Never miss these 1D0-570 dumps questions before you go for test.

Page 1

CIW

1D0-570 CIW v5 Security Professional

http://killexams.com/exam-detail/1D0-570


Answer: B

QUESTION: 113 Your supervisor has asked you to conduct an audit of the Human Resources department's desktop systems. Which consideration is most important when preparing for the audit?

A. The names of any employees who are on vacation B. The importance of the data held in the desktop systems C. Whether the Human Resources department employees are currently distracted by any new or unusual projects D. The number of employees who have worked in the Human Resources department within the last six months

Answer: C

QUESTION: 114

Which tool can best help you determine if a denial-of-service attack is underway?

A. A system that has SNMP enabled B. Intrusion-detection software C. The /var/log/messages file D. Event Viewer

Answer: B

QUESTION: 115

Which of the following best describes a Trojan horse?

A. An application that creates a database of user-entered information B. An application that appears as if it is legitimate, but in fact is designed to defeat system security C. Software that is designed to compare user-entered information with the contents of the Windows registry D. An application that enables a network connection designed to defeat legitimate authentication measures

38


Answer: B

QUESTION: 116

Which of the following is the strongest indicator of social engineering?

A. An employee who logs on to a recently reset user account on a system B. A contractor who initiates contact and requests a user name C. A system administrator who resets a user's password D. The creation of a condition for a buffer overflow

Answer: B

QUESTION: 117 Which of the following provides the greatest potential to allow someone to avoid the firewall and attack the internal network?

A. A new virus B. A USB drive C. A dual-homed bastion D. Disabled stateful inspection

Answer: B

QUESTION: 118

Which of the following describes a weakness of Wired Equivalent Privacy (WEP)?

A. MAC address filtering B. The use of one-time pads to encrypt data C. The use of weak keys during the encryption process D. The use of symmetric-key encryption, which is never appropriate when securing networkbased connections

Answer: C

39


QUESTION: 119 You want to prioritize resources due to limited funds. Which of the following strategies is best to help you determine which resources to protect?

A. Meet with the security manager. B. Meet with the chief executive officer (CEO). C. Meet with managers from each department. D. Meet with the manager of the IT department.

Answer: C

QUESTION: 120

Which of the following must you do to create a chroot jail?

A. Track all attempted connections. B. Block all connections that appear suspicious. C. Create a dedicated subdirectory that contains all referenced applications. D. Log all attempted attacks into a database and then regularly verify the contents of the database.

Answer: C

40


For More exams visit https://killexams.com/vendors-exam-list

Kill your exam at First Attempt....Guaranteed!


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.