These Firewall Concepts multiple-choice questions and their answers will help you strengthen your grip on the subject of Firewall Concepts. You can prepare for an upcoming exam or job interview with these 100 Firewall Concepts MCQs.
So scroll down and start answering.
A. Tunnel
B. VPN
C. HTTPS
D. Radius
A. TCP
B. 3-way
C. 2-way
D. 4-way
A. Zone Based
B. Stateless
C. Stateful
D. Connection oriented firewall
A. Packet Filtering
B. MAC layer firewalls
C. Application Gateways
D. Circuit Gateways
A. Inbound Direction
B. Outbound Direction
C. All of the given options are valid
D. IP source and destination address
A. 1500
B. 1023
C. 255
D. 1025
A. MAC layer firewalls
B. Dynamic Filtering
C. Hybrid Firewall
D. Application –level firewall
A. 443
B. 53
C. 80
D. 161
A. corporate
B. proxy
C. personal
D. IDS
A. False
B. True
A. Connected
B. Source
C. Destination
D. Flag
A. Bits
B. Frames
C. Packets
D. Segments
A. Commercial –Grade Firewall
B. Fourth Generation
C. Third Generation
D. Residential –Grade Firewall
A. IFG
B. IPC (IP Check)
C. FQDN
D. CRC
A. At the Application layer
B. Both Transport layer and Network layer
C. Network layer
D. Transport layer
A. Service
B. Source
C. User
D. Destination
A. header
B. datagram
C. data
D. footer
A. Frames and packets
B. Source and/or destination IP Addresses
C. Source and/or destination TCP/UDP ports
D. ICMP and IP
A. Software
B. Boundary
C. Stateless
D. Stateful
A. access denied
B. least privilege
C. failover firewall
D. IP forwarding
A. Source Packet Information
B. Stateful Packet Inspection
C. Shared Packet Interconnection
D. Stateless Packet Inspection
A. Dynamic Filtering
B. Stateful inspection
C. Static filtering
D. Stateless inspection
A. Cost effective
B. Robust
C. Expensive
D. Scalable
A. MTR
B. PING
C. ICMP
D. Traceroute
A. IDS
B. Software
C. Corporate
D. Business
A. IP Servers
B. Proxy servers
C. HTTP servers
D. HTTP servers
A. Firewall
B. Server
C. Repeater
D. Router
A. IDS
B. Switch
C. Router
D. Hub
A. Time To Live
B. Checksum
C. Protocol
D. Fragment
A. A device that is installed by your Internet Service Provider
B. Software firewall installed on a server/workstation/desktop
C. A proxy server configured to handle http requests
D. A Firewall connected directly to the Network Interface Card of a Computer
A. Application layer firewall
B. Router enhanced firewall
C. Stateful packet filtering firewall
D. Packet filtering firewall
A. 443
B. 441
C. 442
D. 8080
A. 23
B. 21
C. 20
D. 22
A. total length
B. flag
C. destination address
D. source address
A. 25
B. 21
C. 80
D. 8080
A. application-level firewalls
B. circuit firewall
C. MAC layer firewalls
D. Packet filtering firewal
A. Hub
B. Firewall
C. Switch
D. Router
A. All of the given options are correct
B. Firewalls can be categorized by processing mode, development era, or structure
C. Firewalls categorized by which level of technology they employ are identified by generation, with the later generations being more complex and more recently developed
D. The firewall may be a separate computer system, a software service running on an existing router or server, or a separate network containing a number of supporting devices
A. fragment
B. checksum
C. protocol
D. time to live
A. Dedicated Master Zone
B. Donor Master Zone
C. Dual Master Zone
D. DeMilitarized Zone
A. Second generation
B. DMZ
C. Third Generation
D. First Generation
A. 72
B. 110
C. 80
D. 23
A. 22
B. 21
C. 23
D. 20
A. 8021
B. 20 and 21
C. 20
D. 2121
A. 22
B. 43
C. 443
D. 23
A. Enables fast forwarding
B. Route hot packets
C. Route frames
D. Inspect packets
A. authentication
B. RADIUS
C. tunnel
D. VPN
A. The Packet is allowed, but marked as low priority
B. The Packet is dropped
C. Interface will get disabled due to a routing conflict
D. Poison reverse routing is disabled and the packet is allowed
A. Connection Oriented Inspection
B. Stateful Packet Inspection
C. Stateless Packet Inspection
D. Stateful Frame Inspection
A. Packet Filtering
B. MAC layer Firewalls
C. Circuit Gateways
