Question 1
What does a firewall primarily do?
Encrypts and decrypts data during transmission to ensure confidentiality
Blocks or allows network traffic based on predefined security rules
Monitors network traffic without altering or blocking it
Encrypts, monitors, and filters all traffic between networks
Question 2
What is the default policy for a firewall?
Allow all traffic unless explicitly denied
Reject all traffic unless explicitly allowed
Block all traffic unless explicitly denied
Drop all traffic unless explicitly allowed
Question 3
Which of the following is NOT a type of firewall based on network placement?
Packet Filtering Firewall
Application-Level Gateway
Circuit-Level Gateway
Distributed Firewall
Question 4
What is the function of a Web Application Firewall (WAF)?
Filters and monitors HTTP/HTTPS requests to block web-based attacks
Inspects and filters all inbound and outbound network packets for malware
Enforces access control policies between internal and external networks
Detects suspicious activity on a host system and prevents malicious software execution
Question 5
Which type of firewall is known for being the most basic and inspects packet headers to make filtering decisions?
Stateless Packet Filtering Firewall
Application Proxy Firewall
Stateful Packet Filtering Firewall
Next-Generation Firewall (NGFW)
Question 6
Which type of proxy server is used to provide anonymity by masking the client's IP address while still allowing the destination server to know the proxy's IP address?
Transparent Proxy
Anonymous Proxy
Reverse Proxy
Highly Anonymous Proxy
Question 7
What is the key benefit of using a Reverse Proxy?
It hides the identity of users while accessing external servers
It hides the identity of the backend server and optimizes content delivery
It encrypts communications between internal users and external servers
It filters and blocks traffic based on predefined firewall rules
Question 8
Which of the following is a primary use case for a Proxy Server?
Encrypting all data transmissions between endpoints to prevent eavesdropping
Inspecting and analyzing network traffic to identify suspicious activity
Restricting or allowing access to websites based on predefined security rules
Acting as an intermediary to secure communication between the client and the server while concealing
Question 9
What is Network Address Translation (NAT) used for?
Translating private IP addresses to public IP addresses for internet communication
Encrypting data packets to secure communication between devices
Mapping MAC addresses to IP addresses for network access
Assigning dynamic IP addresses to devices within a private network
Question 10
In which type of NAT does each private IP address map to a unique public IP address?
Overloaded NAT – Multiple private IPs share a single public IP with different port numbers.
Dynamic NAT – Private IPs mapped to available public IPs from a pool, but not fixed.
Static NAT – Permanent one-to-one mapping between private and public IPs.
One-to-Many NAT – A single private IP is translated to multiple public IPs for redundancy.
There are 10 questions to complete.