{"id":84643,"date":"2024-07-23T03:33:29","date_gmt":"2024-07-23T03:33:29","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=84643"},"modified":"2024-07-23T03:33:34","modified_gmt":"2024-07-23T03:33:34","slug":"latest-1d0-671-dumps-v8-02-the-most-effective-study-materials-for-ciw-web-security-associate-exam-preparation","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/latest-1d0-671-dumps-v8-02-the-most-effective-study-materials-for-ciw-web-security-associate-exam-preparation.html","title":{"rendered":"Latest 1D0-671 Dumps (V8.02) &#8211; The Most Effective Study Materials for CIW Web Security Associate Exam Preparation"},"content":{"rendered":"\n<p>Are you still looking for the most effective study materials to prepare for your CIW Web Security Associate 1D0-671 exam? DumpsBase has the1D0-671 dumps to make preparations now. The latest 1D0-671 dumps (V8.02), containing the latest practice exam questions, are based on specific details and skills, providing a comprehensive understanding that will be beneficial for your exam preparations. 1D0-671 exam demonstrates you have the technical skills and knowledge to manage and protect the security of online data, from a single computer to an entire corporate network. The 1D0-671 dumps are meticulously crafted to cover all the essential topics and skills required for the CIW Web Security Associate certification. By studying the latest CIW 1D0-671 dumps, you can develop a deep understanding of web security principles, threats, and defense mechanisms. Make sure to take advantage of the <a href=\"https:\/\/www.dumpsbase.com\/news\/Choose_1D0-671_Dumps_from_DumpsBase_to_Practice_the_Latest_1D0-671_Exam_Questions_Regularly.html\"><em><strong>1D0-671 dumps<\/strong><\/em><\/a> to maximize your study efforts and achieve your Web Security Associate certification goals.<\/p>\n<h2>Check CIW Web Security Associate <em><span style=\"background-color: #00ffff;\">1D0-671 Free Dumps Below<\/span><\/em><\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam8836\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-8836\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-8836\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-345197'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Which of the following causes problems with firewalls<\/div><input type='hidden' name='question_id[]' id='qID_1' value='345197' \/><input type='hidden' id='answerType345197' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345197[]' id='answer-id-1349658' class='answer   answerof-345197 ' value='1349658'   \/><label for='answer-id-1349658' id='answer-label-1349658' class=' answer'><span>Control FTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345197[]' id='answer-id-1349659' class='answer   answerof-345197 ' value='1349659'   \/><label for='answer-id-1349659' id='answer-label-1349659' class=' answer'><span>Data FTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345197[]' id='answer-id-1349660' class='answer   answerof-345197 ' value='1349660'   \/><label for='answer-id-1349660' id='answer-label-1349660' class=' answer'><span>Active FTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345197[]' id='answer-id-1349661' class='answer   answerof-345197 ' value='1349661'   \/><label for='answer-id-1349661' id='answer-label-1349661' class=' answer'><span>Passive FTP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-345198'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>In relation to security, which of the following is the primary benefit of classifying systems?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='345198' \/><input type='hidden' id='answerType345198' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345198[]' id='answer-id-1349662' class='answer   answerof-345198 ' value='1349662'   \/><label for='answer-id-1349662' id='answer-label-1349662' class=' answer'><span>Ability to identify common attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345198[]' id='answer-id-1349663' class='answer   answerof-345198 ' value='1349663'   \/><label for='answer-id-1349663' id='answer-label-1349663' class=' answer'><span>Identification of highest-priority systems to protect<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345198[]' id='answer-id-1349664' class='answer   answerof-345198 ' value='1349664'   \/><label for='answer-id-1349664' id='answer-label-1349664' class=' answer'><span>Ability to recover quickly from a natural or man-made disaster<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345198[]' id='answer-id-1349665' class='answer   answerof-345198 ' value='1349665'   \/><label for='answer-id-1349665' id='answer-label-1349665' class=' answer'><span>Collection of information for properly configuring the firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-345199'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. <br \/>\r<br>The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then used this information to obtain the files she needs to complete her task using Mozilla Firefox. <br \/>\r<br>Which of the following is a primary risk factor when authenticating with a standard HTTP server?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='345199' \/><input type='hidden' id='answerType345199' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345199[]' id='answer-id-1349666' class='answer   answerof-345199 ' value='1349666'   \/><label for='answer-id-1349666' id='answer-label-1349666' class=' answer'><span>HTTP uses cleartext transmission during authentication, which can lead to a man-in-the- middle attack.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345199[]' id='answer-id-1349667' class='answer   answerof-345199 ' value='1349667'   \/><label for='answer-id-1349667' id='answer-label-1349667' class=' answer'><span>Irina has used the wrong application for this protocol, thus increasing the likelihood of a man-in- the-middle attack.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345199[]' id='answer-id-1349668' class='answer   answerof-345199 ' value='1349668'   \/><label for='answer-id-1349668' id='answer-label-1349668' class=' answer'><span>A standard HTTP connection uses public-key encryption that is not sufficiently strong, inviting the possibility of a man-in-the-middle attack.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345199[]' id='answer-id-1349669' class='answer   answerof-345199 ' value='1349669'   \/><label for='answer-id-1349669' id='answer-label-1349669' class=' answer'><span>Irina has accessed the Web server using a non-standard Web browser.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-345200'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>You have been assigned to provide security measures for your office's reception area. Although the company needs to provide security measures, costs must be kept to a minimum. <br \/>\r<br>Which of the following tools is the most appropriate choice?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='345200' \/><input type='hidden' id='answerType345200' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345200[]' id='answer-id-1349670' class='answer   answerof-345200 ' value='1349670'   \/><label for='answer-id-1349670' id='answer-label-1349670' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345200[]' id='answer-id-1349671' class='answer   answerof-345200 ' value='1349671'   \/><label for='answer-id-1349671' id='answer-label-1349671' class=' answer'><span>Intrusion-detection system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345200[]' id='answer-id-1349672' class='answer   answerof-345200 ' value='1349672'   \/><label for='answer-id-1349672' id='answer-label-1349672' class=' answer'><span>Camera<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345200[]' id='answer-id-1349673' class='answer   answerof-345200 ' value='1349673'   \/><label for='answer-id-1349673' id='answer-label-1349673' class=' answer'><span>Security guard<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-345201'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Which symmetric algorithm created by the RSA Security Corporation is a stream cipher that encrypts messages as a whole, in real time?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='345201' \/><input type='hidden' id='answerType345201' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345201[]' id='answer-id-1349674' class='answer   answerof-345201 ' value='1349674'   \/><label for='answer-id-1349674' id='answer-label-1349674' class=' answer'><span>RC4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345201[]' id='answer-id-1349675' class='answer   answerof-345201 ' value='1349675'   \/><label for='answer-id-1349675' id='answer-label-1349675' class=' answer'><span>RC6<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345201[]' id='answer-id-1349676' class='answer   answerof-345201 ' value='1349676'   \/><label for='answer-id-1349676' id='answer-label-1349676' class=' answer'><span>RC5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345201[]' id='answer-id-1349677' class='answer   answerof-345201 ' value='1349677'   \/><label for='answer-id-1349677' id='answer-label-1349677' class=' answer'><span>RC2<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-345202'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>Your firewall is configured to forbid all internal traffic from going out to the Internet. You want to allow internal clients to access all Web traffic. <br \/>\r<br>At a minimum, what ports must you open in regards to the internal systems?