Free 1D0-571 Exam Braindumps (page: 3)

Page 2 of 16

Which of the following is most likely to pose a security threat to a Web server?

  1. CGI scripts
  2. Database connections
  3. Flash or Silverlight animation files
  4. LDAP servers

Answer(s): A



What is the first tool needed to create a secure networking environment?

  1. User authentication
  2. Confidentiality
  3. Security policy
  4. Auditing

Answer(s): C



Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. Which of the following is a primary risk factor when authenticating with a standard HTTP server?

  1. HTTP usescleartext transmission during authentication, which can lead to a man-in-the-middle attack.
  2. Irina has used the wrong application for this protocol, thus increasing the likelihood of a man-inthe- middle attack.
  3. A standard HTTP connection uses public-key encryption that is not sufficiently strong, inviting the possibility of a man-in-the-middle attack.
  4. Irina has accessed the Web server using a non-standard Web browser.

Answer(s): A



Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?

  1. Enablestateful multi-layer inspection on the packet filter
  2. Implement caching on the network proxy server
  3. Enable authentication on the network proxy server
  4. Implement a screening router on the network DMZ

Answer(s): B






Post your Comments and Discuss CIW 1D0-571 exam with other Community members:

1D0-571 Discussions & Posts