Certified Information Systems Security Professional – CISSP – Question107

What can happen when an Intrusion Detection System (IDS) is installed inside a firewall-protected internal network?

A.
The IDS can detect failed administrator logon attempts from servers.
B. The IDS can increase the number of packets to analyze.
C. The firewall can increase the number of packets to analyze.
D. The firewall can detect failed administrator login attempts from servers

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question105

“Stateful” differs from “Static” packet filtering firewalls by being aware of which of the following?

A.
Difference between a new and an established connection
B. Originating network location
C. Difference between a malicious and a benign packet payload
D. Originating application session

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question104

From a security perspective, which of the following is a best practice to configure a Domain Name Service (DNS) system?

A.
Disable all recursive queries on the name servers
B. Limit zone transfers to authorized devices
C. Configure secondary servers to use the primary server as a zone forwarder
D. Block all Transmission Control Protocol (TCP) connections

Correct Answer: B

Certified Information Systems Security Professional – CISSP – Question101

A company receives an email threat informing of an Imminent Distributed Denial of Service (DDoS) attack targeting its web application, unless ransom is paid. Which of the following techniques BEST addresses that threat?

A.
Deploying load balancers to distribute inbound traffic across multiple data centers
B. Set Up Web Application Firewalls (WAFs) to filter out malicious traffic
C. Implementing reverse web-proxies to validate each new inbound connection
D. Coordinate with and utilize capabilities within Internet Service Provider (ISP)

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question100

How does Encapsulating Security Payload (ESP) in transport mode affect in the Internet Protocol (IP)?

A.
Authenticates the IP payload and selected portions of the IP header
B. Encrypts and optionally authenticates the complete IP packet
C. Encrypts and optionally authenticates the IP header, but not the IP payload
D. Encrypts and optionally authenticates the IP payload, but not the IP header

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question099

In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?

A.
The second of two routers can periodically check in to make sure that the first router is operational.
B. The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.
C. The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
D. The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.

Correct Answer: C

Certified Information Systems Security Professional – CISSP – Question098

A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?

A.
Point-to-Point Protocol (PPP) and Internet Control Message Protocol (ICMP)
B. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
C. Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP)
D. Transport Layer Security (TLS) and Secure Sockets Layer (SSL)

Correct Answer: B