exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 94 discussion

Actual exam question from ISC's CISSP
Question #: 94
Topic #: 1
[All CISSP Questions]

Which of the following is the MOST effective strategy to prevent an attacker from disabling a network?

  • A. Design networks with the ability to adapt, reconfigure, and fail over.
  • B. Test business continuity and disaster recovery (DR) plans.
  • C. Follow security guidelines to prevent unauthorized network access.
  • D. Implement network segmentation to achieve robustness.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Dee83
Highly Voted 2 years, 2 months ago
D. Implement network segmentation to achieve robustness. Network segmentation is a security practice that involves dividing a network into smaller, isolated subnetworks, which can limit the potential damage and spread of an attack. This can prevent an attacker from disabling the entire network, and it can also provide additional security controls such as access controls, firewalls, and intrusion detection/prevention systems (IDS/IPS) to further protect critical network assets. Designing networks with the ability to adapt, reconfigure, and fail over can also help to maintain network availability in the face of an attack, but network segmentation is considered the most effective way to prevent an attacker from disabling the entire network. Testing business continuity and disaster recovery (DR) plans and following security guidelines to prevent unauthorized network access are important, but they are not directly related to preventing an attacker from disabling the network.
upvoted 13 times
...
BigITGuy
Most Recent 6 days, 21 hours ago
Selected Answer: A
The MOST effective strategy to prevent an attacker from completely disabling a network is to design it with redundancy, failover capabilities, dynamic reconfiguration. Can't be C -- following security guidelines helps prevent unauthorized access, but even authorized users can face network failures if the network is not resilient. Can't be D -- Network segmentation improves security and containment, but by itself does not guarantee that the network will adapt or failover when under attack.
upvoted 1 times
...
Dtony66
2 months, 4 weeks ago
Selected Answer: D
With a robust network and different paths, the network would not be able to be taken down.
upvoted 1 times
...
deeden
8 months ago
Selected Answer: A
This approach ensures that the network can maintain its functionality even when under attack. This strategy offers resilience against a wide range of attacks. Examples include: 1. Software-Defined Networking (SDN): SDN controllers enable dynamic network reconfiguration and policy enforcement. 2. Network Function Virtualization (NFV): Virtualizes network services to allow for rapid deployment and scaling. 3. Load Balancers: Distribute traffic across multiple servers to prevent overload and ensure availability. 4. Automated Failover Systems: Tools like Kubernetes for container orchestration support automatic failover for applications. These solutions collectively enhance network resilience and continuity.
upvoted 4 times
...
Ramye
10 months, 3 weeks ago
Based on the key statement - prevent an attacker from disabling a network, the answer is A. This will ensure access is provided based on who needs it thus making sure preventing access to others to carry on attacks.
upvoted 1 times
Ramye
10 months, 3 weeks ago
Oops - I meant to say the answer is C.
upvoted 1 times
...
...
Dtony66
11 months, 1 week ago
Selected Answer: A
Any network can be hacked
upvoted 2 times
...
CCNPWILL
11 months, 3 weeks ago
Selected Answer: A
A. C is just network access only.. you can still point a DOS and disable a. network. no need for network access to disable a network. Answer is A.
upvoted 4 times
...
Vasyamba1
1 year ago
Selected Answer: A
I think the correct answer is A. We are asked about strategy - design networks in a proper way is a strategy. Moreover, C tells us about guidelines to prevent access only, but the question is about disabling network in general.
upvoted 4 times
CCNPWILL
11 months, 3 weeks ago
I agree with this statement. Answer is indeed A.
upvoted 1 times
...
...
homeysl
1 year ago
Selected Answer: C
C is about best practice. D is a bit technical but best solution.
upvoted 1 times
...
Kyanka
1 year, 1 month ago
Selected Answer: A
A. I think the key is that it says "prevent an attacker" instead of talking about maintaining availability during an attack. That's why I think it's C instead of A.
upvoted 2 times
...
gjimenezf
1 year, 2 months ago
Selected Answer: A
A. Design networks with the ability to adapt, reconfigure, and fail over. Even if access controls fails, failover will prevent loss of service
upvoted 1 times
...
Soleandheel
1 year, 4 months ago
A. Design networks with the ability to adapt, reconfigure, and fail over.
upvoted 1 times
...
AMANSUNAR
1 year, 4 months ago
Selected Answer: A
Designing networks with adaptability, reconfigurability, and failover mechanisms enhances their resilience and ensures continuity of services even in the face of attacks or disruptions. This approach makes it more difficult for an attacker to disable the network by introducing redundancy and alternative paths.
upvoted 2 times
...
InclusiveSTEAM
1 year, 5 months ago
The answer is A The most effective strategy to prevent an attacker from disabling a network is to design networks with adaptability, reconfigurability, and failover capabilities, option A. Building resiliency into the network architecture provides the greatest protection against total denial of service. The network can recover and adapt. Testing DR plans, following security guidelines, and segmentation are beneficial but alone don't prevent full denial if the design is still fragile. While comprehensive security is crucial, a brittle design leaves no options if endpoints are still compromised. Resilient architecture assumes breaches may occur.
upvoted 2 times
...
aape1
1 year, 6 months ago
Selected Answer: C
C. Because A and B are reactive, not preventive. D is not going to prevent disabling the network assuming the attacker got into a VLAN and performed other attacks, such as VLAN hopping and etc...
upvoted 4 times
...
aape1
1 year, 6 months ago
Selected Answer: C
C. Because A and B are not reactive, not preventive. D is not going to prevent disabling the network assuming the attacker got into a VLAN and performed other attacks, such as VLAN hopping and etc...
upvoted 1 times
...
Bach1968
1 year, 9 months ago
Option C, "Follow security guidelines to prevent unauthorized network access," is indeed an important strategy to enhance network security. By following security guidelines and implementing measures such as strong access controls, secure authentication mechanisms, and intrusion detection systems, organizations can prevent unauthorized network access and reduce the risk of network compromise. However, in the context of preventing an attacker from disabling a network, implementing network segmentation (Option D) is generally considered a more effective strategy. Network segmentation helps isolate different parts of the network, limiting the impact of a potential breach or attack. While following security guidelines is crucial for overall network security, it may not provide the same level of protection against network disabling as network segmentation. It is important to implement a combination of security measures, including network segmentation, access controls, monitoring, and regular security updates, to safeguard against various threats and ensure the availability and integrity of the network. always, it is never a one approach to perfection
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago