ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 57

List of questions

Question 561

Report Export Collapse

A company receives an email threat informing of an Imminent Distributed Denial of Service (DDoS) attack targeting its web application, unless ransom is paid. Which of the following techniques BEST addresses that threat?

Deploying load balancers to distribute inbound traffic across multiple data centers
Deploying load balancers to distribute inbound traffic across multiple data centers
Set Up Web Application Firewalls (WAFs) to filter out malicious traffic
Set Up Web Application Firewalls (WAFs) to filter out malicious traffic
Implementing reverse web-proxies to validate each new inbound connection
Implementing reverse web-proxies to validate each new inbound connection
Coordinate with and utilize capabilities within Internet Service Provider (ISP)
Coordinate with and utilize capabilities within Internet Service Provider (ISP)
Suggested answer: D
asked 18/09/2024
Christian Weber
42 questions

Question 562

Report Export Collapse

The MAIN use of Layer 2 Tunneling Protocol (L2TP) is to tunnel data

through a firewall at the Session layer
through a firewall at the Session layer
through a firewall at the Transport layer
through a firewall at the Transport layer
in the Point-to-Point Protocol (PPP)
in the Point-to-Point Protocol (PPP)
in the Payload Compression Protocol (PCP)
in the Payload Compression Protocol (PCP)
Suggested answer: C
asked 18/09/2024
femke vroome
52 questions

Question 563

Report Export Collapse

What protocol is often used between gateway hosts on the Internet?

Exterior Gateway Protocol (EGP)
Exterior Gateway Protocol (EGP)
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)
Open Shortest Path First (OSPF)
Open Shortest Path First (OSPF)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Suggested answer: B
asked 18/09/2024
Eli Thompson
37 questions

Question 564

Report Export Collapse

"Stateful" differs from "Static" packet filtering firewalls by being aware of which of the following?

Difference between a new and an established connection
Difference between a new and an established connection
Originating network location
Originating network location
Difference between a malicious and a benign packet payload
Difference between a malicious and a benign packet payload
Originating application session
Originating application session
Suggested answer: A
asked 18/09/2024
Ishan Patel
47 questions

Question 565

Report Export Collapse

Which of the following provides the MOST comprehensive filtering of Peer-to-Peer (P2P) traffic?

Application proxy
Application proxy
Port filter
Port filter
Network boundary router
Network boundary router
Access layer switch
Access layer switch
Suggested answer: D
asked 18/09/2024
Farid Tannouch
40 questions

Question 566

Report Export Collapse

What can happen when an Intrusion Detection System (IDS) is installed inside a firewall-protected internal network?

The IDS can detect failed administrator logon attempts from servers.
The IDS can detect failed administrator logon attempts from servers.
The IDS can increase the number of packets to analyze.
The IDS can increase the number of packets to analyze.
The firewall can increase the number of packets to analyze.
The firewall can increase the number of packets to analyze.
The firewall can detect failed administrator login attempts from servers
The firewall can detect failed administrator login attempts from servers
Suggested answer: A
asked 18/09/2024
First Last
38 questions

Question 567

Report Export Collapse

A security practitioner is tasked with securing the organization's Wireless Access Points (WAP).

Which of these is the MOST effective way of restricting this environment to authorized users?

Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
Disable the broadcast of the Service Set Identifier (SSID) name
Disable the broadcast of the Service Set Identifier (SSID) name
Change the name of the Service Set Identifier (SSID) to a random value not associated with the organization
Change the name of the Service Set Identifier (SSID) to a random value not associated with the organization
Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
Suggested answer: D
asked 18/09/2024
Anil Dehriya
42 questions

Question 568

Report Export Collapse

Access to which of the following is required to validate web session management?

Log timestamp
Log timestamp
Live session traffic
Live session traffic
Session state variables
Session state variables
Test scripts
Test scripts
Suggested answer: B
asked 18/09/2024
Robert Miletich
51 questions

Question 569

Report Export Collapse

Which of the following would an attacker BEST be able to accomplish through the use of Remote Access Tools (RAT)?

Reduce the probability of identification
Reduce the probability of identification
Detect further compromise of the target
Detect further compromise of the target
Destabilize the operation of the host
Destabilize the operation of the host
Maintain and expand control
Maintain and expand control
Suggested answer: D
asked 18/09/2024
rita whitfield
40 questions

Question 570

Report Export Collapse

Digital certificates used in Transport Layer Security (TLS) support which of the following?

Information input validation
Information input validation
Non-repudiation controls and data encryption
Non-repudiation controls and data encryption
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA)
Server identity and data confidentially
Server identity and data confidentially
Suggested answer: D
asked 18/09/2024
henk Bouman
38 questions
Total 1.482 questions
Go to page: of 149