Subscribe: iTunes | Goggle Play | Stitcher Radio | RSS
Description:
Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.
In this episode, Shon will provide CISSP training for Domain 4 (Communication and Network Security) of the CISSP Exam. His extensive training will cover all of the CISSP domains.
BTW - Get access to all my CISSP Training Courses here at: https://shongerber.com/
CISSP Exam Questions
Question: 090
Which type of firewall automatically adjusts its filtering rules based on the content of the traffic of existing sessions?
Dynamic packet filtering
Dynamic packet-filtering firewalls enable the real-time modification of the filtering rules based on traffic content.
From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328
------------------------------------
Question: 091
By examining the source and destination addresses, the application usage, the source of origin, and the relationship between current packets with the previous packets of the same session, firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.
Stateful inspection
Stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.
From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328
------------------------------------
Question: 092
Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a system?
Social engineering
Social engineering can often be used to bypass even the most effective physical and logical controls. Whatever activity the attacker convinces the victim to perform, it is usually directed toward opening a back door that the attacker can use to gain access to the network.
From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328