Subscribe: iTunes | Goggle Play | Stitcher Radio | RSS

Description:

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will provide CISSP training for Domain 4 (Communication and Network Security) of the CISSP Exam.  His extensive training will cover all of the CISSP domains.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/

CISSP Exam Questions

Question:  093

________ is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.

A) UDP B) IDEA C) IPSec D) SDLC

IPSec

IPSec, or IP Security, is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.

From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328

------------------------------------

Question:  094

What is both a benefit and a potentially harmful implication of multilayer protocols?

A) Throughput B) Encapsulation C) Hash integrity checking D) Logical addressing

Encapsulation

Encapsulation is both a benefit and a potentially harmful implication of multilayer protocols.  

From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328  

------------------------------------

Question:  095

Which of the following is not true regarding firewalls?

A) They are able to log traffic information. B) They are able to block viruses. C) They are able to issue alarms based on suspected attacks. D) They are unable to prevent internal attacks.

They are able to block viruses.

Most firewalls offer extensive logging, auditing, and monitoring capabilities as well as alarms and even basic IDS functions. Firewalls are unable to block viruses or malicious code transmitted through otherwise authorized communication channels, prevent unauthorized but accidental or intended disclosure of information by users, prevent attacks by malicious users already behind the firewall, or protect data after it passed out of or into the private network.

From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328

------------------------------------

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS: 

ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources