ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 56

List of questions

Question 551

Report Export Collapse

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

Truncating parts of the data
Truncating parts of the data
Applying Access Control Lists (ACL) to the data
Applying Access Control Lists (ACL) to the data
Appending non-watermarked data to watermarked data
Appending non-watermarked data to watermarked data
Storing the data in a database
Storing the data in a database
Suggested answer: A
asked 18/09/2024
Rok Nemec
36 questions

Question 552

Report Export Collapse

Which of the following is BEST achieved through the use of eXtensible Access Markup Language (XACML)?

Minimize malicious attacks from third parties
Minimize malicious attacks from third parties
Manage resource privileges
Manage resource privileges
Share digital identities in hybrid cloud
Share digital identities in hybrid cloud
Defined a standard protocol
Defined a standard protocol
Suggested answer: B
asked 18/09/2024
Aldrin Advincula
39 questions

Question 553

Report Export Collapse

An organization has discovered that users are visiting unauthorized websites using anonymous proxies.

Which of the following is the BEST way to prevent future occurrences?

Remove the anonymity from the proxy
Remove the anonymity from the proxy
Analyze Internet Protocol (IP) traffic for proxy requests
Analyze Internet Protocol (IP) traffic for proxy requests
Disable the proxy server on the firewall
Disable the proxy server on the firewall
Block the Internet Protocol (IP) address of known anonymous proxies
Block the Internet Protocol (IP) address of known anonymous proxies
Suggested answer: D
asked 18/09/2024
marek kus
36 questions

Question 554

Report Export Collapse

A post-implementation review has identified that the Voice Over Internet Protocol (VoIP) system was designed to have gratuitous Address Resolution Protocol (ARP) disabled.

Why did the network architect likely design the VoIP system with gratuitous ARP disabled?

Gratuitous ARP requires the use of Virtual Local Area Network (VLAN) 1.
Gratuitous ARP requires the use of Virtual Local Area Network (VLAN) 1.
Gratuitous ARP requires the use of insecure layer 3 protocols.
Gratuitous ARP requires the use of insecure layer 3 protocols.
Gratuitous ARP requires the likelihood of a successful brute-force attack on the phone.
Gratuitous ARP requires the likelihood of a successful brute-force attack on the phone.
Gratuitous ARP requires the risk of a Man-in-the-Middle (MITM) attack.
Gratuitous ARP requires the risk of a Man-in-the-Middle (MITM) attack.
Suggested answer: D
asked 18/09/2024
Tsige Tessema
36 questions

Question 555

Report Export Collapse

Within the company, desktop clients receive Internet Protocol (IP) address over Dynamic Host Configuration Protocol (DHCP).

Which of the following represents a valid measure to help protect the network against unauthorized access?

Implement path management
Implement path management
Implement port based security through 802.1x
Implement port based security through 802.1x
Implement DHCP to assign IP address to server systems
Implement DHCP to assign IP address to server systems
Implement change management
Implement change management
Suggested answer: B
asked 18/09/2024
ALOUAT EKRAM
49 questions

Question 556

Report Export Collapse

Transport Layer Security (TLS) provides which of the following capabilities for a remote access server?

Transport layer handshake compression
Transport layer handshake compression
Application layer negotiation
Application layer negotiation
Peer identity authentication
Peer identity authentication
Digital certificate revocation
Digital certificate revocation
Suggested answer: C
asked 18/09/2024
Lakshmi Yechuri
45 questions

Question 557

Report Export Collapse

A chemical plan wants to upgrade the Industrial Control System (ICS) to transmit data using Ethernet instead of RS422. The project manager wants to simplify administration and maintenance by utilizing the office network infrastructure and staff to implement this upgrade.

Which of the following is the GREATEST impact on security for the network?

The network administrators have no knowledge of ICS
The network administrators have no knowledge of ICS
The ICS is now accessible from the office network
The ICS is now accessible from the office network
The ICS does not support the office password policy
The ICS does not support the office password policy
RS422 is more reliable than Ethernet
RS422 is more reliable than Ethernet
Suggested answer: B
asked 18/09/2024
terence o oneill
47 questions

Question 558

Report Export Collapse

What does a Synchronous (SYN) flood attack do?

Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
Suggested answer: B
asked 18/09/2024
Hossein Nasri
35 questions

Question 559

Report Export Collapse

A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?

Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)
Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)
Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
Suggested answer: B
asked 18/09/2024
shylashri selvamani
50 questions

Question 560

Report Export Collapse

In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?

The second of two routers can periodically check in to make sure that the first router is operational.
The second of two routers can periodically check in to make sure that the first router is operational.
The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.
The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.
The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.
The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.
Suggested answer: C
asked 18/09/2024
Ali S Zahedi
44 questions
Total 1.482 questions
Go to page: of 149
Search