Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 108 discussion

Actual exam question from ISC's CISSP
Question #: 108
Topic #: 1
[All CISSP Questions]

An organization is trying to secure instant messaging (IM) communications through its network perimeter. Which of the following is the MOST significant challenge?

  • A. IM clients can interoperate between multiple vendors.
  • B. IM clients can run as executables that do not require installation.
  • C. IM clients can utilize random port numbers.
  • D. IM clients can run without administrator privileges.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
stickerbush1970
Highly Voted 2 years, 2 months ago
Selected Answer: C
C. IM clients can utilize random port numbers. Through the perimeter lends me to think they are asking for firewall ports to open
upvoted 10 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
dev46
2 years, 2 months ago
IM clients are capable of the tunnel through a firewall. Most IM clients use well-known ports, but they can easily exploit open firewall ports. Although the other risk is not in the options file transfer and sending links is the most considerable risk for IM apps. Anyone can send a link or transfer a file with a worm/ virus/ trojan. Considering available options, C sounds right.
upvoted 1 times
...
...
JAckThePip
Highly Voted 2 years, 1 month ago
Answer is C "IM clients find ways to tunnel through firewalls, creating risk. Most IM services come through well-publicized ports (5190 for AOL Instant Messenger, 1863 for MSN and 5050 for Yahoo), but IM clients also can exploit any open port on the firewall, including those used by other applications (such as Port 80 for Web and HTTP traffic). Some clients also can connect via peer-to-peer connections or establish connections on randomly negotiated ports." https://www.networkworld.com/article/2323048/top-5-im-security-risks.html
upvoted 5 times
...
murphseal
Most Recent 7 months, 3 weeks ago
Selected Answer: C
C. IM clients can utilize random port numbers. Random port numbers can make it difficult for traditional security measures to effectively control and secure IM traffic, as they can bypass standard port-based security policies. This can pose a significant challenge in monitoring and securing IM communications within the network perimeter.
upvoted 1 times
...
YesPlease
11 months, 2 weeks ago
Selected Answer: C
Answer C) Network perimeter usually refers to firewall
upvoted 1 times
...
AMANSUNAR
1 year ago
Selected Answer: A
Interoperability between IM clients from multiple vendors can pose a challenge because it often involves different protocols and standards. Ensuring security across diverse platforms and protocols can be complex, and vulnerabilities in one vendor's implementation can potentially affect the security of the entire communication system.
upvoted 2 times
...
MShaaban
1 year, 3 months ago
I go with B. After users awareness they are to be more vigilant and report more incidents. Whether those incidents are true or not it is a different story, but the fact they are more suspicious and they would report more incidents.
upvoted 1 times
MShaaban
1 year, 3 months ago
Commented in the wrong question.
upvoted 1 times
...
...
Bach1968
1 year, 4 months ago
Selected Answer: A
option A is the most significant challenge in securing instant messaging (IM) communications through the network perimeter. A. IM clients can interoperate between multiple vendors. The ability of IM clients to interoperate between multiple vendors poses a significant challenge for securing IM communications. Different IM clients may use different protocols, encryption methods, or security features, making it difficult to enforce consistent security measures across all IM communications. It requires careful configuration, compatibility testing, and ongoing monitoring to ensure that security controls are effective in a heterogeneous IM environment.
upvoted 2 times
...
jens23
1 year, 5 months ago
This question would be appropriate 10 years ago. Modern firewall solutions identify applications based on signatures and behavioural analysis, port based security is a pretty outdated concept, but in the context of this question, C is correct. If there was the option of simply switching the network on the phone from Wi-Fi to LTE/5G, I wouldn't hesitate to choose that option, because this would circumvent the entire security perimeter.
upvoted 1 times
...
Dee83
1 year, 10 months ago
C. IM clients can utilize random port numbers. The use of random port numbers by IM clients can make it difficult to secure the organization's network perimeter. Because IM clients can use any available port, it can be challenging for network administrators to identify and block IM traffic. This makes it difficult to ensure that all IM traffic is being properly monitored and controlled, increasing the risk that sensitive information could be leaked or that malware could spread through the network. In addition, the use of random port numbers can allow IM clients to bypass firewalls and intrusion detection systems, making it harder to detect and prevent unauthorized access to the network.
upvoted 1 times
...
Jamati
2 years ago
Selected Answer: C
It's easier to secure something that uses known or fixed port numbers.
upvoted 1 times
...
rootic
2 years ago
Selected Answer: C
Definetely C.
upvoted 1 times
...
SongOTD
2 years, 1 month ago
Selected Answer: C
I think 'network perimeter' is the key words.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...