New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 4 Question 1 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 1
Topic #: 4
[All ISSAP Questions]

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Show Suggested Answer Hide Answer
Suggested Answer: A

also known as network saturation attack or bandwidth consumption attack. Attackers make Denial-of-Service attacks by sending a large

number of protocol packets to a network. A DoS attack can cause the following to occur:

Saturate network resources.

Disrupt connections between two computers, thereby preventing communications between services.

Disrupt services to a specific computer.

A SYN attack is a common DoS technique in which an attacker sends multiple SYN packets to a target computer. For each SYN packet received,

the target computer allocates resources and sends an acknowledgement (SYN-ACK) to the source IP address. Since the target computer does

not receive a response from the attacking computer, it attempts to resend the SYN-ACK. This leaves TCP ports in the half-open state. When

an attacker sends TCP SYNs repeatedly before the half-open connections are timed out, the target computer eventually runs out of resources

and is unable to handle any more connections, thereby denying service to legitimate users.

Answer option D is incorrect. An impersonation attack attempts to access the system by using a valid user password.

Answer option B is incorrect. A vulnerability attack takes advantage of the vulnerabilities in an operating system or software service to enter

into the operating system and disrupt its working.

Answer option C is incorrect. Social engineering is the art of convincing people and making them disclose useful information such as account

names and passwords. This information is further exploited by hackers to gain access to a user's computer or network. This method involves

mental ability of the people to trick someone rather than their technical skills. A user should always distrust people who ask him for his

account name or password, computer name, IP address, employee ID, or other information that can be misused.


Contribute your Thoughts:

0/2000 characters
Adaline
4 months ago
Sounds too simple, are there really no other options?
upvoted 0 times
...
Kenneth
4 months ago
100% a DoS attack, no doubt about it!
upvoted 0 times
...
Mariko
4 months ago
Wait, are we sure it's not a vulnerability attack?
upvoted 0 times
...
Felicia
4 months ago
I agree, it's all about overwhelming the network.
upvoted 0 times
...
Quentin
5 months ago
Definitely a Denial-of-Service attack!
upvoted 0 times
...
Kimberlie
5 months ago
Denial-of-Service sounds familiar, but I wonder if there’s a chance it could be something else?
upvoted 0 times
...
Elli
5 months ago
I’m a bit unsure, but I don’t think it’s social engineering. That seems different.
upvoted 0 times
...
Yvonne
5 months ago
I remember practicing a question like this, and I’m pretty sure it’s not a vulnerability attack.
upvoted 0 times
...
Loise
5 months ago
I think this is a Denial-of-Service attack, right? It’s about overwhelming the network.
upvoted 0 times
...
Ashlyn
5 months ago
Hmm, this is a tricky one. I'll need to carefully read through the question and options to understand the context and requirements before deciding on the best approach.
upvoted 0 times
...
Carmela
5 months ago
I'm leaning towards option C. Moving the data to a new container with deviceId as the partition key seems like the best way to reduce RU consumption for the analytics queries.
upvoted 0 times
...
Brittni
5 months ago
Okay, I got this. The key is that the question is asking which formula was developed by FIPS 199. Option C matches that description, with the three security objectives and their corresponding "impact" values.
upvoted 0 times
...

Save Cancel