Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the CIW Web Security Associate 1D0-571 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 1D0-571 Premium Access

View all detail and faqs for the 1D0-571 exam


832 Students Passed

84% Average Score

91% Same Questions
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following organizations provides regular updates concerning security breaches and issues?

Options:

A.

IETF

B.

ISO

C.

ICANN

D.

CERT

Questions # 12:

Which of the following is considered to be the most secure default firewall policy, yet usually causes the most work from an administrative perspective?

Options:

A.

Configuring the firewall to respond automatically to threats

B.

Blocking all access by default, then allowing only necessary connections

C.

Configuring the firewall to coordinate with the intrusion-detection system

D.

Allowing all access by default, then blocking only suspect network connections

Questions # 13:

Which of the following is a common problem, yet commonly overlooked, in regards to physical security in server rooms?

Options:

A.

Firewalls that do not have a dedicated backup

B.

False ceilings

C.

Logic bombs

D.

Biometric malfunctions

Questions # 14:

You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target. Which of the following will accomplish this goal?

Options:

A.

Reinstall the LDAP service on the server so that it is updated and more secure.

B.

Install an application that creates checksums of the contents on the hard disk.

C.

Create a login script for the administrative account that records logins to a separate server.

D.

Create a dummy administrator account on the system so that a potential hacker is distracted from the real login account.

Questions # 15:

Which of the following is a primary auditing activity?

Options:

A.

Encrypting data files

B.

Changing login accounts

C.

Checking log files

D.

Configuring the firewall

Questions # 16:

You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?

Options:

A.

Firewall

B.

Intrusion-detection system

C.

Camera

D.

Security guard

Questions # 17:

You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month. Which of the following is the most likely explanation for this problem?

Options:

A.

The network scanner needs to be replaced.

B.

The network scanner is no substitute for scans conducted by an individual.

C.

The network scanner has a trojan.

D.

The network scanner needs an update.

Questions # 18:

Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?

Options:

A.

Brute force

B.

Denial of service

C.

Botnet

D.

Buffer overflow

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.