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='345202' \/><input type='hidden' id='answerType345202' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345202[]' id='answer-id-1349678' class='answer   answerof-345202 ' value='1349678'   \/><label for='answer-id-1349678' id='answer-label-1349678' class=' answer'><span>TCP Port 80 and all ports above 1023<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345202[]' id='answer-id-1349679' class='answer   answerof-345202 ' value='1349679'   \/><label for='answer-id-1349679' id='answer-label-1349679' class=' answer'><span>TCP Ports 80 and 443, and all ports above 1023<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345202[]' id='answer-id-1349680' class='answer   answerof-345202 ' value='1349680'   \/><label for='answer-id-1349680' id='answer-label-1349680' class=' answer'><span>All TCP ports above 80 and below 1023<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345202[]' id='answer-id-1349681' class='answer   answerof-345202 ' value='1349681'   \/><label for='answer-id-1349681' id='answer-label-1349681' class=' answer'><span>TCP Ports 80 and 443<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-345203'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>The vast majority of hackers are which type of attacker?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='345203' \/><input type='hidden' id='answerType345203' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345203[]' id='answer-id-1349682' class='answer   answerof-345203 ' value='1349682'   \/><label for='answer-id-1349682' id='answer-label-1349682' class=' answer'><span>Casual attacker<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345203[]' id='answer-id-1349683' class='answer   answerof-345203 ' value='1349683'   \/><label for='answer-id-1349683' id='answer-label-1349683' class=' answer'><span>Spy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345203[]' id='answer-id-1349684' class='answer   answerof-345203 ' value='1349684'   \/><label for='answer-id-1349684' id='answer-label-1349684' class=' answer'><span>Disgruntled employee<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345203[]' id='answer-id-1349685' class='answer   answerof-345203 ' value='1349685'   \/><label for='answer-id-1349685' id='answer-label-1349685' class=' answer'><span>Determined attacker<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-345204'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>The best way to thwart a dictionary attack is by enforcing a:<\/div><input type='hidden' name='question_id[]' id='qID_8' value='345204' \/><input type='hidden' id='answerType345204' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345204[]' id='answer-id-1349686' class='answer   answerof-345204 ' value='1349686'   \/><label for='answer-id-1349686' id='answer-label-1349686' class=' answer'><span>strong password policy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345204[]' id='answer-id-1349687' class='answer   answerof-345204 ' value='1349687'   \/><label for='answer-id-1349687' id='answer-label-1349687' class=' answer'><span>restricted access policy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345204[]' id='answer-id-1349688' class='answer   answerof-345204 ' value='1349688'   \/><label for='answer-id-1349688' id='answer-label-1349688' class=' answer'><span>firewall configuration policy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345204[]' id='answer-id-1349689' class='answer   answerof-345204 ' value='1349689'   \/><label for='answer-id-1349689' id='answer-label-1349689' class=' answer'><span>proxy server policy.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-345205'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='345205' \/><input type='hidden' id='answerType345205' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345205[]' id='answer-id-1349690' class='answer   answerof-345205 ' value='1349690'   \/><label for='answer-id-1349690' id='answer-label-1349690' class=' answer'><span>Updating the company vulnerability scanner and conducting a new scan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345205[]' id='answer-id-1349691' class='answer   answerof-345205 ' value='1349691'   \/><label for='answer-id-1349691' id='answer-label-1349691' class=' answer'><span>Adding a buffer overflow rule to the intrusion detection system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345205[]' id='answer-id-1349692' class='answer   answerof-345205 ' value='1349692'   \/><label for='answer-id-1349692' id='answer-label-1349692' class=' answer'><span>Reconfiguring the firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345205[]' id='answer-id-1349693' class='answer   answerof-345205 ' value='1349693'   \/><label for='answer-id-1349693' id='answer-label-1349693' class=' answer'><span>Installing a system update<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-345206'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all. <br \/>\r<br>Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='345206' \/><input type='hidden' id='answerType345206' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345206[]' id='answer-id-1349694' class='answer   answerof-345206 ' value='1349694'   \/><label for='answer-id-1349694' id='answer-label-1349694' class=' answer'><span>Deny all use of UDP above Port 1024.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345206[]' id='answer-id-1349695' class='answer   answerof-345206 ' value='1349695'   \/><label for='answer-id-1349695' id='answer-label-1349695' class=' answer'><span>Configure the firewall to provide VPN access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345206[]' id='answer-id-1349696' class='answer   answerof-345206 ' value='1349696'   \/><label for='answer-id-1349696' id='answer-label-1349696' class=' answer'><span>Configure a second network connection directly to the video conferencing device.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345206[]' id='answer-id-1349697' class='answer   answerof-345206 ' value='1349697'   \/><label for='answer-id-1349697' id='answer-label-1349697' class=' answer'><span>Allow all use of UDP below Port 1024.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-345207'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Which protocol uses cleartext communication by default?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='345207' \/><input type='hidden' id='answerType345207' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345207[]' id='answer-id-1349698' class='answer   answerof-345207 ' value='1349698'   \/><label for='answer-id-1349698' id='answer-label-1349698' class=' answer'><span>HTTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345207[]' id='answer-id-1349699' class='answer   answerof-345207 ' value='1349699'   \/><label for='answer-id-1349699' id='answer-label-1349699' class=' answer'><span>IPSEC<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345207[]' id='answer-id-1349700' class='answer   answerof-345207 ' value='1349700'   \/><label for='answer-id-1349700' id='answer-label-1349700' class=' answer'><span>SSL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345207[]' id='answer-id-1349701' class='answer   answerof-345207 ' value='1349701'   \/><label for='answer-id-1349701' id='answer-label-1349701' class=' answer'><span>POP3<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-345208'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>Which of the following is the primary weakness of symmetric-key encryption?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='345208' \/><input type='hidden' id='answerType345208' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345208[]' id='answer-id-1349702' class='answer   answerof-345208 ' value='1349702'   \/><label for='answer-id-1349702' id='answer-label-1349702' class=' answer'><span>Data encrypted using symmetric-key encryption is subject to corruption during transport.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345208[]' id='answer-id-1349703' class='answer   answerof-345208 ' value='1349703'   \/><label for='answer-id-1349703' id='answer-label-1349703' class=' answer'><span>Symmetric-key encryption operates slower than asymmetric-key encryption.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345208[]' id='answer-id-1349704' class='answer   answerof-345208 ' value='1349704'   \/><label for='answer-id-1349704' id='answer-label-1349704' class=' answer'><span>Symmetric-key encryption does not provide the service of data confidentiality.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345208[]' id='answer-id-1349705' class='answer   answerof-345208 ' value='1349705'   \/><label for='answer-id-1349705' id='answer-label-1349705' class=' answer'><span>Keys created using symmetric-key encryption are difficult to distribute securely.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-345209'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Which component works with an operating system to increase its security ability?