Page 1539 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1539
implication of multilayer protocols.
11. C. Stateful inspection firewalls are able to grant a broader range of
access for authorized users and activities and actively watch for
and block unauthorized users and activities.
12. B. Stateful inspection firewalls are known as third-generation
firewalls.
13. B. Most firewalls offer extensive logging, auditing, and monitoring
capabilities as well as alarms and even basic IDS functions.
Firewalls are unable to block viruses or malicious code transmitted
through otherwise authorized communication channels, prevent
unauthorized but accidental or intended disclosure of information
by users, prevent attacks by malicious users already behind the
firewall, or protect data after it passed out of or into the private
network.
14. C. There are numerous dynamic routing protocols, including RIP,
OSPF, and BGP, but RPC is not a routing protocol.
15. B. A switch is an intelligent hub. It is considered to be intelligent
because it knows the addresses of the systems connected on each
outbound port.
16. A. Wireless Application Protocol (WAP) is a technology associated
with cell phones accessing the internet rather than 802.11 wireless
networking.
17. C. Orthogonal Frequency-Division Multiplexing (OFDM) offers
high throughput with the least interference. OSPF is a routing
protocol, not a wireless frequency access method.
18. A. Endpoint security is the security concept that encourages
administrators to install firewalls, malware scanners, and an IDS
on every host.
19. B. Address Resolution Protocol (ARP) resolves IP addresses
(logical addresses) into MAC addresses (physical addresses).
20. C. Enterprise extended infrastructure mode exists when a wireless
network is designed to support a large physical environment
through the use of a single SSID but numerous access points.

