CIW 1D0-571 - CIW v5 Security Essentials
Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. Which of the following is a primary risk factor when authenticating with a standard HTTP server?
Which of the following is a common problem, yet commonly overlooked, in regards to physical security in server rooms?
Which of the following standards is used for digital certificates?
Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. Which type of attack is this?
You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target. Which of the following will accomplish this goal?
Which of the following organizations provides regular updates concerning security breaches and issues?
What is the primary use of hash (one-way) encryption in networking?
You have implemented a service on a Linux system that allows a user to read and edit resources. What is the function of this service?