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='345209' \/><input type='hidden' id='answerType345209' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345209[]' id='answer-id-1349706' class='answer   answerof-345209 ' value='1349706'   \/><label for='answer-id-1349706' id='answer-label-1349706' class=' answer'><span>Network scanner<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345209[]' id='answer-id-1349707' class='answer   answerof-345209 ' value='1349707'   \/><label for='answer-id-1349707' id='answer-label-1349707' class=' answer'><span>Operating system add-on<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345209[]' id='answer-id-1349708' class='answer   answerof-345209 ' value='1349708'   \/><label for='answer-id-1349708' id='answer-label-1349708' class=' answer'><span>Log analysis tool<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345209[]' id='answer-id-1349709' class='answer   answerof-345209 ' value='1349709'   \/><label for='answer-id-1349709' id='answer-label-1349709' class=' answer'><span>Port scanner<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-345210'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>Which task should you perform first when considering where to place equipment?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='345210' \/><input type='hidden' id='answerType345210' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345210[]' id='answer-id-1349710' class='answer   answerof-345210 ' value='1349710'   \/><label for='answer-id-1349710' id='answer-label-1349710' class=' answer'><span>Conduct research to determine the appropriate products for your organization.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345210[]' id='answer-id-1349711' class='answer   answerof-345210 ' value='1349711'   \/><label for='answer-id-1349711' id='answer-label-1349711' class=' answer'><span>Consult with management to determine specific needs.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345210[]' id='answer-id-1349712' class='answer   answerof-345210 ' value='1349712'   \/><label for='answer-id-1349712' id='answer-label-1349712' class=' answer'><span>Secure funding.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345210[]' id='answer-id-1349713' class='answer   answerof-345210 ' value='1349713'   \/><label for='answer-id-1349713' id='answer-label-1349713' class=' answer'><span>Conduct a needs assessment audit.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-345211'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Danielle was informed by her network administrator that an audit may be conducted during the night to determine the hosts that exist on the network and document any open ports. The next day, Danielle was unable to access any network services. <br \/>\r<br>What may have occurred instead of the anticipated audit?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='345211' \/><input type='hidden' id='answerType345211' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345211[]' id='answer-id-1349714' class='answer   answerof-345211 ' value='1349714'   \/><label for='answer-id-1349714' id='answer-label-1349714' class=' answer'><span>A social engineering attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345211[]' id='answer-id-1349715' class='answer   answerof-345211 ' value='1349715'   \/><label for='answer-id-1349715' id='answer-label-1349715' class=' answer'><span>A zero-day attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345211[]' id='answer-id-1349716' class='answer   answerof-345211 ' value='1349716'   \/><label for='answer-id-1349716' id='answer-label-1349716' class=' answer'><span>A scanning attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345211[]' id='answer-id-1349717' class='answer   answerof-345211 ' value='1349717'   \/><label for='answer-id-1349717' id='answer-label-1349717' class=' answer'><span>A brute-force attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-345212'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>How do activity logs help to implement and maintain a security plan?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='345212' \/><input type='hidden' id='answerType345212' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345212[]' id='answer-id-1349718' class='answer   answerof-345212 ' value='1349718'   \/><label for='answer-id-1349718' id='answer-label-1349718' class=' answer'><span>Activity logs provide advice on firewall installation, because they enable network baseline creation.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345212[]' id='answer-id-1349719' class='answer   answerof-345212 ' value='1349719'   \/><label for='answer-id-1349719' id='answer-label-1349719' class=' answer'><span>Activity logs remind users to log on with strong passwords, because the logs can be analyzed to see if users are complying with policy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345212[]' id='answer-id-1349720' class='answer   answerof-345212 ' value='1349720'   \/><label for='answer-id-1349720' id='answer-label-1349720' class=' answer'><span>Activity logs allow you to determine if and how an unauthorized activity occurred.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345212[]' id='answer-id-1349721' class='answer   answerof-345212 ' value='1349721'   \/><label for='answer-id-1349721' id='answer-label-1349721' class=' answer'><span>Activity logs dissuade would-be hackers from breaching your security.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-345213'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>Which of the following errors most commonly occurs when responding to a security breach?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='345213' \/><input type='hidden' id='answerType345213' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345213[]' id='answer-id-1349722' class='answer   answerof-345213 ' value='1349722'   \/><label for='answer-id-1349722' id='answer-label-1349722' class=' answer'><span>Shutting down network access using the firewall, rather than the network router<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345213[]' id='answer-id-1349723' class='answer   answerof-345213 ' value='1349723'   \/><label for='answer-id-1349723' id='answer-label-1349723' class=' answer'><span>Adhering to the company policy rather than determining actions based on the IT manager's input<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345213[]' id='answer-id-1349724' class='answer   answerof-345213 ' value='1349724'   \/><label for='answer-id-1349724' id='answer-label-1349724' class=' answer'><span>Making snap judgments based on emotions, as opposed to company policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345213[]' id='answer-id-1349725' class='answer   answerof-345213 ' value='1349725'   \/><label for='answer-id-1349725' id='answer-label-1349725' class=' answer'><span>Taking too much time to document the attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-345214'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>What is the term for a self-replicating program or algorithm that consumes system resources?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='345214' \/><input type='hidden' id='answerType345214' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345214[]' id='answer-id-1349726' class='answer   answerof-345214 ' value='1349726'   \/><label for='answer-id-1349726' id='answer-label-1349726' class=' answer'><span>Illicit server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345214[]' id='answer-id-1349727' class='answer   answerof-345214 ' value='1349727'   \/><label for='answer-id-1349727' id='answer-label-1349727' class=' answer'><span>Root kit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345214[]' id='answer-id-1349728' class='answer   answerof-345214 ' value='1349728'   \/><label for='answer-id-1349728' id='answer-label-1349728' class=' answer'><span>Trojan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345214[]' id='answer-id-1349729' class='answer   answerof-345214 ' value='1349729'   \/><label for='answer-id-1349729' id='answer-label-1349729' class=' answer'><span>Worm<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-345215'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Which of the following describes the practice of stateful multi-layer inspection?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='345215' \/><input type='hidden' id='answerType345215' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345215[]' id='answer-id-1349730' class='answer   answerof-345215 ' value='1349730'   \/><label for='answer-id-1349730' id='answer-label-1349730' class=' answer'><span>Using a VLAN on a firewall to enable masquerading of private IP addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345215[]' id='answer-id-1349731' class='answer   answerof-345215 ' value='1349731'   \/><label for='answer-id-1349731' id='answer-label-1349731' class=' answer'><span>Prioritizing voice and video data to reduce congestion<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345215[]' id='answer-id-1349732' class='answer   answerof-345215 ' value='1349732'   \/><label for='answer-id-1349732' id='answer-label-1349732' class=' answer'><span>Inspecting packets in all layers of the OSI\/RM with a packet filter<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345215[]' id='answer-id-1349733' class='answer   answerof-345215 ' value='1349733'   \/><label for='answer-id-1349733' id='answer-label-1349733' class=' answer'><span>Using Quality of Service (QoS) on a proxy-oriented firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-345216'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Which term describes a dedicated system meant only to house firewall software?