CIW 1D0-571 - CIW v5 Security Essentials Exam

Question #6 (Topic: )
What is the first tool needed to create a secure networking environment?
A. User authentication B. Confidentiality C. Security policy D. Auditing
Answer: C
Question #7 (Topic: )
Irina has contracted with a company to provide Web design consulting services. The
company has asked her to use several large files available via an HTTP server. The IT
department has provided Irina with user name and password, as well as the DNS name of
the HTTP server. She then used this information to obtain the files she needs to complete
her task using Mozilla Firefox. Which of the following is a primary risk factor when
authenticating with a standard HTTP server?
A. HTTP uses cleartext transmission during authentication, which can lead to a man-in-the- middle attack. B. Irina has used the wrong application for this protocol, thus increasing the likelihood of a man-in-the-middle attack. C. A standard HTTP connection uses public-key encryption that is not sufficiently strong, inviting the possibility of a man-in-the-middle attack. D. Irina has accessed the Web server using a non-standard Web browser.
Answer: A
Question #8 (Topic: )
Requests for Web-based resources have become unacceptably slow. You have been
assigned to implement a solution that helps solve this problem. Which of the following
would you recommend?
A. Enable stateful multi-layer inspection on the packet filter B. Implement caching on the network proxy server C. Enable authentication on the network proxy server D. Implement a screening router on the network DMZ
Answer: B
Question #9 (Topic: )
You have discovered that the ls, su and ps commands no longer function as expected.
They do not return information in a manner similar to any other Linux system. Also, the
implementation of Tripwire you have installed on this server is returning new hash values.
Which of the following has most likely occurred?
A. A trojan has attacked the system. B. A SQL injection attack has occurred. C. A spyware application has been installed. D. A root kit has been installed on the system.
Answer: D
Question #10 (Topic: )
Which of the following organizations provides regular updates concerning security
breaches and issues?
A. IETF B. ISO C. ICANN D. CERT
Answer: D
Download Exam
Page: 2 / 13
Total 62 questions