Firewall Security Quiz

28 Questions | Total Attempts: 12049

SettingsSettingsSettings
Please wait...
Firewall Security Quiz

Firewall security is your best bet against threats. This quiz tells you all about it. Take this 'Firewall Security Quiz' to test your knowledge! To begin with, a firewall is a system that is intended to prevent unlawful access from entering a private internal and external network. A firewall creates a secured barrier between the private and public networks, which protects your computer from dangerous hackers or malicious attacks. Give this quiz a shot, and learn more interesting trivia!


Questions and Answers
  • 1. 
    A firewall needs to be ____ so that it can grow with the network it protects.
    • A. 

      Robust

    • B. 

      Expensive

    • C. 

      Fast

    • D. 

      Scalable

  • 2. 
    A(n) ____ is a fancy term for a computer that has two network interfaces.
    • A. 

      Proxy gateway

    • B. 

      Duel-homed host

    • C. 

      Routing workstation

    • D. 

      NAT server

  • 3. 
    A(n) ____ host is sometimes called a dual-homed gateway or bastion host.
    • A. 

      Proxy

    • B. 

      Stub

    • C. 

      Screened

    • D. 

      Blocked

  • 4. 
    The ____ server in the DMZ needs only list a limited number of public IP addresses.
    • A. 

      DNS

    • B. 

      NAT

    • C. 

      Proxy

    • D. 

      Firewall

  • 5. 
    A(n) ____ server is a server that creates a secure tunnel connection.
    • A. 

      RADIUS

    • B. 

      VPN

    • C. 

      Tunnel

    • D. 

      Authentication

  • 6. 
    What is one advantage of setting up a DMZ with two firewalls?
    • A. 

      You can control where traffic goes in the three networks

    • B. 

      You can do stateful packet filtering

    • C. 

      You can do load balancing

    • D. 

      Improved network performance

  • 7. 
    A system that monitors traffic into and out of a network and automatically alerts personnel when suspicious traffic patterns occur, indicating a possible unauthorized intrusion attempt is called a(n) __________________.
    • A. 

      IDS

    • B. 

      Firewall

    • C. 

      Router

    • D. 

      Anit-virus software

  • 8. 
    In an IP packet header, the ____ is the address of the computer or device that is to receive the packet.
    • A. 

      Source address

    • B. 

      Flag

    • C. 

      Destination address

    • D. 

      Total length

  • 9. 
    In an IP packet header, the ____ describes the header's length in 32-bit words and is a 4-bit value.
    • A. 

      Internet header length

    • B. 

      Fragment offset

    • C. 

      Total length

    • D. 

      Header checksum

  • 10. 
    What tells a firewall how to reassemble a data stream that has been divided into packets?
    • A. 

      The source routing feature

    • B. 

      The number in the header's identification field

    • C. 

      The destination IP address

    • D. 

      The header checksum field in the packet header

  • 11. 
    What is the most effective security approach for a stateless packet filter?
    • A. 

      Deny all except specified hosts

    • B. 

      Allow all except specified hosts

    • C. 

      Allow access to only specified destination servers

    • D. 

      Deny access to all destinations except specified servers

  • 12. 
    What TCP port is used by Telnet?
    • A. 

      80

    • B. 

      110

    • C. 

      23

    • D. 

      72

  • 13. 
    What TCP port is used to filter out Web traffic?
    • A. 

      25

    • B. 

      21

    • C. 

      23

    • D. 

      80

  • 14. 
    Some _ ____ firewalls can examine the contents of packets and the headers for signs that they are legitimate.
    • A. 

      Boundary

    • B. 

      Stateful

    • C. 

      Stateless

    • D. 

      Personal

  • 15. 
    What is the most common command to use ICMP?
    • A. 

      Ping

    • B. 

      Trace

    • C. 

      Netstat

    • D. 

      NBTstat

  • 16. 
    What port does secure HTTP use?
    • A. 

      8080

    • B. 

      224

    • C. 

      442

    • D. 

      443

  • 17. 
    What port does DNS use for connection attempts?
    • A. 

      68

    • B. 

      21

    • C. 

      53

    • D. 

      56

  • 18. 
    FTP uses port ____ for the control port.
    • A. 

      20

    • B. 

      21

    • C. 

      22

    • D. 

      23

  • 19. 
    A datagram is called ______ at the physcial layer of OSI.
    • A. 

      Bits

    • B. 

      Segments

    • C. 

      Frames

    • D. 

      Packets

  • 20. 
    A datagram is called ______ at the network layer of OSI.
    • A. 

      Bits

    • B. 

      Segments

    • C. 

      Frames

    • D. 

      Packets

  • 21. 
    A ________-level proxy provides protection at the session layer of OSI.
    • A. 

      Application

    • B. 

      Circuit

    • C. 

      Proxy

    • D. 

      Server

  • 22. 
    Ports up to _______ are called well-known ports.
    • A. 

      1500

    • B. 

      255

    • C. 

      1023

    • D. 

      1025

  • 23. 
    A stateful firewall maintains a ___________, which is a list of active connections.
    • A. 

      Routing table

    • B. 

      Bridging table

    • C. 

      State table

    • D. 

      Connection table

  • 24. 
    _______________ is an error-checking procedure performed in the trailer section of an IP packet.
    • A. 

      CRC

    • B. 

      ACK

    • C. 

      FQDN

    • D. 

      FIN

  • 25. 
    This 8-bit value identifies the maximum time the packet can remain in the system before it is dropped.
    • A. 

      Fragment

    • B. 

      Time to live

    • C. 

      Protocol

    • D. 

      Checksum

Back to Top Back to top