An application is creating hashes of each file on an attached storage device. Which of the following will typically occur during this process?
Answer(s): A
You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network. Which term best describes this device?
Answer(s): D
A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. Which of the following techniques will best help reduce the severity of this attack?
Which of the following is considered to be the most secure default firewall policy, yet usually causes the most work from an administrative perspective?
Answer(s): B
Post your Comments and Discuss CIW 1D0-571 exam with other Community members:
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 1D0-571 content, but please register or login to continue.