Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

1D0-571 CIW v5 Security Essentials Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CIW 1D0-571 CIW v5 Security Essentials certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 62 questions

You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?

A.

Firewall

B.

Intrusion-detection system

C.

Camera

D.

Security guard

What is the primary use of hash (one-way) encryption in networking?

A.

Signing files, for data integrity

B.

Encrypting files, for data confidentiality

C.

Key exchange, for user authentication

D.

User authentication, for non-repudiation

Which of the following can help you authoritatively trace a network flooding attack?

A.

Your ISP

B.

Firewall logs

C.

Router logs

D.

Ping

Which of the following is the primary weakness of symmetric-key encryption?

A.

Data encrypted using symmetric-key encryption is subject to corruption during transport.

B.

Symmetric-key encryption operates slower than asymmetric-key encryption.

C.

Symmetric-key encryption does not provide the service of data confidentiality.

D.

Keys created using symmetric-key encryption are difficult to distribute securely.

You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?

A.

Installing software updates for the Web server daemon

B.

Using the POST method instead of the GET method for a Web form

C.

Installing an intrusion detection service to monitor logins

D.

Using the GET method instead of the POST method for a Web form

A security breach has occurred involving the company e-commerce server. Customer credit card data has been released to unauthorized third parties. Which of the following lists the appropriate parties to inform?

A.

Shareholders, law enforcement agencies and company employees

B.

Affected customers, credit card companies and law enforcement agencies

C.

The Internet Service Provider, ICANN and company shareholders

D.

External security consultants, company board members and affected customers

Which of the following errors most commonly occurs when responding to a security breach?

A.

Shutting down network access using the firewall, rather than the network router

B.

Adhering to the company policy rather than determining actions based on the IT manager's input

C.

Making snap judgments based on emotions, as opposed to company policy

D.

Taking too much time to document the attack

You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet. Which of the following is a primary concern for this solution?

A.

The extra hard disk space required to store the database of checksums

B.

The amount of memory remaining now that the checksum-based application is running

C.

The possibility of a buffer overflow attack leading to a security breach

D.

The security of the checksum database on a read-only media format

Which of the following is a primary auditing activity?

A.

Encrypting data files

B.

Changing login accounts

C.

Checking log files

D.

Configuring the firewall

Consider the following diagram:

Which type of attack is occurring?

A.

Polymorphic virus-based attack

B.

Denial-of-service attack

C.

Distributed denial-of-service attack

D.

Man-in-the-middle attack using a packet sniffer

What is the primary strength of symmetric-key encryption?

A.

It allows easy and secure exchange of the secret key.

B.

It creates a ash?of a text, enabling data integrity.It creates a ?ash?of a text, enabling data integrity.

C.

It can encrypt large amounts of data very quickly.

D.

It provides non-repudiation services more efficiently than asymmetric-key encryption.

You have implemented a version of the Kerberos protocol for your network. What service does Kerberos primarily offer?

A.

Authentication

B.

Encryption

C.

Non-repudiation

D.

Data integrity

At what layer of the OSI/RM does a packet filter operate?

A.

Layer 1

B.

Layer 3

C.

Layer 5

D.

Layer 7

A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. Which of the following techniques will best help reduce the severity of this attack?

A.

Filtering traffic at the firewall

B.

Changing your ISP

C.

Installing Apache Server rather than Microsoft IIS

D.

Placing the database and the Web server on separate systems

Which of the following is most likely to pose a security threat to a Web server?

A.

CGI scripts

B.

Database connections

C.

Flash or Silverlight animation files

D.

LDAP servers

You are creating an information security policy for your company. Which of the following activities will help you focus on creating policies for the most important resources?

A.

Auditing the firewall

B.

Implementing non-repudiation

C.

Logging users

D.

Classifying systems

Consider the following image of a packet capture:

Which of the following best describes the protocol used, along with its primary benefit?

A.

It is a passive FTP session, which is easier for firewalls to process.

B.

It is an active FTP session, which is necessary in order to support IPv6.

C.

It is an extended passive FTP session, which is necessary to support IPv6.

D.

It is an active FTP session, which is supported by all FTP clients.

You want to create a certificate for use in a Secure Sockets Layer (SSL) session. Which of the following is responsible for verifying the identity of an individual and also issuing the certificate?

A.

Kerberos server

B.

Certificate authority

C.

Certificate revocation entity

D.

Certificate repository

Page: 1 / 1
Total 62 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved