Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CIW v5 Security Essentials Question and Answers

CIW v5 Security Essentials

Last Update May 15, 2024
Total Questions : 62

We are offering FREE 1D0-571 CIW exam questions. All you do is to just go and sign up. Give your details, prepare 1D0-571 free exam questions and then go for complete pool of CIW v5 Security Essentials test questions that will help you more.

1D0-571 pdf

1D0-571 PDF

$35  $99.99
1D0-571 Engine

1D0-571 Testing Engine

$42  $119.99
1D0-571 PDF + Engine

1D0-571 PDF + Testing Engine

$56  $159.99
Questions 1

Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?

Options:

A.  

Firewall

B.  

Software update

C.  

Intrusion detection system

D.  

Network scanner

Discussion 0
Questions 2

You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a network. Which form of encryption should you use?

Options:

A.  

Asymmetric

B.  

PGP

C.  

Hash

D.  

Symmetric

Discussion 0
Questions 3

The best way to thwart a dictionary attack is by enforcing a:

Options:

A.  

strong password policy.

B.  

restricted access policy.

C.  

firewall configuration policy.

D.  

proxy server policy.

Discussion 0
Questions 4

You have implemented a version of the Kerberos protocol for your network. What service does Kerberos primarily offer?

Options:

A.  

Authentication

B.  

Encryption

C.  

Non-repudiation

D.  

Data integrity

Discussion 0
Questions 5

You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?

Options:

A.  

Firewall

B.  

Intrusion-detection system

C.  

Camera

D.  

Security guard

Discussion 0
Questions 6

A security breach has occurred in which a third party was able to obtain and misuse legitimate authentication information. After investigation, you determined that the specific cause for the breach was that end users have been placing their passwords underneath their keyboards. Which step will best help you resolve this problem?

Options:

A.  

Discipline specific end users as object lessons to the rest of the staff and reset passwords on all systems immediately.

B.  

Change all passwords on the company servers immediately and inform end users that their passwords will be changing on a regular basis.

C.  

Set passwords to expire at specific intervals and establish mandatory continual training sessions.

D.  

Inform end users that their passwords will be changing on a regular basis and require more complex passwords.

Discussion 0
Questions 7

An application is creating hashes of each file on an attached storage device. Which of the following will typically occur during this process?

Options:

A.  

An increase in the amount of time it takes for the system to respond to requests

B.  

Reduced risk of an attack

C.  

Increased risk of an attack

D.  

A reduction in the amount of time it takes for the system to respond to requests

Discussion 0
Questions 8

A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all. Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?

Options:

A.  

Deny all use of UDP above Port 1024.

B.  

Configure the firewall to provide VPN access.

C.  

Configure a second network connection directly to the video conferencing device.

D.  

Allow all use of UDP below Port 1024.

Discussion 0
Questions 9

A CGI application on the company's Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information. Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?

Options:

A.  

- Buffer overflow

- Work with the Web developer to solve the problem

B.  

- SQL injection

- Work with a database administrator to solve the problem

C.  

- Denial of service

- Contact the organization that wrote the code for the Web server

D.  

- Man-in-the-middle attack

- Contact the company auditor

Discussion 0