Summer Sale 60% Special Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best60

CIW 1D0-571 CIW v5 Security Essentials Exam Practice Test

Page: 1 / 6
Total 62 questions

CIW v5 Security Essentials Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$48  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$42  $104.99
Question 1

Which of the following organizations provides regular updates concerning security breaches and issues?

Options:

A.

IETF

B.

ISO

C.

ICANN

D.

CERT

Question 2

Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?

Options:

A.

Firewall

B.

Software update

C.

Intrusion detection system

D.

Network scanner

Question 3

At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?

Options:

A.

Determining the number of security associations

B.

Negotiating the authentication method

C.

Determining the network identification number

D.

Negotiating the version of IP to be used

Question 4

Which of the following is a primary auditing activity?

Options:

A.

Encrypting data files

B.

Changing login accounts

C.

Checking log files

D.

Configuring the firewall

Question 5

What is the primary use of hash (one-way) encryption in networking?

Options:

A.

Signing files, for data integrity

B.

Encrypting files, for data confidentiality

C.

Key exchange, for user authentication

D.

User authentication, for non-repudiation

Question 6

At what layer of the OSI/RM does a packet filter operate?

Options:

A.

Layer 1

B.

Layer 3

C.

Layer 5

D.

Layer 7

Question 7

A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all. Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?

Options:

A.

Deny all use of UDP above Port 1024.

B.

Configure the firewall to provide VPN access.

C.

Configure a second network connection directly to the video conferencing device.

D.

Allow all use of UDP below Port 1024.

Question 8

Which of the following details should be included in documentation of an attack?

Options:

A.

An overview of the security policy and suggestions for the next response plan

B.

Estimates of how much the attack cost the company, and a list of the applications used by the attacker

C.

The time and date of the attack, and the names of employees who were contacted during the response

D.

The network resources involved in the attack, and recommendations for thwarting future attacks

Question 9

Which choice lists typical firewall functions?

Options:

A.

Creating a VLAN and configuring the intrusion-detection system

B.

Issuing alerts and limiting host access

C.

Logging traffic and creating a choke point

D.

Implementing the security policy and scanning the internal network

Page: 1 / 6
Total 62 questions