New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 6 Question 81 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 81
Topic #: 6
[All CISSP Questions]

Which of the following will help identify the source internet protocol (IP) address of malware being exected on a computer?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Graciela
3 months ago
Wait, can you really find an IP from open connections? Sounds sketchy!
upvoted 0 times
...
Gladys
3 months ago
D? Really? That seems off.
upvoted 0 times
...
Gerry
4 months ago
C won't help with IPs, just processes.
upvoted 0 times
...
Dorthy
4 months ago
I think B is more useful for network info.
upvoted 0 times
...
Mitsue
4 months ago
A is definitely the way to go for finding IP addresses.
upvoted 0 times
...
Nobuko
4 months ago
The ARP table seems less relevant for identifying malware sources; it’s more about mapping IPs to MAC addresses, right?
upvoted 0 times
...
Evangelina
4 months ago
I feel like running processes might not directly show the source IP, but it could give clues about which applications are communicating.
upvoted 0 times
...
Charlene
4 months ago
I’m not entirely sure, but I think the TCP/IP configuration info is more about the local setup rather than identifying external IPs.
upvoted 0 times
...
Rose
5 months ago
I remember studying that open network connections can show active connections, which might help identify the source IP of malware.
upvoted 0 times
...
Rosalind
5 months ago
I'm a little confused by this question. I'm not sure if the running processes or the ARP table would really help identify the source IP. I think I'll focus on the network connection and configuration options, but I'll need to double-check my understanding.
upvoted 0 times
...
Pamella
5 months ago
Okay, I've got this. The source IP address would be visible in the list of open network connections, so I'm going to go with option A. Displaying the TCP/IP configuration could also work, but the network connections seem like the more direct approach.
upvoted 0 times
...
Rashida
5 months ago
This seems like a straightforward question about identifying the source IP address of malware. I think the key is to look at the network connections and configuration information, so I'll focus on options A and B.
upvoted 0 times
...
Fletcher
5 months ago
Hmm, I'm a bit unsure about this one. I know we need to find the source IP, but I'm not sure if the list of running processes or the ARP table would be the most helpful. I'll have to think this through carefully.
upvoted 0 times
...
Eliz
5 months ago
Ah, this is a good one. I remember seeing something about "DISABLE=True" in the zerotouch-config file before. I'm pretty confident that's the right answer.
upvoted 0 times
...
Dorthy
5 months ago
I remember we discussed how the Triple Bottom Line (TBL) focuses on social, environmental, and economic impacts, which seems perfect for BB Laundry's community-driven model.
upvoted 0 times
...
Makeda
5 months ago
Okay, let's see. The question is asking about the best KPIs to underpin the CSF of providing an improved service to senior executives. Based on the information given, I think the KPIs related to incident management and request fulfillment would be most relevant.
upvoted 0 times
...
Mona
10 months ago
Oh, I know just the thing - a nice big can of network RAID should take care of that malware in no time!
upvoted 0 times
France
8 months ago
D) Display the Address Resolution Protocol (APP) table
upvoted 0 times
...
Bok
9 months ago
C) List of running processes
upvoted 0 times
...
Kenneth
9 months ago
B) Display Transmission Control Protocol/Internet Protocol (TCP/IP) network configuration information.
upvoted 0 times
...
My
9 months ago
A) List of open network connections
upvoted 0 times
...
Reed
9 months ago
C) List of running processes
upvoted 0 times
...
Alberta
9 months ago
A) List of open network connections
upvoted 0 times
...
...
Alishia
10 months ago
I'm just gonna throw a network sniffer at the problem and see what pops up. Gotta love those good old packet captures!
upvoted 0 times
Twana
8 months ago
D) Display the Address Resolution Protocol (APP) table.
upvoted 0 times
...
Mireya
9 months ago
C) List of running processes
upvoted 0 times
...
King
9 months ago
B) Display Transmission Control Protocol/Internet Protocol (TCP/IP) network configuration information.
upvoted 0 times
...
Willetta
9 months ago
A) List of open network connections
upvoted 0 times
...
...
Maryann
10 months ago
Haha, the ARP table, really? That's so old-school, Cora. I'm going with option A - the list of open network connections is where it's at for tracking down that malware.
upvoted 0 times
...
Lynsey
10 months ago
But don't you think option B) Display TCP/IP network configuration information could also provide valuable information about the source IP address?
upvoted 0 times
...
Cora
10 months ago
Ah, the ARP table in option D might be the golden ticket! I bet I can find the malware's IP address lurking in there somewhere.
upvoted 0 times
Isabelle
9 months ago
Yeah, that's a good point. It's worth checking the ARP table for any suspicious activity.
upvoted 0 times
...
Andra
10 months ago
I think option D is the way to go, the ARP table could reveal the IP address.
upvoted 0 times
...
Holley
10 months ago
User 2: Good idea! That's where we might find the malware's IP address.
upvoted 0 times
...
Tina
10 months ago
User 1: I think option D is the way to go. Let's check the ARP table.
upvoted 0 times
...
...
Tamekia
10 months ago
I disagree, I believe option C) List of running processes is more likely to reveal the source IP address of malware.
upvoted 0 times
...
Lynsey
10 months ago
I think option A) List of open network connections will help identify the source IP address of malware.
upvoted 0 times
...
Tequila
10 months ago
But wouldn't checking the TCP/IP network configuration information also help identify the source IP address?
upvoted 0 times
...
France
10 months ago
I disagree, I believe the correct answer is C) List of running processes.
upvoted 0 times
...
Fidelia
11 months ago
Hmm, the list of running processes in option C could be helpful too. Maybe I can find the process ID of the malware and trace it back to the source IP.
upvoted 0 times
...
Tequila
11 months ago
I think the answer is A) List of open network connections.
upvoted 0 times
...
Fernanda
11 months ago
I think option B is the way to go. The TCP/IP network configuration should give me the IP address details I need to track down that pesky malware.
upvoted 0 times
Kristel
9 months ago
I believe option D, displaying the Address Resolution Protocol table, could also help in identifying the source IP address of the malware.
upvoted 0 times
...
Bobbye
9 months ago
I would go with option C, checking the list of running processes might reveal the source IP address of the malware.
upvoted 0 times
...
Izetta
9 months ago
I think option A could also be helpful in identifying the source IP address of malware.
upvoted 0 times
...
Aileen
10 months ago
I agree, option B is the best choice for identifying the source IP address of malware.
upvoted 0 times
...
...

Save Cancel