New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISA Exam - Topic 3 Question 47 Discussion

Actual exam question for Isaca's CISA exam
Question #: 47
Topic #: 3
[All CISA Questions]

Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Malcolm
4 months ago
Wait, I didn't know application level gateways were that powerful!
upvoted 0 times
...
Rupert
4 months ago
Circuit gateways are underrated, they can be pretty good too!
upvoted 0 times
...
Johana
4 months ago
I thought packet filtering was still effective though?
upvoted 0 times
...
Eveline
4 months ago
Totally agree, it's more secure than the others.
upvoted 0 times
...
Rebbeca
5 months ago
Application level gateway offers the best control.
upvoted 0 times
...
Boris
5 months ago
I’m torn between the screening router and the application level gateway. I know the latter is more secure, but I need to think about the specifics again.
upvoted 0 times
...
Eun
5 months ago
I feel like packet filtering routers are the most basic type, so they probably don't offer the greatest control. Maybe the application level gateway is the best choice?
upvoted 0 times
...
Cherri
5 months ago
I remember practicing a question about firewalls, and I think the circuit gateway was mentioned as providing good control, but I can't recall the details.
upvoted 0 times
...
Jimmie
5 months ago
I think the application level gateway might be the right answer since it inspects the data at a deeper level, but I'm not completely sure.
upvoted 0 times
...
Raul
5 months ago
I'm pretty sure the answer is C. Spring Boot's default behavior is to look for application.properties or application.yml files in the classpath root.
upvoted 0 times
...
Dean
5 months ago
I'm pretty confident the answer is 4. Each high-level feature should have its own Product Backlog, so the total number of Product Backlogs needed is 4.
upvoted 0 times
...
Wynell
5 months ago
I thought they went into the material library. It feels like I've seen a question about that in the review sessions!
upvoted 0 times
...
Janine
5 months ago
I've got a good feeling about this one. I remember learning about the evolution of data protection laws in Asia, and how they've been influenced by the European model. I think I know the answer, but I'll double-check my notes to be sure.
upvoted 0 times
...
Mona
5 months ago
This is a tricky question. I'm a bit confused about the specific requirements for the field attribute. I'll need to think it through step-by-step.
upvoted 0 times
...
Georgene
5 months ago
I'm pretty confident I can identify the three true statements here. The key is to read each option carefully and eliminate the ones that don't seem accurate.
upvoted 0 times
...

Save Cancel