New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 6 Question 12 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 12
Topic #: 6
[All CISSP Questions]

Which of the following is a standard Access Control List (ACL) element that enables a router to filter Internet traffic?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Cristina
4 months ago
Wait, are we sure about that? Sounds off.
upvoted 0 times
...
Ronny
4 months ago
100% agree, it's all about the IP!
upvoted 0 times
...
Arlette
4 months ago
Security roles? Not really an ACL element.
upvoted 0 times
...
Fidelia
4 months ago
I thought MAC addresses were more common for filtering.
upvoted 0 times
...
Herminia
5 months ago
Definitely the IP address!
upvoted 0 times
...
Jani
5 months ago
Security roles seem more related to user permissions than actual traffic filtering, so I’m leaning towards IP addresses too.
upvoted 0 times
...
Madonna
5 months ago
I feel like I've seen practice questions where IP addresses were definitely mentioned as a key element in ACLs.
upvoted 0 times
...
Flo
5 months ago
I'm not entirely sure, but I remember something about MAC addresses being used for local network filtering, not Internet traffic.
upvoted 0 times
...
Ronny
5 months ago
I think the IP address is the right answer since it’s commonly used in ACLs for filtering traffic.
upvoted 0 times
...
Desire
5 months ago
Okay, let's see. I know Versa CPEs handle classification, so that's one. Admission control and hierarchical queuing also sound familiar, but I'm not 100% sure.
upvoted 0 times
...
Melita
5 months ago
This question seems straightforward, but I want to make sure I understand the key details. Noah's credit report was a factor in his job application, and he's worried about the security of his information at Arnie's Emporium. I'll need to carefully review the legislation options to determine which one would address his concerns.
upvoted 0 times
...
Julian
5 months ago
I'm confident I know the answer to this. User2 and Group2 are the only objects that can be added as members to Group3, since they are both direct child objects of the Azure AD tenant.
upvoted 0 times
...
Sharmaine
5 months ago
Okay, let's think this through step-by-step. A low change success rate and instances of unauthorized changes would both indicate poor change management control, so I'm leaning towards option B.
upvoted 0 times
...
Wade
5 months ago
Okay, let me break this down. The customer and stakeholder want to visualize the final product, so I think Prototyping is the way to go. That will give them a tangible representation to review.
upvoted 0 times
...

Save Cancel