Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CIW 1D0-571 Dumps

Page: 1 / 2
Total 62 questions

CIW v5 Security Essentials Questions and Answers

Question 1

An application is creating hashes of each file on an attached storage device. Which of the following will typically occur during this process?

Options:

A.

An increase in the amount of time it takes for the system to respond to requests

B.

Reduced risk of an attack

C.

Increased risk of an attack

D.

A reduction in the amount of time it takes for the system to respond to requests

Question 2

The most popular types of proxy-oriented firewalls operate at which layer of the OSI/RM?

Options:

A.

Application layer

B.

Network layer

C.

Session layer

D.

Transport layer

Question 3

A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. Which of the following techniques will best help reduce the severity of this attack?

Options:

A.

Filtering traffic at the firewall

B.

Changing your ISP

C.

Installing Apache Server rather than Microsoft IIS

D.

Placing the database and the Web server on separate systems

Question 4

Consider the following diagram:

Which type of attack is occurring?

Options:

A.

Polymorphic virus-based attack

B.

Denial-of-service attack

C.

Distributed denial-of-service attack

D.

Man-in-the-middle attack using a packet sniffer

Question 5

Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?

Options:

A.

Enable stateful multi-layer inspection on the packet filter

B.

Implement caching on the network proxy server

C.

Enable authentication on the network proxy server

D.

Implement a screening router on the network DMZ

Question 6

Which of the following standards is used for digital certificates?

Options:

A.

DES

B.

Diffie-Hellman

C.

X.509

D.

RC5

Question 7

You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?

Options:

A.

Firewall

B.

Intrusion-detection system

C.

Camera

D.

Security guard

Question 8

Consider the following diagram:

Which of the following best describes the protocol activity shown in the diagram, along with the most likely potential threat that accompanies this protocol?

Options:

A.

The ICMP Time Exceeded message, with the threat of a denial-of-service attack

B.

The SIP three-way handshake, with the threat of a buffer overflow

C.

The TCP three-way handshake, with the threat of a man-in-the-middle attack

D.

The DNS name query, with the threat of cache poisoning

Question 9

Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?

Options:

A.

Firewall

B.

Software update

C.

Intrusion detection system

D.

Network scanner

Page: 1 / 2
Total 62 questions