Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

1D0-571 Exam Dumps - CIW Web Security Associate Questions and Answers

Question # 4

Which tool is best suited for identifying applications and code on a Web server that can lead to a SQL injection attack?

Options:

A.

A vulnerability scanner

B.

A packet sniffer

C.

An intrusion-detection system

D.

A network switch

Buy Now
Question # 5

Consider the following image of a packet capture:

Which of the following best describes the protocol used, along with its primary benefit?

Options:

A.

It is a passive FTP session, which is easier for firewalls to process.

B.

It is an active FTP session, which is necessary in order to support IPv6.

C.

It is an extended passive FTP session, which is necessary to support IPv6.

D.

It is an active FTP session, which is supported by all FTP clients.

Buy Now
Question # 6

A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all. Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?

Options:

A.

Deny all use of UDP above Port 1024.

B.

Configure the firewall to provide VPN access.

C.

Configure a second network connection directly to the video conferencing device.

D.

Allow all use of UDP below Port 1024.

Buy Now
Question # 7

The most popular types of proxy-oriented firewalls operate at which layer of the OSI/RM?

Options:

A.

Application layer

B.

Network layer

C.

Session layer

D.

Transport layer

Buy Now
Question # 8

What is the primary drawback of using symmetric-key encryption?

Options:

A.

Key transport across a network

B.

Speed of encryption

C.

Denial-of-service attacks

D.

Inability to support convergence traffic

Buy Now
Question # 9

You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?

Options:

A.

Firewall

B.

Intrusion-detection system

C.

Camera

D.

Security guard

Buy Now
Question # 10

You are using a PKI solution that is based on Secure Sockets Layer (SSL). Which of the following describes the function of the asymmetric-key-encryption algorithm used?

Options:

A.

It encrypts the symmetric key.

B.

It encrypts all of the data.

C.

It encrypts the hash code used for data integrity.

D.

It encrypts the X.509 key.

Buy Now
Question # 11

Which of the following is the most likely first step to enable a server to recover from a denial-of-service attack in which all hard disk data is lost?

Options:

A.

Enable virtualization

B.

Contact the backup service

C.

Contact a disk recovery service

D.

Rebuild your RAID 0 array

Buy Now
Question # 12

A disgruntled employee has discovered that the company Web server is not protected against a particular buffer overflow vulnerability. The disgruntled employee has created an application to take advantage of this vulnerability and secretly obtain sensitive data from the Web server's hard disk. This application sends a set of packets to the Web server that causes it to present an unauthenticated terminal with root privileges. What is the name for this particular type of attack?

Options:

A.

Man-in-the-middle attack

B.

Trojan

C.

Denial of service

D.

Zero-day attack

Buy Now
Exam Code: 1D0-571
Exam Name: CIW v5 Security Essentials
Last Update: Feb 22, 2025
Questions: 62
1D0-571 pdf

1D0-571 PDF

$25.5  $84.99
1D0-571 Engine

1D0-571 Testing Engine

$28.5  $94.99
1D0-571 PDF + Engine

1D0-571 PDF + Testing Engine

$40.5  $134.99