Hello Freelancer, Get the FIREWALL CONCEPTS TEST of Latest version 2018. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website.
1. Which of the following is helped by Logging?
Answers:
- Health of the Firewalls
- Status of the Firewalls
- Troubleshooting the issues
- Monitoring the Firewalls
2. Which of the protocols listed below will you scan at the Gateway to block the Spam Mails?
Answers:
- HTTP
- SMTP
- POP3
- IMAP
3. Which of the following are Encryption algorithms?
Answers:
- SHA1
- AES
- MD5
- 3DES
- DES
- CAST
4. Digital Certificates are used for___________.
Answers:
- Encryption
- Verification
- Attacking
- Authentication
5. Which of the following tools can be used to monitor the Packets?
Answers:
- Wireshark
- Nessus
- TCPDUMP
- Snort
6. Which of the sources listed below are secured by Desktop Firewalls?
Answers:
- Personal Desktop
- Scanners
- Printers
- Personal Files and folders
7. Port-Scanning tools helps the administrator in which of the following?
Answers:
- Finding the vulnerabilities
- Crashing the Firewall.
- Building a strong security policy.
- To test the Firewalls configuration.
8. Which of the reasons listed below lead to common attacks?
Answers:
- Un-authorized mail relaying
- Application bugs
- Operating System bugs
- Spoofing
9. Which of the following can lead to the denial of service attacks?
Answers:
- Unplugging the cable of the main switch
- Spoofing the Packets
- Sending SYN Packets using the Zombies
- Shutting down the server being accessed
10. Which protocol is used by the DNS?
Answers:
- TCP
- UDP
- IP
- IPX
11. Which of the following are hash algorithms?
Answers:
- MD5
- AES
- SHA 1
- AES-128
- AES-256
12. By using which command can you see the active TCP connections?
Answers:
- netstat
- ipconfig
- ifconfig
- traceroute
13. What is the mode of operation of Firewalls?
Answers:
- Bridge mode
- Route mode
- Hybrid Mode
- VPN Mode
14. The______________ TCP flag can launch a DoS attack.
Answers:
- ACK
- FIN
- SYN
- SYN/ACK
- URG
15. Which layer of the OSI model is used by Packet filtering?
Answers:
- Transport Layer
- Network Layer
- Session layer
- Application Layer
16. What exactly is a DoS?
Answers:
- It is a type of Attack
- It is a type of Virus
- It is a type of Firewalls
- It is a Security Policy
17. What exactly is spoofing?
Answers:
- Sending a lot of mails on the same email address
- Sending a lot of SYN Packets
- Pretending to be someone you are not
- Sending spam mails
18. Which of the following things should be kept in mind while troubleshooting the Firewall problems?
Answers:
- Verification of the problem
- Status of the Firewall
- Firewall Logs
- Firewall Configuration
- All of the above
19. Which of the following tools can be used to find vulnerabilities?
Answers:
- Ethereal
- Nessus
- TCPDUMP
- SNORT
20. Over which of the following can a VPN be established?
Answers:
- WAN Link
- Internet Link
- DSL Link
- Wireless connectivity
- All of the above
21. What are the functions of a Desktop Firewall?
Answers:
- It blocks the worms replicating in the Network
- It Controls the Access
- It blocks the attacks on a Desktop machine
- It scans the system for viruses
22. Which of the following ports is used by IMAP?
Answers:
- 143
- 153
- 159
- 25
- 110
23. What is the action on Packet when we apply the action, REJECT?
Answers:
- The Packet is dropped
- The ACK Packet is sent
- The FIN Packet is sent
- An error Packet is sent when a matched packet is detected
- All of the above
24. What exactly is the Stateful Packet Filtering?
Answers:
- It is an attack
- It is a Firewall Technology
- It is a Security Policy
25. Which of the following are the functions of a Firewall?
Answers:
- It filters the packet
- It protects the resources
- It records and reports the events
- All of the above
26. Generally, a Firewall can not be managed by which of the following:
Answers:
- GUI
- CLI
- SSH
- FTP
27. Suppose Matt is the Network Security Engineer for XYZ Company. He is asked by his manager to create a security policy in the Firewalls so that host_A(172.16.0.3) may be able to access the HTTP service from the internet cloud. NAT rule already exists for the host. How will Matt create the security policy in the Firewalls?
Answers:
- Source: Host_A(172.16.0.3), Destination:Any , Service: HTTP(80), Action :Accept
- Source: Host_A(172.16.0.3), Destination:Any , Service: POP3(110), Action :Accept
- Source:Any, Destination: Host_A(172.16.0.3), Service: HTTP(80), Action :Accept
- Source: Host_A(172.16.0.3), Destination:Any , Service: HTTP(80), Action :Drop
- All of the above
28. Suppose Eric is a Network Security Engineer in ABC Company. He is asked by his manager to block the access to unauthorized web sites being accessed by the users of the company. Can these unauthorized web sites be blocked with the Firewalls?