D. Application Gateways
A. state table
B. routing table
C. connection table
D. bridging table
A. RISC
B. Intel X86
C. ASIC
D. MIPS
A. Stateless
B. Zone Based
C. Connection oriented firewall
D. Stateful
A. ASIC
B. Intel
C. SPI
D. ACL
A. Routing Table
B. Connection Table
C. NAT Table
D. State Table
A. Packet Filtering Firewalls
B. Stateful Packet Inspection firewall
C. Network Layer Firewalls
D. Application Based Firewalls
A. 1024
B. 1023
C. 65536
D. 65524
A. Fourth Generation
B. Second generation
C. First Generation
D. Third Generation
A. True
B. False
A. Datagram
B. Packet
C. Frame
D. Data
A. Application –level firewall
B. Hybrids
C. MAC layer firewalls
D. Circuit Gateways
A. TCP Handshaking
B. UDP Handshaking
C. IP Handshaking
D. Transport Handshaking
A. Static filtering
B. Stateless inspection
C. Dynamic Filtering
D. Stateful inspection
A. Stateful and Stateless
B. Server and Host
C. TCP and UDP
D. IP and ICMP
A. Proxy firewalls
B. Packet filtering Firewalls
C. Circuit gateways
D. Application gateways
A. NAT
B. Stateful
C. Controlled
D. Stateless
A. DNS
B. firewall
C. NAT
D. proxy
A. First Generation
B. Second generation
C. Third Generation
D. Fifth Generation
A. Third Generation
B. Second generation
C. First Generation
D. Fourth Generation
A. Firewall operates at the transport layer
B. Circuit gateways firewalls DO NOT look at data traffic flowing between one network and another
C. Circuit Gateway firewalls provide a unique access mechanism based on the destination application
D. Circuit Gateway firewalls provide a common access mechanism which is not dependent on the destination application
A. total length
B. fragment offset
C. header checksum
D. Internet header length
A. D and F
B. Network
C. Application
D. Data Link
A. screened subnet firewall
B. packet filtering routers
C. dual-homed firewalls
D. Screened Host Firewalls
A. blocked
B. stub
C. proxy
D. sceened
A. application
B. proxy
C. server
D. circuit
A. hardware-based
B. application-based
C. residential grade
D. commercial-grade
A. Session Layer
B. Application Layer
C. Transport Layer
D. Network Layer
A. Application gateway
B. Packet filtering Firewalls
C. Application filtering
D. Circuit gateway
A. First Generation
B. Third Generation
C. Second generation
D. Fourth Generation
A. packet filtering routers
B. dual-homed firewalls
C. Dynamic Filtering
D. screened host firewalls
A. Health of the Firewalls
B. Status of the Firewalls
C. Troubleshooting the issues
D. Monitoring the Firewalls
A. HTTP
B. SMTP
C. POP3
D. IMAP
A. SHA1
B. AES
C. MD5
D. 3DES
E. DES
F. CAST
A. Encryption
B. Verification
C. Attacking
D. Authentication
A. Wireshark
B. Nessus
C. TCPDUMP
D. Snort
A. Personal Desktop
B. Scanners
C. Printers
D. Personal Files and folders
A. Finding the vulnerabilities
B. Crashing the Firewall.
C. Building a strong security policy.
D. To test the Firewalls configuration.
A. Un-authorized mail relaying
B. Application bugs
C. Operating System bugs
D. Spoofing
A. Unplugging the cable of the main switch
B. Spoofing the Packets
C. Sending SYN Packets using the Zombies
D. Shutting down the server being accessed
A. TCP
B. UDP
C. IP
D. IPX
A. MD5
B. AES
C. SHA 1
D. AES-128
E. AES-256
A. Bridge mode
B. Route mode
C. Hybrid Mode
D. VPN Mode
A. ACK
B. FIN
C. SYN
D. SYN/ACK
E. URG
A. Transport Layer
B. Network Layer
C. Session layer
D. Application Layer
A. It is a type of Attack
B. It is a type of Virus
C. It is a type of Firewalls
D. It is a Security Policy
A. Sending a lot of mails on the same email address
B. Sending a lot of SYN Packets
C. Pretending to be someone you are not
D. Sending spam mails
A. Verification of the problem
B. Status of the Firewall
C. Firewall Logs
D. Firewall Configuration
E. All of the above
A. Ethereal
B. Nessus
C. TCPDUMP
D. SNORT
A. WAN Link
B. Internet Link
C. Wireless connectivity
D. All of the above
A. It blocks the worms replicating in the Network
B. It Controls the Access
C. It blocks the attacks on a Desktop machine
D. It scans the system for viruses