Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Application layer firewalls are also called ____________(a) first generation firewalls(b) second generation firewalls(c) third generation firewalls(d) fourth generation firewallsThis question was addressed to me during a job interview.I would like to ask this question from Firewalls in division Cyber Security of Cyber Security

Answer»

The correct ANSWER is (c) third generation firewalls

To elaborate: Application LAYER firewalls are also called third generation firewalls. They CAME into the picture in around 1995-1998. Application level gateway firewalls are helped in making the NETWORK PERFORMANCE smooth for logging traffic.

2.

Packet filtering firewalls are also called ____________(a) first generation firewalls(b) second generation firewalls(c) third generation firewalls(d) fourth generation firewallsThis question was posed to me during a job interview.Question is taken from Firewalls in section Cyber Security of Cyber Security

Answer»

The correct answer is (a) first generation firewalls

To EXPLAIN: PACKET FILTERING firewalls are also CALLED the first generation firewalls. It came into the PICTURE around the 1980s. Packet filtering technique cannot support the complex models of rules and is spoofing attack-prone in some cases as well.

3.

Stateful Multilayer firewalls are also called ____________(a) first generation firewalls(b) second generation firewalls(c) third generation firewalls(d) fourth generation firewallsI had been asked this question in examination.Enquiry is from Firewalls topic in chapter Cyber Security of Cyber Security

Answer»

Correct answer is (B) SECOND generation firewalls

Explanation: STATEFUL multilayer firewalls are also called second generation firewalls. They came into the picture in around 1989-1990. Due to multiple CHARACTERISTICS of different firewalls in Multilayer Inspection firewalls, it makes such type of firewalls powerful and more secure.

4.

One advantage of Stateful Multilayer Inspection firewall is __________(a) costlier but easy to understand(b) large to manage(c) complex internal architecture(d) large to manage but efficientThis question was addressed to me during an interview.This interesting question is from Firewalls topic in portion Cyber Security of Cyber Security

Answer»

Right option is (C) complex INTERNAL architecture

The explanation: Stateful Multilayer Inspection firewalls are complex internally due to multiple characteristics of different firewalls incorporated TOGETHER which MAKES it POWERFUL and more secure.

5.

We can also implement ____________ in Stateful Multilayer Inspection firewall.(a) external programs(b) algorithms(c) policies(d) algorithms and external programsI had been asked this question in an interview.This interesting question is from Firewalls in portion Cyber Security of Cyber Security

Answer» CORRECT OPTION is (B) algorithms

To explain: STATEFUL Multilayer Inspection firewall can also allow us to implement algorithms as well as complex security modes making data TRANSFER more secure.
6.

Stateful Multilayer Inspection firewall cannot perform which of the following?(a) Filter network layer packets(b) Check for legitimate session(c) Scans for illicit data packets at the presentation layer(d) Evaluate packets at application lagerI had been asked this question during an online interview.This interesting question is from Firewalls in section Cyber Security of Cyber Security

Answer»

Correct OPTION is (C) SCANS for illicit DATA packets at the presentation layer

Explanation: Stateful MULTILAYER Inspection firewalls are designed to perform filtering packets in the network layer, check for legitimate sessions in the session layer as well as evaluate all packets at the application layer of OSI model. But it cannot scan for illicit data packets at the presentation layer.

7.

Application level gateway firewalls are also used for configuring cache-servers.(a) True(b) FalseI got this question in examination.My question is taken from Firewalls in chapter Cyber Security of Cyber Security

Answer» RIGHT answer is (a) True

Easiest EXPLANATION: As caching servers, the APPLICATION level gateway FIREWALLS are CONFIGURED that helps in increasing the network performance making it smooth for logging traffic.
8.

___________ firewalls are a combination of other three types of firewalls.(a) Packet Filtering(b) Circuit Level Gateway(c) Application-level Gateway(d) Stateful Multilayer InspectionI had been asked this question in an interview for job.Query is from Firewalls topic in chapter Cyber Security of Cyber Security

Answer» RIGHT choice is (d) Stateful Multilayer Inspection

The best I can explain: Stateful Multilayer Inspection firewalls are a combination of other three types of firewalls. These combinations are Packet filtering, CIRCUIT LEVEL and application-level GATEWAY firewalls.
9.

Application level gateway firewalls protect the network for specific _____________(a) application layer protocol(b) session layer protocol(c) botnet attacks(d) network layer protocolI got this question in quiz.The query is from Firewalls topic in division Cyber Security of Cyber Security

Answer»

Correct CHOICE is (a) APPLICATION layer protocol

To EXPLAIN I would say: Some specific application layer protocols need protection from attacks which is done by the application level GATEWAY firewall in the application layer of the OSI model.

10.

