Free 1D0-571 Exam Braindumps (page: 6)

Page 5 of 16

Which of the following standards is used for digital certificates?

  1. DES
  2. Diffie-Hellman
  3. X.509
  4. RC5

Answer(s): C



At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?

  1. Determining the number of security associations
  2. Negotiating the authentication method
  3. Determining the network identification number
  4. Negotiating the version of IP to be used

Answer(s): B



A security breach has occurred in which a third party was able to obtain and misuse legitimate authentication information. After investigation, you determined that the specific cause for the breach was that end users have been placing their passwords underneath their keyboards. Which step will best help you resolve this problem?

  1. Discipline specific end users as object lessons to the rest of the staff and reset passwords on all systems immediately.
  2. Change all passwords on the company servers immediately and inform end users that their passwords will be changing on a regular basis.
  3. Set passwords to expire at specific intervals and establish mandatory continual training sessions.
  4. Inform end users that their passwords will be changing on a regular basis and require more complex passwords.

Answer(s): C



You have implemented a version of the Kerberos protocol for your network. What service does Kerberos primarily offer?

  1. Authentication
  2. Encryption
  3. Non-repudiation
  4. Data integrity

Answer(s): A






Post your Comments and Discuss CIW 1D0-571 exam with other Community members:

1D0-571 Exam Discussions & Posts