Independence Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CIW 1D0-571 CIW v5 Security Essentials Exam Practice Test

Demo: 9 questions
Total 62 questions

CIW v5 Security Essentials Questions and Answers

Question 1

Which of the following is the primary weakness of symmetric-key encryption?

Options:

A.

Data encrypted using symmetric-key encryption is subject to corruption during transport.

B.

Symmetric-key encryption operates slower than asymmetric-key encryption.

C.

Symmetric-key encryption does not provide the service of data confidentiality.

D.

Keys created using symmetric-key encryption are difficult to distribute securely.

Question 2

Which of the following is considered to be the most secure default firewall policy, yet usually causes the most work from an administrative perspective?

Options:

A.

Configuring the firewall to respond automatically to threats

B.

Blocking all access by default, then allowing only necessary connections

C.

Configuring the firewall to coordinate with the intrusion-detection system

D.

Allowing all access by default, then blocking only suspect network connections

Question 3

The best way to thwart a dictionary attack is by enforcing a:

Options:

A.

strong password policy.

B.

restricted access policy.

C.

firewall configuration policy.

D.

proxy server policy.

Question 4

You have determined that an attack is currently underway on your database server. An attacker is currently logged in, modifying data. You want to preserve logs, caching and other data on this affected server. Which of the following actions will best allow you to stop the attack and still preserve data?

Options:

A.

Pull the server network cable

B.

Shut down the server

C.

Back up the system logs

D.

Force an instant password reset

Question 5

A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all. Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?

Options:

A.

Deny all use of UDP above Port 1024.

B.

Configure the firewall to provide VPN access.

C.

Configure a second network connection directly to the video conferencing device.

D.

Allow all use of UDP below Port 1024.

Question 6

What is the first tool needed to create a secure networking environment?

Options:

A.

User authentication

B.

Confidentiality

C.

Security policy

D.

Auditing

Question 7

The most popular types of proxy-oriented firewalls operate at which layer of the OSI/RM?

Options:

A.

Application layer

B.

Network layer

C.

Session layer

D.

Transport layer

Question 8

Consider the following image of a packet capture:

Which of the following best describes the protocol used, along with its primary benefit?

Options:

A.

It is a passive FTP session, which is easier for firewalls to process.

B.

It is an active FTP session, which is necessary in order to support IPv6.

C.

It is an extended passive FTP session, which is necessary to support IPv6.

D.

It is an active FTP session, which is supported by all FTP clients.

Question 9

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?

Options:

A.

Authentication databases, including directory servers

B.

Intrusion detection systems, especially those placed on sensitive networks

C.

Log files on firewall systems

D.

Firewall settings for desktop systems

Demo: 9 questions
Total 62 questions