CIW 1D0-671 CIW Web Security Associate Online Training
CIW 1D0-671 Online Training
The questions for 1D0-671 were last updated at Dec 26,2024.
- Exam Code: 1D0-671
- Exam Name: CIW Web Security Associate
- Certification Provider: CIW
- Latest update: Dec 26,2024
Consider the following diagram:
Which type of attack is occurring?
- A . Polymorphic virus-based attack
- B . Denial-of-service attack
- C . Distributed denial-of-service attack
- D . Man-in-the-middle attack using a packet sniffer
Which of the following is most likely to address a problem with an operating system’s ability to withstand an attack that attempts to exploit a buffer overflow?
- A . Firewall
- B . Software update
- C . Intrusion detection system
- D . Network scanner
Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server.
When fulfilling this request, which of the following resources should you audit the most aggressively?
- A . Authentication databases, including directory servers
- B . Intrusion detection systems, especially those placed on sensitive networks
- C . Log files on firewall systems
- D . Firewall settings for desktop systems
You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month.
Which of the following is the most likely explanation for this problem?
- A . The network scanner needs to be replaced.
- B . The network scanner is no substitute for scans conducted by an individual.
- C . The network scanner has a trojan.
- D . The network scanner needs an update.
Considering physical security, which of the following should you look for when identifying a room that will act as a server room?
- A . Electrical outlets
- B . Power over Ethernet (PoE) settings
- C . False ceilings
- D . Space for backup servers
Which two protocols can be found at the transport layer of the TCP/IP stack?
- A . File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP)
- B . Internet Protocol (IP) and Internet Control Message Protocol (ICMP)
- C . Post Office Protocol 3 (POP3) and Simple Mail Transfer Protocol (SMTP)
- D . Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
You are creating an information security policy for your company.
Which of the following activities will help you focus on creating policies for the most important resources?
- A . Auditing the firewall
- B . Implementing non-repudiation
- C . Logging users
- D . Classifying systems
You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts.
Which of the following is the most effective way to respond to this attack?
- A . Installing software updates for the Web server daemon
- B . Using the POST method instead of the GET method for a Web form
- C . Installing an intrusion detection service to monitor logins
- D . Using the GET method instead of the POST method for a Web form
Which of the following security services, as defined by the ISO 7498-2 Security Architecture document, protects against active threats by verifying or maintaining the consistency of information?
- A . Data confidentiality
- B . Authentication
- C . Non-repudiation
- D . Data integrity
What is the primary strength of symmetric-key encryption?
- A . It allows easy and secure exchange of the secret key.
- B . It creates a ash?of a text, enabling data integrity.It creates a ?ash?of a text, enabling data integrity.
- C . It can encrypt large amounts of data very quickly.
- D . It provides non-repudiation services more efficiently than asymmetric-key encryption.