Download CIW v5 Security Essentials.1D0-571.PracticeTest.2018-11-23.35q.vcex

Vendor: CIW
Exam Code: 1D0-571
Exam Name: CIW v5 Security Essentials
Date: Nov 23, 2018
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
What is the first tool needed to create a secure networking environment?
  1. User authentication
  2. Confidentiality
  3. Security policy
  4. Auditing
Correct answer: C
Question 2
Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. Which of the following is a primary risk factor when authenticating with a standard HTTP server?
  1. HTTP uses cleartext transmission during authentication, which can lead to a man-in-the-middle attack.
  2. Irina has used the wrong application for this protocol, thus increasing the likelihood of a man-in-the-middle attack.
  3. A standard HTTP connection uses public-key encryption that is not sufficiently strong, inviting the possibility of a man-in-the-middle attack.
  4. Irina has accessed the Web server using a non-standard Web browser.
Correct answer: A
Question 3
Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?
  1. Enable stateful multi-layer inspection on the packet filter
  2. Implement caching on the network proxy server
  3. Enable authentication on the network proxy server
  4. Implement a screening router on the network DMZ
Correct answer: B
Question 4
Which of the following organizations provides regular updates concerning security breaches and issues?
  1. IETF
  2. ISO
  3. ICANN
  4. CERT
Correct answer: D
Question 5
You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a network. Which form of encryption should you use?
  1. Asymmetric
  2. PGP
  3. Hash
  4. Symmetric
Correct answer: D
Question 6
Which of the following is the most likely first step to enable a server to recover from a denial-of-service attack in which all hard disk data is lost?
  1. Enable virtualization
  2. Contact the backup service
  3. Contact a disk recovery service
  4. Rebuild your RAID 0 array
Correct answer: B
Question 7
You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month. Which of the following is the most likely explanation for this problem?
  1. The network scanner needs to be replaced.
  2. The network scanner is no substitute for scans conducted by an individual.
  3. The network scanner has a trojan.
  4. The network scanner needs an update.
Correct answer: D
Question 8
What is the primary use of hash (one-way) encryption in networking?
  1. Signing files, for data integrity
  2. Encrypting files, for data confidentiality
  3. Key exchange, for user authentication
  4. User authentication, for non-repudiation
Correct answer: A
Question 9
Which of the following standards is used for digital certificates?
  1. DES
  2. Diffie-Hellman
  3. X.509
  4. RC5
Correct answer: C
Question 10
At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?
  1. Determining the number of security associations
  2. Negotiating the authentication method
  3. Determining the network identification number
  4. Negotiating the version of IP to be used
Correct answer: B
Question 11
What is the first tool needed to create a secure networking environment?
  1. User authentication
  2. Confidentiality
  3. Security policy
  4. Auditing
Correct answer: C
Question 12
Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. Which of the following is a primary risk factor when authenticating with a standard HTTP server?
  1. HTTP uses cleartext transmission during authentication, which can lead to a man-in-the-middle attack.
  2. Irina has used the wrong application for this protocol, thus increasing the likelihood of a man-in-the-middle attack.
  3. A standard HTTP connection uses public-key encryption that is not sufficiently strong, inviting the possibility of a man-in-the-middle attack.
  4. Irina has accessed the Web server using a non-standard Web browser.
Correct answer: A
Question 13
Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?
  1. Enable stateful multi-layer inspection on the packet filter
  2. Implement caching on the network proxy server
  3. Enable authentication on the network proxy server
  4. Implement a screening router on the network DMZ
Correct answer: B
Question 14
Which of the following organizations provides regular updates concerning security breaches and issues?
  1. IETF
  2. ISO
  3. ICANN
  4. CERT
Correct answer: D
Question 15
You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a network. Which form of encryption should you use?
  1. Asymmetric
  2. PGP
  3. Hash
  4. Symmetric
Correct answer: D
Question 16
Which of the following is the most likely first step to enable a server to recover from a denial-of-service attack in which all hard disk data is lost?
  1. Enable virtualization
  2. Contact the backup service
  3. Contact a disk recovery service
  4. Rebuild your RAID 0 array
Correct answer: B
Question 17
You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month. Which of the following is the most likely explanation for this problem?
  1. The network scanner needs to be replaced.
  2. The network scanner is no substitute for scans conducted by an individual.
  3. The network scanner has a trojan.
  4. The network scanner needs an update.
Correct answer: D
Question 18
What is the primary use of hash (one-way) encryption in networking?
  1. Signing files, for data integrity
  2. Encrypting files, for data confidentiality
  3. Key exchange, for user authentication
  4. User authentication, for non-repudiation
Correct answer: A
Question 19
Which of the following standards is used for digital certificates?
  1. DES
  2. Diffie-Hellman
  3. X.509
  4. RC5
Correct answer: C
Question 20
At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?
  1. Determining the number of security associations
  2. Negotiating the authentication method
  3. Determining the network identification number
  4. Negotiating the version of IP to be used
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!