Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 18 questions
Exam Code: 1D0-571                Update: Sep 13, 2025
Exam Name: CIW v5 Security Essentials

CIW CIW v5 Security Essentials 1D0-571 Exam Dumps: Updated Questions & Answers (September 2025)

Question # 1

You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?

A.

Installing software updates for the Web server daemon

B.

Using the POST method instead of the GET method for a Web form

C.

Installing an intrusion detection service to monitor logins

D.

Using the GET method instead of the POST method for a Web form

Question # 2

Which of the following is a primary auditing activity?

A.

Encrypting data files

B.

Changing login accounts

C.

Checking log files

D.

Configuring the firewall

Question # 3

Which of the following is the most likely first step to enable a server to recover from a denial-of-service attack in which all hard disk data is lost?

A.

Enable virtualization

B.

Contact the backup service

C.

Contact a disk recovery service

D.

Rebuild your RAID 0 array

Question # 4

Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. Which of the following is a primary risk factor when authenticating with a standard HTTP server?

A.

HTTP uses cleartext transmission during authentication, which can lead to a man-in-the-middle attack.

B.

Irina has used the wrong application for this protocol, thus increasing the likelihood of a man-in-the-middle attack.

C.

A standard HTTP connection uses public-key encryption that is not sufficiently strong, inviting the possibility of a man-in-the-middle attack.

D.

Irina has accessed the Web server using a non-standard Web browser.

Question # 5

Which of the following can help you authoritatively trace a network flooding attack?

A.

Your ISP

B.

Firewall logs

C.

Router logs

D.

Ping

Question # 6

What is the primary use of hash (one-way) encryption in networking?

A.

Signing files, for data integrity

B.

Encrypting files, for data confidentiality

C.

Key exchange, for user authentication

D.

User authentication, for non-repudiation

Question # 7

Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?

A.

Firewall

B.

Software update

C.

Intrusion detection system

D.

Network scanner

Question # 8

Which of the following errors most commonly occurs when responding to a security breach?

A.

Shutting down network access using the firewall, rather than the network router

B.

Adhering to the company policy rather than determining actions based on the IT manager's input

C.

Making snap judgments based on emotions, as opposed to company policy

D.

Taking too much time to document the attack

Question # 9

What is the first tool needed to create a secure networking environment?

A.

User authentication

B.

Confidentiality

C.

Security policy

D.

Auditing

Question # 10

Which choice lists typical firewall functions?

A.

Creating a VLAN and configuring the intrusion-detection system

B.

Issuing alerts and limiting host access

C.

Logging traffic and creating a choke point

D.

Implementing the security policy and scanning the internal network

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 13 Sep 2025