ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 57

Question list
Search
Search

A company receives an email threat informing of an Imminent Distributed Denial of Service (DDoS) attack targeting its web application, unless ransom is paid. Which of the following techniques BEST addresses that threat?

A.
Deploying load balancers to distribute inbound traffic across multiple data centers
A.
Deploying load balancers to distribute inbound traffic across multiple data centers
Answers
B.
Set Up Web Application Firewalls (WAFs) to filter out malicious traffic
B.
Set Up Web Application Firewalls (WAFs) to filter out malicious traffic
Answers
C.
Implementing reverse web-proxies to validate each new inbound connection
C.
Implementing reverse web-proxies to validate each new inbound connection
Answers
D.
Coordinate with and utilize capabilities within Internet Service Provider (ISP)
D.
Coordinate with and utilize capabilities within Internet Service Provider (ISP)
Answers
Suggested answer: D

The MAIN use of Layer 2 Tunneling Protocol (L2TP) is to tunnel data

A.
through a firewall at the Session layer
A.
through a firewall at the Session layer
Answers
B.
through a firewall at the Transport layer
B.
through a firewall at the Transport layer
Answers
C.
in the Point-to-Point Protocol (PPP)
C.
in the Point-to-Point Protocol (PPP)
Answers
D.
in the Payload Compression Protocol (PCP)
D.
in the Payload Compression Protocol (PCP)
Answers
Suggested answer: C

What protocol is often used between gateway hosts on the Internet?

A.
Exterior Gateway Protocol (EGP)
A.
Exterior Gateway Protocol (EGP)
Answers
B.
Border Gateway Protocol (BGP)
B.
Border Gateway Protocol (BGP)
Answers
C.
Open Shortest Path First (OSPF)
C.
Open Shortest Path First (OSPF)
Answers
D.
Internet Control Message Protocol (ICMP)
D.
Internet Control Message Protocol (ICMP)
Answers
Suggested answer: B

"Stateful" differs from "Static" packet filtering firewalls by being aware of which of the following?

A.
Difference between a new and an established connection
A.
Difference between a new and an established connection
Answers
B.
Originating network location
B.
Originating network location
Answers
C.
Difference between a malicious and a benign packet payload
C.
Difference between a malicious and a benign packet payload
Answers
D.
Originating application session
D.
Originating application session
Answers
Suggested answer: A

Which of the following provides the MOST comprehensive filtering of Peer-to-Peer (P2P) traffic?

A.
Application proxy
A.
Application proxy
Answers
B.
Port filter
B.
Port filter
Answers
C.
Network boundary router
C.
Network boundary router
Answers
D.
Access layer switch
D.
Access layer switch
Answers
Suggested answer: D

What can happen when an Intrusion Detection System (IDS) is installed inside a firewall-protected internal network?

A.
The IDS can detect failed administrator logon attempts from servers.
A.
The IDS can detect failed administrator logon attempts from servers.
Answers
B.
The IDS can increase the number of packets to analyze.
B.
The IDS can increase the number of packets to analyze.
Answers
C.
The firewall can increase the number of packets to analyze.
C.
The firewall can increase the number of packets to analyze.
Answers
D.
The firewall can detect failed administrator login attempts from servers
D.
The firewall can detect failed administrator login attempts from servers
Answers
Suggested answer: A

A security practitioner is tasked with securing the organization's Wireless Access Points (WAP).

Which of these is the MOST effective way of restricting this environment to authorized users?

A.
Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
A.
Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
Answers
B.
Disable the broadcast of the Service Set Identifier (SSID) name
B.
Disable the broadcast of the Service Set Identifier (SSID) name
Answers
C.
Change the name of the Service Set Identifier (SSID) to a random value not associated with the organization
C.
Change the name of the Service Set Identifier (SSID) to a random value not associated with the organization
Answers
D.
Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
D.
Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
Answers
Suggested answer: D

Access to which of the following is required to validate web session management?

A.
Log timestamp
A.
Log timestamp
Answers
B.
Live session traffic
B.
Live session traffic
Answers
C.
Session state variables
C.
Session state variables
Answers
D.
Test scripts
D.
Test scripts
Answers
Suggested answer: B

Which of the following would an attacker BEST be able to accomplish through the use of Remote Access Tools (RAT)?

A.
Reduce the probability of identification
A.
Reduce the probability of identification
Answers
B.
Detect further compromise of the target
B.
Detect further compromise of the target
Answers
C.
Destabilize the operation of the host
C.
Destabilize the operation of the host
Answers
D.
Maintain and expand control
D.
Maintain and expand control
Answers
Suggested answer: D

Digital certificates used in Transport Layer Security (TLS) support which of the following?

A.
Information input validation
A.
Information input validation
Answers
B.
Non-repudiation controls and data encryption
B.
Non-repudiation controls and data encryption
Answers
C.
Multi-Factor Authentication (MFA)
C.
Multi-Factor Authentication (MFA)
Answers
D.
Server identity and data confidentially
D.
Server identity and data confidentially
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149