Page 1539 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1539

implication of multilayer protocols.

               11.  C. Stateful inspection firewalls are able to grant a broader range of
                    access for authorized users and activities and actively watch for

                    and block unauthorized users and activities.

               12.  B. Stateful inspection firewalls are known as third-generation
                    firewalls.

               13.  B. Most firewalls offer extensive logging, auditing, and monitoring
                    capabilities as well as alarms and even basic IDS functions.
                    Firewalls are unable to block viruses or malicious code transmitted

                    through otherwise authorized communication channels, prevent
                    unauthorized but accidental or intended disclosure of information
                    by users, prevent attacks by malicious users already behind the
                    firewall, or protect data after it passed out of or into the private
                    network.

               14.  C. There are numerous dynamic routing protocols, including RIP,
                    OSPF, and BGP, but RPC is not a routing protocol.

               15.  B. A switch is an intelligent hub. It is considered to be intelligent

                    because it knows the addresses of the systems connected on each
                    outbound port.

               16.  A. Wireless Application Protocol (WAP) is a technology associated
                    with cell phones accessing the internet rather than 802.11 wireless
                    networking.

               17.  C. Orthogonal Frequency-Division Multiplexing (OFDM) offers
                    high throughput with the least interference. OSPF is a routing

                    protocol, not a wireless frequency access method.

              18.  A. Endpoint security is the security concept that encourages
                    administrators to install firewalls, malware scanners, and an IDS
                    on every host.

               19.  B. Address Resolution Protocol (ARP) resolves IP addresses
                    (logical addresses) into MAC addresses (physical addresses).

              20.  C. Enterprise extended infrastructure mode exists when a wireless

                    network is designed to support a large physical environment
                    through the use of a single SSID but numerous access points.
   1534   1535   1536   1537   1538   1539   1540   1541   1542   1543   1544