InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Application layer firewalls are also called ____________(a) first generation firewalls(b) second generation firewalls(c) third generation firewalls(d) fourth generation firewallsThis question was addressed to me during a job interview.I would like to ask this question from Firewalls in division Cyber Security of Cyber Security |
|
Answer» The correct ANSWER is (c) third generation firewalls |
|
| 2. |
Packet filtering firewalls are also called ____________(a) first generation firewalls(b) second generation firewalls(c) third generation firewalls(d) fourth generation firewallsThis question was posed to me during a job interview.Question is taken from Firewalls in section Cyber Security of Cyber Security |
|
Answer» The correct answer is (a) first generation firewalls |
|
| 3. |
Stateful Multilayer firewalls are also called ____________(a) first generation firewalls(b) second generation firewalls(c) third generation firewalls(d) fourth generation firewallsI had been asked this question in examination.Enquiry is from Firewalls topic in chapter Cyber Security of Cyber Security |
|
Answer» Correct answer is (B) SECOND generation firewalls |
|
| 4. |
One advantage of Stateful Multilayer Inspection firewall is __________(a) costlier but easy to understand(b) large to manage(c) complex internal architecture(d) large to manage but efficientThis question was addressed to me during an interview.This interesting question is from Firewalls topic in portion Cyber Security of Cyber Security |
|
Answer» Right option is (C) complex INTERNAL architecture |
|
| 5. |
We can also implement ____________ in Stateful Multilayer Inspection firewall.(a) external programs(b) algorithms(c) policies(d) algorithms and external programsI had been asked this question in an interview.This interesting question is from Firewalls in portion Cyber Security of Cyber Security |
|
Answer» CORRECT OPTION is (B) algorithms To explain: STATEFUL Multilayer Inspection firewall can also allow us to implement algorithms as well as complex security modes making data TRANSFER more secure. |
|
| 6. |
Stateful Multilayer Inspection firewall cannot perform which of the following?(a) Filter network layer packets(b) Check for legitimate session(c) Scans for illicit data packets at the presentation layer(d) Evaluate packets at application lagerI had been asked this question during an online interview.This interesting question is from Firewalls in section Cyber Security of Cyber Security |
|
Answer» Correct OPTION is (C) SCANS for illicit DATA packets at the presentation layer |
|
| 7. |
Application level gateway firewalls are also used for configuring cache-servers.(a) True(b) FalseI got this question in examination.My question is taken from Firewalls in chapter Cyber Security of Cyber Security |
|
Answer» RIGHT answer is (a) True Easiest EXPLANATION: As caching servers, the APPLICATION level gateway FIREWALLS are CONFIGURED that helps in increasing the network performance making it smooth for logging traffic. |
|
| 8. |
___________ firewalls are a combination of other three types of firewalls.(a) Packet Filtering(b) Circuit Level Gateway(c) Application-level Gateway(d) Stateful Multilayer InspectionI had been asked this question in an interview for job.Query is from Firewalls topic in chapter Cyber Security of Cyber Security |
|
Answer» RIGHT choice is (d) Stateful Multilayer Inspection The best I can explain: Stateful Multilayer Inspection firewalls are a combination of other three types of firewalls. These combinations are Packet filtering, CIRCUIT LEVEL and application-level GATEWAY firewalls. |
|
| 9. |
Application level gateway firewalls protect the network for specific _____________(a) application layer protocol(b) session layer protocol(c) botnet attacks(d) network layer protocolI got this question in quiz.The query is from Firewalls topic in division Cyber Security of Cyber Security |
|
Answer» Correct CHOICE is (a) APPLICATION layer protocol |
|
| 10. |
Which of the following is a disadvantage of Circuit-level gateway firewalls?(a) They’re expensive(b) They’re complex in architecture(c) They do not filter individual packets(d) They’re complex to setupI had been asked this question in an online quiz.This interesting question is from Firewalls in section Cyber Security of Cyber Security |
|
Answer» RIGHT ANSWER is (c) They do not filter INDIVIDUAL PACKETS Easiest explanation: Circuit-level gateway firewalls don’t filter packets INDIVIDUALLY which gives the attacker a chance to take access in the network. |
|
| 11. |
_____________ gateway firewalls are deployed in application-layer of OSI model.(a) Packet Filtering Firewalls(b) Circuit Level Gateway Firewalls(c) Application-level Gateway Firewalls(d) Stateful Multilayer Inspection FirewallsThe question was asked by my school teacher while I was bunking the class.My query is from Firewalls topic in division Cyber Security of Cyber Security |
|
Answer» The correct choice is (c) APPLICATION-level GATEWAY Firewalls |
|
| 12. |
Circuit-level gateway firewalls are installed in _______ layer of OSI model.(a) Application layer(b) Session layer(c) Presentation layer(d) Network layerI got this question during an online exam.This question is from Firewalls topic in portion Cyber Security of Cyber Security |
|
Answer» The CORRECT option is (b) Session LAYER |
|
| 13. |
Which of these comes under the advantage of Circuit-level gateway firewalls?(a) They maintain anonymity and also inexpensive(b) They are light-weight(c) They’re expensive yet efficient(d) They preserve IP address privacy yet expensiveThis question was posed to me in an interview for job.This question is from Firewalls in section Cyber Security of Cyber Security |
|
Answer» Right choice is (a) They maintain ANONYMITY and also inexpensive |
|
| 14. |