Which of the following is a disadvantage of Circuit-level gateway firewalls?(a) They’re expensive(b) They’re complex in architecture(c) They do not filter individual packets(d) They’re complex to setupI had been asked this question in an online quiz.This interesting question is from Firewalls in section Cyber Security of Cyber Security

Answer» RIGHT ANSWER is (c) They do not filter INDIVIDUAL PACKETS

Easiest explanation: Circuit-level gateway firewalls don’t filter packets INDIVIDUALLY which gives the attacker a chance to take access in the network.
11.

_____________ gateway firewalls are deployed in application-layer of OSI model.(a) Packet Filtering Firewalls(b) Circuit Level Gateway Firewalls(c) Application-level Gateway Firewalls(d) Stateful Multilayer Inspection FirewallsThe question was asked by my school teacher while I was bunking the class.My query is from Firewalls topic in division Cyber Security of Cyber Security

Answer»

The correct choice is (c) APPLICATION-level GATEWAY Firewalls

To explain: Application level Gateway Firewalls are deployed in the application-LAYER of OSI MODEL for PROTECTING the network for different protocols of the application layer.

12.

Circuit-level gateway firewalls are installed in _______ layer of OSI model.(a) Application layer(b) Session layer(c) Presentation layer(d) Network layerI got this question during an online exam.This question is from Firewalls topic in portion Cyber Security of Cyber Security

Answer»

The CORRECT option is (b) Session LAYER

To explain I would SAY: In the session layer (which is the fifth layer) of the OSI model, circuit-level GATEWAY firewalls are deployed for monitoring TCP sessions for 3-way handshakes.

13.

Which of these comes under the advantage of Circuit-level gateway firewalls?(a) They maintain anonymity and also inexpensive(b) They are light-weight(c) They’re expensive yet efficient(d) They preserve IP address privacy yet expensiveThis question was posed to me in an interview for job.This question is from Firewalls in section Cyber Security of Cyber Security

Answer»

Right choice is (a) They maintain ANONYMITY and also inexpensive

To explain: For a private NETWORK, or for ORGANIZATIONS, circuit-level gateway firewalls maintain anonymity. They’re also inexpensive as compared to other FIREWALL TYPES.

14.

Packet filtering firewalls are vulnerable to __________(a) hardware vulnerabilities(b) MiTM(c) phishing(d) spoofingThis question was posed to me in exam.My doubt stems from Firewalls in portion Cyber Security of Cyber Security

Answer»

Correct answer is (d) spoofing

For explanation I would say: ONE popular disadvantage of the packet FILTERING technique is that it cannot SUPPORT the complex models of RULES and is spoofing attack-prone in some cases as well.

15.

Packet filtering firewalls work effectively in _________ networks.(a) very simple(b) smaller(c) large(d) very large complexThe question was posed to me in an internship interview.My doubt is from Firewalls topic in chapter Cyber Security of Cyber Security

Answer»

Right answer is (b) smaller

Explanation: PACKET Filtering Firewalls are applied within routers which connect the internal Network SYSTEM with the OUTSIDE network using the internet. It works EFFECTIVELY if the internal network is smaller in SIZE.

16.

Network administrators can create their own ACL rules based on _______________ and _______(a) Address, Protocols and Packet attributes(b) Address, Protocols and security policies(c) Address, policies and Packet attributes(d) Network topology, Protocols and data packetsI had been asked this question in a national level competition.The origin of the question is Firewalls topic in chapter Cyber Security of Cyber Security

Answer»

Correct OPTION is (a) Address, Protocols and PACKET ATTRIBUTES

The explanation: Network administrators can create their own ACL RULES based on Address, Protocols and Packet attributes. This is generally done where the specific customised type of data packets need to PASS through firewall screening.

17.

One advantage of Packet Filtering firewall is __________(a) more efficient(b) less complex(c) less costly(d) very fastI have been asked this question in class test.This question is from Firewalls topic in chapter Cyber Security of Cyber Security

Answer»

The CORRECT option is (c) LESS costly

Best explanation: Packet filtering firewalls are more ADVANTAGEOUS because they are less costly and they use fewer resources and are USED EFFECTIVELY in small networks.

18.

When a packet does not fulfil the ACL criteria, the packet is _________(a) resend(b) dropped(c) destroyed(d) acknowledged as receivedI have been asked this question during an online interview.Query is from Firewalls topic in chapter Cyber Security of Cyber Security

Answer»

Right choice is (b) dropped

Easy explanation: In the PACKET filtering firewall, when the rules defined by the Access Control List is not meet by any DATA packet, the packet is dropped & LOGS are updated in the firewall.

19.

ACL stands for _____________(a) Access Condition List(b) Anti-Control List(c) Access Control Logs(d) Access Control ListI got this question in homework.I'm obligated to ask this question of Firewalls in chapter Cyber Security of Cyber Security

Answer» RIGHT CHOICE is (d) Access CONTROL List

To explain: The Access Control List is a table containing to check all the packets and SCANS them against the defined rule set by Network ADMINISTRATOR in any particular system or firewall.
20.

The __________ defines the packet filtering firewall rules.(a) Access Control List(b) Protocols(c) Policies(d) PortsI have been asked this question during an interview.My query is from Firewalls in chapter Cyber Security of Cyber Security

Answer» CORRECT CHOICE is (a) ACCESS Control List

Best EXPLANATION: The Access Control List is a table containing rules that instruct the firewall system to provide the RIGHT access. It checks all the packets and scans them against the defined rule set by Network administrator in the packet filtering firewall.
21.

In the ______________ layer of OSI model, packet filtering firewalls are implemented.(a) Application layer(b) Session layer(c) Presentation layer(d) Network layerI got this question in homework.Enquiry is from Firewalls topic in portion Cyber Security of Cyber Security

Answer»

Correct answer is (d) NETWORK layer

Explanation: In the network layer, which is the third layer of the OSI (Open SYSTEMS INTERCONNECTION) MODEL, packet filtering firewalls are implemented.

22.

A firewall protects which of the following attacks?(a) Phishing(b) Dumpster diving(c) Denial of Service (DoS)(d) Shoulder surfingThe question was posed to me in quiz.This key question is from Firewalls in division Cyber Security of Cyber Security

Answer»

Correct choice is (C) Denial of Service (DOS)

For EXPLANATION: Firewalls are used to protect the computer network and restricts illicit traffic. Denial of Service (DoS) ATTACK is one such automated attack which a firewall with proper settings and the UPDATED version can resist and stop from getting executed.

23.

Packet filtering firewalls are deployed on ________(a) routers(b) switches(c) hubs(d) repeatersI have been asked this question in unit test.The query is from Firewalls in division Cyber Security of Cyber Security

Answer»

Right option is (a) ROUTERS

The explanation: Packet FILTERING FIREWALLS are deployed on routers that HELP in CONNECTING internal network worldwide via the internet.

24.

There are ______ types of firewall.(a) 5(b) 4(c) 3(d) 2I had been asked this question in a job interview.Query is from Firewalls in section Cyber Security of Cyber Security

Answer»

Right option is (b) 4

Easiest explanation: There are FOUR types of firewall BASED on their working and characteristics. These are Packet FILTERING FIREWALLS, Circuit Level Gateway Firewalls, APPLICATION level Gateway Firewalls, and Stateful Multilayer Inspection Firewalls.

25.

Firewall examines each ____________ that are entering or leaving the internal network.(a) emails users(b) updates(c) connections(d) data packetsThis question was posed to me in homework.My doubt stems from Firewalls topic in chapter Cyber Security of Cyber Security

Answer»

The CORRECT ANSWER is (d) DATA packets

Easy explanation: Firewalls examines each data packets that are entering or leaving the internal network which ultimately prevents unauthorized ACCESS.

26.

_________ is software that is installed using an internet connection or they come by-default with operating systems.(a) Hardware Firewall(b) Software Firewall(c) Stateful Inspection Firewall(d) Microsoft FirewallI had been asked this question by my school principal while I was bunking the class.My query is from Firewalls topic in section Cyber Security of Cyber Security

Answer» CORRECT option is (b) Software Firewall

The explanation: Software firewalls are those kinds of firewalls that are INSTALLED in the system using internet connection as we install NORMAL applications and UPDATE them. Some operating system vendors provide default firewalls with their operating SYSTEMS.
27.

Which of the following is not a software firewall?(a) Windows Firewall(b) Outpost Firewall Pro(c) Endian Firewall(d) Linksys FirewallI had been asked this question in examination.The doubt is from Firewalls topic in section Cyber Security of Cyber Security

Answer»

Correct answer is (d) Linksys FIREWALL

For EXPLANATION: Windows Firewall, Outpost Firewall Pro and ENDIAN Firewall are software firewalls that are installed in the SYSTEM. Linksys firewall is not an EXAMPLE of a software firewall.

28.

Firewalls can be of _______ kinds.(a) 1(b) 2(c) 3(d) 4The question was asked during an interview.I would like to ask this question from Firewalls topic in section Cyber Security of Cyber Security

Answer»

Correct answer is (C) 3

To explain: Firewalls are of three kinds – one is the HARDWARE firewalls, another is SOFTWARE firewalls and the other is a COMBINATION of both hardware and software.

29.

_________________ is the kind of firewall is connected between the device and the network connecting to internet.(a) Hardware Firewall(b) Software Firewall(c) Stateful Inspection Firewall(d) Microsoft FirewallThe question was posed to me in an internship interview.I would like to ask this question from Firewalls in section Cyber Security of Cyber Security

Answer»

Correct choice is (a) Hardware Firewall

For explanation I WOULD say: Hardware firewalls are those firewalls that need to be connected as additional hardware between the DEVICE through which the internet is coming to the system and the network USED for connecting to the internet.