Firewall Networking Trivia Test! Quiz

20 Questions

Settings
Please wait...
Firewall Quizzes & Trivia

.


Questions and Answers
  • 1. 
    The application firewall runs special software that acts as a proxy for a service request.
    • A. 

      True

    • B. 

      False

  • 2. 
    One method of protecting the residential user is to install a software firewall directly on the user's system.
    • A. 

      True

    • B. 

      False

  • 3. 
    All organizations with an Internet connection have some form of a router at the boundary between the organization's internal networks and the external service provider.
    • A. 

      True

    • B. 

      False

  • 4. 
    Firewall Rule Set 1 states that responses to internal requests are not allowed.
    • A. 

      True

    • B. 

      False

  • 5. 
    It is important that e-mail traffic reach your e-mail server and only your e-mail server.
    • A. 

      True

    • B. 

      False

  • 6. 
    The restrictions most commonly implemented in packet-filtering firewalls are based on ____.
    • A. 

      IP source and destination address

    • B. 

      Direction (inbound or outbound)

    • C. 

      TCP or UDP source and destination port requests

    • D. 

      All of the above

  • 7. 
    A ____ filtering firewall can react to an emergent event and update or create rules to deal with the event.
    • A. 

      Dynamic

    • B. 

      Static

    • C. 

      Stateful

    • D. 

      Stateless

  • 8. 
    ____ inspection firewalls keep track of each network connection between internal and external systems.
    • A. 

      Static

    • B. 

      Dynamic

    • C. 

      Stateful

    • D. 

      Stateless

  • 9. 
    The application gateway is also known as a(n) ____.
    • A. 

      Application-level firewall

    • B. 

      Client firewall

    • C. 

      Proxy firewall

    • D. 

      All of the above

  • 10. 
    The proxy server is often placed in an unsecured area of the network or is placed in the ____ zone.
    • A. 

      Fully trusted

    • B. 

      Hot

    • C. 

      Demilitarized

    • D. 

      Cold

  • 11. 
    The ____ is an intermediate area between a trusted network and an untrusted network.
    • A. 

      Perimeter

    • B. 

      DMZ

    • C. 

      Domain

    • D. 

      Firewall

  • 12. 
    In recent years, the broadband router devices that can function as packet-filtering firewalls have been enhanced to combine the features of ____.
    • A. 

      UDP

    • B. 

      MAC

    • C. 

      WANs

    • D. 

      WAPs

  • 13. 
    The dominant architecture used to secure network access today is the ____ firewall.
    • A. 

      Static

    • B. 

      Bastion

    • C. 

      Unlimited

    • D. 

      Screened subnet

  • 14. 
    Telnet protocol packets usually go to TCP port ____.
    • A. 

      7

    • B. 

      8

    • C. 

      14

    • D. 

      23

  • 15. 
    ____ is the protocol for handling TCP traffic through a proxy server.
    • A. 

      Socks

    • B. 

      Https

    • C. 

      FTP

    • D. 

      Telnet

  • 16. 
    ICMP uses port ____ to request a response to a query and can be the first indicator of a malicious attack.
    • A. 

      4

    • B. 

      7

    • C. 

      14

    • D. 

      23

  • 17. 
     ____ and TACACS are systems that authenticate the credentials of users who are trying to access an organization's network via a dial-up connection.
    • A. 

      Radius

    • B. 

      Radial

    • C. 

      Tunman

    • D. 

      IPSec

  • 18. 
    Which of the following is a valid version of TACACS?
    • A. 

      TACACS

    • B. 

      EXTENDED TACACS

    • C. 

      TACTACS +

    • D. 

      ALL OF THE ABOVE

  • 19. 
    ____ generates and issues session keys in Kerberos.
    • A. 

      VPN

    • B. 

      KDC

    • C. 

      AS

    • D. 

      TGS

  • 20. 
    In ____ mode, the data within an IP packet is encrypted, but the header information is not.
    • A. 

      Tunnel

    • B. 

      Transport

    • C. 

      Public

    • D. 

      Symmetric