Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CIW 1D0-470 Exam -

Free 1D0-470 Sample Questions:

1. What is the major security problem with the SUID/SGID programs or utilities?
A. The root account must be active in order to utilize programs set this way.
B. These permissions in a program can temporarily grant root privileges to anyone.
C. SUID programs are not removed immediately from the swap/paging area, which results in a security risk.
D. The SGID violates good security practice and is only used as a result of the SUID.
Answer: B

2. Raul is worried that his network might be attacked through modified ICMP messages. What can he do to prevent this?
A. Disable anonymous logins
B. Filter ICMP packets at the firewall
C. Configure the firewall to block zone transfers
D. Scan ICMP messages for viruses at the firewall
Answer: B

3. Which ports are used by SNMP?
A. UDP ports 161 and 162
B. UDP ports 20 and 21
C. TCP ports 161 and 162
D. TCP ports 20 and 21
Answer: A

4. Which type of device communicates with external servers on behalf of internal clients?
A. A circuit-level gateway
B. An application-level gateway
C. A proxy server
D. A packet filter
Answer: C

5. Which service, command or tool discovers the IP addresses of all computers or routers between two computers on an Internet/intranet network?
A. Whois
B. Port scanner
C. Traceroute
D. Nslookup
Answer: C

6. What is the difference between digital signature mechanisms and simple encryption?
A. Digital signatures generally use 128-bit encryption, whereas simple encryption generally uses 56 bits.
B. Digital signatures are verified by third parties that vouch for the veracity of the sender and the contents.
C. Digital signatures carry timestamps, whereas standard encryption does not.
D. Standard encryption mechanisms have no provision for traffic padding to thwart password sniffers.
Answer: B

7. Helga is logging on to her network. Her network does not employ traffic padding mechanisms. Why will it be easy for someone to steal her password?
A. Because her password could be more than two weeks old
B. Because of the predictability of the login length and password prompts
C. Because the cleartext user name and password are not encrypted
D. Because there is no provision for log analysis without traffic padding, thus no accountability when passwords are lost
Answer: B

8. What is included in the formula that Windows NT/2000 uses to create the security identifier?
A. A semi-random number generated by the CPU based on the number of processes in the queue
B. A set of numbers based on the serial number of the computer CPU and the serial number of Windows NT
C. The computer name and the current amount of CPU time used by the user mode
D. The octal encryption of the user name and the password
Answer: C

9. Which choice lists the components that form security descriptors for Windows NT/2000 objects?
A. The user name (UNAME), the password (PWD), and the object-owner security identifier (SID)
B. The UNAME, the access profile of the object-owner SID, and confirmation by the system access control list (SACL)
C. The object-owner SID, the discretionary access control list (DACL), the SACL, and the group SID
D. The user name, the object identifier (OID), the set user identifier (UID), and the time/date stamp
Answer: C

10. Which choice best defines the Windows NT Security Account Manager?
A. The portion of the GINA DLL that controls security
B. The database containing the identities and credentials of users
C. The name of the machine responsible for management of all security on the LAN
D. The interface that is responsible for logging on and user IDs
Answer: B

11. Andreas wants to choose a strong password for his computer. Which of the following should he include in his password?
A. A mixture of uppercase and lowercase letters, symbols and numbers
B. An arcane phrase only he can remember
C. An incorrect spelling of a word or a phrase
D. A mixture of random words that form non-sense
Answer: A

12. Which of the following is the most desirable goal that UNIX system crackers typically hope to achieve?
A. To be able to write a message on the compromised computer's Web page
B. To be able to plant a virus that will wipe out the entire user database
C. To gain root privileges
D. To alter the /var/log/messages file and thus escape detection
Answer: C

13. What is the best way to prevent employees on a LAN from performing unauthorized activities or other mischief?
A. Reduce each user's permissions to the minimum needed to perform the tasks required by his or her job
B. Limit the number of user logins available to one at a time
C. Limit the number of files that any one user can have open at any given time
D. Implement a strict policy to dismiss employees who load games or other unauthorized software on the company's computers
Answer: A

14. When setting up Microsoft Internet Information Server (IIS) in either Windows NT or Windows 2000, what should you change to help provide security?
A. The default accounts must be renamed because they pose a security problem.
B. The domain controller must be queried for the default encryption for the user database.
C. The administrator must import default admin profiles for secure administration rights.
D. The default users must be trained in the errata and security features of Internet Information Manager.
Answer: A

15. Why is password lockout an effective deterrent to cracking attempts?
A. Passwords cannot be changed through brute-force methods.
B. A limited number of login attempts before lockout reduces the number of guesses the potential cracker can make.
C. Passwords protected in this manner are impossible to find because they are locked out of the main flow of information on the WAN.
D. Password lockout provides no real improvement over traditional locking methods.
Answer: B

16. Tavo wants to check the status of failed Telnet-based login attempts on a Linux machine he administers. Which shell command can he use to see only that information?
A. cat /etc/passwd > newfile.txt
B. grep login /var/log/messages
C. more /var/log/secure
D. more /etc/passwd
Answer: B

