Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 187 discussion

Actual exam question from ISC's CISSP
Question #: 187
Topic #: 1
[All CISSP Questions]

A network security engineer needs to ensure that a security solution analyzes traffic for protocol manipulation and various sorts of common attacks. In addition, all
Uniform Resource Locator (URL) traffic must be inspected and users prevented from browsing inappropriate websites. Which of the following solutions should be implemented to enable administrators the capability to analyze traffic, blacklist external sites, and log user traffic for later analysis?

  • A. Application-Level Proxy
  • B. Intrusion detection system (IDS)
  • C. Host-based Firewall
  • D. Circuit-Level Proxy
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
gjimenezf
10 months, 1 week ago
Selected Answer: A
Both application proxies and circuit-level proxies can potentially detect protocol manipulation, but they operate at different levels of the network stack and have different approaches.Application proxy works at the application layer and circuit level proxy at the session layer Application proxies are more suited for detecting protocol manipulation at the application layer, where they have visibility into the specifics of application-layer protocols. Circuit-level proxies, on the other hand, may be more focused on identifying anomalies or manipulation at the transport layer, based on patterns or behaviors that deviate from standard TCP behavior.
upvoted 1 times
...
Soleandheel
11 months, 2 weeks ago
A. Application-Level Proxy An application-level proxy (also known as an application firewall or application gateway) can inspect traffic at the application layer and enforce policies based on application-specific rules. This allows administrators to analyze traffic, block inappropriate websites, and log user activity for further analysis. It provides granular control over the traffic and is well-suited for these requirements.
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: A
From a CISSP perspective, the solution that should be implemented to enable administrators the capability to analyze traffic, blacklist external sites, and log user traffic for later analysis is an Application-Level Proxy. An Application-Level Proxy operates at the application layer of the OSI model, allowing for deep inspection of network traffic. It can analyze traffic for protocol manipulation and various sorts of common attacks, while also allowing administrators to blacklist external sites and log user traffic for later analysis. Intrusion detection systems (IDS) are designed to detect and alert on malicious activity on the network, but they do not offer the same level of traffic analysis or control as an Application-Level Proxy. Host-based firewalls are designed to protect individual hosts from network attacks, but they do not offer the same level of network-wide control as a proxy. Circuit-level proxies do not offer the same level of traffic analysis or control as an Application-Level Proxy.
upvoted 2 times
...
Marzie
1 year, 7 months ago
Selected Answer: C
Host-based Firewall seems like a good fit here given that is calling out user behavior's e.g. blocking websites
upvoted 2 times
...
DJOEK
1 year, 10 months ago
Selected Answer: A
We are talking about a webfilter here like ZScaler.
upvoted 2 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
Jamati
2 years ago
Selected Answer: A
Answer is A. Confused me at 1st coz I thought it would be running on the actual application, but it's just a proxy server operating at the application layer of the OSI model.
upvoted 2 times
...
rdy4u
2 years, 1 month ago
Selected Answer: A
Application proxies provide one of the most secure types of access you can have in a security gateway. An application proxy sits between the protected network and the network you want to be protected from. Every time an application makes a request, the application intercepts the request to the destination system.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...