Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 192 discussion

Actual exam question from ISC's CISSP
Question #: 192
Topic #: 1
[All CISSP Questions]

What is the FIRST step in reducing the exposure of a network to Internet Control Message Protocol (ICMP) based attacks?

  • A. Implement network access control lists (ACL).
  • B. Implement an intrusion prevention system (IPS).
  • C. Implement a web application firewall (WAF).
  • D. Implement egress filtering at the organization's network boundary.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RVoigt
Highly Voted 1 year, 9 months ago
Selected Answer: A
CISSP Official Study Guide pg 824 " Active Response Active responses can modify the environment using several different methods. Typical responses include modifying firewall ACLs to block traffic based on ports, protocols, and source addresses, and even disabling all communications over specific cable segments. For example, if an IDS detects a SYN flood attack from a single IP address, the IDS can change the ACL to block all traffic from this IP address. Similarly, if the IDS detects a ping flood attack from multiple IP addresses, it can change the ACL to block all ICMP traffic."
upvoted 8 times
...
YesPlease
Most Recent 11 months, 2 weeks ago
Selected Answer: A
Answer A) Although I found interesting articles about egress filtering and ICMP attacks, the fact still remains that network ACLs can both do Ingress and Egress filtering at the network boundary. Here is the interesting article: https://www.ietf.org/rfc/rfc5927.html#section-4:~:text=As%20with
upvoted 2 times
...
ramingt
1 year ago
Selected Answer: D
https://www.giac.org/paper/gsec/705/egress-filtering-keeping-internet-safe-systems/101588 Best Practices and Considerations in Egress Filtering (cmu.edu) it looks like D for me
upvoted 2 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: A
Implementing egress filtering at the organization's network boundary refers to the practice of controlling outgoing traffic from an organization's network to the Internet. While egress filtering can help prevent some types of attacks, such as data theft and malware propagation, it may not necessarily reduce exposure to ICMP-based attacks. ICMP-based attacks typically involve sending ICMP packets to a victim's IP address or network, causing it to become overwhelmed with requests and making it unavailable for legitimate users. The primary way to mitigate these types of attacks is by restricting or blocking certain types of ICMP traffic using network access control lists (ACL). Therefore, implementing egress filtering at the organization's network boundary alone might not be as effective in preventing ICMP-based attacks compared with implementing network ACLs that can specifically block unwanted/unnecessary ICMP traffic based on their characteristics such as source/destination IP address or port numbers.
upvoted 4 times
...
georgegeorge125487
1 year, 3 months ago
Selected Answer: A
A is correct
upvoted 1 times
...
v1223
1 year, 6 months ago
Ambiguous. Depends on which type of attack. Smurf attack would be A - ACL. ICMP covert channels would be D - egress blocks.
upvoted 2 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
FlimFlam
1 year, 8 months ago
It's got to be D. The question says 'first step' in reducing the risk. Blacklisting an IP that is sending your bad traffic is a response, not a first step. The egress filtering is preventative and stop the formation of a covert ICMP channel.
upvoted 1 times
Tygrond87
1 year, 6 months ago
you do not blacklist an IP you make an ACL to block all inbound ICMP traffic. your First action would be to asume the burgler is already inside and try to catch him at the door ? No your first action is to lock the door with an ACL
upvoted 3 times
dumdada
1 year, 5 months ago
You can filter all ICMP traffic to be dropped as well. ACL is not required necessarily
upvoted 1 times
...
...
...
Dee83
1 year, 10 months ago
D. Implement egress filtering at the organization's network boundary. The first step in reducing the exposure of a network to Internet Control Message Protocol (ICMP) based attacks is to implement egress filtering at the organization's network boundary. Egress filtering is the process of monitoring and controlling outbound traffic from the organization's network. It can be used to block or limit the types of traffic that can leave the network, such as ICMP traffic. By implementing egress filtering, the organization can prevent malicious ICMP traffic from leaving the network and reaching its intended target.
upvoted 1 times
...
somkiatr
1 year, 10 months ago
Selected Answer: D
I will go with D. We should filter egress traffic to respond ICMP message from WAN while keep the ICMP message enabled or responding from LAN. reference : https://blog.paessler.com/disabling-icmp-and-snmp-wont-increase-security-but-will-impact-network-monitoring
upvoted 2 times
...
DJOEK
1 year, 10 months ago
Selected Answer: D
The first step in reducing the exposure of a network to ICMP based attacks according to CISSP is to implement egress filtering at the organization's network boundary. This involves setting up rules that determine which types of traffic are allowed to leave the network and which are not. Egress filtering can help to prevent attackers from using ICMP to exfiltrate data from the network or to launch other types of attacks. Other measures, such as implementing network access control lists (ACLs) and an intrusion prevention system (IPS), may also be effective in mitigating the risk of ICMP based attacks, but implementing egress filtering at the network boundary is typically the first step in this process.
upvoted 1 times
...
mccoy
1 year, 10 months ago
D. Implement egress filtering at the organization's network boundary. Egress filtering involves checking outgoing traffic from a network to ensure that it conforms to the organization's security policies. This can help to reduce the exposure of the network to Internet Control Message Protocol (ICMP) based attacks by blocking or limiting the types of ICMP messages that are allowed to leave the network. This can help to prevent attackers from using ICMP messages to probe the network for vulnerabilities or to carry out other types of attacks. Egress filtering should be implemented at the organization's network boundary, such as at a firewall or router, to ensure that all outgoing traffic is checked.
upvoted 1 times
...
oudmaster
1 year, 11 months ago
Selected Answer: D
Common ingress filters and egress filters can be used to block spoofed packets that often relate to malware, botnets, and other unwanted activities. Egress filtering prevents any unauthorized or malicious traffic to leave the internal network. Information flowing from the internal network to the internet is monitored and controlled. TCP/IP packets that are being sent out of the internal network are examined through a router, firewall, or a similar edge device. ! Example: Payment Card Industry Data Security Standard (PCI DSS) requires egress filtering from any server in the cardholder environment.
upvoted 1 times
...
stickerbush1970
2 years ago
I am going to disagree with A. An ICMP attack is more than likely coming from the outside of the network, an ACL would do nothing to stop this from happening. An ACL is used to control access to this file or that server, and attacker is not going to be on the ACL.
upvoted 1 times
...
sphenixfire
2 years ago
Selected Answer: B
Icmp can be needed and is not only to be covert by ping. Tvere are also reroute issues by icmp. Recognice attacks by ips, because they are known.
upvoted 2 times
...
bynd
2 years ago
Selected Answer: D
You can prevent Ping Attacks by: Configuring your firewall to block ICMP pings from entering your network at the perimeter. Adding filters to tell your router to detect and drop malformed data packets or those coming from suspicious sources. - Looking for spoofed packets that do not originate from within your network, also known as egress filtering. Installing network monitoring software to alert for traffic patterns that are not ordinary. Scanning your network for open ports on a regular basis that is outside of your baseline.
upvoted 1 times
...
Jamati
2 years ago
Selected Answer: A
A is correct
upvoted 2 times
...
rdy4u
2 years, 1 month ago
Selected Answer: A
By setting your perimeter firewall to block pings, you can effectively prevent attacks launched from outside your network.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...