Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

1D0-571 Sample Questions Answers

Questions 4

Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?

Options:

A.

The netstat command and a packet sniffer

B.

The ps command and a network scanner

C.

The ping command and User Manager

D.

The iptables command and Windows desktop firewall

Buy Now
Questions 5

Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?

Options:

A.

Enable stateful multi-layer inspection on the packet filter

B.

Implement caching on the network proxy server

C.

Enable authentication on the network proxy server

D.

Implement a screening router on the network DMZ

Buy Now
Questions 6

Consider the following image of a packet capture:

Which of the following best describes the protocol used, along with its primary benefit?

Options:

A.

It is a passive FTP session, which is easier for firewalls to process.

B.

It is an active FTP session, which is necessary in order to support IPv6.

C.

It is an extended passive FTP session, which is necessary to support IPv6.

D.

It is an active FTP session, which is supported by all FTP clients.

Buy Now
Questions 7

Which of the following details should be included in documentation of an attack?

Options:

A.

An overview of the security policy and suggestions for the next response plan

B.

Estimates of how much the attack cost the company, and a list of the applications used by the attacker

C.

The time and date of the attack, and the names of employees who were contacted during the response

D.

The network resources involved in the attack, and recommendations for thwarting future attacks

Buy Now
Questions 8

Which of the following is most likely to pose a security threat to a Web server?

Options:

A.

CGI scripts

B.

Database connections

C.

Flash or Silverlight animation files

D.

LDAP servers

Buy Now
Questions 9

Which of the following is a typical target of a trojan on a Linux system?

Options:

A.

Kernel modules

B.

Shared libraries

C.

Boot sector files

D.

System32 DLL files

Buy Now
Questions 10

You have discovered that the ls, su and ps commands no longer function as expected. They do not return information in a manner similar to any other Linux system. Also, the implementation of Tripwire you have installed on this server is returning new hash values. Which of the following has most likely occurred?

Options:

A.

A trojan has attacked the system.

B.

A SQL injection attack has occurred.

C.

A spyware application has been installed.

D.

A root kit has been installed on the system.

Buy Now
Questions 11

You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target. Which of the following will accomplish this goal?

Options:

A.

Reinstall the LDAP service on the server so that it is updated and more secure.

B.

Install an application that creates checksums of the contents on the hard disk.

C.

Create a login script for the administrative account that records logins to a separate server.

D.

Create a dummy administrator account on the system so that a potential hacker is distracted from the real login account.

Buy Now
Questions 12

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?

Options:

A.

Authentication databases, including directory servers

B.

Intrusion detection systems, especially those placed on sensitive networks

C.

Log files on firewall systems

D.

Firewall settings for desktop systems

Buy Now
Questions 13

The most popular types of proxy-oriented firewalls operate at which layer of the OSI/RM?

Options:

A.

Application layer

B.

Network layer

C.

Session layer

D.

Transport layer

Buy Now
Questions 14

Consider the following image:

From the information in this image, what type of attack is occurring?

Options:

A.

A man-in-the-middle attack

B.

A brute-force attack

C.

A connection-hijacking attackC.A connection-hijacking attack

D.

A spoofing attackD.A spoofing attack

Buy Now
Questions 15

Which of the following describes the practice of stateful multi-layer inspection?

Options:

A.

Using a VLAN on a firewall to enable masquerading of private IP addresses

B.

Prioritizing voice and video data to reduce congestion

C.

Inspecting packets in all layers of the OSI/RM with a packet filter

D.

Using Quality of Service (QoS) on a proxy-oriented firewall

Buy Now
Questions 16

A CGI application on the company's Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information. Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?

Options:

A.

- Buffer overflow

- Work with the Web developer to solve the problem

B.

- SQL injection

- Work with a database administrator to solve the problem

C.

- Denial of service

- Contact the organization that wrote the code for the Web server

D.

- Man-in-the-middle attack

- Contact the company auditor

Buy Now
Questions 17

Which of the following is the primary weakness of symmetric-key encryption?

Options:

A.

Data encrypted using symmetric-key encryption is subject to corruption during transport.

B.

Symmetric-key encryption operates slower than asymmetric-key encryption.

C.

Symmetric-key encryption does not provide the service of data confidentiality.

D.

Keys created using symmetric-key encryption are difficult to distribute securely.

Buy Now
Questions 18

Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?

Options:

A.

Brute force

B.

Denial of service

C.

Botnet

D.

Buffer overflow

Buy Now
Exam Code: 1D0-571
Exam Name: CIW v5 Security Essentials
Last Update: Nov 20, 2024
Questions: 62
$64  $159.99
$48  $119.99
$40  $99.99
buy now 1D0-571