Down to date 1D0-571 Exam Study Guides With New Update Exam Questions
Master the 1D0-571 CIW v5 Security Essentials content and be ready for exam day success quickly with this Ucertify 1D0-571 practice test. We guarantee it!We make it a reality and give you real 1D0-571 questions in our CIW 1D0-571 braindumps.Latest 100% VALID CIW 1D0-571 Exam Questions Dumps at below page. You can use our CIW 1D0-571 braindumps and pass your exam.
Q11. You have determined that an attack is currently underway on your database server. An attacker is currently logged in, modifying data. You want to preserve logs, caching and other data on this affected server. Which of the following actions will best allow you to stop the attack and still preserve data?
A. Pull the server network cable
B. Shut down the server
C. Back up the system logs
D. Force an instant password reset
Q12. You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network. Which term best describes this device?
A. Screening router
B. Bastion host
C. Proxy server
D. Choke router
Q13. Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?
A. Brute force
B. Denial of service
D. Buffer overflow
Q14. Which of the following standards is used for digital certificates?
Q15. Which of the following is a typical target of a trojan on a Linux system?
A. Kernel modules
B. Shared libraries
C. Boot sector files
D. System32 DLL files
Q16. You have implemented a service on a Linux system that allows a user to read and edit resources.
What is the function of this service?
B. Data integrity
C. Access control
D. Intrusion detection
Q17. A security breach has occurred involving the company e-commerce server. Customer credit card data has been released to unauthorized third parties. Which of the following lists the appropriate parties to inform?
A. Shareholders, law enforcement agencies and company employees
B. Affected customers, credit card companies and law enforcement agencies
C. The Internet Service Provider, ICANN and company shareholders
D. External securityconsultants, company board members and affected customers
Q18. Which of the following is the primary weakness of symmetric-key encryption?
A. Data encrypted using symmetric-key encryption is subject to corruption during transport.
B. Symmetric-key encryption operates slower than asymmetric-key encryption.
C. Symmetric-key encryption does not provide the service of data confidentiality.
D. Keys created using symmetric-key encryption are difficult to distribute securely.
Q19. Which of the following is a primary weakness of asymmetric-key encryption?
A. It is slow because it requires extensive calculations by the computer.
B. It can lead to the corruption of encrypted data during network transfer.
C. It is reliant on the Secure Sockets Layer (SSL) standard, which has been compromised.
D. It is difficult to transfer any portion of an asymmetric key securely.
Q20. An application is creating hashes of each file on an attached storage device. Which of the following will typically occur during this process?
A. An increase in the amount of time it takes for the system to respond to requests
B. Reduced risk of an attack
C. Increased risk of an attack
D. A reduction in the amount of time it takes for the system to respond to requests