Chapter 8: Information Security Monitoring Tools and Techniques
Practice Question Set 1
Q. 1
Answer: B. The rule to deny all traffic by default and permit only specific traffic
Explanation: From the preceding options, the most robust firewall configuration is to deny all traffic by default and permit only specific traffic. This is the most effective method to prevent unknown traffic from entering the organization's network.
Q. 2
Answer: A. The network layer of the OSI
Explanation: A CISM aspirant should note that packet filtering and stateful inspection operate at the network layer (3rd layer). The circuit level operates at the session layer (5th layer) and the application-level firewall operates at the application layer (7th layer).
Q. 3
Answer: B. A screened subnet firewall
Explanation: A screened subnet firewall (DMZ) is regarded as the safest type of firewall implementation. A screened subnet firewall includes two packet filtering routers and...