Free 1D0-571 Exam Braindumps (page: 5)

Page 4 of 16

You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month. Which of the following is the most likely explanation for this problem?

  1. The network scanner needs to be replaced.
  2. The network scanner is no substitute for scans conducted by an individual.
  3. The network scanner has atrojan.
  4. The network scanner needs an update.

Answer(s): D



What is the primary use of hash (one-way) encryption in networking?

  1. Signing files, for data integrity
  2. Encrypting files, for data confidentiality
  3. Key exchange, for user authentication
  4. User authentication, for non-repudiation

Answer(s): A



Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?

  1. Updating the company vulnerability scanner and conducting a new scan
  2. Adding a buffer overflow rule to the intrusion detection system
  3. Reconfiguring the firewall
  4. Installing a system update

Answer(s): D



You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?

  1. Installing software updates for the Web server daemon
  2. Using the POST method instead of the GET method for a Web form
  3. Installing an intrusion detection service to monitor logins
  4. Using the GET method instead of the POST method for a Web form

Answer(s): A






Post your Comments and Discuss CIW 1D0-571 exam with other Community members:

1D0-571 Exam Discussions & Posts