New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

1D0-571 CIW v5 Security Essentials Questions and Answers

Questions 4

You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?

Options:

A.

Firewall

B.

Intrusion-detection system

C.

Camera

D.

Security guard

Buy Now
Questions 5

Which of the following is a typical target of a trojan on a Linux system?

Options:

A.

Kernel modules

B.

Shared libraries

C.

Boot sector files

D.

System32 DLL files

Buy Now
Questions 6

You have determined that an attack is currently underway on your database server. An attacker is currently logged in, modifying data. You want to preserve logs, caching and other data on this affected server. Which of the following actions will best allow you to stop the attack and still preserve data?

Options:

A.

Pull the server network cable

B.

Shut down the server

C.

Back up the system logs

D.

Force an instant password reset

Buy Now
Questions 7

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?

Options:

A.

Authentication databases, including directory servers

B.

Intrusion detection systems, especially those placed on sensitive networks

C.

Log files on firewall systems

D.

Firewall settings for desktop systems

Buy Now
Questions 8

Consider the following image of a packet capture:

Which of the following best describes the protocol used, along with its primary benefit?

Options:

A.

It is a passive FTP session, which is easier for firewalls to process.

B.

It is an active FTP session, which is necessary in order to support IPv6.

C.

It is an extended passive FTP session, which is necessary to support IPv6.

D.

It is an active FTP session, which is supported by all FTP clients.

Buy Now
Questions 9

You have discovered that the ls, su and ps commands no longer function as expected. They do not return information in a manner similar to any other Linux system. Also, the implementation of Tripwire you have installed on this server is returning new hash values. Which of the following has most likely occurred?

Options:

A.

A trojan has attacked the system.

B.

A SQL injection attack has occurred.

C.

A spyware application has been installed.

D.

A root kit has been installed on the system.

Buy Now
Exam Code: 1D0-571
Exam Name: CIW v5 Security Essentials
Last Update: Dec 26, 2024
Questions: 62
1D0-571 pdf

1D0-571 PDF

$25.5  $84.99
1D0-571 Engine

1D0-571 Testing Engine

$30  $99.99
1D0-571 PDF + Engine

1D0-571 PDF + Testing Engine

$40.5  $134.99