Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

1D0-571 CIW v5 Security Essentials Questions and Answers

Questions 4

Which of the following is a primary auditing activity?

Options:

A.

Encrypting data files

B.

Changing login accounts

C.

Checking log files

D.

Configuring the firewall

Buy Now
Questions 5

Which of the following is the primary weakness of symmetric-key encryption?

Options:

A.

Data encrypted using symmetric-key encryption is subject to corruption during transport.

B.

Symmetric-key encryption operates slower than asymmetric-key encryption.

C.

Symmetric-key encryption does not provide the service of data confidentiality.

D.

Keys created using symmetric-key encryption are difficult to distribute securely.

Buy Now
Questions 6

Consider the following diagram:

Which type of attack is occurring?

Options:

A.

Polymorphic virus-based attack

B.

Denial-of-service attack

C.

Distributed denial-of-service attack

D.

Man-in-the-middle attack using a packet sniffer

Buy Now
Questions 7

Which of the following is a primary weakness of asymmetric-key encryption?

Options:

A.

It is slow because it requires extensive calculations by the computer.

B.

It can lead to the corruption of encrypted data during network transfer.

C.

It is reliant on the Secure Sockets Layer (SSL) standard, which has been compromised.

D.

It is difficult to transfer any portion of an asymmetric key securely.

Buy Now
Questions 8

Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. Which of the following is a primary risk factor when authenticating with a standard HTTP server?

Options:

A.

HTTP uses cleartext transmission during authentication, which can lead to a man-in-the-middle attack.

B.

Irina has used the wrong application for this protocol, thus increasing the likelihood of a man-in-the-middle attack.

C.

A standard HTTP connection uses public-key encryption that is not sufficiently strong, inviting the possibility of a man-in-the-middle attack.

D.

Irina has accessed the Web server using a non-standard Web browser.

Buy Now
Questions 9

Which of the following describes the practice of stateful multi-layer inspection?

Options:

A.

Using a VLAN on a firewall to enable masquerading of private IP addresses

B.

Prioritizing voice and video data to reduce congestion

C.

Inspecting packets in all layers of the OSI/RM with a packet filter

D.

Using Quality of Service (QoS) on a proxy-oriented firewall

Buy Now
Exam Code: 1D0-571
Exam Name: CIW v5 Security Essentials
Last Update: Nov 21, 2024
Questions: 62
1D0-571 pdf

1D0-571 PDF

$28  $80
1D0-571 Engine

1D0-571 Testing Engine

$33.25  $95
1D0-571 PDF + Engine

1D0-571 PDF + Testing Engine

$45.5  $130