Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

How to Easily Pass the CIW 1D0-571 Exam: Expert Advice

Questions 11

Which of the following is a primary weakness of asymmetric-key encryption?

Options:

A.

It is slow because it requires extensive calculations by the computer.

B.

It can lead to the corruption of encrypted data during network transfer.

C.

It is reliant on the Secure Sockets Layer (SSL) standard, which has been compromised.

D.

It is difficult to transfer any portion of an asymmetric key securely.

Buy Now
Questions 12

Which of the following is the primary weakness of symmetric-key encryption?

Options:

A.

Data encrypted using symmetric-key encryption is subject to corruption during transport.

B.

Symmetric-key encryption operates slower than asymmetric-key encryption.

C.

Symmetric-key encryption does not provide the service of data confidentiality.

D.

Keys created using symmetric-key encryption are difficult to distribute securely.

Buy Now
Questions 13

You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month. Which of the following is the most likely explanation for this problem?

Options:

A.

The network scanner needs to be replaced.

B.

The network scanner is no substitute for scans conducted by an individual.

C.

The network scanner has a trojan.

D.

The network scanner needs an update.

Buy Now
Questions 14

You want to create a certificate for use in a Secure Sockets Layer (SSL) session. Which of the following is responsible for verifying the identity of an individual and also issuing the certificate?

Options:

A.

Kerberos server

B.

Certificate authority

C.

Certificate revocation entity

D.

Certificate repository

Buy Now
Questions 15

A disgruntled employee has discovered that the company Web server is not protected against a particular buffer overflow vulnerability. The disgruntled employee has created an application to take advantage of this vulnerability and secretly obtain sensitive data from the Web server's hard disk. This application sends a set of packets to the Web server that causes it to present an unauthenticated terminal with root privileges. What is the name for this particular type of attack?

Options:

A.

Man-in-the-middle attack

B.

Trojan

C.

Denial of service

D.

Zero-day attack

Buy Now
Questions 16

What is the primary use of hash (one-way) encryption in networking?

Options:

A.

Signing files, for data integrity

B.

Encrypting files, for data confidentiality

C.

Key exchange, for user authentication

D.

User authentication, for non-repudiation

Buy Now
Questions 17

At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?

Options:

A.

Determining the number of security associations

B.

Negotiating the authentication method

C.

Determining the network identification number

D.

Negotiating the version of IP to be used

Buy Now
Questions 18

The most popular types of proxy-oriented firewalls operate at which layer of the OSI/RM?

Options:

A.

Application layer

B.

Network layer

C.

Session layer

D.

Transport layer

Buy Now