Wednesday, December 16, 2015

Firewall Concepts test answers of 2016.

Find Complete and recently updated Correct Question and answers of Firewall Concepts. All Answers updated regularly with new questions. Upwork Firewall Concepts test answers of 2016.



Question:* What firewall based technology would you use to create a secure tunnel connection from a corporate headquarters to a remote branch office?

Answer: • VPN

Question:* A stateful firewall maintains which of the following?

Answer: • state table

Question:* Which of the folllowing firewalls keeps track of the state of network connections ?

Answer: • Stateful inspection

Question:* You want to filter all traffic going to an internal web server from the Internet side of the firewall, what port will you filter on the firewall?

Answer: • 80

Question:* Your customer asks you to allow ALL hosts from the Internet to company's secure webserver (Secure HTTP), what port do you open on the firewall?

Answer: • 443

Question:* Which of the following is not a recognized generation of Firewall?

Answer: • DMZ

Question:* Which TCP port is used by Telnet?

Answer: • 23

Question:* Which of the following server creates a secure tunnel connection?

Answer: • VPN

Question:* What is the primary purpose of a firewall?

Answer: • Inspect packets

Question:* Which of the following 8-bit values identifies the maximum time the packet can remain in the system before it is dropped?

Answer: • time to live

Question:* FTP uses which of the following port as control port?

Answer: • 21

Question:* What is a DMZ zone?

Answer: • DeMilitarized Zone

Question:* Which of the following is TRUE?

Answer: • All of the given options are correct

Question:* In an IP packet header, which of the following is the address of the computer or device that is to receive the packet?

Answer: • destination address

Question:* What device logically filters traffic at the edge of a computer network and the Internet?

Answer: • Firewall

Question:* You are a network administrator and you have been asked to add a deny all ICMP firewall stated that is sourced from the Internet; you add a deny all for ICMP, what common command would you use to test your newly added rule?

Answer: • PING

Question:* Which of the following firewalls works at the application level?

Answer: • application-level firewalls

Question:* Your client asks you to create a rule for FTP access, what port(s) will you add on the firewall?

Answer: • 20 and 21

Question:* What port does FTP use for the control port?

Answer: • 21

Question:* Which port does secure HTTP use?

Answer: • 443

Question:* Some firewalls deploy a technology that allows monitoring of traffic in and out of a network and alerts network staff when suspicious traffic patterns occur.

Answer: • IDS

Question:* The Windows based program, ZoneAlarm is an example of a "BLANK" firewall?

Answer: • Software

Question:* When referring to firewall concepts, what are application level gateways?

Answer: • Proxy servers

Question:* Which of the following firewalls keeps track of the connection state?

Answer: • Stateful packet filtering firewall

Question:* Which of the following is not a VALID basic criteria for rule in the firewall policy?

Answer: • User

Question:* Packets contain an 8-bit value that determines the maximum time the packet can remain the CPU, Memory, and Buffer circuits of a firewall before it is dropped or discarded, what is this called?

Answer: • Time To Live

Question:* When designing a network that consists of a firewall, the firewall design needs to be "BLANK" so that it can grow with the network it protects.

Answer: • Scalable

Question:* What application controls what information is transmitted or received from an external source destined to a server, workstation, or computer that is based on a preset of rules and/or user preferences?

Answer: • Firewall

Question:* What is a host based firewall?

Answer: • Software firewall installed on a server/workstation/desktop

Question:* When referring to firewalls, what does SPI Stand for?

Answer: • Stateful Packet Inspection

Question:* What types of firewalls are able to analyze the contents of packets and the IP headers for signs that the traffic is legitimate?

Answer: • Stateful

Question:* Which of the following valid OSI layer are covered by packet filtering firewall operation ?

Answer: • Both Transport layer and Network layer

Question:* Which of the following is another term for a packet of digital information?

Answer: • datagram

Question:* When packets are being processed by a hardware firewall, one of the several steps in processing the packets is an error-checking procedure that is performed in the trailer section of an IP Packet, this is called what?

Answer: • CRC

Question:* The practice of designing operational aspects of a system to work with a minimal amount of system privilege is called:

Answer: • least privilege

Question:* Which type of firewall involves firewall software installation directly on the user's system?

Answer: • Residential –Grade Firewall

Question:* What main attributes are used at layer 4 of the OSI model to filter traffic on a firewall?

Answer: • Source and/or destination TCP/UDP ports

Question:* Ports up to which of the following are called well-known ports?

Answer: • 1023

Question:* Which particular firewall usually consists of two separate firewall devices?

Answer: • Hybrid Firewall

Question:* Zone Alarm is an example of which type of firewall?

Answer: • personal

Question:* When troubleshooting the flow of packets through a firewall, a datagram is called what at the network layer of the OSI model?

