Exam 156-31581 All QuestionsBrowse all questions from this exam
Question 7

What technologies are used to deny or permit network traffic?

    Correct Answer: B

    Technologies used to deny or permit network traffic typically include Packet Filtering, Stateful Inspection, and Application Layer Firewall. Packet Filtering involves examining packets against a set of filters and applies rules to allow or block traffic. Stateful Inspection monitors the state of active connections and makes decisions based on the context of traffic. An Application Layer Firewall operates at the application layer, inspecting the entire message and making more in-depth security decisions. These technologies combined provide a robust mechanism for traffic management.

Discussion
rabbirobertOption: B

CCSA: Controlling Network Traffic Managing firewalls and monitoring network traffic is the key role of a network Security Administrator. The firewall, or the Security Gateway with a firewall enabled, denies or permits traffic based on rules defined in the Security Policy. The following technologies are used to deny or permit network traffic: • PacketFiltering • Stateful Inspection • ApplicationLayerFirewall

moobeOption: B

correct

cron_08Option: B

agree its B from the actual smarconsole access help

McBeano

It's kind of a confusing question, I would have said threat prevention technically denies or permits network traffic too. For example the IPS blade can inspect network traffic and prevent it if is matches a protection. Anti-virus blade denies traffic if it matches a malicious signature.

amitkor

TP blades do not allow traffic. If there is a match, they always prevent. the only other option is that the traffic does not match the protection and in that case the traffic was not allowed nor ignored, just not matched.

jjdrew

FYI, detect, prevent, inactive are options for protections.

gperesOption: B

correct

bhn12312Option: B

it's B

18408Option: B

B is correct

[Removed]Option: B

Answer is B

NirmalyaOption: B

Answer should be B Packet Filtering, Stateful Inspection, and Application Layer Firewall