Pass4itsure > CIW > CIW Certification > 1D0-571 > 1D0-571 Online Practice Questions and Answers

1D0-571 Online Practice Questions and Answers

Questions 4

Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?

A. Enablestateful multi-layer inspection on the packet filter

B. Implement caching on the network proxy server

C. Enable authentication on the network proxy server

D. Implement a screening router on the network DMZ

Buy Now
Questions 5

Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?

A. Updating the company vulnerability scanner and conducting a new scan

B. Adding a buffer overflow rule to the intrusion detection system

C. Reconfiguring the firewall

D. Installing a system update

Buy Now
Questions 6

Which of the following standards is used for digital certificates?

A. DES

B. Diffie-Hellman

C. X.509

D. RC5

Buy Now
Questions 7

You are using a PKI solution that is based on Secure Sockets Layer (SSL). Which of the following describes the function of the asymmetric-key-encryption algorithm used?

A. It encrypts the symmetric key.

B. It encrypts all of the data.

C. It encrypts the hash code used for data integrity.

D. It encrypts the X.509 key.

Buy Now
Questions 8

A security breach has occurred involving the company e-commerce server. Customer credit card data has been released to unauthorized third parties. Which of the following lists the appropriate parties to inform?

A. Shareholders, law enforcement agencies and company employees

B. Affected customers, credit card companies and law enforcement agencies

C. The Internet Service Provider, ICANN and company shareholders

D. External securityconsultants, company board members and affected customers

Buy Now
Questions 9

Which of the following errors most commonly occurs when responding to a security breach?

A. Shutting down network access using the firewall, rather than the network router

B. Adhering to the company policy rather than determining actions based on the IT manager's input

C. Making snap judgments based on emotions, as opposed to company policy

D. Taking too much time to document the attack

Buy Now
Questions 10

You have implemented a service on a Linux system that allows a user to read and edit resources. What is the function of this service?

A. Authentication

B. Data integrity

C. Access control

D. Intrusion detection

Buy Now
Questions 11

Which of the following can help you authoritatively trace a network flooding attack?

A. Your ISP

B. Firewall logs

C. Router logs

D. Ping

Buy Now
Questions 12

Consider the following image: From the information in this image, what type of attack is occurring?

A. A man-in-the-middle attack

B. A brute-force attack

C. A connection-hijacking attack

D. A spoofingattackD.A spoofing attack

Buy Now
Questions 13

Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?

A. Brute force

B. Denial of service

C. Botnet

D. Buffer overflow

Buy Now
Exam Code: 1D0-571
Exam Name: CIW V5 Security Essentials
Last Update: Mar 19, 2024
Questions: 62
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99