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='345216' \/><input type='hidden' id='answerType345216' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345216[]' id='answer-id-1349734' class='answer   answerof-345216 ' value='1349734'   \/><label for='answer-id-1349734' id='answer-label-1349734' class=' answer'><span>Firewall appliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345216[]' id='answer-id-1349735' class='answer   answerof-345216 ' value='1349735'   \/><label for='answer-id-1349735' id='answer-label-1349735' class=' answer'><span>Virtual Private Network (VPN)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345216[]' id='answer-id-1349736' class='answer   answerof-345216 ' value='1349736'   \/><label for='answer-id-1349736' id='answer-label-1349736' class=' answer'><span>Kernel firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345216[]' id='answer-id-1349737' class='answer   answerof-345216 ' value='1349737'   \/><label for='answer-id-1349737' id='answer-label-1349737' class=' answer'><span>Proxy server<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-345217'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='345217' \/><input type='hidden' id='answerType345217' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345217[]' id='answer-id-1349738' class='answer   answerof-345217 ' value='1349738'   \/><label for='answer-id-1349738' id='answer-label-1349738' class=' answer'><span>Determining the number of security associations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345217[]' id='answer-id-1349739' class='answer   answerof-345217 ' value='1349739'   \/><label for='answer-id-1349739' id='answer-label-1349739' class=' answer'><span>Negotiating the authentication method<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345217[]' id='answer-id-1349740' class='answer   answerof-345217 ' value='1349740'   \/><label for='answer-id-1349740' id='answer-label-1349740' class=' answer'><span>Determining the network identification number<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345217[]' id='answer-id-1349741' class='answer   answerof-345217 ' value='1349741'   \/><label for='answer-id-1349741' id='answer-label-1349741' class=' answer'><span>Negotiating the version of IP to be used<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-345218'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. <br \/>\r<br>Which of the following techniques will best help reduce the severity of this attack?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='345218' \/><input type='hidden' id='answerType345218' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345218[]' id='answer-id-1349742' class='answer   answerof-345218 ' value='1349742'   \/><label for='answer-id-1349742' id='answer-label-1349742' class=' answer'><span>Filtering traffic at the firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345218[]' id='answer-id-1349743' class='answer   answerof-345218 ' value='1349743'   \/><label for='answer-id-1349743' id='answer-label-1349743' class=' answer'><span>Changing your ISP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345218[]' id='answer-id-1349744' class='answer   answerof-345218 ' value='1349744'   \/><label for='answer-id-1349744' id='answer-label-1349744' class=' answer'><span>Installing Apache Server rather than Microsoft IIS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345218[]' id='answer-id-1349745' class='answer   answerof-345218 ' value='1349745'   \/><label for='answer-id-1349745' id='answer-label-1349745' class=' answer'><span>Placing the database and the Web server on separate systems<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-345219'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Consider the following image of a packet capture: <br \/>\r<br>Which of the following best describes the protocol used, along with its primary benefit?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='345219' \/><input type='hidden' id='answerType345219' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345219[]' id='answer-id-1349746' class='answer   answerof-345219 ' value='1349746'   \/><label for='answer-id-1349746' id='answer-label-1349746' class=' answer'><span>It is a passive FTP session, which is easier for firewalls to process.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345219[]' id='answer-id-1349747' class='answer   answerof-345219 ' value='1349747'   \/><label for='answer-id-1349747' id='answer-label-1349747' class=' answer'><span>It is an active FTP session, which is necessary in order to support IPv6.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345219[]' id='answer-id-1349748' class='answer   answerof-345219 ' value='1349748'   \/><label for='answer-id-1349748' id='answer-label-1349748' class=' answer'><span>It is an extended passive FTP session, which is necessary to support IPv6.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345219[]' id='answer-id-1349749' class='answer   answerof-345219 ' value='1349749'   \/><label for='answer-id-1349749' id='answer-label-1349749' class=' answer'><span>It is an active FTP session, which is supported by all FTP clients.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-345220'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>What is the primary advantage of using a circuit-level proxy?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='345220' \/><input type='hidden' id='answerType345220' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345220[]' id='answer-id-1349750' class='answer   answerof-345220 ' value='1349750'   \/><label for='answer-id-1349750' id='answer-label-1349750' class=' answer'><span>It provides Network Address Translation (NAT).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345220[]' id='answer-id-1349751' class='answer   answerof-345220 ' value='1349751'   \/><label for='answer-id-1349751' id='answer-label-1349751' class=' answer'><span>It can discriminate between good and malicious data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345220[]' id='answer-id-1349752' class='answer   answerof-345220 ' value='1349752'   \/><label for='answer-id-1349752' id='answer-label-1349752' class=' answer'><span>It allows applications to provide connection information to the SOCKS server.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345220[]' id='answer-id-1349753' class='answer   answerof-345220 ' value='1349753'   \/><label for='answer-id-1349753' id='answer-label-1349753' class=' answer'><span>It allows masquerading.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-345221'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>A flaw is discovered in an application. Before a patch is available, this vulnerability is used to gain access to sensitive data. <br \/>\r<br>What type of attack is being described?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='345221' \/><input type='hidden' id='answerType345221' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345221[]' id='answer-id-1349754' class='answer   answerof-345221 ' value='1349754'   \/><label for='answer-id-1349754' id='answer-label-1349754' class=' answer'><span>Social engineering<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345221[]' id='answer-id-1349755' class='answer   answerof-345221 ' value='1349755'   \/><label for='answer-id-1349755' id='answer-label-1349755' class=' answer'><span>Dictionary<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345221[]' id='answer-id-1349756' class='answer   answerof-345221 ' value='1349756'   \/><label for='answer-id-1349756' id='answer-label-1349756' class=' answer'><span>Zero day<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345221[]' id='answer-id-1349757' class='answer   answerof-345221 ' value='1349757'   \/><label for='answer-id-1349757' id='answer-label-1349757' class=' answer'><span>Zero day<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-345222'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which of the following is the simplest, most common firewall design?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='345222' \/><input type='hidden' id='answerType345222' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345222[]' id='answer-id-1349758' class='answer   answerof-345222 ' value='1349758'   \/><label for='answer-id-1349758' id='answer-label-1349758' class=' answer'><span>A dual-homed bastion host<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345222[]' id='answer-id-1349759' class='answer   answerof-345222 ' value='1349759'   \/><label for='answer-id-1349759' id='answer-label-1349759' class=' answer'><span>A screening router<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345222[]' id='answer-id-1349760' class='answer   answerof-345222 ' value='1349760'   \/><label for='answer-id-1349760' id='answer-label-1349760' class=' answer'><span>A screened subnet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345222[]' id='answer-id-1349761' class='answer   answerof-345222 ' value='1349761'   \/><label for='answer-id-1349761' id='answer-label-1349761' class=' answer'><span>A single-homed bastion host<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-345223'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Which security management concept is the ability for a department to accurately determine the costs of using various networking security services?