Certbus > CIW > CIW Certification > 1D0-571 > 1D0-571 Online Practice Questions and Answers

1D0-571 Online Practice Questions and Answers

Questions 4

A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. Which of the following techniques will best help reduce the severity of this attack?

A. Filtering traffic at the firewall

B. Changing your ISP

C. Installing Apache Server rather than Microsoft IIS

D. Placing the database and the Web server on separate systems

Browse 62 Q&As
Questions 5

Which of the following organizations provides regular updates concerning security breaches and issues?

A. IETF

B. ISO

C. ICANN

D. CERT

Browse 62 Q&As
Questions 6

The most popular types of proxy-oriented firewalls operate at which layer of the OSI/RM?

A. Application layer B. Network layer

C. Session layer

D. Transport layer

Browse 62 Q&As
Questions 7

The best way to thwart a dictionary attack is by enforcing a:

A. strong password policy.

B. restricted access policy.

C. firewall configuration policy.

D. proxy server policy.

Browse 62 Q&As
Questions 8

Which algorithm can use a 128-bit key, and has been adopted as a standard by various governments and corporations?

A. MARS

B. RC2

C. Advanced Encryption Standard (AES)

D. International Data Encryption Algorithm (IDEA)

Browse 62 Q&As
Questions 9

Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?

A. A vulnerability scanner

B. A packet sniffer

C. An intrusion-detection system

D. A network switch

Browse 62 Q&As
Questions 10

Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?

A. Thenetstat command and a packet sniffer

B. Theps command and a network scanner

C. The ping command and User Manager

D. Theiptables command and Windows desktop firewall

Browse 62 Q&As
Questions 11

Consider the following diagram:

Which of the following best describes the protocol activity shown in the diagram, along with the most likely potential threat that accompanies this protocol?

A. The ICMP Time Exceeded message, with the threat of a denial-of-service attack

B. The SIP three-way handshake, with the threat of a buffer overflow

C. The TCP three-way handshake, with the threat of a man-in-the-middle attack

D. The DNS name query, with the threat of cache poisoning

Browse 62 Q&As
Exam Code: 1D0-571
Exam Name: CIW V5 Security Essentials
Last Update: Apr 28, 2024
Questions: 62 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99