Security ( Filtering, DOS, Firewalls)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Apalani
A
Apalani
Community Contributor
Quizzes Created: 17 | Total Attempts: 69,313
Questions: 10 | Attempts: 223

SettingsSettingsSettings
Security ( Filtering, DOS, Firewalls) - Quiz

.


Questions and Answers
  • 1. 

    What is ESP when configuring IPSec?

    • A.

      Is the only type of IPSec header

    • B.

      Provides integrity and authentication

    • C.

      Encapsulating Security Payload - provides Confidentially, Integrity and Authentication

    • D.

      Sits behind the UDP header

    Correct Answer
    C. Encapsulating Security Payload - provides Confidentially, Integrity and Authentication
    Explanation
    ESP (Encapsulating Security Payload) is a protocol used in IPSec (Internet Protocol Security) to provide confidentiality, integrity, and authentication for data packets. It is not the only type of IPSec header, but it is an important component. ESP encapsulates the original IP packet and adds a new ESP header, which includes encryption and authentication information. It ensures that the data is protected from unauthorized access, maintains its integrity during transmission, and verifies the authenticity of the sender. ESP operates at the network layer and sits behind the UDP header, providing end-to-end security for IP traffic.

    Rate this question:

  • 2. 

    Destination NAT typically occurs…

    • A.

      For access to internal devices on a network that sit behind a router / firewall

    • B.

      For all workstations to use when going out to the internet

    • C.

      When you need to translate internal and external ports

    • D.

      For internal workstations that need to access the internet sharing the same IP address

    Correct Answer
    A. For access to internal devices on a network that sit behind a router / firewall
    Explanation
    Destination NAT typically occurs for access to internal devices on a network that sit behind a router/firewall. This means that when external devices or users want to access a specific internal device, the destination NAT translates the destination IP address of the incoming packets to the internal IP address of the device. This allows external access to internal resources without exposing the internal IP addresses to the outside world.

    Rate this question:

  • 3. 

    SYN flood relates to?

    • A.

      Many workstations trying to access the same server at the same time

    • B.

      One workstation scanning open ports on a target server

    • C.

      A denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system

    • D.

      Excessive acknowledgements

    Correct Answer
    C. A denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system
    Explanation
    SYN flood is a type of denial-of-service attack where an attacker floods a target's system with a series of SYN requests. The attacker sends a large number of SYN packets to the target server, but does not complete the handshake process by sending the final ACK packet. This causes the target system to allocate resources and keep waiting for the final ACK, eventually exhausting its resources and making it unable to respond to legitimate requests.

    Rate this question:

  • 4. 

    IDP (Intrusion Detection & Prevention) devices typically operate in what mode?

    • A.

      Route mode

    • B.

      Transparent mode

    • C.

      Sniffer mode

    • D.

      ARP mode

    Correct Answer
    B. Transparent mode
    Explanation
    IDP devices typically operate in transparent mode. In this mode, the devices are placed between the network segments and act as a bridge, allowing the traffic to pass through without any disruption. The devices monitor the network traffic for any suspicious or malicious activity and can take preventive actions to block or mitigate the threats. Transparent mode is preferred as it does not require any changes to the existing network infrastructure and does not introduce any additional latency or points of failure.

    Rate this question:

  • 5. 

    Protocol Anomolies are?

    • A.

      Known attacks launched on network devices

    • B.

      Non IP traffic

    • C.

      Traffic outside normal protocol behaviour that could be seen as a new network attack

    • D.

      Traffic inside IPSec that could contain a know attack signature

    Correct Answer
    C. Traffic outside normal protocol behaviour that could be seen as a new network attack
    Explanation
    Protocol anomalies refer to traffic that deviates from the normal behavior of a protocol and could potentially be interpreted as a new network attack. These anomalies can include unusual packet structures, unexpected sequencing or timing, or any other behavior that does not conform to the standard protocol specifications. Detecting and analyzing protocol anomalies is important for identifying and mitigating potential network attacks, as they may indicate the presence of malicious activity or attempts to exploit vulnerabilities in the network.

    Rate this question:

  • 6. 

    If traffic doesn't match a rule on the firewall what is the default action?

    • A.

      Permit

    • B.

      Deny

    • C.

      Log

    • D.

      Send an ICMP message to the destination

    Correct Answer
    B. Deny
    Explanation
    If traffic doesn't match a rule on the firewall, the default action is to deny the traffic. This means that the firewall will block or reject the traffic and not allow it to pass through.

    Rate this question:

  • 7. 

    Source NAT typically occurs?

    • A.

      For traffic passing out to the internet where not enough IP addresses are available

    • B.

      To hide internal addresses

    • C.

      Both a) and c)

    • D.

      Only translates source IP addresses and never source ports

    Correct Answer
    A. For traffic passing out to the internet where not enough IP addresses are available
    Explanation
    Source NAT typically occurs for traffic passing out to the internet where not enough IP addresses are available. This is because Source NAT allows multiple devices within a private network to share a single public IP address when communicating with the internet. By translating the source IP addresses of the outgoing traffic, Source NAT enables the private network to connect to the internet using a limited number of available public IP addresses.

    Rate this question:

  • 8. 

    What does DOS stand for when it comes to firewalling?

    • A.

      Denied Operating System

    • B.

      Distributed Office Scan

    • C.

      Denial of Service

    • D.

      Distributed SYN flood

    Correct Answer
    C. Denial of Service
    Explanation
    DOS stands for Denial of Service when it comes to firewalling. Denial of Service refers to a type of cyber attack where the attacker overwhelms a network or system with excessive traffic or requests, causing it to become unavailable to legitimate users. Firewalls are security measures that protect networks by monitoring and controlling incoming and outgoing network traffic. In this context, DOS refers to the ability of a firewall to detect and prevent denial of service attacks, ensuring the availability and integrity of the network.

    Rate this question:

  • 9. 

    IPSec is?

    • A.

      Security for IPv4 traffic

    • B.

      Short for IP Security

    • C.

      Used for site to site and remote client VPN access

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    IPSec is a protocol suite used for securing IPv4 traffic. It provides authentication, confidentiality, and integrity for data transmitted over IP networks. It is also commonly referred to as IP Security. IPSec can be used for both site-to-site and remote client VPN access, making it a versatile solution for securing network communications. Therefore, the correct answer is "all of the above."

    Rate this question:

  • 10. 

    IDS/IDP devices operate at what layers in the OSI model?

    • A.

      Layers 3

    • B.

      Layers 3-4

    • C.

      Layers 3- 7

    • D.

      Layer 6

    Correct Answer
    C. Layers 3- 7
    Explanation
    IDS/IDP devices operate at layers 3-7 in the OSI model. This means that they can analyze network traffic and detect intrusions or malicious activity at various levels, including the network layer (layer 3), transport layer (layer 4), session layer (layer 5), and application layer (layer 7). By operating at these layers, IDS/IDP devices can provide a more comprehensive and detailed analysis of network traffic, allowing for better detection and prevention of security threats.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 11, 2011
    Quiz Created by
    Apalani
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.