ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 57

Add to Whishlist

List of questions

Question 561

Report Export Collapse

A company receives an email threat informing of an Imminent Distributed Denial of Service (DDoS) attack targeting its web application, unless ransom is paid. Which of the following techniques BEST addresses that threat?

Become a Premium Member for full access
  Unlock Premium Member

Question 562

Report Export Collapse

The MAIN use of Layer 2 Tunneling Protocol (L2TP) is to tunnel data

Become a Premium Member for full access
  Unlock Premium Member

Question 563

Report Export Collapse

What protocol is often used between gateway hosts on the Internet?

Become a Premium Member for full access
  Unlock Premium Member

Question 564

Report Export Collapse

"Stateful" differs from "Static" packet filtering firewalls by being aware of which of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 565

Report Export Collapse

Which of the following provides the MOST comprehensive filtering of Peer-to-Peer (P2P) traffic?

Become a Premium Member for full access
  Unlock Premium Member

Question 566

Report Export Collapse

What can happen when an Intrusion Detection System (IDS) is installed inside a firewall-protected internal network?

Become a Premium Member for full access
  Unlock Premium Member

Question 567

Report Export Collapse

A security practitioner is tasked with securing the organization's Wireless Access Points (WAP).

Which of these is the MOST effective way of restricting this environment to authorized users?

Become a Premium Member for full access
  Unlock Premium Member

Question 568

Report Export Collapse

Access to which of the following is required to validate web session management?

Become a Premium Member for full access
  Unlock Premium Member

Question 569

Report Export Collapse

Which of the following would an attacker BEST be able to accomplish through the use of Remote Access Tools (RAT)?

Become a Premium Member for full access
  Unlock Premium Member

Question 570

Report Export Collapse

Digital certificates used in Transport Layer Security (TLS) support which of the following?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149