Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
 

CIW 1D0-571 Exam Actual Questions

The questions for 1D0-571 were last updated on Nov. 17, 2024.
  • Viewing page 1 out of 16 pages.
  • Viewing questions 1-4 out of 62 questions

Topic 1 - Single Topic

Question #1 Topic 1

An application is creating hashes of each file on an attached storage device. Which of the following will typically occur during this process?

  • A. An increase in the amount of time it takes for the system to respond to requests
  • B. Reduced risk of an attack
  • C. Increased risk of an attack
  • D. A reduction in the amount of time it takes for the system to respond to requests
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #2 Topic 1

You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network. Which term best describes this device?

  • A. Screening router
  • B. Bastion host
  • C. Proxy server
  • D. Choke router
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #3 Topic 1

A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. Which of the following techniques will best help reduce the severity of this attack?

  • A. Filtering traffic at the firewall
  • B. Changing your ISP
  • C. Installing Apache Server rather than Microsoft IIS
  • D. Placing the database and the Web server on separate systems
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #4 Topic 1

Which of the following is considered to be the most secure default firewall policy, yet usually causes the most work from an administrative perspective?

  • A. Configuring the firewall to respond automatically to threats
  • B. Blocking all access by default, then allowing only necessary connections
  • C. Configuring the firewall to coordinate with the intrusion-detection system
  • D. Allowing all access by default, then blocking only suspect network connections
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...