Which of the following firewalls inspects the actual contents of packets?
Answer(s): C
The application level firewall inspects the contents of packets, rather than the source/destination or connection between the two. An Application level firewall operates at the application layer of the OSI model. Answer option D is incorrect. The circuit-level firewall regulates traffic based on whether or not a trusted connection has been established. It operates at the session layer of the OSI model.Answer option A is incorrect. The packet filtering firewall filters traffic based on the headers. It operates at the network layer of the OSI model.Answer option B is incorrect. The stateful inspection firewall assures the connection between the two parties is valid and inspects packets from this connection to assure the packets are not malicious.
Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.
Answer(s): A,D
Incremental backup is the fastest method of backing up data. It backs up only the files changed since the most recent backup and clears the archive bit. In an incremental backup, data restoration is slower than the other backup methods.Restoring data from an incremental backup requires the last full backup and all subsequent incremental backups. Incremental backups must be restored in the same order as they are created.
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices.Which of the following protocols is used by VPN for tunneling?
Answer(s): A
VPN uses L2TP for tunneling. Layer 2 Tunneling Protocol (L2TP) provides tunneling, address assignment, and authentication. L2TP allows transfer of Point-to-Point Protocol (PPP) traffic between different networks. L2TP combines with IPSec to provide both tunneling and security for Internet Protocol (IP), Internetwork Packet Exchange (IPX), and other protocol packets across IP networks. It is a more secure version ofPoint-to-Point Tunneling Protocol (PPTP).
John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling.Which of the following topologies should John use to accomplish the task?
Answer(s): B
Mesh network topology is a type of physical network design where all devices in a network are connected to each other with many redundant connections. It provides multiple paths for the data traveling on the network to reach its destination.Mesh topology also provides redundancy in the network. It employs the full mesh and partial mesh methods to connect devices. In a full mesh topology network, each computer is connected to all the other computers. In a partial mesh topology network, some of the computers are connected to all the computers, whereas some are connected to only those computers with which they frequently exchange data.
Post your Comments and Discuss ISC2 ISSAP exam with other Community members:
Terry commented on May 24, 2023 i can practice for exam Anonymous upvote
Rahul Kumar commented on August 31, 2023 need certification. CANADA upvote
Terry commented on May 24, 2023 I can practice for exam Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the ISSAP content, but please register or login to continue.