Packet filtering firewalls are vulnerable to __________(a) hardware vulnerabilities(b) MiTM(c) phishing(d) spoofingThis question was posed to me in exam.My doubt stems from Firewalls in portion Cyber Security of Cyber Security |
|
Answer» Correct answer is (d) spoofing |
|
| 15. |
Packet filtering firewalls work effectively in _________ networks.(a) very simple(b) smaller(c) large(d) very large complexThe question was posed to me in an internship interview.My doubt is from Firewalls topic in chapter Cyber Security of Cyber Security |
|
Answer» Right answer is (b) smaller |
|
| 16. |
Network administrators can create their own ACL rules based on _______________ and _______(a) Address, Protocols and Packet attributes(b) Address, Protocols and security policies(c) Address, policies and Packet attributes(d) Network topology, Protocols and data packetsI had been asked this question in a national level competition.The origin of the question is Firewalls topic in chapter Cyber Security of Cyber Security |
|
Answer» Correct OPTION is (a) Address, Protocols and PACKET ATTRIBUTES |
|
| 17. |
One advantage of Packet Filtering firewall is __________(a) more efficient(b) less complex(c) less costly(d) very fastI have been asked this question in class test.This question is from Firewalls topic in chapter Cyber Security of Cyber Security |
|
Answer» The CORRECT option is (c) LESS costly |
|
| 18. |
When a packet does not fulfil the ACL criteria, the packet is _________(a) resend(b) dropped(c) destroyed(d) acknowledged as receivedI have been asked this question during an online interview.Query is from Firewalls topic in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (b) dropped |
|
| 19. |
ACL stands for _____________(a) Access Condition List(b) Anti-Control List(c) Access Control Logs(d) Access Control ListI got this question in homework.I'm obligated to ask this question of Firewalls in chapter Cyber Security of Cyber Security |
|
Answer» RIGHT CHOICE is (d) Access CONTROL List To explain: The Access Control List is a table containing to check all the packets and SCANS them against the defined rule set by Network ADMINISTRATOR in any particular system or firewall. |
|
| 20. |
The __________ defines the packet filtering firewall rules.(a) Access Control List(b) Protocols(c) Policies(d) PortsI have been asked this question during an interview.My query is from Firewalls in chapter Cyber Security of Cyber Security |
|
Answer» CORRECT CHOICE is (a) ACCESS Control List Best EXPLANATION: The Access Control List is a table containing rules that instruct the firewall system to provide the RIGHT access. It checks all the packets and scans them against the defined rule set by Network administrator in the packet filtering firewall. |
|
| 21. |
In the ______________ layer of OSI model, packet filtering firewalls are implemented.(a) Application layer(b) Session layer(c) Presentation layer(d) Network layerI got this question in homework.Enquiry is from Firewalls topic in portion Cyber Security of Cyber Security |
|
Answer» Correct answer is (d) NETWORK layer |
|
| 22. |
A firewall protects which of the following attacks?(a) Phishing(b) Dumpster diving(c) Denial of Service (DoS)(d) Shoulder surfingThe question was posed to me in quiz.This key question is from Firewalls in division Cyber Security of Cyber Security |
|
Answer» Correct choice is (C) Denial of Service (DOS) |
|
| 23. |
Packet filtering firewalls are deployed on ________(a) routers(b) switches(c) hubs(d) repeatersI have been asked this question in unit test.The query is from Firewalls in division Cyber Security of Cyber Security |
|
Answer» Right option is (a) ROUTERS |
|
| 24. |
There are ______ types of firewall.(a) 5(b) 4(c) 3(d) 2I had been asked this question in a job interview.Query is from Firewalls in section Cyber Security of Cyber Security |
|
Answer» Right option is (b) 4 |
|
| 25. |
Firewall examines each ____________ that are entering or leaving the internal network.(a) emails users(b) updates(c) connections(d) data packetsThis question was posed to me in homework.My doubt stems from Firewalls topic in chapter Cyber Security of Cyber Security |
|
Answer» The CORRECT ANSWER is (d) DATA packets |
|
| 26. |
_________ is software that is installed using an internet connection or they come by-default with operating systems.(a) Hardware Firewall(b) Software Firewall(c) Stateful Inspection Firewall(d) Microsoft FirewallI had been asked this question by my school principal while I was bunking the class.My query is from Firewalls topic in section Cyber Security of Cyber Security |
|
Answer» CORRECT option is (b) Software Firewall The explanation: Software firewalls are those kinds of firewalls that are INSTALLED in the system using internet connection as we install NORMAL applications and UPDATE them. Some operating system vendors provide default firewalls with their operating SYSTEMS. |
|
| 27. |
Which of the following is not a software firewall?(a) Windows Firewall(b) Outpost Firewall Pro(c) Endian Firewall(d) Linksys FirewallI had been asked this question in examination.The doubt is from Firewalls topic in section Cyber Security of Cyber Security |
|
Answer» Correct answer is (d) Linksys FIREWALL |
|
| 28. |
Firewalls can be of _______ kinds.(a) 1(b) 2(c) 3(d) 4The question was asked during an interview.I would like to ask this question from Firewalls topic in section Cyber Security of Cyber Security |
|
Answer» Correct answer is (C) 3 |
|
| 29. |
_________________ is the kind of firewall is connected between the device and the network connecting to internet.(a) Hardware Firewall(b) Software Firewall(c) Stateful Inspection Firewall(d) Microsoft FirewallThe question was posed to me in an internship interview.I would like to ask this question from Firewalls in section Cyber Security of Cyber Security |
|
Answer» Correct choice is (a) Hardware Firewall |
|