Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 340

Mary Smith

Sun, 15 Mar 2026

CISA—Certified Information Systems Auditor - Part 340

1. Which of the following types of firewall treats each network frame or packet in isolation?

A) statefull firewall
B) hardware firewall
C) combination firewall
D) packet filtering firewall
E) stateless firewall
F) None of the choices.

2. Which of the following types of attack involves a program that creates an infinite loop, makes lots of copies of itself, and continues to open lots of files?

A) Local DoS attacks
B) Remote DoS attacks
C) Distributed DoS attacks
D) Local Virus attacks
E) None of the choices.


3. What is the best defense against Local DoS attacks?

A) patch your systems.
B) run a virus checker.
C) run an anti-spy software.
D) find this program and kill it.
E) None of the choices.


4. Which of the following are examples of tools for launching Distributed DoS Attack (Choose four.):(Select 4answers)

A) TFN
B) TFN2K
C) Trin00
D) Stacheldracht
E) Tripwire


5. What is the best defense against Distributed DoS Attack?

A) patch your systems.
B) run a virus checker.
C) run an anti-spy software.
D) find the DoS program and kill it.
E) None of the choices.


1. Right Answer: E
Explanation: A stateless firewall treats each network frame or packet in isolation.Such a firewall has no way of knowing if any given packet is part of an existing connection, is trying to establish a new connection, or is just a rogue packet.

2. Right Answer: A
Explanation: Local DoS attacks can be a program that creates an infinite loop, makes lots of copies of itself, and continues to open lots of files. The best defense is to find this program and kill it.

3. Right Answer: D
Explanation: Local DoS attacks can be a program that creates an infinite loop, makes lots of copies of itself, and continues to open lots of files. The best defense is to find this program and kill it.

4. Right Answer: A,B,C,D
Explanation: Distributed DoS Attack is a network-based attack from many servers used remotely to send packets. Examples of tools for conducting such attack include TFN,TFN2K, Trin00, Stacheldracht, and variants. The best defense is to make sure all systems patches are up-to-date. Also make sure your firewalls are configured appropriately.

5. Right Answer: A
Explanation: Distributed DoS Attack is a network-based attack from many servers used remotely to send packets. Examples of tools for conducting such attack include TFN,TFN2K, Trin00, Stacheldracht, and variants. The best defense is to make sure all systems patches are up-to-date. Also make sure your firewalls are configured appropriately.

0 Comments

Leave a comment