Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

1D0-571 CIW v5 Security Essentials Questions and Answers

Questions 4

Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?

Options:

A.

The netstat command and a packet sniffer

B.

The ps command and a network scanner

C.

The ping command and User Manager

D.

The iptables command and Windows desktop firewall

Buy Now
Questions 5

A security breach has occurred in which a third party was able to obtain and misuse legitimate authentication information. After investigation, you determined that the specific cause for the breach was that end users have been placing their passwords underneath their keyboards. Which step will best help you resolve this problem?

Options:

A.

Discipline specific end users as object lessons to the rest of the staff and reset passwords on all systems immediately.

B.

Change all passwords on the company servers immediately and inform end users that their passwords will be changing on a regular basis.

C.

Set passwords to expire at specific intervals and establish mandatory continual training sessions.

D.

Inform end users that their passwords will be changing on a regular basis and require more complex passwords.

Buy Now
Questions 6

What is the first tool needed to create a secure networking environment?

Options:

A.

User authentication

B.

Confidentiality

C.

Security policy

D.

Auditing

Buy Now
Questions 7

What is the primary use of hash (one-way) encryption in networking?

Options:

A.

Signing files, for data integrity

B.

Encrypting files, for data confidentiality

C.

Key exchange, for user authentication

D.

User authentication, for non-repudiation

Buy Now
Questions 8

What is the primary drawback of using symmetric-key encryption?

Options:

A.

Key transport across a network

B.

Speed of encryption

C.

Denial-of-service attacks

D.

Inability to support convergence traffic

Buy Now
Questions 9

A new server has been placed on the network. You have been assigned to protect this server using a packet-filtering firewall. To comply with this request, you have enabled the following ruleset:

1D0-571 Question 9

Which choice describes the next step to take now that this ruleset has been enabled?

Options:

A.

From the internal network, use your Web browser to determine whether all internal users can access the Web server.

B.

From the internal network, use your e-mail client to determine whether all internal users can access the e-mail server.

C.

From the external network, use your Web browser to determine whether all external users can access the Web server.

D.

From the external network, use your e-mail client to determine whether all external users can access the e-mail server.

Buy Now
Questions 10

Which of the following details should be included in documentation of an attack?

Options:

A.

An overview of the security policy and suggestions for the next response plan

B.

Estimates of how much the attack cost the company, and a list of the applications used by the attacker

C.

The time and date of the attack, and the names of employees who were contacted during the response

D.

The network resources involved in the attack, and recommendations for thwarting future attacks

Buy Now
Questions 11

Consider the following diagram:

1D0-571 Question 11

Which of the following best describes the protocol activity shown in the diagram, along with the most likely potential threat that accompanies this protocol?

Options:

A.

The ICMP Time Exceeded message, with the threat of a denial-of-service attack

B.

The SIP three-way handshake, with the threat of a buffer overflow

C.

The TCP three-way handshake, with the threat of a man-in-the-middle attack

D.

The DNS name query, with the threat of cache poisoning

Buy Now
Questions 12

You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?

Options:

A.

Installing software updates for the Web server daemon

B.

Using the POST method instead of the GET method for a Web form

C.

Installing an intrusion detection service to monitor logins

D.

Using the GET method instead of the POST method for a Web form

Buy Now
Questions 13

Which of the following is the most likely first step to enable a server to recover from a denial-of-service attack in which all hard disk data is lost?

Options:

A.

Enable virtualization

B.

Contact the backup service

C.

Contact a disk recovery service

D.

Rebuild your RAID 0 array

Buy Now
Questions 14

You have implemented a service on a Linux system that allows a user to read and edit resources. What is the function of this service?

Options:

A.

Authentication

B.

Data integrity

C.

Access control

D.

Intrusion detection

Buy Now
Questions 15

The best way to thwart a dictionary attack is by enforcing a:

Options:

A.

strong password policy.

B.

restricted access policy.

C.

firewall configuration policy.

D.

proxy server policy.

Buy Now
Questions 16

Consider the following image of a packet capture:

1D0-571 Question 161D0-571 Question 16

Which of the following best describes the protocol used, along with its primary benefit?

Options:

A.

It is a passive FTP session, which is easier for firewalls to process.

B.

It is an active FTP session, which is necessary in order to support IPv6.

C.

It is an extended passive FTP session, which is necessary to support IPv6.

D.

It is an active FTP session, which is supported by all FTP clients.

Buy Now
Questions 17

Which of the following activities is the most effective at keeping the actions of nae end users from putting the company ' s physical and logicalWhich of the following activities is the most effective at keeping the actions of na?e end users from putting the company ' s physical and logical resources at risk?

Options:

A.

Configuring network intrusion-detection software to monitor end user activity

B.

Conducting a training session at the time of hire

C.

Reconfiguring the network firewall

D.

Assembling a team of security professionals to monitor the network

Buy Now
Questions 18

Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?

Options:

A.

Enable stateful multi-layer inspection on the packet filter

B.

Implement caching on the network proxy server

C.

Enable authentication on the network proxy server

D.

Implement a screening router on the network DMZ

Buy Now
Exam Code: 1D0-571
Exam Name: CIW v5 Security Essentials
Last Update: Apr 30, 2026
Questions: 62

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now 1D0-571 testing engine

PDF (Q&A)

$43.57  $124.49
buy now 1D0-571 pdf