is
thrown into the black hole, none of the domain names protected by this WAF instance can be accessed
during the black hole period. To avoid this, you can purchase an additional exclusive IP address for an
important domain name. In this case, this important domain name is not affected by other domain names
under DDoS attacks.

Note The best solution to traffic-heavy DDoS attacks is to use Anti-DDoS Pro to protect your domain
names.

Alibaba Cloud Confidential Information


Alibaba Cloud Language Service Center
Technical Editing Test

WAF blackhole FAQ


My WAF is thrown into a blackhole. Can you recover it immediately?

The blackhole is a service that Alibaba Cloud purchases from the operator who imposes strict
restrictions on the time and frequency to trigger a blackhole. Therefore, you cannot manually
deactivate the blackhole, rather you have to patiently wait for the system to automatically free the
server.

In fact, even if the blackhole is deactivated immediately, it gets triggered again if WAF is still under
heavy-traffic DDoS attack.

How do I know the specific domain name that is under attack when WAF is configured with
multiple domain names?

Generally, the hacker resolves a WAF protected domain name to obtain the WAF instance’s IP
address, and then starts the DDoS attack against this IP address. Heavy-traffic DDoS attacks are
targeting at a WAF IP address. We cannot figure out the domain name that is under attack, based
on the traffic.

However, you can use the domain name split method to find out the domain name that is under
attack. For example, you can resolve some of the domain names to WAF, and the rest to some other
places (ECS origin, CDN, or SLB). If the WAF is no longer in the blackhole, it means that the
hacker’s target lies in the domain names that are resolved to other places. However, this operation
is relatively complex and may expose the origin and other assets, which may lead to a greater
security issue. Unless necessary, do not use this method to find the domain name that is under
attack.

Can you help change the WAF IP address so that my WAF is not thrown into the blackhole?

Changing the WAF IP address does not resolve the problem. A hacker can obtain your new IP
address by pinging your domain name and can start another DDoS attack. So, changing your IP
address will not be of much help.

Is there any difference between a DDoS attack and an HTTP flood attack? Why cannot WAF
defend against HTTP flood attacks?

Heavy-traffic DDoS attacks are layer 4 attacks against IP addresses; while HTTP flood attacks are
layer 7 attacks (for example, HTTP GET/POST Flood). Layer 4 attacks generate huge amounts of
volumes of traffic occupy all "inlets" to an end-resource, blocking normal requests. Layer 7 attacks
send large amounts of packets and requests to the victim, which consumes resources of
intermediate resources.

Alibaba Cloud Confidential Information


Alibaba Cloud Language Service Center
Technical Editing Test

WAF can defend against DDoS attacks. However, WAF cannot defend against , it requires sufficient
bandwidth resources to take over all traffic to perform the traffic cleaning. Therefore, you can only count
on protection from Anti-DDoS Pro.

Alibaba Cloud Confidential Information


Alibaba Cloud Language Service Center
Technical Editing Test

Article 2
Apply the screen protector using a self-control jig to ensure it is applied properly without bubbles.
Sharpen a Mitsubishi pencil to expose a 5 mm cylindrical lead, and rub it on a 400-grit sandpaper before
installing it on a purpose-built pencil hardness tester. Slide the pencil forward for about 5 mm at a
constant speed. Do the same in three different positions. Remove the traces with an eraser, and check if
the hardened layer on the surface of the screen protector is damaged.

The optical sensor is hidden at the center on the top of the screen, and the infrared sensor is between
the front dual cameras. Do not stain the above sensor areas or use a screen protector with low light
transmittance. If you apply a self-purchased screen protector to your phone and the phone prompts that
the infrared sensor is blocked or the screen does not wake up for incoming calls, you need to cut the
screen protector to expose the sensor areas.

Alibaba Cloud Confidential Information

You might also like