Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

1D0-571 CIW v5 Security Essentials Questions and Answers

Questions 4

You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network. Which term best describes this device?

Options:

A.

Screening router

B.

Bastion host

C.

Proxy server

D.

Choke router

Buy Now
Questions 5

Which of the following is a primary auditing activity?

Options:

A.

Encrypting data files

B.

Changing login accounts

C.

Checking log files

D.

Configuring the firewall

Buy Now
Questions 6

Consider the following image of a packet capture:

This packet capture has recorded two types of attacks. Which choice lists both attack types?

Options:

A.

A dictionary attack and a worm-based attackA.A dictionary attack and a worm-based attack

B.

A syn flood attack and a spoofing attackB.A syn flood attack and a spoofing attack

C.

A worm attack and a botnet attack C.A worm attack and a botnet attack

D.

A SQL injection attack and a virus attackD.A SQL injection attack and a virus attack

Buy Now
Questions 7

You have discovered that the ls, su and ps commands no longer function as expected. They do not return information in a manner similar to any other Linux system. Also, the implementation of Tripwire you have installed on this server is returning new hash values. Which of the following has most likely occurred?

Options:

A.

A trojan has attacked the system.

B.

A SQL injection attack has occurred.

C.

A spyware application has been installed.

D.

A root kit has been installed on the system.

Buy Now
Questions 8

You are creating an information security policy for your company. Which of the following activities will help you focus on creating policies for the most important resources?

Options:

A.

Auditing the firewall

B.

Implementing non-repudiation

C.

Logging users

D.

Classifying systems

Buy Now
Questions 9

Which of the following is the primary weakness of symmetric-key encryption?

Options:

A.

Data encrypted using symmetric-key encryption is subject to corruption during transport.

B.

Symmetric-key encryption operates slower than asymmetric-key encryption.

C.

Symmetric-key encryption does not provide the service of data confidentiality.

D.

Keys created using symmetric-key encryption are difficult to distribute securely.

Buy Now
Exam Code: 1D0-571
Exam Name: CIW v5 Security Essentials
Last Update: May 17, 2024
Questions: 62

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80