Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 500 discussion

Actual exam question from Isaca's CISA
Question #: 500
Topic #: 1
[All CISA Questions]

Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?

  • A. Flooding the site with an excessive number of packets
  • B. Intercepting packets and viewing passwords
  • C. Phishing
  • D. Using a dictionary attack of encrypted passwords
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
choboanon
1 month, 3 weeks ago
Selected Answer: A
Answer is A. Directly related to firewall. Sniffing packets is not and more related to the protocols being used rather than the firewall itself.
upvoted 1 times
...
Swallows
5 months, 1 week ago
Selected Answer: A
The option B describes a different type of attack known as packet sniffing or eavesdropping. While packet sniffing can pose a security risk, it typically bypasses the firewall altogether and relies on vulnerabilities in network protocols or encryption mechanisms rather than exploiting weaknesses in the firewall itself. Therefore, option A is the attack technique that will succeed because of an inherent security weakness in an Internet firewall.
upvoted 2 times
...
a84n
6 months, 3 weeks ago
Selected Answer: B
Q: attack TECHNIQUES will succeed because of an INHERENT security weakness in an Internet FIREWALL Answer: B directly exploits weaknesses in the firewall's configuration or implementation, allowing attackers to eavesdrop on network traffic passing through the firewall. option A DoS attack, potentially exploit weaknesses in network infrastructure, it's not directly related to inherent security weaknesses in a firewall. option C phishing attack can bypass firewalls if conducted via email or other communication channels, they don't necessarily exploit inherent weaknesses in the firewall itself.
upvoted 1 times
...
001Yogesh
11 months, 1 week ago
Cant it be Phishing???
upvoted 1 times
...
Chloeeeee
1 year ago
It makes me confusing between a and b...
upvoted 1 times
...
Changwha
1 year, 4 months ago
B. Intercepting packets and viewing passwords
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...