Correct Answer:
Five
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Both Configuration and Testing
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of these (drop the object, send the object to the firewall to pass to the destination, pass the object to the destination directly)
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Bastion Host
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Personal
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Firewall
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Public key
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Terminal Access Controller Access-Control System
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
should be kept at the top
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
SSL
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All the above
Note: This Question is unanswered, help us to find answer for this one
State whether True or False.
A Firewall installed at the Gateway makes the whole network secure.
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
0-1023
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Network Layer
Note: This Question is unanswered, help us to find answer for this one
Firewall can perform NAT to keep the record of various NAT entries. In which of the following tables does Firewall make those entries?
Correct Answer:
NAT Table
Note: This Question is unanswered, help us to find answer for this one
State whether True or False.
All the DoS attacks can be blocked with the Firewalls.
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
ping
Note: This Question is unanswered, help us to find answer for this one
State whether True or False.
Logging should be enabled for all the rules in the Rule Base.
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
netstat
Note: This Question is unanswered, help us to find answer for this one
State whether True or False.
The security of the Firewalls is a very important aspect.
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Network Layer
Note: This Question is unanswered, help us to find answer for this one
Suppose Sally is the Network Security Engineer for ABC Company. She is asked by her manager to create a security policy in the Firewalls so that their internal network ABC_INTERNAL(172.16.0.0/24) may be able to access the SMTP(25) service from the server MAIL_SERVER(192.168.1.15).NAT rule already exists for the network. How will Sally create the security policy in the Firewalls?
Correct Answer:
Source:ABC_INTERNAL(172.16.0.0/16), Destination:MAIL_SERVER(192.168.1.15), Service: SMTP(25), Action :Accept
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Encryption Technology
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Authentication, Authorization, and Accounting
Note: This Question is unanswered, help us to find answer for this one
State whether True or False.
The vulnerabilities in the Network/System can be exploited by threats.
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
49,152-65,535
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It is a technique used to gain unauthorized access to computers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Remote Authentication Dial-In User Service
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
State Table
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
VPN
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
6
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Application Layer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Local Area Network (LAN)
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Suppose Mark is the Network Security Engineer for ABC Company. He is asked by his manager to create a security policy in the Firewalls so that their internal network ABC_INTERNAL(172.16.0.0/24)may be able to access the DNS service from the server DNS_SERVER(192.168.1.5). NAT rule already exists for the Network. How will Mark create the security policy in the Firewalls?
Correct Answer:
Source: ABC_INTERNAL(172.16.0.0/24), Destination: DNS_SERVER(192.168.1.5), Service: DNS(53), Action :Accept
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Confidentiality, Integrity and Availability
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
ACK
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Application
Note: This Question is unanswered, help us to find answer for this one
You are asked by your manager to publish a web server.
Which type of NATing will you use so that the Web Server can be accessed from the Internet?
Correct Answer:
Static NAT
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
SYN
Note: This Question is unanswered, help us to find answer for this one
State whether True or False.
When a rule is matched for a particular incoming/outgoing Packet and is executed, the Firewalls look for another rule in the rule base for the same Packet.
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
event notification
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
traceroute
Note: This Question is unanswered, help us to find answer for this one
Suppose Adrian is the Network Security Engineer for ABC Company. He is asked by his manager to create a security policy in the Firewalls to open the HTTP service for a host_A(192.168.1.2) so that host_A may be able to access the Web Server(172.16.0.2). NAT rule already exists for the host. How will Adrian create the security policy in the Firewalls?
Correct Answer:
Source: Host_A(192.168.1.2), Destination:Web_Server(172.16.0.2), Service: HTTP(80), Action :Accept
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
From the top of the rule base to the bottom of the rule base
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All the above
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Wide Area Network(WAN)
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Session Layer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateful Packet Filtering Firewall
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Capturing data traveling across the network
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
No, the sites cannot be blocked
Note: This Question is unanswered, help us to find answer for this one
Suppose Matt is the Network Security Engineer for XYZ Company. He is asked by his manager to create a security policy in the Firewalls so that host_A(172.16.0.3) may be able to access the HTTP service from the internet cloud. NAT rule already exists for the host. How will Matt create the security policy in the Firewalls?
Correct Answer:
Source: Host_A(172.16.0.3), Destination:Any , Service: HTTP(80), Action :Accept
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
FTP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It is a Firewall Technology
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
An error Packet is sent when a matched packet is detected
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
143
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It blocks the attacks on a Desktop machine
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Nessus
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Pretending to be someone you are not
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It is a type of Attack
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Network Layer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
SYN
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Hybrid Mode
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
MD5
SHA 1
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TCP
UDP
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Unplugging the cable of the main switch
Sending SYN Packets using the Zombies
Shutting down the server being accessed
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Un-authorized mail relaying
Application bugs
Operating System bugs
Spoofing
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Finding the vulnerabilities
Building a strong security policy.
To test the Firewalls configuration.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Personal Desktop
Personal Files and folders
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Wireshark
TCPDUMP
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Encryption
Verification
Authentication
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
AES
3DES
DES
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
SMTP
POP3
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Health of the Firewalls
Status of the Firewalls
Troubleshooting the issues
Monitoring the Firewalls
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Dynamic Filtering
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Second generation
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Application filtering
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Session Layer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
application-based
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
circuit
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
D and F
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Internet header length
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Circuit Gateway firewalls provide a unique access mechanism based on the destination application
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Third Generation
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Fifth Generation
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
DNS
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateless
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Proxy firewalls
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TCP and UDP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateless inspection
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TCP Handshaking
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Application –level firewall
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Datagram
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
First Generation
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
1023
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateful Packet Inspection firewall
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
State Table
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
ASIC
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateful
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
ASIC
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
MAC layer Firewalls
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateful Packet Inspection
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
The Packet is dropped
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
VPN
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Inspect packets
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
443
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
20 and 21
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
21
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
23
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
DMZ
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
DeMilitarized Zone
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
time to live
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the given options are correct
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Firewall
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
application-level firewalls
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
80
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
destination address
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
21
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
443
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateful packet filtering firewall
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Software firewall installed on a server/workstation/desktop
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Time To Live
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
IDS
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Firewall
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Proxy servers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Software
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
PING
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Scalable
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateful inspection
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateful Packet Inspection
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
least privilege
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateful
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Source and/or destination TCP/UDP ports
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
datagram
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
User
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Both Transport layer and Network layer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
CRC
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Residential –Grade Firewall
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Packets
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Destination
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
personal
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
53
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Hybrid Firewall
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
1023
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the given options are valid
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Packet Filtering
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Stateful
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
3-way
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
VPN
Note: This Question is unanswered, help us to find answer for this one
Firewall Concepts MCQs | Topic-wise