RCR 069: CISSP Sample Exam Questions - CISSP Training and Study!

Published: Feb. 12, 2020, 11 p.m.

SubscribeiTunes | Goggle Play | Stitcher Radio | RSS

Description:

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will provide CISSP training for Domain 4 (Communication and Network Security) of the CISSP Exam.  His extensive training will cover all of the CISSP domains.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/

CISSP Exam Questions

Question:  090

Which type of firewall automatically adjusts its filtering rules based on the content of the traffic of existing sessions?

  1. A) Static packet filtering
  2. B) Application-level gateway
  3. C) Stateful inspection
  4. D) Dynamic packet filtering

Dynamic packet filtering

Dynamic packet-filtering firewalls enable the real-time modification of the filtering rules based on traffic content.

From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328

------------------------------------

Question:  091

By examining the source and destination addresses, the application usage, the source of origin, and the relationship between current packets with the previous packets of the same session, firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.

  1. A) Static packet-filtering
  2. B) Application-level gateway
  3. C) Stateful inspection
  4. D) Circuit-level gateway

Stateful inspection

Stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.

From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328

------------------------------------

Question:  092

Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a system?

 

  1. A) Brute-force attacks
  2. B) Denial of service
  3. C) Social engineering
  4. D) Port scanning

Social engineering

Social engineering can often be used to bypass even the most effective physical and logical controls. Whatever activity the attacker convinces the victim to perform, it is usually directed toward opening a back door that the attacker can use to gain access to the network.

From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328