Page 1

   

Exam

: CIW 1D0-570

Title

: CIW V5 Security Professional Exam

Version : R6.1

 

www.Prepking.com


Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

 

www.Prepking.com


1. The chief operations officer (COO) has questioned the need for end-user training. Which of the following is the most effective response? A.Indicate that you will not be responsible for the next virus outbreak. B.Remind the CEO about the last virus attack and the expense incurred. C.Explain that the cost of end-user training is a fraction of the cost of the last security breach caused by end users. D.Provide statistics that definitively show how end-user training reduces the likelihood of security breaches on the corporate network. Answer: C

2. Consider the following sequence: user1@zeppelin:/public$ su root@zeppelin:~# chmod 1777 /public root@zeppelin:~# exit Which of the following most accurately describes the result of this command? A.Only the root user can create and delete files in the /public directory. B.All users can create, delete and read files in the /public directory, but only root has execute permissions. C.All users can create and read files in the /public directory, but only root can delete another user's file. D.Any user can create files in the / directory, but no user can delete a file in this directory unless root permissions are obtained. Answer: C

3. What is the first step of a gap analysis? A.Scan the firewall. B.Review antivirus settings. C.Review the security policy. D.Review intrusion-detection software settings. Answer: C

4. Consider the following firewall rules:  

www.Prepking.com


Incoming traffic: TCP Port 25 TCP Port 139: Denied UDP Port 137: Denied UDP Port 138: Denied ICMP echo request: Denied ICMP echo reply: Denied Outgoing traffic: TCP Ports 1024 through 65,535 to port 80: Denied TCP Port 80: Denied ICMP echo request: Denied ICMP echo reply: Denied TCP Port 139: Denied UDP Port 137: Denied UDP Port 138: Denied All company production servers reside behind the corporate firewall. However, you discover that the Web server performance is very low. After sniffing the traffic to the Web server, you learn that the Web server is experiencing a distributed denial-of-service attack in which millions of ping packets are being directed at the server. Which of the following is the most plausible explanation for this situation? A.There is a flaw in the firewall rule set. B.The firewall is not configured to block ICMP packets generated by the ping command. C.The attack is originating from a wireless access point (WAP) connected to the corporate network. D.The attack is originating from a Web server that has not been properly updated, and which has been infected with a Trojan horse. Answer: C

5. A Linux system running Apache Server has received millions of SYN packets that it can no longer respond to, because the client's operator is maliciously withholding the necessary reply packet. What is the most common solution for this problem? A.Implement SSL.  

www.Prepking.com


B.Implement SYN cookie support. C.Upgrade the TCP/IP stack with new software. D.Upgrade the operating system to support IPsec. Answer: B

6. Two routers in your company network require a firmware upgrade. Which of the following upgrade strategies will reduce downtime? A.Conducting the upgrade while the routers are still running B.Upgrading the routers using the latest upgrade software C.Conducting the upgrade after rebooting the router D.Upgrading the routers after business hours Answer: D

7. You and your team have created a security policy document that is 120 pages long. Which of the following techniques will help ensure that upper-level managers read the essential policy elements? A.Including a sign-off sheet B.Including an executive summary C.Using bold type to emphasize essential elements D.Using italic type to emphasize essential elements Answer: B

8. Which of the following is a main function of a company's information security policy? A.It obligates the IT department to basic services. B.It defines basic responsibilities for all stakeholders. C.It defines the responsibilities of employees and managers. D.It defines basic responsibilities for executive management. Answer: B

9. After consulting with the IT department, you have determined that a particular security solution is quite effective for protecting a particular resource, but not necessary due to the expense. Which of the following  

www.Prepking.com


was conducted to enable this conclusion? A.Risk analysis B.Cost-to-benefit analysis C.Physical security analysis D.Resource priority analysis Answer: B

10. You want to learn more about a security breach that was recently discovered in a Windows server. Which organization should you consult? A.ISO B.SANS C.CERT D.IETF Answer: C

11. Your supervisor asks you to recommend a firewall. The firewall must provide the following services: The ability to filter specific traffic types (e.g., HTTP, SIP, POP3) User authenticationWeb page caching for later use Which type of firewall would you recommend? A.Proxy B.Stateful C.Packet filter D.Circuit-based Answer: A

