in Education by
Stateful Multilayer Inspection firewall cannot perform which of the following? (a) Filter network layer packets (b) Check for legitimate session (c) Scans for illicit data packets at the presentation layer (d) Evaluate packets at application lager I had been asked this question during an online interview. This interesting question is from Firewalls in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct option is (c) Scans for illicit data packets at the presentation layer Explanation: Stateful Multilayer Inspection firewalls are designed to perform filtering packets in the network layer, check for legitimate sessions in the session layer as well as evaluate all packets at the application layer of OSI model. But it cannot scan for illicit data packets at the presentation layer.

Related questions

0 votes
    We can also implement ____________ in Stateful Multilayer Inspection firewall. (a) external programs (b) algorithms (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    One advantage of Stateful Multilayer Inspection firewall is __________ (a) costlier but easy to understand (b) large to ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Stateful Multilayer firewalls are also called ____________ (a) first generation firewalls (b) second generation firewalls (c) ... and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following operations DNSenum cannot perform? (a) Perform reverse lookups (b) Get the host's addresses ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a software firewall? (a) Windows Firewall (b) Outpost Firewall Pro (c) Endian ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    A firewall protects which of the following attacks? (a) Phishing (b) Dumpster diving (c) Denial of Service (DoS) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    Firewall examines each ____________ that are entering or leaving the internal network. (a) emails users (b) updates (c ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    There are ______ types of firewall. (a) 5 (b) 4 (c) 3 (d) 2 I had been asked this question in a job ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    The __________ defines the packet filtering firewall rules. (a) Access Control List (b) Protocols (c) Policies (d ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    One advantage of Packet Filtering firewall is __________ (a) more efficient (b) less complex (c) less costly (d) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Enumeration is done to gain information. Which of the following cannot be achieved using enumeration? (a) IP Tables ( ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following attack-based checks WebInspect cannot do? (a) cross-site scripting (b) directory traversal (c ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Hackers cannot do which of the following after compromising your phone? (a) Steal your information (b) Rob ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Hackers cannot do which of the following after compromising your phone? (a) Shoulder surfing (b) Accessing ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...