exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 814 discussion

Actual exam question from Isaca's CISA
Question #: 814
Topic #: 1
[All CISA Questions]

The MOST critical security weakness of a packet level firewall is that it can be circumvented by:

  • A. deciphering the signature information of the packets
  • B. using a dictionary attack of encrypted passwords
  • C. intercepting packets and viewing passwords sent in clear text
  • D. changing the source address on incoming packets
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
saado9
Highly Voted 1 year, 8 months ago
D. changing the source address on incoming packets
upvoted 6 times
...
SuperMax
Highly Voted 1 year, 4 months ago
Selected Answer: C
C. intercepting packets and viewing passwords sent in clear text Packet-level firewalls operate at the network layer and make decisions based on the source and destination IP addresses, as well as port numbers, without inspecting the content of the packets. This means that if sensitive information, such as passwords, is sent in clear text (unencrypted) within the packets, an attacker can intercept and view this information without the firewall detecting or preventing it. This is a significant security weakness because it doesn't protect against eavesdropping or interception of sensitive data within the packets themselves.
upvoted 5 times
...
Swallows
Most Recent 10 months, 2 weeks ago
Selected Answer: D
The packet filtering type determines whether to allow packets to pass through to the internal network by referring to packet headers (information such as procotr, source and destination addresses, and port numbers). In other words, in the packet filtering type, access permission/denial is determined based on header information alone. Therefore, as long as the header information clears the access permission definition (policy), it is possible to enter the internal network even if there is unauthorized data in it.
upvoted 3 times
...
3008
1 year, 5 months ago
Selected Answer: D
: where an attacker sends packets with a forged source IP 2 번 찬성address to bypass the firewall’s rules and gain access to the network.
upvoted 5 times
...
JONESKA
1 year, 6 months ago
Option A is not correct as packet level firewalls do not typically involve deciphering the signature information of packets. Option B is out, Packet level firewalls do not perform password authentication or encryption. Option D is out, While this may be a concern from a network security perspective, it is not a specific weakness of a packet level firewall. This action relates to source address spoofing, which is a separate security issue and is typically addressed by other measures like anti-spoofing controls. That leaves to Option C.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...