0 likes | 0 Vues
Easily download the CIW Web Security Associate 1D0-671 PDF Dumps from Passcert to keep your study materials accessible anytime, anywhere. This PDF includes the latest and most accurate exam questions and answers verified by experts to help you prepare confidently and pass your exam on your first try.
E N D
Download CIW 1D0-671 Exam Dumps For Best Preparation Exam : 1D0-671 Title : CIW Web SecurityAssociate https://www.passcert.com/1D0-671.html 1 / 4
Download CIW 1D0-671 Exam Dumps For Best Preparation 1.Which of the following causes problems with firewalls A. Control FTP B. Data FTP C. Active FTP D. Passive FTP Answer: C 2.In relation to security, which of the following is the primary benefit of classifying systems? A. Ability to identify common attacks B. Identification of highest-priority systems to protect C. Ability to recover quickly from a natural or man-made disaster D. Collection of information for properly configuring the firewall Answer: B 3.Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. Which of the following is a primary risk factor when authenticating with a standard HTTP server? A. HTTP uses cleartext transmission during authentication, which can lead to a man-in-the- middle attack. B. Irina has used the wrong application for this protocol, thus increasing the likelihood of a man-in- the-middle attack. C. A standard HTTP connection uses public-key encryption that is not sufficiently strong, inviting the possibility of a man-in-the-middle attack. D. Irina has accessed the Web server using a non-standard Web browser. Answer: A 4.You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice? A. Firewall B. Intrusion-detection system C. Camera D. Security guard Answer: C 5.Which symmetric algorithm created by the RSA Security Corporation is a stream cipher that encrypts messages as a whole, in real time? A. RC4 B. RC6 C. RC5 D. RC2 Answer: A 2 / 4
Download CIW 1D0-671 Exam Dumps For Best Preparation 6.Your firewall is configured to forbid all internal traffic from going out to the Internet. You want to allow internal clients to access all Web traffic. At a minimum, what ports must you open in regards to the internal systems? A. TCP Port 80 and all ports above 1023 B. TCP Ports 80 and 443, and all ports above 1023 C. All TCP ports above 80 and below 1023 D. TCP Ports 80 and 443 Answer: B 7.The vast majority of hackers are which type of attacker? A. Casual attacker B. Spy C. Disgruntled employee D. Determined attacker Answer: A 8.The best way to thwart a dictionary attack is by enforcing a: A. strong password policy. B. restricted access policy. C. firewall configuration policy. D. proxy server policy. Answer: A 9.Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability? A. Updating the company vulnerability scanner and conducting a new scan B. Adding a buffer overflow rule to the intrusion detection system C. Reconfiguring the firewall D. Installing a system update Answer: D 10.A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all. Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall? A. Deny all use of UDP above Port 1024. B. Configure the firewall to provide VPN access. C. Configure a second network connection directly to the video conferencing device. D. Allow all use of UDP below Port 1024. Answer: B 11.Which protocol uses cleartext communication by default? 3 / 4
Download CIW 1D0-671 Exam Dumps For Best Preparation A. HTTP B. IPSEC C. SSL D. POP3 Answer: A 12.Which of the following is the primary weakness of symmetric-key encryption? A. Data encrypted using symmetric-key encryption is subject to corruption during transport. B. Symmetric-key encryption operates slower than asymmetric-key encryption. C. Symmetric-key encryption does not provide the service of data confidentiality. D. Keys created using symmetric-key encryption are difficult to distribute securely. Answer: D 13.Which component works with an operating system to increase its security ability? A. Network scanner B. Operating system add-on C. Log analysis tool D. Port scanner Answer: B 14.Which task should you perform first when considering where to place equipment? A. Conduct research to determine the appropriate products for your organization. B. Consult with management to determine specific needs. C. Secure funding. D. Conduct a needs assessment audit. Answer: D 15.Danielle was informed by her network administrator that an audit may be conducted during the night to determine the hosts that exist on the network and document any open ports. The next day, Danielle was unable to access any network services. What may have occurred instead of the anticipated audit? A. A social engineering attack B. A zero-day attack C. A scanning attack D. A brute-force attack Answer: C 16.How do activity logs help to implement and maintain a security plan? A. Activity logs provide advice on firewall installation, because they enable network baseline creation. B. Activity logs remind users to log on with strong passwords, because the logs can be analyzed to see if users are complying with policy. C. Activity logs allow you to determine if and how an unauthorized activity occurred. D. Activity logs dissuade would-be hackers from breaching your security. Answer: C 4 / 4