• Tutorials
  • Courses
  • Tracks

Cyber Quiz 16

Last Updated :
Discuss
Comments

Question 1

What does a firewall primarily do?

  • Encrypts and decrypts data during transmission to ensure confidentiality

  • Blocks or allows network traffic based on predefined security rules

  • Monitors network traffic without altering or blocking it

  • Encrypts, monitors, and filters all traffic between networks


Question 2

What is the default policy for a firewall?

  • Allow all traffic unless explicitly denied

  • Reject all traffic unless explicitly allowed

  • Block all traffic unless explicitly denied

  • Drop all traffic unless explicitly allowed

Question 3

Which of the following is NOT a type of firewall based on network placement?

  • Packet Filtering Firewall

  • Application-Level Gateway

  • Circuit-Level Gateway

  • Distributed Firewall

Question 4

What is the function of a Web Application Firewall (WAF)?

  • Filters and monitors HTTP/HTTPS requests to block web-based attacks

  • Inspects and filters all inbound and outbound network packets for malware

  • Enforces access control policies between internal and external networks

  • Detects suspicious activity on a host system and prevents malicious software execution

Question 5

Which type of firewall is known for being the most basic and inspects packet headers to make filtering decisions?

  • Stateless Packet Filtering Firewall

  • Application Proxy Firewall

  • Stateful Packet Filtering Firewall

  • Next-Generation Firewall (NGFW)

Question 6

Which type of proxy server is used to provide anonymity by masking the client's IP address while still allowing the destination server to know the proxy's IP address?

  • Transparent Proxy

  • Anonymous Proxy

  • Reverse Proxy

  • Highly Anonymous Proxy

Question 7

What is the key benefit of using a Reverse Proxy?

  • It hides the identity of users while accessing external servers

  • It hides the identity of the backend server and optimizes content delivery

  • It encrypts communications between internal users and external servers

  • It filters and blocks traffic based on predefined firewall rules

Question 8

Which of the following is a primary use case for a Proxy Server?

  • Encrypting all data transmissions between endpoints to prevent eavesdropping

  • Inspecting and analyzing network traffic to identify suspicious activity

  • Restricting or allowing access to websites based on predefined security rules

  • Acting as an intermediary to secure communication between the client and the server while concealing

Question 9

What is Network Address Translation (NAT) used for?

  • Translating private IP addresses to public IP addresses for internet communication

  • Encrypting data packets to secure communication between devices

  • Mapping MAC addresses to IP addresses for network access

  • Assigning dynamic IP addresses to devices within a private network

Question 10

In which type of NAT does each private IP address map to a unique public IP address?

  • Overloaded NAT – Multiple private IPs share a single public IP with different port numbers.

  • Dynamic NAT – Private IPs mapped to available public IPs from a pool, but not fixed.

  • Static NAT – Permanent one-to-one mapping between private and public IPs.

  • One-to-Many NAT – A single private IP is translated to multiple public IPs for redundancy.

There are 10 questions to complete.

Take a part in the ongoing discussion