Free 1D0-571 Exam Braindumps (page: 7)

Page 6 of 16

Consider the following series of commands from a Linux system: iptables -A input -p icmp -s 0/0 -d
0/0 -j REJECT which explanation best describes the impact of the resulting firewall ruleset?

  1. Individuals on remote networks will no longer be able to use SSH to control internal network resources.
  2. Internal hosts will not be able to ping each other using ICMP.
  3. Stateful multi-layer inspection has been enabled.
  4. Individuals on remote networks will not be able to use ping to troubleshoot connections.

Answer(s): D



A CGI application on the company's Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information. Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?

  1. - Buffer overflow
    - Work with the Web developer to solve the problem
  2. - SQL injection
    - Work with a database administrator to solve the problem
  3. - Denial of service
    - Contact the organization that wrote the code for the Web server
  4. - Man-in-the-middle attack
    - Contact the company auditor

Answer(s): A



A new server has been placed on the network. You have been assigned to protect this server using a packet-filtering firewall. To comply with this request, you have enabled the following ruleset:

Which choice describes the next step to take now that this ruleset has been enabled?

  1. From the internal network, use your Web browser to determine whether all internal users can access the Web server.
  2. From the internal network, use your e-mail client to determine whether all internal users can access the e-mail server.
  3. From the external network, use your Web browser to determine whether all external users can access the Web server.
  4. From the external network, use your e-mail client to determine whether all external users can access the e-mail server.

Answer(s): D



The most popular types of proxy-oriented firewalls operate at which layer of the OSI/RM?

  1. Application layer
  2. Network layer
  3. Session layer
  4. Transport layer

Answer(s): A






Post your Comments and Discuss CIW 1D0-571 exam with other Community members:

1D0-571 Exam Discussions & Posts