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='345223' \/><input type='hidden' id='answerType345223' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345223[]' id='answer-id-1349762' class='answer   answerof-345223 ' value='1349762'   \/><label for='answer-id-1349762' id='answer-label-1349762' class=' answer'><span>Performance management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345223[]' id='answer-id-1349763' class='answer   answerof-345223 ' value='1349763'   \/><label for='answer-id-1349763' id='answer-label-1349763' class=' answer'><span>Chargeback<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345223[]' id='answer-id-1349764' class='answer   answerof-345223 ' value='1349764'   \/><label for='answer-id-1349764' id='answer-label-1349764' class=' answer'><span>Capacity forecasting<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345223[]' id='answer-id-1349765' class='answer   answerof-345223 ' value='1349765'   \/><label for='answer-id-1349765' id='answer-label-1349765' class=' answer'><span>Amortization<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-345224'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>A CGI application on the company's Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information. <br \/>\r<br>Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='345224' \/><input type='hidden' id='answerType345224' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345224[]' id='answer-id-1349766' class='answer   answerof-345224 ' value='1349766'   \/><label for='answer-id-1349766' id='answer-label-1349766' class=' answer'><span>- Buffer overflow \r\n- Work with the Web developer to solve the problem<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345224[]' id='answer-id-1349767' class='answer   answerof-345224 ' value='1349767'   \/><label for='answer-id-1349767' id='answer-label-1349767' class=' answer'><span>- SQL injection \r\n- Work with a database administrator to solve the problem<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345224[]' id='answer-id-1349768' class='answer   answerof-345224 ' value='1349768'   \/><label for='answer-id-1349768' id='answer-label-1349768' class=' answer'><span>- Denial of service \r\n- Contact the organization that wrote the code for the Web server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345224[]' id='answer-id-1349769' class='answer   answerof-345224 ' value='1349769'   \/><label for='answer-id-1349769' id='answer-label-1349769' class=' answer'><span>- Man-in-the-middle attack \r\n- Contact the company auditor<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-345225'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network. <br \/>\r<br>Which term best describes this device?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='345225' \/><input type='hidden' id='answerType345225' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345225[]' id='answer-id-1349770' class='answer   answerof-345225 ' value='1349770'   \/><label for='answer-id-1349770' id='answer-label-1349770' class=' answer'><span>Screening router<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345225[]' id='answer-id-1349771' class='answer   answerof-345225 ' value='1349771'   \/><label for='answer-id-1349771' id='answer-label-1349771' class=' answer'><span>Bastion host<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345225[]' id='answer-id-1349772' class='answer   answerof-345225 ' value='1349772'   \/><label for='answer-id-1349772' id='answer-label-1349772' class=' answer'><span>Proxy server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345225[]' id='answer-id-1349773' class='answer   answerof-345225 ' value='1349773'   \/><label for='answer-id-1349773' id='answer-label-1349773' class=' answer'><span>Choke router<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-345226'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Which of the following is a common problem with proxy servers?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='345226' \/><input type='hidden' id='answerType345226' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345226[]' id='answer-id-1349774' class='answer   answerof-345226 ' value='1349774'   \/><label for='answer-id-1349774' id='answer-label-1349774' class=' answer'><span>Proxy servers do not log incoming and outgoing access, so you will not be able to see details of successful and failed connections.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345226[]' id='answer-id-1349775' class='answer   answerof-345226 ' value='1349775'   \/><label for='answer-id-1349775' id='answer-label-1349775' class=' answer'><span>Proxy servers cannot filter out specific application-layer traffic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345226[]' id='answer-id-1349776' class='answer   answerof-345226 ' value='1349776'   \/><label for='answer-id-1349776' id='answer-label-1349776' class=' answer'><span>Proxy servers may return old cached information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345226[]' id='answer-id-1349777' class='answer   answerof-345226 ' value='1349777'   \/><label for='answer-id-1349777' id='answer-label-1349777' class=' answer'><span>Because proxy servers do not mask network resources, hackers may be able to access all exposed systems.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-345227'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Consider the following diagram: <br \/>\r<br>Which type of attack is occurring?<\/div><input type='hidden' name='question_id[]' id='qID_31' value='345227' \/><input type='hidden' id='answerType345227' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345227[]' id='answer-id-1349778' class='answer   answerof-345227 ' value='1349778'   \/><label for='answer-id-1349778' id='answer-label-1349778' class=' answer'><span>Polymorphic virus-based attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345227[]' id='answer-id-1349779' class='answer   answerof-345227 ' value='1349779'   \/><label for='answer-id-1349779' id='answer-label-1349779' class=' answer'><span>Denial-of-service attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345227[]' id='answer-id-1349780' class='answer   answerof-345227 ' value='1349780'   \/><label for='answer-id-1349780' id='answer-label-1349780' class=' answer'><span>Distributed denial-of-service attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345227[]' id='answer-id-1349781' class='answer   answerof-345227 ' value='1349781'   \/><label for='answer-id-1349781' id='answer-label-1349781' class=' answer'><span>Man-in-the-middle attack using a packet sniffer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-345228'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='345228' \/><input type='hidden' id='answerType345228' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345228[]' id='answer-id-1349782' class='answer   answerof-345228 ' value='1349782'   \/><label for='answer-id-1349782' id='answer-label-1349782' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345228[]' id='answer-id-1349783' class='answer   answerof-345228 ' value='1349783'   \/><label for='answer-id-1349783' id='answer-label-1349783' class=' answer'><span>Software update<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345228[]' id='answer-id-1349784' class='answer   answerof-345228 ' value='1349784'   \/><label for='answer-id-1349784' id='answer-label-1349784' class=' answer'><span>Intrusion detection system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345228[]' id='answer-id-1349785' class='answer   answerof-345228 ' value='1349785'   \/><label for='answer-id-1349785' id='answer-label-1349785' class=' answer'><span>Network scanner<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-345229'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. <br \/>\r<br>When fulfilling this request, which of the following resources should you audit the most aggressively?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='345229' \/><input type='hidden' id='answerType345229' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345229[]' id='answer-id-1349786' class='answer   answerof-345229 ' value='1349786'   \/><label for='answer-id-1349786' id='answer-label-1349786' class=' answer'><span>Authentication databases, including directory servers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345229[]' id='answer-id-1349787' class='answer   answerof-345229 ' value='1349787'   \/><label for='answer-id-1349787' id='answer-label-1349787' class=' answer'><span>Intrusion detection systems, especially those placed on sensitive networks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345229[]' id='answer-id-1349788' class='answer   answerof-345229 ' value='1349788'   \/><label for='answer-id-1349788' id='answer-label-1349788' class=' answer'><span>Log files on firewall systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345229[]' id='answer-id-1349789' class='answer   answerof-345229 ' value='1349789'   \/><label for='answer-id-1349789' id='answer-label-1349789' class=' answer'><span>Firewall settings for desktop systems<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-345230'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month. <br \/>\r<br>Which of the following is the most likely explanation for this problem?