Exam1pass
Easiest way to pass IT exams
Exam1pass Help You Pass Any IT Exam
http://www.exam1pass.com
Exam : CIW 1D0-470
Title
: CIW SECURITY
PROFESSIONAL
Version : Demo
Exam1pass
Easiest way to pass IT exams
Exam1pass Help You Pass Any IT Exam
http://www.exam1pass.com
1. What is the final step in assessing the risk of network intrusion from an internal or external source?
A. Using the existing management and control architecture
B. Evaluating the existing perimeter and internal security
C. Analyzing, categorizing and prioritizing resources
D. Considering the business concerns
Answer: A
2. While assessing the risk to a network, which step are you conducting when you determine whether the
network can differentiate itself from other networks?
A. Considering the business concerns
B. Analyzing, categorizing and prioritizing resources
C. Evaluating the existing perimeter and internal security
D. Using the existing management and control architecture
Answer: C
3. Which service, tool or command allows a remote or local user to learn the directories or files that are
accessible on the network?
A. Traceroute
B. Share scanner
C. Port scanner
D. Ping scanner
Answer: B
4. Which type of attack uses a database or databases to guess a password in order to gain access to a
computer system?
A. Hijacking attack
B. Virus attack
C. Dictionary attack
D. Man-in-the-middle attack
Answer: C
Exam1pass
Easiest way to pass IT exams
Exam1pass Help You Pass Any IT Exam
http://www.exam1pass.com
5. Your IDS application paged you at 3:00 a.m. and informed you that an attack occurred against your DNS
server. You drive to the server site to investigate. You find no evidence of an attack, although the IDS
application claims that a remote DNS server waged an attack on port 53 of your intranet DNS server. You
check the logs and discover that a zone transfer has occurred. You check your zones and name resolution,
and discover that all entries exist, and no unusual entries have been added to the database. What has most
likely occurred?
A. A DNS poisonin