Page 856 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 856
10. What is both a benefit and a potentially harmful implication of
multilayer protocols?
A. Throughput
B. Encapsulation
C. Hash integrity checking
D. Logical addressing
11. By examining the source and destination addresses, the application
usage, the source of origin, and the relationship between current
packets with the previous packets of the same session,
______________ firewalls are able to grant a broader range of
access for authorized users and activities and actively watch for
and block unauthorized users and activities.
A. Static packet-filtering
B. Application-level gateway
C. Stateful inspection
D. Circuit-level gateway
12. ______________ firewalls are known as third-generation
firewalls.
A. Application-level gateway
B. Stateful inspection
C. Circuit-level gateway
D. Static packet-filtering
13. Which of the following is not true regarding firewalls?
A. They are able to log traffic information.
B. They are able to block viruses.
C. They are able to issue alarms based on suspected attacks.
D. They are unable to prevent internal attacks.
14. Which of the following is not a routing protocol?