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='345230' \/><input type='hidden' id='answerType345230' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345230[]' id='answer-id-1349790' class='answer   answerof-345230 ' value='1349790'   \/><label for='answer-id-1349790' id='answer-label-1349790' class=' answer'><span>The network scanner needs to be replaced.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345230[]' id='answer-id-1349791' class='answer   answerof-345230 ' value='1349791'   \/><label for='answer-id-1349791' id='answer-label-1349791' class=' answer'><span>The network scanner is no substitute for scans conducted by an individual.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345230[]' id='answer-id-1349792' class='answer   answerof-345230 ' value='1349792'   \/><label for='answer-id-1349792' id='answer-label-1349792' class=' answer'><span>The network scanner has a trojan.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345230[]' id='answer-id-1349793' class='answer   answerof-345230 ' value='1349793'   \/><label for='answer-id-1349793' id='answer-label-1349793' class=' answer'><span>The network scanner needs an update.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-345231'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>Considering physical security, which of the following should you look for when identifying a room that will act as a server room?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='345231' \/><input type='hidden' id='answerType345231' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345231[]' id='answer-id-1349794' class='answer   answerof-345231 ' value='1349794'   \/><label for='answer-id-1349794' id='answer-label-1349794' class=' answer'><span>Electrical outlets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345231[]' id='answer-id-1349795' class='answer   answerof-345231 ' value='1349795'   \/><label for='answer-id-1349795' id='answer-label-1349795' class=' answer'><span>Power over Ethernet (PoE) settings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345231[]' id='answer-id-1349796' class='answer   answerof-345231 ' value='1349796'   \/><label for='answer-id-1349796' id='answer-label-1349796' class=' answer'><span>False ceilings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345231[]' id='answer-id-1349797' class='answer   answerof-345231 ' value='1349797'   \/><label for='answer-id-1349797' id='answer-label-1349797' class=' answer'><span>Space for backup servers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-345232'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>Which two protocols can be found at the transport layer of the TCP\/IP stack?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='345232' \/><input type='hidden' id='answerType345232' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345232[]' id='answer-id-1349798' class='answer   answerof-345232 ' value='1349798'   \/><label for='answer-id-1349798' id='answer-label-1349798' class=' answer'><span>File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345232[]' id='answer-id-1349799' class='answer   answerof-345232 ' value='1349799'   \/><label for='answer-id-1349799' id='answer-label-1349799' class=' answer'><span>Internet Protocol (IP) and Internet Control Message Protocol (ICMP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345232[]' id='answer-id-1349800' class='answer   answerof-345232 ' value='1349800'   \/><label for='answer-id-1349800' id='answer-label-1349800' class=' answer'><span>Post Office Protocol 3 (POP3) and Simple Mail Transfer Protocol (SMTP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345232[]' id='answer-id-1349801' class='answer   answerof-345232 ' value='1349801'   \/><label for='answer-id-1349801' id='answer-label-1349801' class=' answer'><span>Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-345233'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>You are creating an information security policy for your company. <br \/>\r<br>Which of the following activities will help you focus on creating policies for the most important resources?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='345233' \/><input type='hidden' id='answerType345233' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345233[]' id='answer-id-1349802' class='answer   answerof-345233 ' value='1349802'   \/><label for='answer-id-1349802' id='answer-label-1349802' class=' answer'><span>Auditing the firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345233[]' id='answer-id-1349803' class='answer   answerof-345233 ' value='1349803'   \/><label for='answer-id-1349803' id='answer-label-1349803' class=' answer'><span>Implementing non-repudiation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345233[]' id='answer-id-1349804' class='answer   answerof-345233 ' value='1349804'   \/><label for='answer-id-1349804' id='answer-label-1349804' class=' answer'><span>Logging users<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345233[]' id='answer-id-1349805' class='answer   answerof-345233 ' value='1349805'   \/><label for='answer-id-1349805' id='answer-label-1349805' class=' answer'><span>Classifying systems<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-345234'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. <br \/>\r<br>Which of the following is the most effective way to respond to this attack?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='345234' \/><input type='hidden' id='answerType345234' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345234[]' id='answer-id-1349806' class='answer   answerof-345234 ' value='1349806'   \/><label for='answer-id-1349806' id='answer-label-1349806' class=' answer'><span>Installing software updates for the Web server daemon<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345234[]' id='answer-id-1349807' class='answer   answerof-345234 ' value='1349807'   \/><label for='answer-id-1349807' id='answer-label-1349807' class=' answer'><span>Using the POST method instead of the GET method for a Web form<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345234[]' id='answer-id-1349808' class='answer   answerof-345234 ' value='1349808'   \/><label for='answer-id-1349808' id='answer-label-1349808' class=' answer'><span>Installing an intrusion detection service to monitor logins<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345234[]' id='answer-id-1349809' class='answer   answerof-345234 ' value='1349809'   \/><label for='answer-id-1349809' id='answer-label-1349809' class=' answer'><span>Using the GET method instead of the POST method for a Web form<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-345235'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Which of the following security services, as defined by the ISO 7498-2 Security Architecture document, protects against active threats by verifying or maintaining the consistency of information?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='345235' \/><input type='hidden' id='answerType345235' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345235[]' id='answer-id-1349810' class='answer   answerof-345235 ' value='1349810'   \/><label for='answer-id-1349810' id='answer-label-1349810' class=' answer'><span>Data confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345235[]' id='answer-id-1349811' class='answer   answerof-345235 ' value='1349811'   \/><label for='answer-id-1349811' id='answer-label-1349811' class=' answer'><span>Authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345235[]' id='answer-id-1349812' class='answer   answerof-345235 ' value='1349812'   \/><label for='answer-id-1349812' id='answer-label-1349812' class=' answer'><span>Non-repudiation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345235[]' id='answer-id-1349813' class='answer   answerof-345235 ' value='1349813'   \/><label for='answer-id-1349813' id='answer-label-1349813' class=' answer'><span>Data integrity<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-345236'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>What is the primary strength of symmetric-key encryption?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='345236' \/><input type='hidden' id='answerType345236' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345236[]' id='answer-id-1349814' class='answer   answerof-345236 ' value='1349814'   \/><label for='answer-id-1349814' id='answer-label-1349814' class=' answer'><span>It allows easy and secure exchange of the secret key.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345236[]' id='answer-id-1349815' class='answer   answerof-345236 ' value='1349815'   \/><label for='answer-id-1349815' id='answer-label-1349815' class=' answer'><span>It creates a ash?of a text, enabling data integrity.It creates a ?ash?of a text, enabling data integrity.