To help mitigate the effects of a denial of service attack,
which mechanism can an Internet service provider (ISP) use
to identify Internet protocol (IP) packets from unauthorized
sources?
A. Inbound traffic filtering
B. Rate limiting
C. Reverse address lookup
D. Network performance monitoring
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
ISPs serve user organizations with pre-assigned IP
addresses. Inbound traffic filtering can filter out IP
packets that do not conform to the pre-assigned IP address
range. Rate limiting involves limiting the occurrences of
certain types of TCP/IP packets according to predefined
specifications. It is used to identify excess packets.
Reverse address lookup determines if the source address is
an IP packet of the true address of the computer (host) that
is actually sending the packet. It would identify address
substitution, but would not initially identify that it was
an unauthorized source. Network performance monitoring is a
way to monitor system performance for potential intrusions
on a real-time basis. It could help identify unusual traffic
volumes.
| Is This Answer Correct ? | 3 Yes | 0 No |
When conducting an audit of client/server database security, the IS auditor would be MOST concerned about the availability of: A. system utilities. B. application program generators. C. system security documentation. D. access to stored procedures.
A PING command is used to measure: A. attenuation. B. throughput. C. delay distortion. D. latency.
An IS auditor performing a review of an application's controls would evaluate the: A. efficiency of the application in meeting the business processes. B. impact of any exposures discovered. C. business processes served by the application. D. the application's optimization.
An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the: A. maintenance of access logs of usage of various system resources. B. authorization and authentication of the user prior to granting access to system resources. C. adequate protection of stored data on servers by encryption or other means. D. accountability system and the ability to identify any terminal accessing system resources.
An organization is proposing to install a single sign-on facility giving access to all systems. The organization should be aware that: A. Maximum unauthorized access would be possible if a password is disclosed. B. User access rights would be restricted by the additional security parameters. C. The security administrator?s workload would increase. D. User access rights would be increased.
An organization has an integrated development environment (IDE), where the program libraries reside on the server, but modification/development and testing are done from PC workstations. Which of the following would be a strength of an integrated development environment? A. Controls the proliferation of multiple versions of programs B. Expands the programming resources and aids available C. Increases program and processing integrity D. Prevents valid changes from being overwritten by other changes
In a risk-based audit approach an IS auditor should FIRST complete a/an: A. inherent risk assessment. B. control risk assessment. C. test of control assessment. D. substantive test assessment.
IS auditors, in performing detailed network assessments and access control reviews should FIRST: A. determine the points of entry. B. evaluate users access authorization. C. assess users identification and authorization. D. evaluate the domain-controlling server configuration.
Which of the following is the MOST reasonable option for recovering a noncritical system? A. Warm site B. Mobile site C. Hot site D. Cold site
Which of the following data entry controls provides the GREATEST assurance that the data is entered correctly? A. Using key verification B. Segregating the data entry function from data entry verification C. Maintaining a log/record detailing the time, date, employee's initials/user id and progress of various data preparation and verification tasks D. Adding check digits
Which of the following would be a compensating control to mitigate risks resulting from an inadequate segregation of duties? A. Sequence check B. Check digit C. Source documentation retention D. Batch control reconciliations
The FIRST step in data classification is to: A. establish ownership. B. perform a criticality analysis. C. define access rules. D. create a data dictionary.