Answers:
- Yes, the sites can be blocked
- No, the sites cannot be blocked
29. What does sniffing mean?
Answers:
- Encrypting a data
- Decrypting a data
- Encryption algorithm
- Capturing data traveling across the network
30. Which type of Firewalls keep a track on the state of the connection?
Answers:
- Application Firewall
- Packet Filtering Firewall
- Stateful Packet Filtering Firewall
- Session Firewall
31. At which layer does the Circuit-Level Firewall work?
Answers:
- Session Layer
- Data Link Layer
- Transport Layer
- Physical Layer
- Network Layer
32. Which zone is the un-trusted zone in Firewalls architecture?
Answers:
- Local Area Network(LAN)
- Wide Area Network(WAN)
- DMZ
- RAS
33. What are the advantages of Stateful Inspection Firewall?
Answers:
- High Performance
- Security
- Transparency
- All of the above
34. Auditing is the process of tracking ________________________ on a system.
Answers:
- events
- errors
- access
- authentication
- All the above
35. What is the sequence in which the rules are executed in the Rule Base?
Answers:
- From the bottom of the rule base to the top of the rule base
- From the top of the rule base to the bottom of the rule base
- Random
- According to the priority
36. Suppose Adrian is the Network Security Engineer for ABC Company. He is asked by his manager to create a security policy in the Firewalls to open the HTTP service for a host_A(192.168.1.2) so that host_A may be able to access the Web Server(172.16.0.2). NAT rule already exists for the host. How will Adrian create the security policy in the Firewalls?
Answers:
Answers:
- Source: Web_Server(172.16.0.2), Destination(192.168.1.2): host_A, Service: HTTP(80), Action :Accept
- Source: Host_A(192.168.1.2), Destination:Web_Server(172.16.0.2), Service: HTTP(80), Action :Reject
- Source: Host_A(192.168.1.2), Destination:Web_Server(172.16.0.2), Service: SMTP(25), Action :Accept
- Source: Host_A(192.168.1.2), Destination:Web_Server(172.16.0.2), Service: HTTP(80), Action :Accept
- None of the above
37. Which command is used to determine the route taken by a Packet?
Answers:
- netstat
- ipconfig
- ifconfig
- traceroute
38. Syslog protocol is used for __________.
Answers:
- managing the Firewall
- event notification
- encryption
- VPN
39. State whether True or False.
When a rule is matched for a particular incoming/outgoing Packet and is executed, the Firewalls look for another rule in the rule base for the same Packet.
Answers:
- True
- False
40. What are the advantages of DMZ?
Answers:
- It isolates the incoming traffic
- It enhances the security of the network
- It implements the multilayered approach to secure the resources
- All of the above
41. Which Packet is sent by the source to initiate the connection in TCP 3-way handshake?
Answers:
- SYN
- SYN/ACK
- ACK
- All of the above
42. You are asked by your manager to publish a web server.
Which type of NATing will you use so that the Web Server can be accessed from the Internet?
Answers:
- Static NAT
- Dynamic NAT
- Source based NAT
- Destination based NAT
43. Which of the following can be categorized as a threat to secured resources?
Answers:
- Un-authorized access
- Impersonation
- Denial of service
- All of the above
44. Which among the following Firewalls is the slowest?
Answers:
- Packet filtering
- Stateful Packet inspection
- Application
- Session
45. A TCP connection is complete when it receives the_____________Packet.
Answers:
- SYN
- ACK
- SYN-ACK
- URG
46. What is the CIA concept?
Answers:
- Confidentiality, Integrity and Access
- Confidentiality, Integrity and Administration
- Continuity, Integrity and Authentication
- Confidentiality, Integrity and Availability
47. Suppose Mark is the Network Security Engineer for ABC Company. He is asked by his manager to create a security policy in the Firewalls so that their internal network ABC_INTERNAL(172.16.0.0/24)may be able to access the DNS service from the server DNS_SERVER(192.168.1.5). NAT rule already exists for the Network. How will Mark create the security policy in the Firewalls?
Answers:
- Source: ABC_INTERNAL(172.16.0.0/24), Destination: DNS_SERVER(192.168.1.5), Service: HTTP(80), Action :Accept
- Source: ABC_INTERNAL(172.16.0.0/24), Destination: DNS_SERVER(192.168.1.5), Service: DNS(53), Action :Accept
- Source:Any, Destination: ABC_INTERNAL(172.16.0.0/24), service DNS(53), Action :Accept
- Source: ABC_INTERNAL(172.16.0.0/24), Destination: DNS_SERVER(192.168.1.5), Service: HTTP(80), Action :Drop
- None of the above
48. Which of the following is a Firewall technology?
Answers:
