Introduction to CIW Web Security Associate Exam
The CIW 1D0-571 Exam is challenging and thorough
preparation is essential for success. This exam study guide is designed to help
you prepare for the Web Security Associate certification exam. It contains a
detailed list of the topics covered on the Professional exam, as well as a
detailed list of preparation resources. These study guides for the CIW Web
Security Associate will help guide you through the study process for your
certification.
1D0-571 CIW Web Security Associate Exam Summary
● Exam Name: CIW Web Security Associate
● Exam Code: 1D0-571
● Exam Price: $150 (USD)
● Duration: 90 mins
● Number of Questions: 62
● Passing Score: 76%
● Schedule Exam: Pearson
VUE
● Sample Questions: CIW Web Security Associate Sample Questions
● Recommended Practice: CIW 1D0-571 Certification Practice Exam
Exam Syllabus: 1D0-571 CIW Web Security Associate
1. Network Security and Firewalls
Define the significance of network security,
and identify various elements of an effective security policy, including risk
factors, security-related organizations, key resources to secure, general
security threat types, access control.
-
Define encryption and the encryption methods used in internetworking.
-
Use universal guidelines and principles of effective network security to create
effective specific solutions.
- Apply
security principles and identify security attacks.
-
Identify firewall types and define common firewall terminology.
-
Plan a firewall system that incorporates multiple levels of protection,
including firewall system design, proactive detection, setting traps, security
breach response, security alerting organizations.
CIW 1D0-571 Certification Sample Questions and Answers
To make you familiar with CIW Web Security Associate
(1D0-571) certification exam structure, we have prepared this sample question set.
We suggest you to try our Sample
Questions for Web Security Associate 1D0-571 Certification to test your understanding
of CIW 1D0-571process with real CIW certification exam environment.
1D0-571 CIW Web Security Associate
Sample Questions:-
01.
Which of the following security measures presents the most risk?
a) A firewall application
b) A tripwire
c) A jail
d) A login script
02.
Which type of encryption poses challenges to key transport?
a) Asymmetric-key encryption
b) Hash encryption
c) Symmetric-key encryption
d) Diffie-Hellman
03.
Which of the following is a primary auditing activity?
a) Encrypting data files
b) Changing login accounts
c) Checking log files
d) Configuring the firewall
04. In
relation to security, which of the following is the primary benefit of
classifying systems?
a) Ability to identify common attacks
b) Identification of highest-priority systems
to protect
c) Ability to recover quickly from a natural
or man-made disaster
d) Collection of information for properly
configuring the firewall
05. How
do activity logs help to implement and maintain a security plan?
a) Activity logs provide advice on firewall
installation, because they enable network baseline creation.
b) Activity logs remind users to log on with
strong passwords, because the logs can be analyzed to see if users are
complying with policy.
c) Activity logs allow you to determine if and
how an unauthorized activity occurred.
d) Activity logs dissuade would-be hackers
from breaching your security.
06.
Which of the following constitutes a problem when conducting a reverse scan?
a) IP address spoofing
b) SYN floods
c) Default settings on target systems
d) An older system kernel
07.
What would be the result if you were the recipient of a SYN flood or malformed
packet?
a) You would be unable to access a legitimate
service, such as establishing a network connection.
b) The files on your boot sector would be
replaced with infected code.
c) A virus would be unleashed on your system
at the time the SYN flood or malformed packet was received.
d) You would be misdirected to a fraudulent
Web site without your knowledge or consent.
08.
Your firewall is configured to forbid all internal traffic from going out to
the Internet. You want to allow internal clients to access all Web traffic. At
a minimum, what ports must you open in regards to the internal systems?
a) TCP Port 80 and all ports above 1023
b) TCP Ports 80 and 443, and all ports above
1023
c) All TCP ports above 80 and below 1023
d) TCP Ports 80 and 443
09. To
implement a successful security system, you should:
a) use as many security principles and techniques
as you can to protect each resource.
b) place your firewall and network in a public
area so that authorized users have easy access to them to solve problems as
they occur.
c) implement beta software and operating
systems that hold the promise of enhanced security measures.
d) find a product that can offer full
protection against all threats.
10.
Which two protocols can be found at the transport layer of the TCP/IP stack?
a) File Transfer Protocol (FTP) and Hypertext
Transfer Protocol (HTTP)
b) Internet Protocol (IP) and Internet Control
Message Protocol (ICMP)
c) Post Office Protocol 3 (POP3) and Simple
Mail Transfer Protocol (SMTP)
d) Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP)
Answers:-
Answer
1:- c
Answer
2:- c
Answer
3:- c
Answer
4:- b
Answer
5:- c
Answer
6:- a
Answer
7:- a
Answer
8:- b
Answer
9:- a
Answer
10:- d
Comments
Post a Comment