 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | IN_THE________________LAYER_OF_OSI_MODEL,_PACKET_FILTERING_FIREWALLS_ARE_IMPLEMENTED.?$ | 
| A. | Application layer | 
| B. | Session layer | 
| C. | Presentation layer | 
| D. | Network layer | 
| Answer» E. | |
| 2. | ACL stands for _____________$ | 
| A. | Access Condition List | 
| B. | Anti-Control List | 
| C. | Access Control Logs | 
| D. | Access Control List | 
| Answer» E. | |
| 3. | The____________defines_the_packet_filtering_firewall_rules.$ | 
| A. | Access Control List | 
| B. | Protocols | 
| C. | Policies | 
| D. | Ports | 
| Answer» B. Protocols | |
| 4. | Packet filtering firewalls work effectively in _________ networks. | 
| A. | very simple | 
| B. | smaller | 
| C. | large | 
| D. | very large complex | 
| Answer» C. large | |
| 5. | One advantage of Packet Filtering firewall is __________ | 
| A. | more efficient | 
| B. | less complex | 
| C. | less costly | 
| D. | very fast | 
| Answer» D. very fast | |
| 6. | Network administrators can create their own ACL rules based on _______ ________ and _______ | 
| A. | Address, Protocols and Packet attributes | 
| B. | Address, Protocols and security policies | 
| C. | Address, policies and Packet attributes | 
| D. | Network topology, Protocols and data packets | 
| Answer» B. Address, Protocols and security policies | |
| 7. | When_a_packet_does_not_fulfil_the_ACL_criteria,_the_packet_is__________ | 
| A. | resend | 
| B. | dropped | 
| C. | destroyed | 
| D. | acknowledged as received | 
| Answer» C. destroyed | |
| 8. | Packet filtering firewalls are deployed on _______? | 
| A. | routers | 
| B. | switches | 
| C. | hubs | 
| D. | repeaters | 
| Answer» B. switches | |
| 9. | There are ______ types of firewall. | 
| A. | 5 | 
| B. | 4 | 
| C. | 3 | 
| D. | 2 | 
| Answer» C. 3 | |
| 10. | A firewall protects which of the following attacks? | 
| A. | Phishing | 
| B. | Dumpster diving | 
| C. | Denial of Service (DoS) | 
| D. | Shoulder surfing | 
| Answer» D. Shoulder surfing | |
| 11. | Firewall examines each ____________ that are entering or leaving the internal network. | 
| A. | emails users | 
| B. | updates | 
| C. | connections | 
| D. | data packets | 
| Answer» E. | |
| 12. | Which of the following is not a software firewall? | 
| A. | Windows Firewall | 
| B. | Outpost Firewall Pro | 
| C. | Endian Firewall | 
| D. | Linksys Firewall | 
| Answer» E. | |
| 13. | _________ is software that is installed using internet connection or they come by-default with operating systems. | 
| A. | Hardware Firewall | 
| B. | Software Firewall | 
| C. | Stateful Inspection Firewall | 
| D. | Microsoft Firewall | 
| Answer» C. Stateful Inspection Firewall | |
| 14. | _________________ is the kind of firewall is connected between the device and the network connecting to internet. | 
| A. | Hardware Firewall | 
| B. | Software Firewall | 
| C. | Stateful Inspection Firewall | 
| D. | Microsoft Firewall | 
| Answer» B. Software Firewall | |
| 15. | Firewalls can be of _______ kinds. | 
| A. | 1 | 
| B. | 2 | 
| C. | 3 | 
| D. | 4 | 
| Answer» D. 4 | |