17. What is problematic about a new NTFS partition?
A. The "everyone" group has unrestricted access permissions on the new partition, thus restricting access to the new partition becomes problematic.
B. NTFS cannot read user/group permission tables on FAT systems, thus the group permission file must be kept in the same file format as the new partition.
C. The "admin" group has exclusive access to the new partition, thus getting client machines to see the new partitions can be problematic.
D. NTFS allows only the root user to access it, thus it is difficult to divide the new partition.
Answer: A

18. Why would a Windows NT/2000 administrator place the operating system, the program files and the data on different, discrete directories?
A. To avoid confusion and duplication of upgrades between applications and the operating system
B. To enhance security by modifying permissions for each resource as needed
C. To restrict users from accidentally overwriting critical files (if they fill their home directories to capacity), which makes the operating system vulnerable to hacker attacks
D. To keep the operating system partition from becoming overwhelmed with user program libraries and DLLs
Answer: B

19. Which of the following best describes the problem with share permissions and share points in Windows NT/2000?
A. Share points must be the same value as the directory that serves the share point.
B. Share points contain permissions, and any file under the share point must possess the same permissions.
C. Share permissions are exclusive to root directories and files; they do not involve share points, which define user permissions.
D. Share points are set when connection is established, therefore the static nature of file permissions can conflict with share points if they are not set with read and write permissions for everyone.
Answer: B

20. Lucy wants to ensure that her Windows NT Server 4.0 and Windows 2000 systems do not incur any unauthorized changes. What can she do to help secure her registry from changes?
A. Lock the registry so that it cannot be written to by any application.
B. Enable auditing.
C. Back up the registry.
D. Configure the registry so that it does not change.
Answer: B

21. You must apply permissions to a file named /projects/group1/myfile.txt, and you need to fulfill the following requirements: You want full access to the file. People in your group should be able to read the file. People in your group should not be able to write to the file. People outside of your group should be denied access to the file. What are the most secure permissions you would apply to this file?
A. chage 700 /home/myname/myfile.txt
B. chage 744 /home/myname/myfile.txt
C. chmod 640 /home/myname.myfile.txt
D. chmod 064 /home/myname/myfile.txt
Answer: C

22. What is a spoofing attack?
A. A hacker obtains access to the root account and poses as the system administrator.
B. A hacker calls a user and obtains the user’s password.
C. A computer (or network) poses as a trusted host (or network).
D. A hacker gains entrance to the building where the network resides and accesses the system by pretending to be an employee.
Answer: C

23. What is the primary function of IPsec?
A. It thwarts denial-of-service attacks.
B. It provides encryption.
C. It authenticates users.
D. It provides access control.
Answer: B

24. A computer on your network is responding very slowly to network requests, and then it stops responding at all. You use a packet sniffer and create a filter that views packets being sent to that host. You see that the host is receiving thousands of ICMP packets a minute. What type of attack is causing the system to slow down?
A. A spoofing attack
B. A root kit installed on the system
C. A denial-of-service attack
D. A man-in-the-middle attack
Answer: C

25. Why is the rlogin command dangerous to network security?
A. Remote logins are a security threat regardless of the protocol and should be avoided.
B. There is no way to prevent the user from becoming root if he successfully uses rlogin.
C. The rlogin command has a history of buffer overflows that has not been corrected.
D. The rlogin command relies on IP-based authentication, which is easily defeated.
Answer: D

26. What is the major security issue with standard NIS (Network Information System)?
A. It is impossible to enforce a centralized login scheme.
B. NIS provides no authentication requirement in its native state.
C. There is no way to encrypt data being transferred.
D. NIS is a legacy service used only in older, less secure operating systems and networks.
Answer: C

27. What are the security issues that arise in the use of the NFS (Network File System)?
A. Synchronization of user and group IDs is poor, so it is easy to spoof trusted hosts and user names.
B. The lack of logging in one place or on one machine, and the multiple logs this requires, can create bottlenecks.
C. The possibility arises for cleartext passwords to be sniffed on the network if it does not use Secure RPC.
D. NFS uses a weak authentication scheme and transfers information in unencrypted form.
Answer: D

28. What is the purpose of blocking services on any given server?
A. To limit the number of targets a cracker can choose from
B. To limit the number of processes that run at any given time, enhancing response time in case of a security breach
C. To keep the operating system and its processes as simple as possible so administration is easier
D. None; most services are needed and pose only minor security threats.
Answer: A

29. Which single service can you disable to stop approximately two-thirds of the exploitation tools used against Windows NT/2000?
A. The Schedule service
B. The POSIX subsystem with the C2Config tool
C. The Ansi.sys from the boot loader
D. The NetBIOS service
Answer: D

30. In a Linux system running inetd, how do you stop the POP3, IMAPD and FTP services?
A. By changing the permissions on the configuration file that controls the service (/sbin/inetd), then recompiling /etc/inetd.conf
B. By commenting out the service using the # symbol in the text file /etc/inetd.conf, then restarting the inetd daemon
C. By recompiling the system kernel, ensuring you have disabled that service
D. By commenting out the service using the $ symbol in the text file /etc/inetd.conf, then restarting the inetd daemon
Answer: B

© 2014, All Rights Reserved