Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CIW v5 Security Essentials

Last Update 4 hours ago Total Questions : 62

The CIW v5 Security Essentials content is now fully updated, with all current exam questions added 4 hours ago. Deciding to include 1D0-571 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 1D0-571 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 1D0-571 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CIW v5 Security Essentials practice test comfortably within the allotted time.

Question # 11

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?

A.

Authentication databases, including directory servers

B.

Intrusion detection systems, especially those placed on sensitive networks

C.

Log files on firewall systems

D.

Firewall settings for desktop systems

Question # 12

You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target. Which of the following will accomplish this goal?

A.

Reinstall the LDAP service on the server so that it is updated and more secure.

B.

Install an application that creates checksums of the contents on the hard disk.

C.

Create a login script for the administrative account that records logins to a separate server.

D.

Create a dummy administrator account on the system so that a potential hacker is distracted from the real login account.

Question # 13

Consider the following diagram:

Which type of attack is occurring?

A.

Polymorphic virus-based attack

B.

Denial-of-service attack

C.

Distributed denial-of-service attack

D.

Man-in-the-middle attack using a packet sniffer

Question # 14

Consider the following diagram involving two firewall-protected networks:

Which of the following is necessary for each of the firewalls to allow private IP addresses to be passed on to the Internet?

A.

Chargeback

B.

Stateful multi-layer inspection

C.

Masquerading

D.

DMZ creation

Question # 15

Which of the following organizations provides regular updates concerning security breaches and issues?

A.

IETF

B.

ISO

C.

ICANN

D.

CERT

Question # 16

A disgruntled employee has discovered that the company Web server is not protected against a particular buffer overflow vulnerability. The disgruntled employee has created an application to take advantage of this vulnerability and secretly obtain sensitive data from the Web server ' s hard disk. This application sends a set of packets to the Web server that causes it to present an unauthenticated terminal with root privileges. What is the name for this particular type of attack?

A.

Man-in-the-middle attack

B.

Trojan

C.

Denial of service

D.

Zero-day attack

Question # 17

Which of the following details should be included in documentation of an attack?

A.

An overview of the security policy and suggestions for the next response plan

B.

Estimates of how much the attack cost the company, and a list of the applications used by the attacker

C.

The time and date of the attack, and the names of employees who were contacted during the response

D.

The network resources involved in the attack, and recommendations for thwarting future attacks

Question # 18

You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?

A.

Installing software updates for the Web server daemon

B.

Using the POST method instead of the GET method for a Web form

C.

Installing an intrusion detection service to monitor logins

D.

Using the GET method instead of the POST method for a Web form

Go to page: