ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 56

Question list
Search
Search

List of questions

Search

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

A.
Truncating parts of the data
A.
Truncating parts of the data
Answers
B.
Applying Access Control Lists (ACL) to the data
B.
Applying Access Control Lists (ACL) to the data
Answers
C.
Appending non-watermarked data to watermarked data
C.
Appending non-watermarked data to watermarked data
Answers
D.
Storing the data in a database
D.
Storing the data in a database
Answers
Suggested answer: A

Which of the following is BEST achieved through the use of eXtensible Access Markup Language (XACML)?

A.
Minimize malicious attacks from third parties
A.
Minimize malicious attacks from third parties
Answers
B.
Manage resource privileges
B.
Manage resource privileges
Answers
C.
Share digital identities in hybrid cloud
C.
Share digital identities in hybrid cloud
Answers
D.
Defined a standard protocol
D.
Defined a standard protocol
Answers
Suggested answer: B

An organization has discovered that users are visiting unauthorized websites using anonymous proxies.

Which of the following is the BEST way to prevent future occurrences?

A.
Remove the anonymity from the proxy
A.
Remove the anonymity from the proxy
Answers
B.
Analyze Internet Protocol (IP) traffic for proxy requests
B.
Analyze Internet Protocol (IP) traffic for proxy requests
Answers
C.
Disable the proxy server on the firewall
C.
Disable the proxy server on the firewall
Answers
D.
Block the Internet Protocol (IP) address of known anonymous proxies
D.
Block the Internet Protocol (IP) address of known anonymous proxies
Answers
Suggested answer: D

A post-implementation review has identified that the Voice Over Internet Protocol (VoIP) system was designed to have gratuitous Address Resolution Protocol (ARP) disabled.

Why did the network architect likely design the VoIP system with gratuitous ARP disabled?

A.
Gratuitous ARP requires the use of Virtual Local Area Network (VLAN) 1.
A.
Gratuitous ARP requires the use of Virtual Local Area Network (VLAN) 1.
Answers
B.
Gratuitous ARP requires the use of insecure layer 3 protocols.
B.
Gratuitous ARP requires the use of insecure layer 3 protocols.
Answers
C.
Gratuitous ARP requires the likelihood of a successful brute-force attack on the phone.
C.
Gratuitous ARP requires the likelihood of a successful brute-force attack on the phone.
Answers
D.
Gratuitous ARP requires the risk of a Man-in-the-Middle (MITM) attack.
D.
Gratuitous ARP requires the risk of a Man-in-the-Middle (MITM) attack.
Answers
Suggested answer: D

Within the company, desktop clients receive Internet Protocol (IP) address over Dynamic Host Configuration Protocol (DHCP).

Which of the following represents a valid measure to help protect the network against unauthorized access?

A.
Implement path management
A.
Implement path management
Answers
B.
Implement port based security through 802.1x
B.
Implement port based security through 802.1x
Answers
C.
Implement DHCP to assign IP address to server systems
C.
Implement DHCP to assign IP address to server systems
Answers
D.
Implement change management
D.
Implement change management
Answers
Suggested answer: B

Transport Layer Security (TLS) provides which of the following capabilities for a remote access server?

A.
Transport layer handshake compression
A.
Transport layer handshake compression
Answers
B.
Application layer negotiation
B.
Application layer negotiation
Answers
C.
Peer identity authentication
C.
Peer identity authentication
Answers
D.
Digital certificate revocation
D.
Digital certificate revocation
Answers
Suggested answer: C

A chemical plan wants to upgrade the Industrial Control System (ICS) to transmit data using Ethernet instead of RS422. The project manager wants to simplify administration and maintenance by utilizing the office network infrastructure and staff to implement this upgrade.

Which of the following is the GREATEST impact on security for the network?

A.
The network administrators have no knowledge of ICS
A.
The network administrators have no knowledge of ICS
Answers
B.
The ICS is now accessible from the office network
B.
The ICS is now accessible from the office network
Answers
C.
The ICS does not support the office password policy
C.
The ICS does not support the office password policy
Answers
D.
RS422 is more reliable than Ethernet
D.
RS422 is more reliable than Ethernet
Answers
Suggested answer: B

What does a Synchronous (SYN) flood attack do?

A.
Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
A.
Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
Answers
B.
Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
B.
Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
Answers
C.
Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
C.
Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
Answers
D.
Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
D.
Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
Answers
Suggested answer: B

A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?

A.
Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)
A.
Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)
Answers
B.
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
B.
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
Answers
C.
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)
C.
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)
Answers
D.
Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
D.
Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
Answers
Suggested answer: B

In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?

A.
The second of two routers can periodically check in to make sure that the first router is operational.
A.
The second of two routers can periodically check in to make sure that the first router is operational.
Answers
B.
The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.
B.
The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.
Answers
C.
The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
C.
The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
Answers
D.
The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.
D.
The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149