New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSMP Exam - Topic 3 Question 53 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 53
Topic #: 3
[All ISSMP Questions]

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Show Suggested Answer Hide Answer
Suggested Answer: B

Tunneling is a process used by remote users to make a secure connection to internal resources after establishing an Internet connection. The tunnel is created between the two ends by encapsulating the data in a mutually agreed-upon protocol for transmission.

Answer option A is incorrect. Packet filtering is a method that allows or restricts the flow of specific types of packets to provide security. It analyzes the incoming and outgoing packets and lets them pass or stops them at a network interface based on the source and destination addresses, ports, or protocols. Packet filtering provides a way to define precisely which type of IP traffic is allowed to cross the firewall of an intranet. IP packet filtering is important when users from private intranets connect to public networks, such as the Internet.

Answer option C is incorrect. Packet sniffing is a process of monitoring data packets that travel across a network. The software used for packet sniffing is known as sniffers. There are many packet-sniffing programs that are available on the Internet. Some of these are unauthorized, which can be harmful for a network's security.

Answer option D is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to hide his identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the responses to be misdirected.


Contribute your Thoughts:

0/2000 characters
Tu
4 months ago
Spoofing is just a no-go for secure connections!
upvoted 0 times
...
Beckie
4 months ago
Wait, are you sure it's not packet sniffing? Sounds fishy.
upvoted 0 times
...
Telma
4 months ago
Tunneling is the best option here, no doubt.
upvoted 0 times
...
Lamar
4 months ago
I thought packet filtering was enough for security?
upvoted 0 times
...
Thora
4 months ago
Definitely tunneling! That's the way to go for secure connections.
upvoted 0 times
...
Novella
5 months ago
Spoofing and packet sniffing don’t seem like the right processes for secure connections, so I’m leaning towards tunneling too.
upvoted 0 times
...
Germaine
5 months ago
I’m a bit confused; packet filtering sounds familiar, but I don’t think it’s the same as making a secure connection.
upvoted 0 times
...
Regenia
5 months ago
I remember practicing a question about secure connections, and tunneling was mentioned as a method. It seems to fit here.
upvoted 0 times
...
Shenika
5 months ago
I think tunneling is the right answer because it creates a secure connection, but I'm not completely sure.
upvoted 0 times
...
Hobert
5 months ago
Ah, I see what they're asking. "Log" would be the best option to quietly track those attempts.
upvoted 0 times
...
Mollie
5 months ago
Hmm, I'm a bit confused by the `greater()` comparator in the `sort` and `equal_range` calls. I'll need to make sure I understand how that's affecting the sorting and search.
upvoted 0 times
...
Tyra
5 months ago
Hmm, I'm a bit confused. Do we need to create calculated columns in the Orders table, or is there a better way to handle the date requirements?
upvoted 0 times
...