Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSMP Topic 4 Question 57 Discussion

Actual exam question for ISC2's Information Systems Security Management Professional exam
Question #: 57
Topic #: 4
[All Information Systems Security Management Professional Questions]

Which of the following signatures watches for the connection attempts to well-known, frequently attacked ports?

Show Suggested Answer Hide Answer
Suggested Answer: A

Port signatures watch for connection attempts to well-known, frequently attacked ports. These type of signatures are used in Network-based ID systems, which involve looking at the packets on the network as they pass by some sensor. The packets are identified to be of interest if they match a signature.

Answer option D is incorrect. String signatures look for a text string that indicates a possible attack.

Answer option C is incorrect. Header signatures watch for dangerous or illogical combinations in packet headers.

Answer option B is incorrect. Digital signature is an authentication tool that is used to ensure the integrity and non-repudiation of a presentation. It is used to authenticate the presentation by using a cryptographic mechanism. The document for a digital signature can be a presentation, a message, or an email.


Comments

Currently there are no comments in this discussion, be the first to comment!


Save Cancel