FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2024-03-31.q980 Dumps
  • ««
  • «
  • …
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • …
  • »
  • »»
Download Now

Question 351

To prevent IP spoofing attacks, a firewall should be configured to drop a packet if:

Correct Answer: A
Section: Protection of Information Assets
Explanation:
IP spoofing takes advantage of the source-routing option in the IP protocol. With this option enabled, an attacker can insert a spoofed source IP address. The packet will travel the network according to the information within the source-routing field, bypassing the logic in each router, including dynamic and static routing (choice D). Choices B and C do not have any relation to IP spoofing attacks. If a packet has a broadcast destination address (choice B), it will be sent to all addresses in the subnet. Turning on the reset flag (RST) (choice C) is part of the normal procedure to end a TCP connection.
insert code

Question 352

Which of the following disaster recovery/continuity plan components provides the GREATEST assurance of recovery after a disaster?

Correct Answer: A
Explanation/Reference:
Explanation:
The alternate facility should be made available until the original site is restored to provide the greatest assurance of recovery after a disaster. Without this assurance, the plan will not be successful. All other choices ensure prioritization or the execution pf the plan.
insert code

Question 353

During what process should router access control lists be reviewed?

Correct Answer: B
Section: Protection of Information Assets
Explanation:
Network security reviews include reviewing router access control lists, port scanning, internal and external connections to the system, etc. Environmental reviews, business continuity reviews and data integrity reviews do not require a review of the router access control lists.
insert code

Question 354

Which of the following should be the PRIMARY basis for prioritizing follow-up audits?

Correct Answer: A
insert code

Question 355

There are many firewall implementations provided by firewall manufacturers. Which of the following
implementation utilize two packet filtering routers and a bastion host? This approach creates the most
secure firewall system since it supports network and application level security while defining a separate
DMZ.

Correct Answer: B
Section: Protection of Information Assets
Explanation/Reference:
In network security, a screened subnet firewall is a variation of the dual-homed gateway and screened host
firewall. It can be used to separate components of the firewall onto separate systems, thereby achieving
greater throughput and flexibility, although at some cost to simplicity. As each component system of the
screened subnet firewall needs to implement only a specific task, each system is less complex to
configure.
A screened subnet firewall is often used to establish a demilitarized zone (DMZ).
Below are few examples of Firewall implementations:
Screened host Firewall
Utilizing a packet filtering router and a bastion host, this approach implements a basic network layer
security and application server security.
An intruder in this configuration has to penetrate two separate systems before the security of the private
network can be compromised
This firewall system is configured with the bastion host connected to the private network with a packet
filtering router between internet and the bastion host
Dual-homed Firewall
A firewall system that has two or more network interface, each of which is connected to a different network
In a firewall configuration, a dual homed firewall system usually acts to block or filter some or all of the
traffic trying to pass between the network
A dual-homed firewall system is more restrictive form of screened-host firewall system
Demilitarize Zone (DMZ) or screened-subnet firewall
Utilizing two packet filtering routers and a bastion host
This approach creates the most secure firewall system since it supports network and application level
security while defining a separate DMZ network
Typically, DMZs are configured to limit access from the internet and organization's private network.
The following were incorrect answers:
The other types of firewall mentioned in the option do not utilize two packet filtering routers and a bastion
host.
The following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 346
insert code
  • ««
  • «
  • …
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2024-03-31.q980 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.