1D0-571 Free Sample Questions

v5 Security Essentials Practice Test
6/62 questions · Unlock full access
Q1

Which of the following is a primary auditing activity?

Q2

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?

Q3

You have discovered that the Is, su and ps commands no longer function as expected. They do not return information in a manner similar to any other Linux system. Also, the implementation of Tripwire you have installed on this server is returning new hash values. Which of the following has most likely occurred?

Q4

A disgruntled employee has discovered that the company Web server is not protected against a particular buffer overflow vulnerability. The disgruntled employee has created an application to take advantage of this vulnerability and secretly obtain sensitive data from the Web server's hard disk. This application sends a set of packets to the Web server that causes it to present an unauthenticated terminal with root privileges. What is the name for this particular type of attack?

Q5

Which of the following details should be included in documentation of an attack?

Q6

At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?