Firewall Concepts Quiz # 3

Instructions
Quiz: Firewall Concepts Quiz # 3
Total Questions: 30 MCQs
Time: 30 Minutes

Note

  • Do not refresh the page while taking the test.
  • Results along with correct answers will be shown at the end of the test.
Firewall Concepts Quiz # 3
Question 1 of 30
00:00
  • Network-based firewalls and Host-based firewalls are valid categories of which of the following firewall ?

  • What do circuit layer Firewalls monitor?

  • Which of the following is not a VALID subset of packet filtering firewalls?

  • A dynamic or Stateful Packet Inspection firewall maintains active "BLANK" sessions and "BLANK" pseudo sessions.

  • Which of the following is not a VALID processing –mode category of firewalls?

  • What is a Cisco Access Control List (ACL) considered as?

  • Which of the following servers in the DMZ needs only list a limited number of public IP addresses?

  • Which of the following is a mechanism designed into operating system kernel ?

  • Which generation firewalls are stateful inspection firewalls?

  • Which of the following is FALSE about Circuit Gateways?

  • In an IP packet header, which of the following describes the length of the header in 32-bit words and is a 4-bit value?

  • What layer(s) does an SPI firewall generally operate at?

  • Which of the following can have different components of the firewall for different systems?

  • Which of the following host is sometimes called a dual-homed gateway or bastion host?

  • Which level proxy provides protection at the session layer of OSI?

  • Which of the following is not a vaild categorization of Firewall based on structure?

  • What layer of the OSI model do Circuit Layer Firewalls operate at?

  • Which of the following is not a vaild categorization of Firewall based on processing mode?

  • Which generation firewalls are either application-level firewalls or proxy servers?

  • Which of the following is an INVALID common architectural implementation of firewall?

  • Which of the following is helped by Logging?

  • Which of the protocols listed below will you scan at the Gateway to block the Spam Mails?

  • Which of the following are Encryption algorithms?

  • Digital Certificates are used for___________.

  • Which of the following tools can be used to monitor the Packets?

  • Which of the sources listed below are secured by Desktop Firewalls?

  • Port-Scanning tools helps the administrator in which of the following?

  • Which of the reasons listed below lead to common attacks?

  • Which of the following can lead to the denial of service attacks?

  • Which protocol is used by the DNS?