Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > CIW > Web Security Associate > 1D0-571

1D0-571 CIW v5 Security Essentials Question and Answers

Question # 4

Which of the following is a typical target of a trojan on a Linux system?

A.

Kernel modules

B.

Shared libraries

C.

Boot sector files

D.

System32 DLL files

Full Access
Question # 5

Which of the following is a primary auditing activity?

A.

Encrypting data files

B.

Changing login accounts

C.

Checking log files

D.

Configuring the firewall

Full Access
Question # 6

Which of the following is the most likely first step to enable a server to recover from a denial-of-service attack in which all hard disk data is lost?

A.

Enable virtualization

B.

Contact the backup service

C.

Contact a disk recovery service

D.

Rebuild your RAID 0 array

Full Access
Question # 7

Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?

A.

Firewall

B.

Software update

C.

Intrusion detection system

D.

Network scanner

Full Access
Question # 8

You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?

A.

Installing software updates for the Web server daemon

B.

Using the POST method instead of the GET method for a Web form

C.

Installing an intrusion detection service to monitor logins

D.

Using the GET method instead of the POST method for a Web form

Full Access
Question # 9

What is the primary use of hash (one-way) encryption in networking?

A.

Signing files, for data integrity

B.

Encrypting files, for data confidentiality

C.

Key exchange, for user authentication

D.

User authentication, for non-repudiation

Full Access