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345236[]' id='answer-id-1349816' class='answer   answerof-345236 ' value='1349816'   \/><label for='answer-id-1349816' id='answer-label-1349816' class=' answer'><span>It can encrypt large amounts of data very quickly.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345236[]' id='answer-id-1349817' class='answer   answerof-345236 ' value='1349817'   \/><label for='answer-id-1349817' id='answer-label-1349817' class=' answer'><span>It provides non-repudiation services more efficiently than asymmetric-key encryption.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-345237'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>Why can instant messaging (IM) and peer-to-peer (P2P) applications be considered a threat to network security?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='345237' \/><input type='hidden' id='answerType345237' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345237[]' id='answer-id-1349818' class='answer   answerof-345237 ' value='1349818'   \/><label for='answer-id-1349818' id='answer-label-1349818' class=' answer'><span>Because they use ports above 1023 and many firewalls are not configured to block this traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345237[]' id='answer-id-1349819' class='answer   answerof-345237 ' value='1349819'   \/><label for='answer-id-1349819' id='answer-label-1349819' class=' answer'><span>Because they are susceptible to VLAN hopping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345237[]' id='answer-id-1349820' class='answer   answerof-345237 ' value='1349820'   \/><label for='answer-id-1349820' id='answer-label-1349820' class=' answer'><span>Because they usually lie outside the broadcast domain<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345237[]' id='answer-id-1349821' class='answer   answerof-345237 ' value='1349821'   \/><label for='answer-id-1349821' id='answer-label-1349821' class=' answer'><span>Because they use ports below 1023 and many firewalls are not configured to block this traffic<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-345238'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>You have discovered that the ls, su and ps commands no longer function as expected. They do not return information in a manner similar to any other Linux system. Also, the implementation of Tripwire you have installed on this server is returning new hash values. <br \/>\r<br>Which of the following has most likely occurred?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='345238' \/><input type='hidden' id='answerType345238' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345238[]' id='answer-id-1349822' class='answer   answerof-345238 ' value='1349822'   \/><label for='answer-id-1349822' id='answer-label-1349822' class=' answer'><span>A trojan has attacked the system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345238[]' id='answer-id-1349823' class='answer   answerof-345238 ' value='1349823'   \/><label for='answer-id-1349823' id='answer-label-1349823' class=' answer'><span>A SQL injection attack has occurred.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345238[]' id='answer-id-1349824' class='answer   answerof-345238 ' value='1349824'   \/><label for='answer-id-1349824' id='answer-label-1349824' class=' answer'><span>A spyware application has been installed.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345238[]' id='answer-id-1349825' class='answer   answerof-345238 ' value='1349825'   \/><label for='answer-id-1349825' id='answer-label-1349825' class=' answer'><span>A root kit has been installed on the system.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-345239'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>At what layer of the OSI\/RM does a packet filter operate?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='345239' \/><input type='hidden' id='answerType345239' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345239[]' id='answer-id-1349826' class='answer   answerof-345239 ' value='1349826'   \/><label for='answer-id-1349826' id='answer-label-1349826' class=' answer'><span>Layer 1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345239[]' id='answer-id-1349827' class='answer   answerof-345239 ' value='1349827'   \/><label for='answer-id-1349827' id='answer-label-1349827' class=' answer'><span>Layer 3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345239[]' id='answer-id-1349828' class='answer   answerof-345239 ' value='1349828'   \/><label for='answer-id-1349828' id='answer-label-1349828' class=' answer'><span>Layer 5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345239[]' id='answer-id-1349829' class='answer   answerof-345239 ' value='1349829'   \/><label for='answer-id-1349829' id='answer-label-1349829' class=' answer'><span>Layer 7<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-345240'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>What would be the result if you were the recipient of a SYN flood or malformed packet?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='345240' \/><input type='hidden' id='answerType345240' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345240[]' id='answer-id-1349830' class='answer   answerof-345240 ' value='1349830'   \/><label for='answer-id-1349830' id='answer-label-1349830' class=' answer'><span>You would be unable to access a legitimate service, such as establishing a network connection.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345240[]' id='answer-id-1349831' class='answer   answerof-345240 ' value='1349831'   \/><label for='answer-id-1349831' id='answer-label-1349831' class=' answer'><span>The files on your boot sector would be replaced with infected code.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345240[]' id='answer-id-1349832' class='answer   answerof-345240 ' value='1349832'   \/><label for='answer-id-1349832' id='answer-label-1349832' class=' answer'><span>A virus would be unleashed on your system at the time the SYN flood or malformed packet was received.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345240[]' id='answer-id-1349833' class='answer   answerof-345240 ' value='1349833'   \/><label for='answer-id-1349833' id='answer-label-1349833' class=' answer'><span>You would be misdirected to a fraudulent Web site without your knowledge or consent.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-345241'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target. <br \/>\r<br>Which of the following will accomplish this goal?<\/div><input type='hidden' name='question_id[]' id='qID_45' value='345241' \/><input type='hidden' id='answerType345241' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345241[]' id='answer-id-1349834' class='answer   answerof-345241 ' value='1349834'   \/><label for='answer-id-1349834' id='answer-label-1349834' class=' answer'><span>Reinstall the LDAP service on the server so that it is updated and more secure.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345241[]' id='answer-id-1349835' class='answer   answerof-345241 ' value='1349835'   \/><label for='answer-id-1349835' id='answer-label-1349835' class=' answer'><span>Install an application that creates checksums of the contents on the hard disk.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345241[]' id='answer-id-1349836' class='answer   answerof-345241 ' value='1349836'   \/><label for='answer-id-1349836' id='answer-label-1349836' class=' answer'><span>Create a login script for the administrative account that records logins to a separate server.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345241[]' id='answer-id-1349837' class='answer   answerof-345241 ' value='1349837'   \/><label for='answer-id-1349837' id='answer-label-1349837' class=' answer'><span>Create a dummy administrator account on the system so that a potential hacker is distracted from the real login account.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-345242'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>Which of the following details should be included in documentation of an attack?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='345242' \/><input type='hidden' id='answerType345242' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345242[]' id='answer-id-1349838' class='answer   answerof-345242 ' value='1349838'   \/><label for='answer-id-1349838' id='answer-label-1349838' class=' answer'><span>An overview of the security policy and suggestions for the next response plan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345242[]' id='answer-id-1349839' class='answer   answerof-345242 ' value='1349839'   \/><label for='answer-id-1349839' id='answer-label-1349839' class=' answer'><span>Estimates of how much the attack cost the company, and a list of the applications used by the attacker<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345242[]' id='answer-id-1349840' class='answer   answerof-345242 ' value='1349840'   \/><label for='answer-id-1349840' id='answer-label-1349840' class=' answer'><span>The time and date of the attack, and the names of employees who were contacted during the response<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345242[]' id='answer-id-1349841' class='answer   answerof-345242 ' value='1349841'   \/><label for='answer-id-1349841' id='answer-label-1349841' class=' answer'><span>The network resources involved in the attack, and recommendations for thwarting future attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-345243'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>What is the most common attack method against TCP?