CIW 1D0-671 CIW Web Security Associate Online Training
CIW 1D0-671 Online Training
The questions for 1D0-671 were last updated at Nov 22,2024.
- Exam Code: 1D0-671
- Exam Name: CIW Web Security Associate
- Certification Provider: CIW
- Latest update: Nov 22,2024
At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?
- A . Determining the number of security associations
- B . Negotiating the authentication method
- C . Determining the network identification number
- D . Negotiating the version of IP to be used
A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company’s Web server.
Which of the following techniques will best help reduce the severity of this attack?
- A . Filtering traffic at the firewall
- B . Changing your ISP
- C . Installing Apache Server rather than Microsoft IIS
- D . Placing the database and the Web server on separate systems
Consider the following image of a packet capture:
Which of the following best describes the protocol used, along with its primary benefit?
- A . It is a passive FTP session, which is easier for firewalls to process.
- B . It is an active FTP session, which is necessary in order to support IPv6.
- C . It is an extended passive FTP session, which is necessary to support IPv6.
- D . It is an active FTP session, which is supported by all FTP clients.
What is the primary advantage of using a circuit-level proxy?
- A . It provides Network Address Translation (NAT).
- B . It can discriminate between good and malicious data.
- C . It allows applications to provide connection information to the SOCKS server.
- D . It allows masquerading.
A flaw is discovered in an application. Before a patch is available, this vulnerability is used to gain access to sensitive data.
What type of attack is being described?
- A . Social engineering
- B . Dictionary
- C . Zero day
- D . Zero day
Which of the following is the simplest, most common firewall design?
- A . A dual-homed bastion host
- B . A screening router
- C . A screened subnet
- D . A single-homed bastion host
Which security management concept is the ability for a department to accurately determine the costs of using various networking security services?
- A . Performance management
- B . Chargeback
- C . Capacity forecasting
- D . Amortization
A CGI application on the company’s Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information.
Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?
- A . – Buffer overflow
– Work with the Web developer to solve the problem - B . – SQL injection
– Work with a database administrator to solve the problem - C . – Denial of service
– Contact the organization that wrote the code for the Web server - D . – Man-in-the-middle attack
– Contact the company auditor
You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network.
Which term best describes this device?
- A . Screening router
- B . Bastion host
- C . Proxy server
- D . Choke router
Which of the following is a common problem with proxy servers?
- A . Proxy servers do not log incoming and outgoing access, so you will not be able to see details of successful and failed connections.
- B . Proxy servers cannot filter out specific application-layer traffic.
- C . Proxy servers may return old cached information.
- D . Because proxy servers do not mask network resources, hackers may be able to access all exposed systems.