ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 56

Question list
Search
Search

List of questions

Search

Question 551

Report
Export
Collapse

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

A.
Truncating parts of the data
A.
Truncating parts of the data
Answers
B.
Applying Access Control Lists (ACL) to the data
B.
Applying Access Control Lists (ACL) to the data
Answers
C.
Appending non-watermarked data to watermarked data
C.
Appending non-watermarked data to watermarked data
Answers
D.
Storing the data in a database
D.
Storing the data in a database
Answers
Suggested answer: A
asked 18/09/2024
Rok Nemec
31 questions

Question 552

Report
Export
Collapse

Which of the following is BEST achieved through the use of eXtensible Access Markup Language (XACML)?

A.
Minimize malicious attacks from third parties
A.
Minimize malicious attacks from third parties
Answers
B.
Manage resource privileges
B.
Manage resource privileges
Answers
C.
Share digital identities in hybrid cloud
C.
Share digital identities in hybrid cloud
Answers
D.
Defined a standard protocol
D.
Defined a standard protocol
Answers
Suggested answer: B
asked 18/09/2024
Aldrin Advincula
27 questions

Question 553

Report
Export
Collapse

An organization has discovered that users are visiting unauthorized websites using anonymous proxies.

Which of the following is the BEST way to prevent future occurrences?

A.
Remove the anonymity from the proxy
A.
Remove the anonymity from the proxy
Answers
B.
Analyze Internet Protocol (IP) traffic for proxy requests
B.
Analyze Internet Protocol (IP) traffic for proxy requests
Answers
C.
Disable the proxy server on the firewall
C.
Disable the proxy server on the firewall
Answers
D.
Block the Internet Protocol (IP) address of known anonymous proxies
D.
Block the Internet Protocol (IP) address of known anonymous proxies
Answers
Suggested answer: D
asked 18/09/2024
marek kus
30 questions

Question 554

Report
Export
Collapse

A post-implementation review has identified that the Voice Over Internet Protocol (VoIP) system was designed to have gratuitous Address Resolution Protocol (ARP) disabled.

Why did the network architect likely design the VoIP system with gratuitous ARP disabled?

A.
Gratuitous ARP requires the use of Virtual Local Area Network (VLAN) 1.
A.
Gratuitous ARP requires the use of Virtual Local Area Network (VLAN) 1.
Answers
B.
Gratuitous ARP requires the use of insecure layer 3 protocols.
B.
Gratuitous ARP requires the use of insecure layer 3 protocols.
Answers
C.
Gratuitous ARP requires the likelihood of a successful brute-force attack on the phone.
C.
Gratuitous ARP requires the likelihood of a successful brute-force attack on the phone.
Answers
D.
Gratuitous ARP requires the risk of a Man-in-the-Middle (MITM) attack.
D.
Gratuitous ARP requires the risk of a Man-in-the-Middle (MITM) attack.
Answers
Suggested answer: D
asked 18/09/2024
Tsige Tessema
31 questions

Question 555

Report
Export
Collapse

Within the company, desktop clients receive Internet Protocol (IP) address over Dynamic Host Configuration Protocol (DHCP).

Which of the following represents a valid measure to help protect the network against unauthorized access?

A.
Implement path management
A.
Implement path management
Answers
B.
Implement port based security through 802.1x
B.
Implement port based security through 802.1x
Answers
C.
Implement DHCP to assign IP address to server systems
C.
Implement DHCP to assign IP address to server systems
Answers
D.
Implement change management
D.
Implement change management
Answers
Suggested answer: B
asked 18/09/2024
ALOUAT EKRAM
45 questions

Question 556

Report
Export
Collapse

Transport Layer Security (TLS) provides which of the following capabilities for a remote access server?

A.
Transport layer handshake compression
A.
Transport layer handshake compression
Answers
B.
Application layer negotiation
B.
Application layer negotiation
Answers
C.
Peer identity authentication
C.
Peer identity authentication
Answers
D.
Digital certificate revocation
D.
Digital certificate revocation
Answers
Suggested answer: C
asked 18/09/2024
Lakshmi Yechuri
40 questions

Question 557

Report
Export
Collapse

A chemical plan wants to upgrade the Industrial Control System (ICS) to transmit data using Ethernet instead of RS422. The project manager wants to simplify administration and maintenance by utilizing the office network infrastructure and staff to implement this upgrade.

Which of the following is the GREATEST impact on security for the network?

A.
The network administrators have no knowledge of ICS
A.
The network administrators have no knowledge of ICS
Answers
B.
The ICS is now accessible from the office network
B.
The ICS is now accessible from the office network
Answers
C.
The ICS does not support the office password policy
C.
The ICS does not support the office password policy
Answers
D.
RS422 is more reliable than Ethernet
D.
RS422 is more reliable than Ethernet
Answers
Suggested answer: B
asked 18/09/2024
terence o oneill
37 questions

Question 558

Report
Export
Collapse

What does a Synchronous (SYN) flood attack do?

A.
Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
A.
Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
Answers
B.
Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
B.
Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
Answers
C.
Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
C.
Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
Answers
D.
Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
D.
Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
Answers
Suggested answer: B
asked 18/09/2024
Hossein Nasri
31 questions

Question 559

Report
Export
Collapse

A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?

A.
Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)
A.
Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)
Answers
B.
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
B.
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
Answers
C.
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)
C.
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)
Answers
D.
Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
D.
Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
Answers
Suggested answer: B
asked 18/09/2024
shylashri selvamani
46 questions

Question 560

Report
Export
Collapse

In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?

A.
The second of two routers can periodically check in to make sure that the first router is operational.
A.
The second of two routers can periodically check in to make sure that the first router is operational.
Answers
B.
The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.
B.
The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.
Answers
C.
The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
C.
The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
Answers
D.
The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.
D.
The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.
Answers
Suggested answer: C
asked 18/09/2024
Ali S Zahedi
40 questions
Total 1.482 questions
Go to page: of 149