CIW Web Security Associate 1D0-571 Exam Practice Test

Page: 1 / 14
Total 62 questions
Question 1

You are using a PKI solution that is based on Secure Sockets Layer (SSL). Which of the following describes the function of the asymmetric-key-encryption algorithm used?



Answer : A


Question 2

You have implemented a version of the Kerberos protocol for your network. What service does Kerberos primarily offer?



Answer : A


Question 3

Which of the following is a typical target of a trojan on a Linux system?



Answer : A


Question 4

Which of the following is considered to be the most secure default firewall policy, yet usually causes the most work from an administrative perspective?



Answer : B


Question 5

You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target. Which of the following will accomplish this goal?



Answer : C


Question 6

You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. Which of the following tools is the most appropriate choice?



Answer : C


Question 7

Which algorithm can use a 128-bit key, and has been adopted as a standard by various governments and corporations?



Answer : C


Page:    1 / 14   
Total 62 questions