Leads4pass > CIW > CIW Certification > 1D0-571 > 1D0-571 Online Practice Questions and Answers

1D0-571 Online Practice Questions and Answers

Questions 4

Which of the following is most likely to pose a security threat to a Web server?

A. CGI scripts

B. Database connections

C. Flash or Silverlight animation files

D. LDAP servers

Buy Now
Questions 5

Which of the following organizations provides regular updates concerning security breaches and issues?

A. IETF

B. ISO

C. ICANN

D. CERT

Buy Now
Questions 6

Which of the following is the most likely first step to enable a server to recover from a denial-of- service attack in which all hard disk data is lost?

A. Enable virtualization

B. Contact the backup service

C. Contact a disk recovery service

D. Rebuild your RAID 0 array

Buy Now
Questions 7

Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?

A. Updating the company vulnerability scanner and conducting a new scan

B. Adding a buffer overflow rule to the intrusion detection system

C. Reconfiguring the firewall

D. Installing a system update

Buy Now
Questions 8

Which of the following is a common problem, yet commonly overlooked, in regards to physical security in server rooms?

A. Firewalls that do not have a dedicated backup

B. False ceilings

C. Logic bombs

D. Biometric malfunctions

Buy Now
Questions 9

Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?

A. A vulnerability scanner

B. A packet sniffer

C. An intrusion-detection system

D. A network switch

Buy Now
Questions 10

Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?

A. Thenetstat command and a packet sniffer

B. Theps command and a network scanner

C. The ping command and User Manager

D. Theiptables command and Windows desktop firewall

Buy Now
Questions 11

You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet. Which of the following is a primary concern for this solution?

A. The extra hard disk space required to store the database of checksums

B. The amount of memory remaining now that the checksum-based application is running

C. The possibility of a bufferoverflow attack leading to a security breach

D. The security of the checksum database on a read-only media format

Buy Now
Questions 12

Which of the following activities is the most effective at keeping the actions of nae end users from putting the company's physical and logicalWhich of the following activities is the most effective at keeping the actions of na?e end users from putting the company's physical and logical resources at risk?

A. Configuring network intrusion-detection software to monitor end user activity

B. Conducting a training session at the time of hire

C. Reconfiguring the network firewall

D. Assembling a team of security professionals to monitor the network

Buy Now
Questions 13

Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?

A. Brute force

B. Denial of service

C. Botnet

D. Buffer overflow

Buy Now
Exam Code: 1D0-571
Exam Name: CIW V5 Security Essentials
Last Update: Dec 13, 2024
Questions: 62
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99