Answer: • Packets

Question:* Which of the following are the most common restrictions implemented in packet filtering firewalls?

Answer: • All of the given options are valid

Question:* What port do most DDOS DNS attacks occur on?

Answer: • 53

Question:* What it is called when a packet arrives at a firewall, gets analyzed and determines that no connection exists and the packet is dropped?

Answer: • Stateful Packet Inspection

Question:* When configuring a firewall to deny port 3389 to a RDP server that is to receive the SYN packet, what is the address?

Answer: • Destination

Question:* What happens when a packet arrives on an interface and a route exists in the local routing table and the firewall routes the packet back out the same interface the packet arrived on?

Answer: • The Packet is dropped

Question:* The basic concept of a SYN flooding attack lies in the design of what handshake that begins a TCP connection?

Answer: • 3-way

Question:* True/False: Application proxy firewalls are faster than Stateful Packet Inspection firewalls.

Answer: • False

Question:* Which of the following firewall makes the filtering decision based on the media access control address of the source/destination of a packet ?

Answer: • MAC layer Firewalls

Question:* What kind of firewall is the opensource IPtables firewall commonly found on Linux Distros?

Answer: • Stateful

Question:* Which particular generation firewall are stateless in nature ?

Answer: • First Generation

Question:* What specific chip design allows firewalls to accelerate packet processing to analyze and filter packets between an untrusted and trusted network?

Answer: • ASIC

Question:* Ports up to "BLANK" are considered well known ports.

Answer: • 1023

Question:* What technology is used on firewalls that process stateful packet inspections at the hardware level and as close to the line rate as possible?

Answer: • ASIC

Question:* What kind of firewall is the integrated Microsoft Windows firewall application?

Answer: • Stateful

Question:* What device should be the front line defense in your network?

Answer: • Stateful Packet Inspection firewall

Question:* A Stateful Packet Inspection firewall maintains a "BLANK", which is also just a list of active connections.

Answer: • State Table

Question:* True/False: NAT is considered as a firewall technology.

Answer: • False

Question:* Which of the following firewall's filtering process can be either Stateful, Stateless or both ?

Answer: • Packet Filtering

Question:* What do circuit layer Firewalls monitor?

Answer: • TCP Handshaking

Question:* Network-based firewalls and Host-based firewalls are valid categories of which of the following firewall ?

Answer: • Application –level firewall

Question:* Which of the following is not a VALID subset of packet filtering firewalls?

Answer: • Stateless inspection

Question:* A dynamic or Stateful Packet Inspection firewall maintains active "BLANK" sessions and "BLANK" pseudo sessions.

Answer: • TCP and UDP

Question:* A "BLANK" flowing through a firewall is another term for a packet of digital information.

Answer: • Datagram

Question:* Which of the following is not a VALID processing –mode category of firewalls?

Answer: • Proxy firewalls

Question:* In an IP packet header, which of the following describes the length of the header in 32-bit words and is a 4-bit value?

Answer: • Internet header length

Question:* Which generation firewalls are stateful inspection firewalls?

Answer: • Third Generation

Question:* Which of the following servers in the DMZ needs only list a limited number of public IP addresses?

Answer: • DNS

Question:* What is a Cisco Access Control List (ACL) considered as?

Answer: • Stateless

Question:* Which of the following is FALSE about Circuit Gateways?

Answer: • Circuit Gateway firewalls provide a unique access mechanism based on the destination application

Question:* Which of the following is a mechanism designed into operating system kernel ?

Answer: • Fifth Generation

Question:* What layer(s) does an SPI firewall generally operate at?

Answer: • D and F

Question:* Which of the following can have different components of the firewall for different systems?

Answer: • Screened Host Firewalls

Question:* Which of the following is not a vaild categorization of Firewall based on processing mode?

Answer: • Application filtering

Question:* Which of the following host is sometimes called a dual-homed gateway or bastion host?

Answer: • sceened

Question:* What layer of the OSI model do Circuit Layer Firewalls operate at?

Answer: • Session Layer

Question:* Which of the following is not a vaild categorization of Firewall based on structure?

Answer: • application-based

Question:* Which level proxy provides protection at the session layer of OSI?

Answer: • circuit

Question:* Which generation firewalls are either application-level firewalls or proxy servers?

Answer: • Second generation

Question:* Which of the following is an INVALID common architectural implementation of firewall?

Answer: • Dynamic Filtering



No comments:

HTML5 Upwork (oDesk) TEST ANSWERS 2022

HTML5 Upwork (oDesk) TEST ANSWERS 2022 Question: Which of the following is the best method to detect HTML5 Canvas support in web br...

Disqus for upwork test answers