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='345243' \/><input type='hidden' id='answerType345243' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345243[]' id='answer-id-1349842' class='answer   answerof-345243 ' value='1349842'   \/><label for='answer-id-1349842' id='answer-label-1349842' class=' answer'><span>Illicit server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345243[]' id='answer-id-1349843' class='answer   answerof-345243 ' value='1349843'   \/><label for='answer-id-1349843' id='answer-label-1349843' class=' answer'><span>Trojan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345243[]' id='answer-id-1349844' class='answer   answerof-345243 ' value='1349844'   \/><label for='answer-id-1349844' id='answer-label-1349844' class=' answer'><span>IP address spoofing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345243[]' id='answer-id-1349845' class='answer   answerof-345243 ' value='1349845'   \/><label for='answer-id-1349845' id='answer-label-1349845' class=' answer'><span>SYN flood attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-345244'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>What is the first tool needed to create a secure networking environment?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='345244' \/><input type='hidden' id='answerType345244' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345244[]' id='answer-id-1349846' class='answer   answerof-345244 ' value='1349846'   \/><label for='answer-id-1349846' id='answer-label-1349846' class=' answer'><span>User authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345244[]' id='answer-id-1349847' class='answer   answerof-345244 ' value='1349847'   \/><label for='answer-id-1349847' id='answer-label-1349847' class=' answer'><span>Confidentiality<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345244[]' id='answer-id-1349848' class='answer   answerof-345244 ' value='1349848'   \/><label for='answer-id-1349848' id='answer-label-1349848' class=' answer'><span>Security policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345244[]' id='answer-id-1349849' class='answer   answerof-345244 ' value='1349849'   \/><label for='answer-id-1349849' id='answer-label-1349849' class=' answer'><span>Auditing<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-345245'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. <br \/>\r<br>Which type of attack is this?<\/div><input type='hidden' name='question_id[]' id='qID_49' value='345245' \/><input type='hidden' id='answerType345245' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345245[]' id='answer-id-1349850' class='answer   answerof-345245 ' value='1349850'   \/><label for='answer-id-1349850' id='answer-label-1349850' class=' answer'><span>Brute force<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345245[]' id='answer-id-1349851' class='answer   answerof-345245 ' value='1349851'   \/><label for='answer-id-1349851' id='answer-label-1349851' class=' answer'><span>Denial of service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345245[]' id='answer-id-1349852' class='answer   answerof-345245 ' value='1349852'   \/><label for='answer-id-1349852' id='answer-label-1349852' class=' answer'><span>Botnet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345245[]' id='answer-id-1349853' class='answer   answerof-345245 ' value='1349853'   \/><label for='answer-id-1349853' id='answer-label-1349853' class=' answer'><span>Buffer overflow<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-345246'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>What distinguishes hash encryption from other forms of encryption?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='345246' \/><input type='hidden' id='answerType345246' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345246[]' id='answer-id-1349854' class='answer   answerof-345246 ' value='1349854'   \/><label for='answer-id-1349854' id='answer-label-1349854' class=' answer'><span>Hash encryption creates a mathematically matched key pair in which one half of the pair encrypts, and the other half decrypts.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345246[]' id='answer-id-1349855' class='answer   answerof-345246 ' value='1349855'   \/><label for='answer-id-1349855' id='answer-label-1349855' class=' answer'><span>Hash encryption creates a single key that is used to encrypt and decrypt information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345246[]' id='answer-id-1349856' class='answer   answerof-345246 ' value='1349856'   \/><label for='answer-id-1349856' id='answer-label-1349856' class=' answer'><span>Hash encryption is the encryption method of choice when conducting e-commerce transactions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-345246[]' id='answer-id-1349857' class='answer   answerof-345246 ' value='1349857'   \/><label for='answer-id-1349857' id='answer-label-1349857' class=' answer'><span>Hash encryption is used for information that you want never to be decrypted or read.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-51'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons8836\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"8836\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-10 09:08:50\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1778404130\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"345197:1349658,1349659,1349660,1349661 | 345198:1349662,1349663,1349664,1349665 | 345199:1349666,1349667,1349668,1349669 | 345200:1349670,1349671,1349672,1349673 | 345201:1349674,1349675,1349676,1349677 | 345202:1349678,1349679,1349680,1349681 | 345203:1349682,1349683,1349684,1349685 | 345204:1349686,1349687,1349688,1349689 | 345205:1349690,1349691,1349692,1349693 | 345206:1349694,1349695,1349696,1349697 | 345207:1349698,1349699,1349700,1349701 | 345208:1349702,1349703,1349704,1349705 | 345209:1349706,1349707,1349708,1349709 | 345210:1349710,1349711,1349712,1349713 | 345211:1349714,1349715,1349716,1349717 | 345212:1349718,1349719,1349720,1349721 | 345213:1349722,1349723,1349724,1349725 | 345214:1349726,1349727,1349728,1349729 | 345215:1349730,1349731,1349732,1349733 | 345216:1349734,1349735,1349736,1349737 | 345217:1349738,1349739,1349740,1349741 | 345218:1349742,1349743,1349744,1349745 | 345219:1349746,1349747,1349748,1349749 | 345220:1349750,1349751,1349752,1349753 | 345221:1349754,1349755,1349756,1349757 | 345222:1349758,1349759,1349760,1349761 | 345223:1349762,1349763,1349764,1349765 | 345224:1349766,1349767,1349768,1349769 | 345225:1349770,1349771,1349772,1349773 | 345226:1349774,1349775,1349776,1349777 | 345227:1349778,1349779,1349780,1349781 | 345228:1349782,1349783,1349784,1349785 | 345229:1349786,1349787,1349788,1349789 | 345230:1349790,1349791,1349792,1349793 | 345231:1349794,1349795,1349796,1349797 | 345232:1349798,1349799,1349800,1349801 | 345233:1349802,1349803,1349804,1349805 | 345234:1349806,1349807,1349808,1349809 | 345235:1349810,1349811,1349812,1349813 | 345236:1349814,1349815,1349816,1349817 | 345237:1349818,1349819,1349820,1349821 | 345238:1349822,1349823,1349824,1349825 | 345239:1349826,1349827,1349828,1349829 | 345240:1349830,1349831,1349832,1349833 | 345241:1349834,1349835,1349836,1349837 | 345242:1349838,1349839,1349840,1349841 | 345243:1349842,1349843,1349844,1349845 | 345244:1349846,1349847,1349848,1349849 | 345245:1349850,1349851,1349852,1349853 | 345246:1349854,1349855,1349856,1349857\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"345197,345198,345199,345200,345201,345202,345203,345204,345205,345206,345207,345208,345209,345210,345211,345212,345213,345214,345215,345216,345217,345218,345219,345220,345221,345222,345223,345224,345225,345226,345227,345228,345229,345230,345231,345232,345233,345234,345235,345236,345237,345238,345239,345240,345241,345242,345243,345244,345245,345246\";\nWatuPROSettings[8836] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 8836;\t    \nWatuPRO.post_id = 84643;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.39060600 1778404130\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(8836);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[485,17255],"tags":[17253,17254],"class_list":["post-84643","post","type-post","status-publish","format-standard","hentry","category-ciw","category-web-security-series","tag-1d0-671-dumps","tag-web-security-associate"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/84643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=84643"}],"version-history":[{"count":2,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/84643\/revisions"}],"predecessor-version":[{"id":84648,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/84643\/revisions\/84648"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=84643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=84643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=84643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}