New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSMP Exam - Topic 3 Question 3 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 3
Topic #: 3
[All ISSMP Questions]

Which of the following is the best method to stop vulnerability attacks on a Web server?

Show Suggested Answer Hide Answer
Suggested Answer: D

A vulnerability attack takes advantage of the vulnerabilities in an operating system or software service by entering the operating system and disrupting its working. The best way to counter such attacks is to keep the operating system updated with latest service packs and updates.

Answer option B is incorrect. Configuring a firewall is helpful in Denial-of-Service attacks.

Answer option A is incorrect. Using strong passwords is helpful in countering brute force attacks.

Answer option C is incorrect. Virus scanners are used to protect computers from viruses. They do not help protect computers from attacks.


Contribute your Thoughts:

0/2000 characters
Jettie
4 months ago
Wait, are strong passwords really enough?
upvoted 0 times
...
Bettina
4 months ago
Definitely need those updates!
upvoted 0 times
...
Julio
4 months ago
Virus scanners can only do so much.
upvoted 0 times
...
Arletta
4 months ago
I think a firewall is more effective.
upvoted 0 times
...
Stephane
5 months ago
Strong passwords are a must!
upvoted 0 times
...
Nilsa
5 months ago
I’m leaning towards configuring a firewall, but I’m not confident if that’s the only thing we need to consider for web server security.
upvoted 0 times
...
Rasheeda
5 months ago
I feel like we had a practice question about updates and patches being crucial for security. Maybe option D is the right choice?
upvoted 0 times
...
Joseph
5 months ago
I think strong passwords are important, but they might not be enough on their own to stop attacks.
upvoted 0 times
...
Latia
5 months ago
I remember we discussed firewalls in class, but I'm not entirely sure if they're the best option for web servers specifically.
upvoted 0 times
...
Gilberto
5 months ago
I think the edge node is responsible for deciding client access, since it's the component that connects the client to the network.
upvoted 0 times
...
Rebbeca
5 months ago
Hmm, this looks like a subnet question. Let me think through this step-by-step.
upvoted 0 times
...
Evangelina
5 months ago
Ah, I see what they're getting at now. The information-sharing agreements need to ensure the confidentiality of any shared data, so the right answer has to be B. Confidential information.
upvoted 0 times
...

Save Cancel