Which of the following heights of fence deters only casual trespassers?
Answer(s): B
Fences having a height of 3 to 4 feet can deter casual trespassers. Answer option D is incorrect. Fences having a height of 6 to 7 feet are considered too difficult to climb.Answer option C is incorrect. Fences having a height of 2 to 2.5 feet can be easily crossed. Hence, this will not act as a deterrent.Answer option A is incorrect. Fences having a height of 8 feet should be used to prevent a determined intruder.
In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?
In a ciphertext only attack, an attacker obtains encrypted messages that have been encrypted using the same encryption algorithm.
Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?
which a threat is expected to occur. It is calculated based upon the probability of the event occurring and the number of employees that could make that event occur.Answer option D is incorrect. The Exposure Factor (EF) represents the % of assets loss caused by a threat. The EF is required to calculate the Single Loss Expectancy (SLE).Answer option C is incorrect. The Single Loss Expectancy (SLE) is the value in dollars that is assigned to a single event.SLE = Asset Value ($) X Exposure Factor (EF) Answer option A is incorrect. Safeguard acts as a countermeasure for reducing the risk associated with a specific threat or a group of threats.
You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall.Which of the following firewalls has this feature?
Answer(s): C
A dynamic packet-filtering firewall is a fourth generation firewall technology. It is also known as a stateful firewall. The dynamic packet-filtering firewall tracks the state of active connections and then determines which network packets are allowed to enter through the firewall. It records session information such as IP addresses and port numbers to implement a more secure network.The dynamic packet-filtering firewall operates at Layer3, Layer4, and Layer5.Answer option D is incorrect. An application gateway firewall applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose performance degradation. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, BitTorrent, SIP, RTSP, file transfer in IM applications, etc. It works on the application layer. Answer option A is incorrect. Stateful packet inspection (SPI) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known connection state will be allowed by the firewall; others will be rejected.Answer option B is incorrect. A proxy-based firewall running either on a dedicated hardware or as software on a general-purpose machine responds to input packets in the manner of an application, whilst blocking other packets. Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall. Conversely, intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines.While use of internal address spaces enhances security, attackers may still employ methods such as IP spoofing to attempt to pass packets to a target network. The proxy firewall functions by maintaining two separate conversations, which are as follows:One between the client and the firewallOne between the firewall and the end server
Post your Comments and Discuss ISC2 ISSAP exam with other Community members:
Terry commented on May 24, 2023 i can practice for exam Anonymous upvote
Rahul Kumar commented on August 31, 2023 need certification. CANADA upvote
Terry commented on May 24, 2023 I can practice for exam Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the ISSAP content, but please register or login to continue.