1D0-671試験無料問題集「CIW Web Security Associate 認定」

Which of the following is a common problem with proxy servers?

You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a network.
Which form of encryption should you use?

A security breach has occurred involving the company e-commerce server. Customer credit card data has been released to unauthorized third parties.
Which of the following lists the appropriate parties to inform?

A CGI application on the company's Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information.
Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?

Which choice lists the designated stages of a hacker attack in the correct order?

You are using a PKI solution that is based on Secure Sockets Layer (SSL).
Which of the following describes the function of the asymmetric-key-encryption algorithm used?

Which of the following activities is the most effective at keeping the actions of nae end users from putting the company's physical and logical resources at risk?

You want to create a certificate for use in a Secure Sockets Layer (SSL) session.
Which of the following is responsible for verifying the identity of an individual and also issuing the certificate?

You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target.
Which of the following will accomplish this goal?

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server.
When fulfilling this request, which of the following resources should you audit the most aggressively?