Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 4 Question 99 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 99
Topic #: 4
[All SSCP Questions]

Related to information security, integrity is the opposite of which of the following?

Show Suggested Answer Hide Answer
Suggested Answer: C

Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses or to publish multiple hosts with service to the internet while having only one single IP assigned on the external side of your gateway.

Most home networks use PAT. In such a scenario, the Internet Service Provider (ISP) assigns a single IP address to the home network's router. When Computer X logs on the Internet, the router assigns the client a port number, which is appended to the internal IP address. This, in effect, gives Computer X a unique address. If Computer Z logs on the Internet at the same time, the router assigns it the same local IP address with a different port number. Although both computers are sharing the same public IP address and accessing the Internet at the same time, the router knows exactly which computer to send specific packets to because each computer has a unique internal address.

Port Address Translation is also called porting, port overloading, port-level multiplexed NAT and single address NAT.

Shon Harris has the following example in her book:

The company owns and uses only one public IP address for all systems that need to communicate outside the internal network. How in the world could all computers use the exact same IP address? Good question. Here's an example: The NAT device has an IP address of 127.50.41.3. When computer A needs to communicate with a system on the Internet, the NAT device documents this computer's private address and source port number (10.10.44.3; port 43,887). The NAT device changes the IP address in the computer's packet header to 127.50.41.3, with the source port 40,000. When computer B also needs to communicate with a system on the Internet, the NAT device documents the private address and source port number (10.10.44.15; port 23,398) and changes the header information to 127.50.41.3 with source port 40,001. So when a system responds to computer A, the packet first goes to the NAT device, which looks up the port number 40,000 and sees that it maps to computer A's real information. So the NAT device changes the header information to address 10.10.44.3 and port 43,887 and sends it to computer A for processing. A company can save a lot more money by using PAT, because the company needs to buy only a few public IP addresses, which are used by all systems in the network.

As mentioned on Wikipedia:

NAT is also known as Port Address Translation: is a feature of a network device that translate TCP or UDP communications made between host on a private network and host on a public network. I allows a single public IP address to be used by many host on private network which is usually a local area network LAN

NAT effectively hides all TCP/IP-level information about internal hosts from the Internet.

The following were all incorrect answer:

IP Spoofing - In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.

Subnetting - Subnetting is a network design strategy that segregates a larger network into smaller components. While connected through the larger network, each subnetwork or subnet functions with a unique IP address. All systems that are assigned to a particular subnet will share values that are common for both the subnet and for the network as a whole.

A different approach to network construction can be thought of as subnetting in reverse. Known as CIDR, or Classless Inter-Domain Routing, this approach also creates a series of subnetworks. Rather than dividing an existing network into small components, CIDR takes smaller components and connects them into a larger network. This can often be the case when a business is acquired by a larger corporation. Instead of doing away with the network developed and used by the newly acquired business, the corporation chooses to continue operating that network as a subsidiary or an added component of the corporation's network. In effect, the system of the purchased entity becomes a subnet of the parent company's network.

IP Distribution - This is a generic term which could mean distribution of content over an IP network or distribution of IP addresses within a Company. Sometimes people will refer to this as Internet Protocol address management (IPAM) is a means of planning, tracking, and managing the Internet Protocol address space used in a network. Most commonly, tools such as DNS and DHCP are used in conjunction as integral functions of the IP address management function, and true IPAM glues these point services together so that each is aware of changes in the other (for instance DNS knowing of the IP address taken by a client via DHCP, and updating itself accordingly). Additional functionality, such as controlling reservations in DHCP as well as other data aggregation and reporting capability, is also common. IPAM tools are increasingly important as new IPv6 networks are deployed with larger address pools, different subnetting techniques, and more complex 128-bit hexadecimal numbers which are not as easily human-readable as IPv4 addresses.

Reference(s) used for this question:

STREBE,

Matthew and PERKINS, Charles, Firewalls 24seven, Sybex 2000, Chapter 1: Understanding Firewalls.

Schneiter, Andrew (2013-04-15). Official (ISC)2 Guide to the CISSP CBK, Third Edition : Telecommunications and Network Security, Page 350.

