Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 2 Question 8 Discussion

Actual exam question for ISC2's Information Systems Security Architecture Professional exam
Question #: 8
Topic #: 2
[All Information Systems Security Architecture Professional Questions]

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do

to accomplish this?

Show Suggested Answer Hide Answer
Suggested Answer: D

effort.

Firewall is used to protect an internal network or intranet against unauthorized access from the Internet or other networks. It restricts

inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass

or block packets from specific IP addresses and ports.

Answer option B is incorrect. A firewall is also in-built within a proxy server. Although implementing a proxy server on the network will

implement the firewall automatically, it will be a software-based solution.

Answer option A is incorrect. A brouter is a combination of a bridge and a router. It is used to connect dissimilar network segments, and it

routes only a specific transport protocol such as TCP/IP. A brouter also works as a bridge for all types of packets, passing them on as long as

they are not local to the LAN segment from which they have originated.

Answer option C is incorrect. Router is a device that routes data packets between computers in different networks. It is used to connect

multiple networks, and it determines the path to be taken by each data packet to its destination computer. Router maintains a routing table of

the available routes and their conditions. By using this information, along with distance and cost algorithms, the router determines the best

path to be taken by the data packets to the destination computer. A router can connect dissimilar networks, such as Ethernet, FDDI, and

Token Ring, and route data packets among them. Routers operate at the network layer (layer 3) of the Open Systems Interconnection (OSI)

model.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel