Do you know that? 9.3M+ registered freelancers on Upwork-Elance next

Contact Email: teammmrem@yahoo.com

<< All Upwork (oDesk) and Elance Tests << Elance test answers << IT & Programming category

Test answers for Firewall Concepts 2016

(80) Last updated: January 23
Elance • IT & Programming
Questions and answers are regularly updated. Answered and not answered tests questions.

This helps getting job: Hundreds of (cover letter examples , interview questions , profile samples ) • Earn on Upwork (oDesk)
Job assistance: jobs popularityfreelance rates

Popular test answers: HTML, .Net, CSS, English, SEO, Photoshop, iOS, Java, Android, Ruby, Python, JavaScript

See all 6 tests answers updated

Find Upwork (oDesk) and Elance test answers on this website:



Collapse | Expand

80 Answered Test Questions:

1. What firewall based technology would you use to create a secure tunnel connection from a corporate headquarters to a remote branch office?

Answers:

• Tunnel

• HTTPS

• VPN

• Radius

2. A stateful firewall maintains which of the following?

Answers:

• routing table

• connection table

• state table

• bridging table

3. Which of the folllowing firewalls keeps track of the state of network connections ?

Answers:

• Static filtering

• Stateful inspection

• Dynamic Filtering

• Stateless inspection

4. You want to filter all traffic going to an internal web server from the Internet side of the firewall, what port will you filter on the firewall?

Answers:

• 25

• 80

• 8080

• 21

5. Your customer asks you to allow ALL hosts from the Internet to company's secure webserver (Secure HTTP), what port do you open on the firewall?

Answers:

• 23

• 443

• 22

• 43

6. Which of the following is not a recognized generation of Firewall?

Answers:

• DMZ

• First Generation

• Second generation

• Third Generation

7. Which TCP port is used by Telnet?

Answers:

• 23

• 72

• 110

• 80

8. Which of the following server creates a secure tunnel connection?

Answers:

• tunnel

• VPN

• RADIUS

• authentication

9. What is the primary purpose of a firewall?

Answers:

• Route hot packets

• Route frames

• Enables fast forwarding

• Inspect packets

10. Which of the following 8-bit values identifies the maximum time the packet can remain in the system before it is dropped?

Answers:

• fragment

• time to live

• checksum

• protocol

11. FTP uses which of the following port as control port?

Answers:

• 21

• 20

• 23

• 22

12. What is a DMZ zone?

Answers:

• DeMilitarized Zone

• Donor Master Zone

• Dedicated Master Zone

• Dual Master Zone

13. Which of the following is TRUE?

Answers:

• Firewalls can be categorized by processing mode, development era, or structure

• All of the given options are correct

• The firewall may be a separate computer system, a software service running on an existing router or server, or a separate network containing a number of supporting devices

• Firewalls categorized by which level of technology they employ are identified by generation, with the later generations being more complex and more recently developed

14. In an IP packet header, which of the following is the address of the computer or device that is to receive the packet?

Answers:

• flag

• destination address

• total length

• source address

15. What device logically filters traffic at the edge of a computer network and the Internet?

Answers:

• Hub

• Router

• Firewall

• Switch

16. You are a network administrator and you have been asked to add a deny all ICMP firewall stated that is sourced from the Internet; you add a deny all for ICMP, what common command would you use to test your newly added rule?

Answers:

• Traceroute

• PING

• MTR

• ICMP

17. Which of the following firewalls works at the application level?

Answers:

• circuit firewall

• application-level firewalls

• MAC layer firewalls

• Packet filtering firewal

18. Your client asks you to create a rule for FTP access, what port(s) will you add on the firewall?

Answers:

• 2121

• 8021

• 20

• 20 and 21

19. What port does FTP use for the control port?

Answers:

• 23

• 22

• 21

• 20

20. Which port does secure HTTP use?

Answers:

• 443

• 442

• 441

• 8080

21. Some firewalls deploy a technology that allows monitoring of traffic in and out of a network and alerts network staff when suspicious traffic patterns occur.

Answers:

• IDS

• Switch

• Router

• Hub

22. The Windows based program, ZoneAlarm is an example of a "BLANK" firewall?

Answers:

• IDS

• Corporate

• Business

• Software

23. When referring to firewall concepts, what are application level gateways?

Answers:

• HTTP servers

• Proxy servers

• IP Servers

• HTTP servers

24. Which of the following firewalls keeps track of the connection state?

Answers:

• Router enhanced firewall

• Application layer firewall

• Stateful packet filtering firewall

• Packet filtering firewall

25. Which of the following is not a VALID basic criteria for rule in the firewall policy?

Answers:

• User

• Source

• Service

• Destination

26. Packets contain an 8-bit value that determines the maximum time the packet can remain the CPU, Memory, and Buffer circuits of a firewall before it is dropped or discarded, what is this called?

Answers:

• Checksum

• Time To Live

• Fragment

• Protocol

27. When designing a network that consists of a firewall, the firewall design needs to be "BLANK" so that it can grow with the network it protects.

Answers:

• Robust

• Scalable

• Expensive

• Cost effective

28. What application controls what information is transmitted or received from an external source destined to a server, workstation, or computer that is based on a preset of rules and/or user preferences?

Answers:

• Server

• Firewall

• Router

• Repeater

29. What is a host based firewall?

Answers:

• A proxy server configured to handle http requests

• Software firewall installed on a server/workstation/desktop

• A device that is installed by your Internet Service Provider

• A Firewall connected directly to the Network Interface Card of a Computer

30. When referring to firewalls, what does SPI Stand for?

Answers:

• Source Packet Information

• Stateless Packet Inspection

• Shared Packet Interconnection

• Stateful Packet Inspection

31. What types of firewalls are able to analyze the contents of packets and the IP headers for signs that the traffic is legitimate?

Answers:

• Software

• Stateful

• Stateless

• Boundary

32. Which of the following valid OSI layer are covered by packet filtering firewall operation ?

Answers:

• Both Transport layer and Network layer

• At the Application layer

• Transport layer

• Network layer

33. Which of the following is another term for a packet of digital information?

Answers:

• datagram

• header

• data

• footer

34. When packets are being processed by a hardware firewall, one of the several steps in processing the packets is an error-checking procedure that is performed in the trailer section of an IP Packet, this is called what?

Answers:

• IPC (IP Check)

• IFG

• CRC

• FQDN

35. The practice of designing operational aspects of a system to work with a minimal amount of system privilege is called:

Answers:

• IP forwarding

• access denied

• failover firewall

• least privilege

36. Which type of firewall involves firewall software installation directly on the user's system?

Answers:

• Commercial ???Grade Firewall

• Third Generation

• Residential ???Grade Firewall

• Fourth Generation

37. What main attributes are used at layer 4 of the OSI model to filter traffic on a firewall?

Answers:

• Source and/or destination TCP/UDP ports

• ICMP and IP

• Source and/or destination IP Addresses

• Frames and packets

38. Ports up to which of the following are called well-known ports?

Answers:

• 255

• 1500

• 1025

• 1023

39. Which particular firewall usually consists of two separate firewall devices?

Answers:

• Hybrid Firewall

• MAC layer firewalls

• Dynamic Filtering

• Application ???level firewall

40. Zone Alarm is an example of which type of firewall?

Answers:

• personal

• IDS

• corporate

• proxy

41. When troubleshooting the flow of packets through a firewall, a datagram is called what at the network layer of the OSI model?

Answers:

• Bits

• Frames

• Segments

• Packets

42. Which of the following are the most common restrictions implemented in packet filtering firewalls?

Answers:

• Outbound Direction

• Inbound Direction

• IP source and destination address

• All of the given options are valid

43. What port do most DDOS DNS attacks occur on?

Answers:

• 161

• 80

• 443

• 53

44. What it is called when a packet arrives at a firewall, gets analyzed and determines that no connection exists and the packet is dropped?

Answers:

• Stateful Frame Inspection

• Stateless Packet Inspection

• Stateful Packet Inspection

• Connection Oriented Inspection

45. When configuring a firewall to deny port 3389 to a RDP server that is to receive the SYN packet, what is the address?

Answers:

• Destination

• Flag

• Connected

• Source

46. What happens when a packet arrives on an interface and a route exists in the local routing table and the firewall routes the packet back out the same interface the packet arrived on?

Answers:

• The Packet is dropped

• The Packet is allowed, but marked as low priority

• Poison reverse routing is disabled and the packet is allowed

• Interface will get disabled due to a routing conflict

47. The basic concept of a SYN flooding attack lies in the design of what handshake that begins a TCP connection?

Answers:

• 4-way

• 3-way

• 2-way

• TCP

48. True/False: Application proxy firewalls are faster than Stateful Packet Inspection firewalls.

Answers:

• True

• False

49. Which of the following firewall makes the filtering decision based on the media access control address of the source/destination of a packet ?

Answers:

• MAC layer Firewalls

• Packet Filtering

• Application Gateways

• Circuit Gateways

50. What kind of firewall is the opensource IPtables firewall commonly found on Linux Distros?

Answers:

• Stateful

• Connection oriented firewall

• Zone Based

• Stateless

51. Which particular generation firewall are stateless in nature ?

Answers:

• Third Generation

• Second generation

• Fourth Generation

• First Generation

52. What specific chip design allows firewalls to accelerate packet processing to analyze and filter packets between an untrusted and trusted network?

Answers:

• MIPS

• ASIC

• Intel X86

• RISC

53. Ports up to "BLANK" are considered well known ports.

Answers:

• 65524

• 65536

• 1024

• 1023

54. What technology is used on firewalls that process stateful packet inspections at the hardware level and as close to the line rate as possible?

Answers:

• Intel

• SPI

• ASIC

• ACL

55. What kind of firewall is the integrated Microsoft Windows firewall application?

Answers:

• Connection oriented firewall

• Zone Based

• Stateful

• Stateless

56. What device should be the front line defense in your network?

Answers:

• Packet Filtering Firewalls

• Stateful Packet Inspection firewall

• Network Layer Firewalls

• Application Based Firewalls

57. A Stateful Packet Inspection firewall maintains a "BLANK", which is also just a list of active connections.

Answers:

• Connection Table

• State Table

• NAT Table

• Routing Table

58. True/False: NAT is considered as a firewall technology.

Answers:

• False

• True

59. Which of the following firewall's filtering process can be either Stateful, Stateless or both ?

Answers:

• Packet Filtering

• Circuit Gateways

• MAC layer firewalls

• Application Gateways

60. What do circuit layer Firewalls monitor?

Answers:

• UDP Handshaking

• IP Handshaking

• TCP Handshaking

• Transport Handshaking

61. Network-based firewalls and Host-based firewalls are valid categories of which of the following firewall ?

Answers:

• Hybrids

• MAC layer firewalls

• Circuit Gateways

• Application ???level firewall

62. Which of the following is not a VALID subset of packet filtering firewalls?

Answers:

• Stateless inspection

• Stateful inspection

• Static filtering

• Dynamic Filtering

63. A dynamic or Stateful Packet Inspection firewall maintains active "BLANK" sessions and "BLANK" pseudo sessions.

Answers:

• TCP and UDP

• IP and ICMP

• Stateful and Stateless

• Server and Host

64. A "BLANK" flowing through a firewall is another term for a packet of digital information.

Answers:

• Frame

• Datagram

• Data

• Packet

65. Which of the following is not a VALID processing ???mode category of firewalls?

Answers:

• Proxy firewalls

• Packet filtering Firewalls

• Circuit gateways

• Application gateways

66. In an IP packet header, which of the following describes the length of the header in 32-bit words and is a 4-bit value?

Answers:

• fragment offset

• Internet header length

• header checksum

• total length

67. Which generation firewalls are stateful inspection firewalls?

Answers:

• Second generation

• Fourth Generation

• Third Generation

• First Generation

68. Which of the following servers in the DMZ needs only list a limited number of public IP addresses?

Answers:

• NAT

• DNS

• proxy

• firewall

69. What is a Cisco Access Control List (ACL) considered as?

Answers:

• Controlled

• NAT

• Stateful

• Stateless

70. Which of the following is FALSE about Circuit Gateways?

Answers:

• Firewall operates at the transport layer

• Circuit gateways firewalls DO NOT look at data traffic flowing between one network and another

• Circuit Gateway firewalls provide a common access mechanism which is not dependent on the destination application

• Circuit Gateway firewalls provide a unique access mechanism based on the destination application

71. Which of the following is a mechanism designed into operating system kernel ?

Answers:

• Third Generation

• Second generation

• First Generation

• Fifth Generation

72. What layer(s) does an SPI firewall generally operate at?

Answers:

• Data Link

• Network

• D and F

• Application

73. Which of the following can have different components of the firewall for different systems?

Answers:

• screened subnet firewall

• Screened Host Firewalls

• dual-homed firewalls

• packet filtering routers

74. Which of the following is not a vaild categorization of Firewall based on processing mode?

Answers:

• Circuit gateway

• Packet filtering Firewalls

• Application filtering

• Application gateway

75. Which of the following host is sometimes called a dual-homed gateway or bastion host?

Answers:

• stub

• blocked

• sceened

• proxy

76. What layer of the OSI model do Circuit Layer Firewalls operate at?

Answers:

• Session Layer

• Network Layer

• Application Layer

• Transport Layer

77. Which of the following is not a vaild categorization of Firewall based on structure?

Answers:

• commercial-grade

• hardware-based

• application-based

• residential grade

78. Which level proxy provides protection at the session layer of OSI?

Answers:

• server

• circuit

• proxy

• application

79. Which generation firewalls are either application-level firewalls or proxy servers?

Answers:

• Third Generation

• Second generation

• Fourth Generation

• First Generation

80. Which of the following is an INVALID common architectural implementation of firewall?

Answers:

• screened host firewalls

• packet filtering routers

• dual-homed firewalls

• Dynamic Filtering