CIW v5 Security Essentials v6.0 (1D0-571)

Page:    1 / 5   
Total 68 questions

Consider the following image of a packet capture:
This packet capture has recorded two types of attacks. Which choice lists both attack types?

  • A. A dictionary attack and a worm-based attackA.A dictionary attack and a worm-based attack
  • B. A syn flood attack and a spoofing attackB.A syn flood attack and a spoofing attack
  • C. A worm attack and a botnet attack C.A worm attack and a botnet attack
  • D. A SQL injection attack and a virus attackD.A SQL injection attack and a virus attack


Answer : B

Which of the following is a primary auditing activity?

  • A. Encrypting data files
  • B. Changing login accounts
  • C. Checking log files
  • D. Configuring the firewall


Answer : C

You have determined that an attack is currently underway on your database server. An attacker is currently logged in, modifying data. You want to preserve logs, caching and other data on this affected server. Which of the following actions will best allow you to stop the attack and still preserve data?

  • A. Pull the server network cable
  • B. Shut down the server
  • C. Back up the system logs
  • D. Force an instant password reset


Answer : A

Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?

  • A. The netstat command and a packet sniffer
  • B. The ps command and a network scanner
  • C. The ping command and User Manager
  • D. The iptables command and Windows desktop firewall


Answer : A

You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet.
Which of the following is a primary concern for this solution?

  • A. The extra hard disk space required to store the database of checksums
  • B. The amount of memory remaining now that the checksum-based application is running
  • C. The possibility of a buffer overflow attack leading to a security breach
  • D. The security of the checksum database on a read-only media format


Answer : D

Which of the following activities is the most effective at keeping the actions of nae end users from putting the company's physical and logicalWhich of the following activities is the most effective at keeping the actions of na?e end users from putting the company's physical and logical resources at risk?

  • A. Configuring network intrusion-detection software to monitor end user activity
  • B. Conducting a training session at the time of hire
  • C. Reconfiguring the network firewall
  • D. Assembling a team of security professionals to monitor the network


Answer : B

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?

  • A. Authentication databases, including directory servers
  • B. Intrusion detection systems, especially those placed on sensitive networks
  • C. Log files on firewall systems
  • D. Firewall settings for desktop systems


Answer : A

Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?

  • A. Brute force
  • B. Denial of service
  • C. Botnet
  • D. Buffer overflow


Answer : A

Consider the following diagram:
Which type of attack is occurring?

  • A. Polymorphic virus-based attack
  • B. Denial-of-service attack
  • C. Distributed denial-of-service attack
  • D. Man-in-the-middle attack using a packet sniffer


Answer : C

Which of the following is a primary weakness of asymmetric-key encryption?

  • A. It is slow because it requires extensive calculations by the computer.
  • B. It can lead to the corruption of encrypted data during network transfer.
  • C. It is reliant on the Secure Sockets Layer (SSL) standard, which has been compromised.
  • D. It is difficult to transfer any portion of an asymmetric key securely.


Answer : A

Consider the following diagram involving two firewall-protected networks:
Which of the following is necessary for each of the firewalls to allow private IP addresses to be passed on to the Internet?

  • A. Chargeback
  • B. Stateful multi-layer inspection
  • C. Masquerading
  • D. DMZ creation


Answer : C

What is the primary strength of symmetric-key encryption?

  • A. It allows easy and secure exchange of the secret key.
  • B. It creates a ash?of a text, enabling data integrity.It creates a ?ash?of a text, enabling data integrity.
  • C. It can encrypt large amounts of data very quickly.
  • D. It provides non-repudiation services more efficiently than asymmetric-key encryption.


Answer : C

You have been assigned to provide security measures for your office's reception area.
Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?

  • A. Firewall
  • B. Intrusion-detection system
  • C. Camera
  • D. Security guard


Answer : C

Consider the following image of a packet capture:
Which of the following best describes the protocol used, along with its primary benefit?

  • A. It is a passive FTP session, which is easier for firewalls to process.
  • B. It is an active FTP session, which is necessary in order to support IPv6.
  • C. It is an extended passive FTP session, which is necessary to support IPv6.
  • D. It is an active FTP session, which is supported by all FTP clients.


Answer : A

At what layer of the OSI/RM does a packet filter operate?

  • A. Layer 1
  • B. Layer 3
  • C. Layer 5
  • D. Layer 7


Answer : B

Page:    1 / 5   
Total 68 questions