CISSP PRACTICE QUESTIONS – 20230309

Effective CISSP Questions

A legacy web server in your company is suffering from a denial of service attack from a malicious source. Which of the following techniques is least likely used by the attacker? (Wentz QOTD)
A. Overlapping IP fragments
B. Spoofing the source IP address
C. Crafting ICMP Packet
D. Sending malformed or oversized packets


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

My suggested answer is B. Spoofing the source IP address.

Wentz’s book, The Effective CISSP: Security and Risk Management, helps CISSP and CISM aspirants build a solid conceptual security model. It is a tutorial for information security and a supplement to the official study guides for the CISSP and CISM exams and an informative reference for security professionals.

Reference


貴公司一台老舊的 Web 主機正遭受一個惡意來源的阻斷式攻擊(DoS)。 攻擊者最不可能使用以下哪種技術? (Wentz QOTD)
A. 重疊的 IP 片段
B. 欺騙來源IP地址
C. 製作 ICMP 數據包
D. 發送畸形或超大數據包






Leave a Reply