nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #142

CERTIFIED-IN-CYBERSECURITY Question #142: Real Exam Question with Answer & Explanation

The correct answer is D: Routers. A router is a networking device whose primary objective is to determine the most efficient path for traffic to flow across a network. Routers connect two or more networks and forward data packets between them according to their destination address (see ISC2 Study Guide, chapter 4

Network Security Concepts

Question

Which of these devices has the PRIMARY objective of determining the most efficient path for the traffic to flow across the network

Options

  • AFirewalls
  • BHubs
  • CSwitches
  • DRouters

Explanation

A router is a networking device whose primary objective is to determine the most efficient path for traffic to flow across a network. Routers connect two or more networks and forward data packets between them according to their destination address (see ISC2 Study Guide, chapter 4, module 1). When a router receives a data packet, it checks the destination address and determines the best route on which to forward the packet, based on its routing table. The routing table is a set of rules that the router uses to determine the next hop for a given data packet. Hubs connect multiple devices on a network and broadcast incoming data packets to all connected devices. Hubs cannot route data based on destination address; as a result, all connected devices receive all incoming data packets. Switches connect multiple devices on a network and forward data packets between them based on the MAC address of the destination device. Switches use MAC addresses to create a forwarding table that efficiently routes data to the correct destination. Firewalls are network devices or software designed to protect a network from external threats (like hacking and malware). Firewalls can block or allow traffic based on various criteria, such as the source or destination of the traffic, as well as the type of data.

Topics

#Network Devices#Routers#Networking Fundamentals#Traffic Flow

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions