To help mitigate the effects of a denial of service attack,
which mechanism can an Internet service provider (ISP) use
to identify Internet protocol (IP) packets from unauthorized
sources?
A. Inbound traffic filtering
B. Rate limiting
C. Reverse address lookup
D. Network performance monitoring
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
ISPs serve user organizations with pre-assigned IP
addresses. Inbound traffic filtering can filter out IP
packets that do not conform to the pre-assigned IP address
range. Rate limiting involves limiting the occurrences of
certain types of TCP/IP packets according to predefined
specifications. It is used to identify excess packets.
Reverse address lookup determines if the source address is
an IP packet of the true address of the computer (host) that
is actually sending the packet. It would identify address
substitution, but would not initially identify that it was
an unauthorized source. Network performance monitoring is a
way to monitor system performance for potential intrusions
on a real-time basis. It could help identify unusual traffic
volumes.
| Is This Answer Correct ? | 3 Yes | 0 No |
A company disposing of personal computers that once were used to store confidential data should first: A. demagnetize the hard disk. B. low-level format the hard disk. C. delete all data contained on the hard disk. D. defragment the data contained on the hard disk.
The BEST time to perform a control self-assessment involving line management, line staff and the audit department is at the time of: A. compliance testing. B. the preliminary survey. C. substantive testing. D. the preparation of the audit report.
Which of the following audit tools is MOST useful to an IS auditor when an audit trail is required? A. Integrated test facility (ITF) B. Continuous and intermittent simulation (CIS) C. Audit hooks D. Snapshots
Which of the following is a function of an IS steering committee? A. Monitoring vendor controlled change control and testing B. Ensuring a separation of duties within the information's processing environment C. Approving and monitoring major projects, the status of IS plans and budgets D. Responsible for liaison between the IS department and the end users
An offsite information processing facility: A. should have the same amount of physical access restrictions as the primary processing site. B. should be easily identified from the outside so that in the event of an emergency it can be easily found. C. should be located in proximity to the originating site so that it can quickly be made operational. D. need not have the same level of environmental monitoring as the originating site since this would be cost prohibitive.
Which of the following is the MOST effective control over visitor access to a data center? A. Visitors are escorted. B. Visitor badges are required. C. Visitors sign in. D. Visitors are spot-checked by operators.
An IS auditor, performing a review of an application?s controls, discovers a weakness in system software, which could materially impact the application. The IS auditor should: A. Disregard these control weaknesses as a system software review is beyond the scope of this review. B. Conduct a detailed system software review and report the control weaknesses. C. Include in the report a statement that the audit was limited to a review of the application?s controls. D. Review the system software controls as relevant and recommend a detailed system software review.
Which of the following can be used to verify output results and control totals by matching them against the input data and control totals? A. Batch header forms B. Batch balancing C. Data conversion error corrections D. Access controls over print spools
Good quality software is BEST achieved: A. through thorough testing. B. by finding and quickly correcting programming errors. C. determining the amount of testing by the available time and budget. D. by applying well-defined processes and structured reviews throughout the project.
Which of the following environmental controls is appropriate to protect computer equipment against short-term reductions in electrical power? A. Power line conditioners B. A surge protective device C. An alternative power supply D. An interruptible power supply
What type of transmission requires modems? A. Encrypted B. Digital C. Analog D. Modulated
Responsibility and reporting lines cannot always be established when auditing automated systems since: A. diversified control makes ownership irrelevant. B. staff traditionally change jobs with greater frequency. C. ownership is difficult to establish where resources are shared. D. duties change frequently in the rapid development of technology.