CIW
1D0-570 CIW v5 Security Professional
http://killexams.com/exam-detail/1D0-570
Answer: B
QUESTION: 113 Your supervisor has asked you to conduct an audit of the Human Resources department's desktop systems. Which consideration is most important when preparing for the audit?
A. The names of any employees who are on vacation B. The importance of the data held in the desktop systems C. Whether the Human Resources department employees are currently distracted by any new or unusual projects D. The number of employees who have worked in the Human Resources department within the last six months
Answer: C
QUESTION: 114
Which tool can best help you determine if a denial-of-service attack is underway?
A. A system that has SNMP enabled B. Intrusion-detection software C. The /var/log/messages file D. Event Viewer
Answer: B
QUESTION: 115
Which of the following best describes a Trojan horse?
A. An application that creates a database of user-entered information B. An application that appears as if it is legitimate, but in fact is designed to defeat system security C. Software that is designed to compare user-entered information with the contents of the Windows registry D. An application that enables a network connection designed to defeat legitimate authentication measures
38
Answer: B
QUESTION: 116
Which of the following is the strongest indicator of social engineering?
A. An employee who logs on to a recently reset user account on a system B. A contractor who initiates contact and requests a user name C. A system administrator who resets a user's password D. The creation of a condition for a buffer overflow
Answer: B
QUESTION: 117 Which of the following provides the greatest potential to allow someone to avoid the firewall and attack the internal network?
A. A new virus B. A USB drive C. A dual-homed bastion D. Disabled stateful inspection
Answer: B
QUESTION: 118
Which of the following describes a weakness of Wired Equivalent Privacy (WEP)?
A. MAC address filtering B. The use of one-time pads to encrypt data C. The use of weak keys during the encryption process D. The use of symmetric-key encryption, which is never appropriate when securing networkbased connections
Answer: C
39
QUESTION: 119 You want to prioritize resources due to limited funds. Which of the following strategies is best to help you determine which resources to protect?
A. Meet with the security manager. B. Meet with the chief executive officer (CEO). C. Meet with managers from each department. D. Meet with the manager of the IT department.
Answer: C
QUESTION: 120
Which of the following must you do to create a chroot jail?
A. Track all attempted connections. B. Block all connections that appear suspicious. C. Create a dedicated subdirectory that contains all referenced applications. D. Log all attempted attacks into a database and then regularly verify the contents of the database.
Answer: C
40
For More exams visit https://killexams.com/vendors-exam-list
Kill your exam at First Attempt....Guaranteed!