12. Which type of firewall provides a DMZ? A.Dual-homed B.Router-based C.Single-homed D.Screened-subnet  

www.Prepking.com


Answer: D

13. Company employees have noticed that the quality of voice calls on their Cisco IP phones is greatly reduced at various times during the day. After investigating the problem, you notice that the times when voice quality is reduced coincides with heavy e-mail traffic. Which of the following can you implement on the firewall to alleviate this problem? A.Stateful inspection B.Quality of Service (QoS) C.Network address translation (NAT) D.Resource Reservation Protocol (RSVP) Answer: B

14. Consider the following firewall rules: Incoming traffic: TCP Port 25: Denied TCP Port 139: Denied UDP Port 137: Denied UDP Port 138: Denied ICMP echo request: Denied ICMP echo reply: Denied Outgoing traffic: TCP Ports 1024 through 65,535 to port 80: Denied ICMP echo request: Denied ICMP echo reply: Denied TCP Port 139: Denied UDP Port 137: Denied UDP Port 138: Denied All company production servers reside behind the corporate firewall. However, you discover that the Web server performance is very low. After sniffing the traffic to the Web server, you learn that the Web server is experiencing a distributed denial-of-service attack in which millions of ping packets are being directed at the  

www.Prepking.com


server. Which is the most plausible explanation for this situation? A.There is a flaw in the firewall rule set. B.The attack is being conducted from an internal host. C.The Web server has been infected with a Trojan horse. D.The firewall is not configured to block ICMP packets generated by the ping command. Answer: B 15. A packet is being sent from one computer to the next. This packet is being processed by an application designed to encrypt sensitive data. One of the duties of this application is to ensure that a packet has not been altered by an intruder. Which type of encryption is this application most likely to use to achieve this goal? A.One-time pad B.Hash encryption C.Symmetric-key encryption D.Asymmetric-key encryption Answer: B

16. Which of the following is responsible for encrypting the data packets encapsulated in an SSL-enabled HTTP session? A.One-way encryption B.One-time pad (OTP) C.Symmetric-key encryption D.Asymmetric-key encryption Answer: C

17. You have used an application called PGP to protect the contents of an e-mail message. Which technology is used to encrypt the key that protects the data in the e-mail message? A.Symmetric-key encryption B.Asymmetric-key encryption C.Diffie-Hellman key exchange protocol D.Advanced Encryption Standard (AES)  

www.Prepking.com


Answer: B

18. Your Web browser issued a warning message that a certificate has not been signed by a recognized authority. This fact indicates that: A.an attack is in progress. B.the ensuing session will not be encrypted. C.the Certificate Authority (CA) has revoked the certificate. D.the browser does not recognize the Certificate Authority (CA). Answer: D

19. A device that provides voice and fax services between your local LAN and the Internet has been installed in the DMZ of your network. However, you cannot send or receive faxes. Which of the following steps is most likely going to solve this problem, while still protecting your network resources? A.Configure the fax device to use the T.441 protocol. B.Configure your firewall to allow the T.38 protocol. C.Move the fax device off the firewall and make it directly accessible to the Internet. D.Configure your firewall to forward all UDP-based packets from the Internet to the company PBX. Answer: B

20. Employee computers have been attacked repeatedly. The attacker appears to be working internally, and has been able to scan internal systems for weaknesses. Which of the following will best help you stop these attacks? A.Installing Webcams B.Upgrading antivirus software C.Installing desktop firewalls D.Establishing a regular auditing schedule Answer: C

21. Which of the following is a feature that you would expect desktop firewall software to provide? A.Port blocking  

www.Prepking.com


B.Spam blocking C.Firewall reconfiguration D.Reporting to intrusion-detection applications Answer: A

22. Which wireless security technique is most susceptible to spoofing? A.802.11i B.Beaconing C.MAC address filtering D.Wired Equivalent Privacy (WEP) Answer: C

23. You have been asked to show end users how to best avoid problems with spyware. Which of the following is the best recommendation to give? A.Upgrade antivirus software daily. B.Configure antivirus software to run automatically. C.Conduct operating system upgrades only as recommended by the IT department. D.Download software only from trusted Internet resources that are recommended by the operating system vendor. Answer: C

24. What is the preferred first step to take if an end user suspects that a desktop system has been compromised by an attacker? A.Call an IT associate. B.Call the IT manager. C.Unplug the system from the network. D.Unplug the power cable from the system. Answer: C

25. Which of the following password policies will help secure employee desktop systems in case an  

www.Prepking.com


100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/1D0-570.htm

Pass4sure 1D0-570 dumps  

1D0-570,1D0-570 exam, 1D0-570 exam questions,1D0-570 dumps

Advertisement