Awesome… Eagerly waiting for more such informative videos
@karthikeyanv340010 ай бұрын
Thank you for your effort. It is a different approach, than other CISSP channels. I appreciate the uniqueness. I could be nice the viewers take some time to give a like or leave comment to improve your effort. I have subscribed and liked it.
@InfoSecGuardians10 ай бұрын
Thanks. Welcome aboard!
@MohammedAlnajjer-q4h Жыл бұрын
Thank you for your good video learning of questions.
@Tradmos10 ай бұрын
deploying a firewall rule audit can reveal unauthorized traffic but does not identify potential vulnerabilities.
@abodymohumed89259 ай бұрын
Thanks so much but we need more and more questions
@InfoSecGuardians9 ай бұрын
Sure. We are working on it.
@anupanu-yc5kq3 ай бұрын
Can not agree with Qn4 answer,, It should be B , A firewall rule audit involves reviewing the rules configured in the firewall to ensure they are properly set up to block unauthorized traffic. While this is valuable for ensuring policy compliance, it doesn’t provide a complete picture of how the firewall performs under attack scenarios or whether its rules are effective in practice. Where as apenetration test simulates real-world attacks to determine how well the firewall can block unauthorized traffic and identify any vulnerabilities that attackers could exploit. It involves actively attempting to bypass the firewall's defenses and provides insights into its overall effectiveness in a controlled, ethical manner. This test is comprehensive because it not only checks for configuration issues but also tests the firewall’s ability to stop unauthorized access.