Firewall_MCQ Computer_Virus_MCQ for Cybersecurity Accenture
MuruganV39
19 views
50 slides
Sep 23, 2024
Slide 1 of 50
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
About This Presentation
Firewall_MCQ
Size: 224.5 KB
Language: en
Added: Sep 23, 2024
Slides: 50 pages
Slide Content
Question Which of the following best describes a firewall? A. A device that filters network traffic B. A software that provides antivirus protection C. A type of physical barrier D. A program that scans for malware
Answer The correct answer is: A. A device that filters network traffic
Question What is the primary function of a firewall? A. To block unwanted emails B. To filter incoming and outgoing network traffic C. To prevent hardware failures D. To provide backup for data
Answer The correct answer is: B. To filter incoming and outgoing network traffic
Question Which type of firewall filters traffic based on predefined rules at the network layer? A. Packet-filtering firewall B. Stateful inspection firewall C. Proxy firewall D. Application-layer firewall
Answer The correct answer is: A. Packet-filtering firewall
Question What does a stateful inspection firewall do? A. It blocks all incoming traffic B. It monitors active connections and makes decisions based on the state of the connection C. It inspects only the packet headers D. It provides end-to-end encryption
Answer The correct answer is: B. It monitors active connections and makes decisions based on the state of the connection
Question Which layer of the OSI model do most firewalls operate at? A. Physical Layer B. Data Link Layer C. Network Layer D. Application Layer
Answer The correct answer is: C. Network Layer
Question A proxy firewall operates primarily at which layer of the OSI model? A. Transport Layer B. Session Layer C. Network Layer D. Application Layer
Answer The correct answer is: D. Application Layer
Question What is a demilitarized zone (DMZ) in network security? A. A secure internal network B. A buffer zone between the public internet and an internal network C. A type of malware D. A secure email server
Answer The correct answer is: B. A buffer zone between the public internet and an internal network
Question Which type of firewall is considered to be the most secure? A. Packet-filtering firewall B. Stateful inspection firewall C. Proxy firewall D. NAT firewall
Answer The correct answer is: C. Proxy firewall
Question What is the main disadvantage of a packet-filtering firewall? A. It cannot block malware B. It does not provide NAT functionality C. It cannot make decisions based on the content of the data D. It requires too much processing power
Answer The correct answer is: C. It cannot make decisions based on the content of the data
Question Which of the following is a common feature of a firewall? A. Encryption B. Intrusion Detection System (IDS) C. Access control lists (ACLs) D. Data backup
Answer The correct answer is: C. Access control lists (ACLs)
Question Which of the following is NOT a type of firewall architecture? A. Dual-homed host B. Screened subnet C. Virtual firewall D. Triple-router configuration
Answer The correct answer is: D. Triple-router configuration
Question What does NAT stand for in the context of firewalls? A. Network Address Translation B. Network Access Technology C. Node Authentication Tool D. Network Application Transfer
Answer The correct answer is: A. Network Address Translation
Question Which type of firewall rule allows all traffic unless explicitly denied? A. Default allow B. Default deny C. Whitelist D. Blacklist
Answer The correct answer is: A. Default allow
Question What is an advantage of using a hardware firewall? A. It is easier to update than software firewalls B. It is generally faster and more reliable C. It can be installed on multiple devices simultaneously D. It is free to use
Answer The correct answer is: B. It is generally faster and more reliable
Question In a firewall, what does the term "deep packet inspection" refer to? A. Inspecting only the packet headers B. Inspecting the data within the packet C. Blocking all incoming traffic D. Allowing all outgoing traffic
Answer The correct answer is: B. Inspecting the data within the packet
Question What is a stateful firewall unable to do? A. Maintain state information about active connections B. Filter packets based on the state of the connection C. Monitor the application-layer data D. Track the state of connections over time
Answer The correct answer is: C. Monitor the application-layer data
Question Which of the following is a common firewall deployment scenario? A. Single-layer firewall B. Dual-layer firewall C. Multi-layered defense D. All of the above
Answer The correct answer is: D. All of the above
Question What is a common limitation of traditional firewalls? A. Inability to filter encrypted traffic B. High cost of deployment C. Limited to physical devices only D. Incompatibility with modern network protocols
Answer The correct answer is: A. Inability to filter encrypted traffic
Question Which type of attack can a firewall help mitigate? A. SQL injection B. Phishing C. Denial of Service (DoS) D. Social engineering
Answer The correct answer is: C. Denial of Service (DoS)
Question Which of the following is a feature of an application-layer firewall? A. It examines traffic at the network layer B. It can filter based on user identities C. It only allows HTTP traffic D. It cannot be configured with ACLs
Answer The correct answer is: B. It can filter based on user identities
Question What is the role of a VPN in conjunction with a firewall? A. To provide end-to-end encryption B. To block all external traffic C. To manage network addresses D. To filter packets at the application layer
Answer The correct answer is: A. To provide end-to-end encryption
Question Which of the following protocols might a firewall commonly filter? A. HTTP B. TCP C. FTP D. All of the above
Answer The correct answer is: D. All of the above
Question Which of the following is a common misconception about firewalls? A. They can block all types of cyberattacks B. They can be either hardware or software-based C. They can filter traffic based on IP addresses D. They are an essential part of network security
Answer The correct answer is: A. They can block all types of cyberattacks
Question What is an Intrusion Prevention System (IPS)? A. A type of firewall that blocks known attacks B. A software that scans for viruses C. A device that detects and prevents network attacks D. A tool for monitoring network performance
Answer The correct answer is: C. A device that detects and prevents network attacks
Question Which of the following can enhance the effectiveness of a firewall? A. Regular updates B. Strong encryption C. User education D. All of the above