Harris, Shon (2012-10-25). CISSP All-in-One Exam Guide, 6th Edition (Kindle Locations 12765-12774). Telecommunications and Network Security, Page 604-606

http://searchnetworking.techtarget.com/definition/Port-Address-Translation-PAT

http://en.wikipedia.org/wiki/IP_address_spoofing

http://www.wisegeek.com/what-is-subnetting.htm

http://en.wikipedia.org/wiki/IP_address_management


Contribute your Thoughts:

0/2000 characters
Evette
4 months ago
I’m not so sure about that, could it be A instead?
upvoted 0 times
...
Belen
4 months ago
Totally agree, B makes the most sense!
upvoted 0 times
...
Mitsue
4 months ago
Wait, isn't integrity just about keeping things as they are?
upvoted 0 times
...
Macy
4 months ago
I think it's definitely B, alteration.
upvoted 0 times
...
Dustin
5 months ago
Integrity is all about maintaining data accuracy.
upvoted 0 times
...
Reid
5 months ago
I vaguely recall that integrity is about preventing unauthorized changes, so alteration sounds like the right choice, but I could be wrong.
upvoted 0 times
...
Erin
5 months ago
I feel like I might be mixing up terms here, but I thought accreditation had something to do with trustworthiness, not integrity.
upvoted 0 times
...
Paris
5 months ago
I'm not entirely sure, but I remember a practice question that mentioned integrity and its relation to data changes. Could it be B?
upvoted 0 times
...
Tamie
5 months ago
I think integrity is about maintaining the accuracy of data, so maybe alteration could be the opposite?
upvoted 0 times
...
Royal
5 months ago
Hmm, I'm a bit stuck on this one. I know integrity is important, but I'm not totally clear on what the opposite would be. I'll have to make an educated guess.
upvoted 0 times
...
Yolando
5 months ago
Integrity is all about maintaining the original state of information, so the opposite must be something that changes or modifies that state. I'm going with B, alteration.
upvoted 0 times
...
Herminia
5 months ago
Wait, I'm not sure. Is it abstraction? That seems like it could be the opposite of integrity somehow. I'll have to review my notes.
upvoted 0 times
...
Fausto
5 months ago
Okay, I've got this. Integrity is about ensuring data isn't changed, so the opposite must be alteration. Easy peasy!
upvoted 0 times
...
Celeste
5 months ago
Hmm, this one's tricky. I'll need to think carefully about the relationship between integrity and the other security concepts.
upvoted 0 times
...
Doretha
10 months ago
Ah, the age-old battle between integrity and alteration. It's like a game of tug-of-war, and alteration is definitely the losing side.
upvoted 0 times
Buck
8 months ago
Accreditation is not the opposite of integrity.
upvoted 0 times
...
Dean
8 months ago
Abstraction is the opposite of integrity.
upvoted 0 times
...
Royal
8 months ago
Integrity is crucial for information security.
upvoted 0 times
...
Ellsworth
9 months ago
Alteration is definitely the losing side in the battle with integrity.
upvoted 0 times
...
...
Stefania
10 months ago
Well, if integrity is the opposite of abstraction, then I guess I should just abstract myself from this exam altogether. *wink wink*
upvoted 0 times
...
Yuonne
10 months ago
Integrity is like a force field around data, keeping it pure and untouched. So the opposite has to be B) alteration, where the data gets messed with. Easy choice!
upvoted 0 times
Yolande
9 months ago
Integrity is all about maintaining the accuracy and consistency of data, alteration does the opposite.
upvoted 0 times
...
Margo
9 months ago
Yeah, alteration compromises the purity of the data, unlike integrity which protects it.
upvoted 0 times
...
William
9 months ago
I agree, alteration is definitely the opposite of integrity.
upvoted 0 times
...
...
Kristine
11 months ago
Hmm, I was a bit unsure at first, but B) alteration makes the most sense. Integrity is like the guardian of data, protecting it from any changes or tampering.
upvoted 0 times
Leslie
9 months ago
Application is more about how software is used, not the integrity of data.
upvoted 0 times
...
Shenika
9 months ago
Abstraction and accreditation don't really relate to data protection like integrity does.
upvoted 0 times
...
Shayne
10 months ago
Integrity ensures data remains unchanged, so alteration is the opposite.
upvoted 0 times
...
Jules
10 months ago
I agree, B) alteration is the correct opposite of integrity.
upvoted 0 times
...
...
Kenny
11 months ago
Easy peasy! Integrity is the opposite of alteration, not abstraction, accreditation, or application. I'm feeling confident about this one.
upvoted 0 times
...
Mike
11 months ago
I think the answer is B) alteration. Integrity is all about maintaining the accuracy and completeness of information, so the opposite would be altering or modifying it.
upvoted 0 times
...
Hershel
11 months ago
So, the answer is B) alteration then?
upvoted 0 times
...
Mammie
11 months ago
I agree, alteration compromises the integrity of data.
upvoted 0 times
...
Irma
12 months ago
Integrity is the opposite of alteration.
upvoted 0 times
...

Save Cancel