Pass the CIW Web Security Associate 1D0-571 Questions and answers with CertsForce

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?

Options:

A.

Installing software updates for the Web server daemon


B.

Using the POST method instead of the GET method for a Web form


C.

Installing an intrusion detection service to monitor logins


D.

Using the GET method instead of the POST method for a Web form


Expert Solution
Questions # 2:

Consider the following diagram:

Question # 2

Which of the following best describes the protocol activity shown in the diagram, along with the most likely potential threat that accompanies this protocol?

Options:

A.

The ICMP Time Exceeded message, with the threat of a denial-of-service attack


B.

The SIP three-way handshake, with the threat of a buffer overflow


C.

The TCP three-way handshake, with the threat of a man-in-the-middle attack


D.

The DNS name query, with the threat of cache poisoning


Expert Solution
Questions # 3:

What is the primary drawback of using symmetric-key encryption?

Options:

A.

Key transport across a network


B.

Speed of encryption


C.

Denial-of-service attacks


D.

Inability to support convergence traffic


Expert Solution
Questions # 4:

You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet. Which of the following is a primary concern for this solution?

Options:

A.

The extra hard disk space required to store the database of checksums


B.

The amount of memory remaining now that the checksum-based application is running


C.

The possibility of a buffer overflow attack leading to a security breach


D.

The security of the checksum database on a read-only media format


Expert Solution
Questions # 5:

The best way to thwart a dictionary attack is by enforcing a:

Options:

A.

strong password policy.


B.

restricted access policy.


C.

firewall configuration policy.


D.

proxy server policy.


Expert Solution
Questions # 6:

An application is creating hashes of each file on an attached storage device. Which of the following will typically occur during this process?

Options:

A.

An increase in the amount of time it takes for the system to respond to requests


B.

Reduced risk of an attack


C.

Increased risk of an attack


D.

A reduction in the amount of time it takes for the system to respond to requests


Expert Solution
Questions # 7:

Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?

Options:

A.

Updating the company vulnerability scanner and conducting a new scan


B.

Adding a buffer overflow rule to the intrusion detection system


C.

Reconfiguring the firewall


D.

Installing a system update


Expert Solution
Questions # 8:

Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?

Options:

A.

The netstat command and a packet sniffer


B.

The ps command and a network scanner


C.

The ping command and User Manager


D.

The iptables command and Windows desktop firewall


Expert Solution
Questions # 9:

The most popular types of proxy-oriented firewalls operate at which layer of the OSI/RM?

Options:

A.

Application layer


B.

Network layer


C.

Session layer


D.

Transport layer


Expert Solution
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions