Page 856 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 856

10.  What is both a benefit and a potentially harmful implication of
                    multilayer protocols?


                    A.  Throughput
                    B.  Encapsulation


                    C.  Hash integrity checking

                    D.  Logical addressing

               11.  By examining the source and destination addresses, the application
                    usage, the source of origin, and the relationship between current
                    packets with the previous packets of the same session,
                    ______________ firewalls are able to grant a broader range of
                    access for authorized users and activities and actively watch for

                    and block unauthorized users and activities.

                    A.  Static packet-filtering

                    B.  Application-level gateway

                    C.  Stateful inspection

                    D.  Circuit-level gateway

               12.  ______________ firewalls are known as third-generation
                    firewalls.

                    A.  Application-level gateway

                    B.  Stateful inspection


                    C.  Circuit-level gateway

                    D.  Static packet-filtering

               13.  Which of the following is not true regarding firewalls?

                    A.  They are able to log traffic information.

                    B.  They are able to block viruses.

                    C.  They are able to issue alarms based on suspected attacks.

                    D.  They are unable to prevent internal attacks.

               14.  Which of the following is not a routing protocol?
   851   852   853   854   855   856   857   858   859   860   861