This page was exported from Free valid test braindumps [ http://free.validbraindumps.com ] Export date:Sat Apr 5 7:03:38 2025 / +0000 GMT ___________________________________________________ Title: [Q31-Q49] 1D0-671 Certification - The Ultimate Guide [Updated 2024] --------------------------------------------------- 1D0-671 Certification - The Ultimate Guide [Updated 2024] 1D0-671 Practice Exam and Study Guides - Verified By ValidBraindumps QUESTION 31Which of the following security measures presents the most risk?  A firewall application  A tripwire  A jail  A login script QUESTION 32You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts.Which of the following is the most effective way to respond to this attack?  Installing software updates for the Web server daemon  Using the POST method instead of the GET method for a Web form  Installing an intrusion detection service to monitor logins  Using the GET method instead of the POST method for a Web form QUESTION 33The best way to thwart a dictionary attack is by enforcing a:  strong password policy.  restricted access policy.  firewall configuration policy.  proxy server policy. QUESTION 34Which task should you perform first when considering where to place equipment?  Conduct research to determine the appropriate products for your organization.  Consult with management to determine specific needs.  Secure funding.  Conduct a needs assessment audit. QUESTION 35Which step in security policy implementation ensures that security policy will change as technology advances?  Log, test and evaluate.  Secure each resource and service.  Publish the security policy.  Repeat the process and keep current. QUESTION 36To implement a successful security system, you should:  use as many security principles and techniques as you can to protect each resource.  place your firewall and network in a public area so that authorized users have easy access to them to solve problems as they occur.  implement beta software and operating systems that hold the promise of enhanced security measures.  find a product that can offer full protection against all threats. QUESTION 37A disgruntled employee has discovered that the company Web server is not protected against particular buffer overflow vulnerability.The disgruntled employee has created an application to take advantage of this vulnerability and secretly obtain sensitive data from the Web server’s hard disk. This application sends a set of packets to the Web server that causes it to present an unauthenticated terminal with root privileges.What is the name for this particular type of attack?  Man-in-the-middle attack  Trojan  Denial of service  Zero-day attack QUESTION 38What is the primary use of hash (one-way) encryption in networking?  Signing files, for data integrity  Encrypting files, for data confidentiality  Key exchange, for user authentication  User authentication, for non-repudiation QUESTION 39Consider the following series of commands from a Linux system:iptables -A input -p icmp -s 0/0 -d 0/0 -j REJECTWhich explanation best describes the impact of the resulting firewall ruleset?  Individuals on remote networks will no longer be able to use SSH to control internal network resources.  Internal hosts will not be able to ping each other using ICMP.  Stateful multi-layer inspection has been enabled.  Individuals on remote networks will not be able to use ping to troubleshoot connections. QUESTION 40You have been assigned to provide security measures for your office’s reception area. Although the company needs to provide security measures, costs must be kept to a minimum.Which of the following tools is the most appropriate choice?  Firewall  Intrusion-detection system  Camera  Security guard QUESTION 41Which of the following organizations provides regular updates concerning security breaches and issues?  IETF  ISO  ICANN  CERT QUESTION 42Your firewall is configured to forbid all internal traffic from going out to the Internet. You want to allow internal clients to access all Web traffic.At a minimum, what ports must you open in regards to the internal systems?  TCP Port 80 and all ports above 1023  TCP Ports 80 and 443, and all ports above 1023  All TCP ports above 80 and below 1023  TCP Ports 80 and 443 QUESTION 43Which component works with an operating system to increase its security ability?  Network scanner  Operating system add-on  Log analysis tool  Port scanner QUESTION 44Which security management concept is the ability for a department to accurately determine the costs of using various networking security services?  Performance management  Chargeback  Capacity forecasting  Amortization QUESTION 45You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a network.Which form of encryption should you use?  Asymmetric  PGP  Hash  Symmetric QUESTION 46All servers assume that a valid IP address belongs to the computer that sent it. Because TCP/IP contains no built-in authentication, a hacker can assume the identity of another device.If your security depends entirely upon the TCP/IP identity, which type of attack can allow a hacker to gain access to your system?  A spoofing attack  A social engineering attack  A denial-of-service attack  A brute-force attack QUESTION 47What is the primary strength of symmetric-key encryption?  It allows easy and secure exchange of the secret key.  It creates a ash?of a text, enabling data integrity.It creates a ?ash?of a text, enabling data integrity.  It can encrypt large amounts of data very quickly.  It provides non-repudiation services more efficiently than asymmetric-key encryption. QUESTION 48Which term is used to describe the activity of a hacker who enters a computer network and begins mapping the contents of the system?  Virus planting  Spoofing  System snooping  Trojan QUESTION 49The vast majority of hackers are which type of attacker?  Casual attacker  Spy  Disgruntled employee  Determined attacker  Loading … Ultimate Guide to the 1D0-671 - Latest Edition Available Now: https://www.validbraindumps.com/1D0-671-exam-prep.html --------------------------------------------------- Images: https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2024-12-20 11:37:37 Post date GMT: 2024-12-20 11:37:37 Post modified date: 2024-12-20 11:37:37 Post modified date GMT: 2024-12-20 11:37:37