Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CIW v5 Security Essentials

Last Update 3 hours ago Total Questions : 62

The CIW v5 Security Essentials content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include 1D0-571 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 1D0-571 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 1D0-571 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CIW v5 Security Essentials practice test comfortably within the allotted time.

Question # 4

What is the primary strength of symmetric-key encryption?

A.

It allows easy and secure exchange of the secret key.

B.

It creates a ash?of a text, enabling data integrity.It creates a ?ash?of a text, enabling data integrity.

C.

It can encrypt large amounts of data very quickly.

D.

It provides non-repudiation services more efficiently than asymmetric-key encryption.

Question # 5

At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?

A.

Determining the number of security associations

B.

Negotiating the authentication method

C.

Determining the network identification number

D.

Negotiating the version of IP to be used

Question # 6

You have implemented a version of the Kerberos protocol for your network. What service does Kerberos primarily offer?

A.

Authentication

B.

Encryption

C.

Non-repudiation

D.

Data integrity

Question # 7

A CGI application on the company ' s Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information. Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?

A.

- Buffer overflow

- Work with the Web developer to solve the problem

B.

- SQL injection

- Work with a database administrator to solve the problem

C.

- Denial of service

- Contact the organization that wrote the code for the Web server

D.

- Man-in-the-middle attack

- Contact the company auditor

Question # 8

Which of the following can help you authoritatively trace a network flooding attack?

A.

Your ISP

B.

Firewall logs

C.

Router logs

D.

Ping

Question # 9

Which of the following is most likely to pose a security threat to a Web server?

A.

CGI scripts

B.

Database connections

C.

Flash or Silverlight animation files

D.

LDAP servers

Question # 10

You are creating an information security policy for your company. Which of the following activities will help you focus on creating policies for the most important resources?

A.

Auditing the firewall

B.

Implementing non-repudiation

C.

Logging users

D.

Classifying systems

Go to page: