CIW 1D0-671 CIW Web Security Associate Online Training
CIW 1D0-671 Online Training
The questions for 1D0-671 were last updated at Dec 24,2024.
- Exam Code: 1D0-671
- Exam Name: CIW Web Security Associate
- Certification Provider: CIW
- Latest update: Dec 24,2024
Which protocol uses cleartext communication by default?
- A . HTTP
- B . IPSEC
- C . SSL
- D . POP3
Which of the following is the primary weakness of symmetric-key encryption?
- A . Data encrypted using symmetric-key encryption is subject to corruption during transport.
- B . Symmetric-key encryption operates slower than asymmetric-key encryption.
- C . Symmetric-key encryption does not provide the service of data confidentiality.
- D . Keys created using symmetric-key encryption are difficult to distribute securely.
Which component works with an operating system to increase its security ability?
- A . Network scanner
- B . Operating system add-on
- C . Log analysis tool
- D . Port scanner
Which task should you perform first when considering where to place equipment?
- A . Conduct research to determine the appropriate products for your organization.
- B . Consult with management to determine specific needs.
- C . Secure funding.
- D . Conduct a needs assessment audit.
Danielle was informed by her network administrator that an audit may be conducted during the night to determine the hosts that exist on the network and document any open ports. The next day, Danielle was unable to access any network services.
What may have occurred instead of the anticipated audit?
- A . A social engineering attack
- B . A zero-day attack
- C . A scanning attack
- D . A brute-force attack
How do activity logs help to implement and maintain a security plan?
- A . Activity logs provide advice on firewall installation, because they enable network baseline creation.
- B . Activity logs remind users to log on with strong passwords, because the logs can be analyzed to see if users are complying with policy.
- C . Activity logs allow you to determine if and how an unauthorized activity occurred.
- D . Activity logs dissuade would-be hackers from breaching your security.
Which of the following errors most commonly occurs when responding to a security breach?
- A . Shutting down network access using the firewall, rather than the network router
- B . Adhering to the company policy rather than determining actions based on the IT manager’s input
- C . Making snap judgments based on emotions, as opposed to company policy
- D . Taking too much time to document the attack
What is the term for a self-replicating program or algorithm that consumes system resources?
- A . Illicit server
- B . Root kit
- C . Trojan
- D . Worm
Which of the following describes the practice of stateful multi-layer inspection?
- A . Using a VLAN on a firewall to enable masquerading of private IP addresses
- B . Prioritizing voice and video data to reduce congestion
- C . Inspecting packets in all layers of the OSI/RM with a packet filter
- D . Using Quality of Service (QoS) on a proxy-oriented firewall
Which term describes a dedicated system meant only to house firewall software?
- A . Firewall appliance
- B . Virtual Private Network (VPN)
- C . Kernel firewall
- D . Proxy server