- Packet Filters
- Network Address Translation Firewall
- Proxy Firewall
- Stateful Firewall
- All of the above
49. Which zone is the trusted zone in Firewalls architecture?
Answers:
- Local Area Network (LAN)
- Wide Area Network (WAN)
- DMZ
- RAS
50. Which of the following things should be kept in mind before implementing/configuring the Firewalls?
Answers:
- Network Diagram
- Traffic Flow
- Topology
- All of the above
51. Which of the following is a type of DoS attack?
Answers:
- TCP SYN attack
- Ping of Death
- SMURF attack
- All of the above
52. At which layer do the Proxy Firewalls function?
Answers:
- Session Layer
- Data Link Layer
- Transport Layer
- Application Layer
- None of the above
53. How many TCP flags are present in the Firewalls concept?
Answers:
- 3
- 2
- 5
- 8
- 6
54. Layer 2 Tunneling Protocol is a type of__________.
Answers:
- VPN
- Firewall
- Encryption Technology
- Authentication
55. In a Stateful Inspection Firewall, the entries about the connection states are made in the_______________ table.
Answers:
- NAT Table
- State Table
- TCP/IP Table
- Connection Table
- ARP Table
56. What does RADIUS stand for?
Answers:
- Remote Authorized Dial-In User Service
- Remote Access Dial-In User Service
- Remote Authentication Dial-In User Service
- Remote Authentication Dial-In User System
57. What is Spoofing?
Answers:
- It is a Firewall Technology
- It is a Firewall Managing Technique
- It is a DOS attack
- It is Firewall Monitoring used while troubleshooting
- It is a technique used to gain unauthorized access to computers
58. What is the range of dynamic ports?
Answers:
- 1-1024
- 1024-2024
- 0-1023
- 49,152-65,535
59. State whether True or False.
The vulnerabilities in the Network/System can be exploited by threats.
Answers:
- True
- False
60. State whether True or False.
When a user makes a request to open some access, he should be allowed to get whatever is required.
Answers:
- True
- False
61. What does AAA stand for?
Answers:
- Authentication, Accounting and Administration
- Advance, Application and Administration
- Authentication, Authorization, and Accounting
- None of these
62. What is SSL?
Answers:
- Firewall Technology
- A type of Attack
- Encryption Technology
- Secure Site Linking
63. Suppose Sally is the Network Security Engineer for ABC Company. She is asked by her manager to create a security policy in the Firewalls so that their internal network ABC_INTERNAL(172.16.0.0/24) may be able to access the SMTP(25) service from the server MAIL_SERVER(192.168.1.15).NAT rule already exists for the network. How will Sally create the security policy in the Firewalls?
Answers:
- Source: ABC_INTERNAL(172.16.0.0/8),Destination: MAIL_SERVER(192.168.1.5), Service: SMTP(25), Action :Accept
- Source:ABC_INTERNAL(172.16.0.0/16), Destination:MAIL_SERVER(192.168.1.15), Service: SMTP(25), Action :Accept
- Source:ABC_INTERNAL(172.16.0.0/24), Destination:MAIL_SERVER(192.168.1.15), Service: SMTP(25), Action :Accept
- Source:ABC_INTERNAL(172.16.0.0/24), Destination:MAIL_SERVER(192.168.1.15), Service:POP3(110), Action :Accept
- None of the above
64. At which layer do the Firewalls generally work in the OSI model?
Answers:
- Network Layer
- Transport Layer
- Data Link Layer
- Physical Layer
65. State whether True or False.
The security of the Firewalls is a very important aspect.
Answers:
- True
- False
66. State whether True or False.
Logging should be enabled for all the rules in the Rule Base.
Answers:
- True
- False
67. Which command is used to check whether a particular host is live or not?
Answers:
- netstat
- ipconfig
- ifconfig
- traceroute
- ping
68. State whether True or False.
All the DoS attacks can be blocked with the Firewalls.
Answers:
- True
- False
69. Firewall can perform NAT to keep the record of various NAT entries. In which of the following tables does Firewall make those entries?
Answers:
- ARP Table
- NAT Table
- State Table
- TCP/IP Table
70. At which layer does the IPSec work?
Answers:
- Session Layer
- Network Layer
- Data Link Layer
- Application Layer
71. What is the range of reserved ports?
Answers:
- 1-1024
- 1024-2024
- 0-1023
- 1024-65,535
72. Which of the traffic listed below should be generally blocked?
Answers:
- Source routed Packets
- Broadcasts
- Peer-to-peer file sharing
- All of the above
73. State whether True or False.
A Firewall installed at the Gateway makes the whole network secure.
Answers:
- True
- False
74. Which of the events listed below should be monitored?
Answers:
- Packets dropped
- Interface up/down
- Firewall restart
- Configuration Changes
- All the above
75. HTTPS uses ___________ encryption technology to encrypt the communication between Client’s system and Firewalls.
Answers:
- SHA 1
- MD5
- SSH
- SSL
Finally no more words require about the FIREWALL CONCEPTS TEST information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box. Thanks for Being with us.
No comments:
Post a Comment