New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 5 Question 32 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 32
Topic #: 5
[All ISSAP Questions]

You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Show Suggested Answer Hide Answer
Suggested Answer: D

manner of an application, whilst blocking other packets.

Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not

necessarily cause a security breach exploitable from outside the firewall. Conversely, intruders may hijack a publicly-reachable system and use

it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines. While use of internal address

spaces enhances security, attackers may still employ methods such as IP spoofing to attempt to pass packets to a target network. The proxy

firewall functions by maintaining two separate conversations, which are as follows:

One between the client and the firewall

One between the firewall and the end server

Answer options C, A, and B are incorrect. These firewalls do not function by creating two different communications.

A packet filter firewall is the basic system first generation firewall, which is a highly evolved and technical internet security feature now a days.

Packet filters act by inspecting the 'packets' which represent the basic unit of data transfer between computers on the Internet. If a packet

matches the packet filter's set of rules, the packet filter will drop the packet, or reject it (discard it, and send 'error responses' to the source).

This type of packet filtering pays no attention to whether a packet is part of an existing stream of traffic (it stores no information on

connection 'state'). Instead, it filters each packet based only on information contained in the packet itself (most commonly using a

combination of the packet's source and destination address, its protocol, and, for TCP and UDP traffic, the port number).

A stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across

it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known connection

state will be allowed by the firewall; others will be rejected.

The Endian Firewall is an open source Linux distribution that specializes on Routing/Firewalling and Unified Threat Management. It is being

developed by the Italian Endian Srl and the community. Endian is originally based on IPCop, which itself was a fork of Smoothwall, but is now

based on Linux From Scratch.


Contribute your Thoughts:

0/2000 characters
Norah
4 months ago
Surprised this question doesn't mention the benefits of each type!
upvoted 0 times
...
Brinda
4 months ago
Nah, Packet filter firewalls are too basic for this.
upvoted 0 times
...
Filiberto
4 months ago
Wait, isn't Endian firewall a type of stateful?
upvoted 0 times
...
Vincenza
4 months ago
I think Proxy-based firewall could work too.
upvoted 0 times
...
Alberto
5 months ago
Definitely a Stateful firewall for that setup.
upvoted 0 times
...
Kiera
5 months ago
I believe the proxy-based firewall is the best option here, as it can handle both communications effectively, but I could be mistaken.
upvoted 0 times
...
Ryann
5 months ago
I’m a bit confused about the differences between stateful and packet filter firewalls. I feel like I need to review that section again.
upvoted 0 times
...
Margart
5 months ago
I remember practicing a similar question, and I think a proxy-based firewall could be useful for managing traffic between the client and the server.
upvoted 0 times
...
Elden
5 months ago
I think the stateful firewall might be the right choice since it tracks the state of active connections, but I'm not entirely sure.
upvoted 0 times
...
Anglea
5 months ago
I'm a bit confused on this one. I know indexes are used to speed up queries, but I'm not sure about the other benefits. I'll have to review my notes on PolarDB to see if I can figure out the other correct answer.
upvoted 0 times
...
Rochell
5 months ago
I'm not totally sure about this one. I'll need to work through it step-by-step to make sure I understand the logic. Subnet math can be tricky, but I'll give it my best shot.
upvoted 0 times
...
Melda
5 months ago
Isn't option A about managing devices during outages? Sounds familiar, but I'm getting a bit confused with the details.
upvoted 0 times
...
Kanisha
5 months ago
I'm pretty confident the packet capture could have been taken at the DMZ interface of the firewall or the external VLAN interface of the LTM device. Those seem like the most likely locations based on the information provided.
upvoted 0 times
...

Save Cancel