Certified Information Systems Security Professional – CISSP – Question087

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?

A.
Add a new rule to the application layer firewall
B. Block access to the service
C. Install an Intrusion Detection System (IDS)
D. Patch the application source code

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question086

An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

A.
Implement packet filtering on the network firewalls
B. Install Host Based Intrusion Detection Systems (HIDS)
C. Require strong authentication for administrators
D. Implement logical network segmentation at the switches

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question085

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

A.
Packet filtering
B. Port services filtering
C. Content filtering
D. Application access control

Correct Answer: A

Explanation:

Certified Information Systems Security Professional – CISSP – Question081

What is the purpose of an Internet Protocol (IP) spoofing attack?

A.
To send excessive amounts of data to a process, making it unpredictable
B. To intercept network traffic without authorization
C. To disguise the destination address from a target’s IP filtering devices
D. To convince a system that it is communicating with a known entity

Correct Answer: D

Certified Information Systems Security Professional – CISSP – Question080

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

A.
Truncating parts of the data
B. Applying Access Control Lists (ACL) to the data
C. Appending non-watermarked data to watermarked data
D. Storing the data in a database

Correct Answer: A

Certified Information Systems Security Professional – CISSP – Question078

Which of the BEST internationally recognized standard for evaluating security products and systems?

A.
Payment Card Industry Data Security Standards (PCI-DSS)
B. Common Criteria (CC)
C. Health Insurance Portability and Accountability Act (HIPAA)
D. Sarbanes-Oxley (SOX)

Correct Answer: B