Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CIW 1D0-571 CIW v5 Security Essentials Exam Practice Test

Page: 1 / 6
Total 62 questions

CIW v5 Security Essentials Questions and Answers

Question 1

Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?

Options:

A.

Brute force

B.

Denial of service

C.

Botnet

D.

Buffer overflow

Question 2

Which of the following describes the practice of stateful multi-layer inspection?

Options:

A.

Using a VLAN on a firewall to enable masquerading of private IP addresses

B.

Prioritizing voice and video data to reduce congestion

C.

Inspecting packets in all layers of the OSI/RM with a packet filter

D.

Using Quality of Service (QoS) on a proxy-oriented firewall

Question 3

Which of the following activities is the most effective at keeping the actions of nae end users from putting the company's physical and logicalWhich of the following activities is the most effective at keeping the actions of na?e end users from putting the company's physical and logical resources at risk?

Options:

A.

Configuring network intrusion-detection software to monitor end user activity

B.

Conducting a training session at the time of hire

C.

Reconfiguring the network firewall

D.

Assembling a team of security professionals to monitor the network

Question 4

Which of the following is a typical target of a trojan on a Linux system?

Options:

A.

Kernel modules

B.

Shared libraries

C.

Boot sector files

D.

System32 DLL files

Question 5

You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target. Which of the following will accomplish this goal?

Options:

A.

Reinstall the LDAP service on the server so that it is updated and more secure.

B.

Install an application that creates checksums of the contents on the hard disk.

C.

Create a login script for the administrative account that records logins to a separate server.

D.

Create a dummy administrator account on the system so that a potential hacker is distracted from the real login account.

Question 6

Which of the following is the primary weakness of symmetric-key encryption?

Options:

A.

Data encrypted using symmetric-key encryption is subject to corruption during transport.

B.

Symmetric-key encryption operates slower than asymmetric-key encryption.

C.

Symmetric-key encryption does not provide the service of data confidentiality.

D.

Keys created using symmetric-key encryption are difficult to distribute securely.

Question 7

Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?

Options:

A.

The netstat command and a packet sniffer

B.

The ps command and a network scanner

C.

The ping command and User Manager

D.

The iptables command and Windows desktop firewall

Question 8

Which of the following is a primary weakness of asymmetric-key encryption?

Options:

A.

It is slow because it requires extensive calculations by the computer.

B.

It can lead to the corruption of encrypted data during network transfer.

C.

It is reliant on the Secure Sockets Layer (SSL) standard, which has been compromised.

D.

It is difficult to transfer any portion of an asymmetric key securely.

Question 9

Which of the following is the most likely first step to enable a server to recover from a denial-of-service attack in which all hard disk data is lost?

Options:

A.

Enable virtualization

B.

Contact the backup service

C.

Contact a disk recovery service

D.

Rebuild your RAID 0 array

Page: 1 / 6
Total 62 questions