1. What is the primary function of a firewall?
A) Blocking all network traffic
B) Controlling incoming and outgoing network traffic
C) Increasing internet speed
D) Encrypting data
Answer: B) Controlling incoming and outgoing network traffic
2. Which deployment method is NOT supported by Sophos XG Firewall?
A) Hardware appliance
B) Virtual appliance
C) Cloud-based deployment
D) Standalone desktop software
Answer: D) Standalone desktop software
3. Which type of image is required to install Sophos XG Firewall on a virtual
machine?
A) ZIP
B) EXE
C) ISO
D) TAR
Answer: C) ISO
4. Which initial setup wizard helps in configuring the basic settings of the
firewall?
A) Firewall Assistant
B) Security Setup Guide
C) Initial Setup Wizard
D) WebAdmin Console
Answer: C) Initial Setup Wizard
5. What are the essential components of a firewall rule in Sophos XG?
A) Source, Destination, Service, Action
B) Username, Password, Encryption
C) Protocol, Time, Frequency
D) Logging, Archiving, Storage
Answer: A) Source, Destination, Service, Action
6. What is the default action for an unconfigured firewall rule?
A) Allow all traffic
B) Block all traffic
C) Redirect traffic to another firewall
D) None of the above
Answer: B) Block all traffic
7. Which feature is used to restrict access to specific websites?
A) Web Filtering Policy
B) Application Filter Policy
C) VPN Policy
D) IPS Policy
Answer: A) Web Filtering Policy
8. What can be controlled using the Application Filter Policy?
A) Block or allow specific applications
B) Encrypt web traffic
C) Detect intrusions
D) Enable NAT rules
Answer: A) Block or allow specific applications
9. What is the purpose of IPS in a firewall?
A) Prevent unauthorized access
B) Monitor network traffic for suspicious activity
C) Scan incoming files for malware
D) Block internet access
Answer: B) Monitor network traffic for suspicious activity
10. Which IPS setting allows administrators to create exceptions for specific
traffic?
A) IPS Whitelist
B) IPS Rules
C) IPS Signatures
D) IPS Tunneling
Answer: A) IPS Whitelist
11. What does Advanced Threat Protection (ATP) primarily detect?
A) Phishing emails
B) Malware-infected files
C) Command & Control (C&C) traffic
D) Unauthorized USB devices
Answer: C) Command & Control (C&C) traffic
12. Which action can ATP take against a detected threat?
A) Allow the traffic
B) Drop the connection
C) Encrypt the traffic
D) Backup the logs
Answer: B) Drop the connection
13. Which service assigns IP addresses dynamically to network devices?
A) DNS
B) DHCP
C) VPN
D) NAT
Answer: B) DHCP
14. What is the purpose of a static route?
A) Automatically resolve IP addresses
B) Define a fixed path for network traffic
C) Monitor internet speeds
D) Encrypt DNS queries
Answer: B) Define a fixed path for network traffic
15. What is the main benefit of integrating Sophos XG Firewall with Active
Directory?
A) Simplifies user authentication
B) Increases firewall speed
C) Disables unnecessary services
D) Blocks all network traffic
Answer: A) Simplifies user authentication
16. Which protocol does Active Directory authentication typically use?
A) HTTP
B) LDAP
C) FTP
D) SMTP
Answer: B) LDAP
17. Which type of VPN does Sophos XG Firewall support?
A) SSL VPN
B) IPsec VPN
C) L2TP VPN
D) All of the above
Answer: D) All of the above
18. What is the main purpose of SSL VPN?
A) Encrypting web traffic
B) Secure remote access
C) Blocking malware
D) Enhancing browsing speed
Answer: B) Secure remote access
19. What is Port Forwarding used for?
A) Securing outbound traffic
B) Exposing internal services to external users
C) Encrypting data transmissions
D) Blocking unauthorized users
Answer: B) Exposing internal services to external users
20. Which network zone is typically used for hosting public-facing web servers?
A) LAN
B) WAN
C) DMZ
D) VPN
Answer: C) DMZ
21. What is the purpose of VLANs?
A) Separate network traffic logically
B) Increase network bandwidth
C) Encrypt data
D) Prevent network attacks
Answer: A) Separate network traffic logically
22. Which protocol is commonly used for VLAN tagging?
A) 802.1X
B) 802.1Q
C) 802.11ac
D) 802.3
Answer: B) 802.1Q
23. What is the recommended method to back up Sophos XG Firewall settings?
A) Cloud backup
B) Manual text file backup
C) Database snapshot
D) None of the above
Answer: A) Cloud backup
24. Which feature allows administrators to restore previous configurations?
A) System Restore
B) Firmware Downgrade
C) Configuration Import
D) Backup & Restore
Answer: D) Backup & Restore
25. What is the main purpose of logging in Sophos XG Firewall?
A) To speed up network performance
B) To track and analyze network activity
C) To block malware
D) To restrict access to websites
Answer: B) To track and analyze network activity
26. Which section in Sophos XG Firewall provides an overview of network traffic
statistics?
A) Reports Dashboard
B) Network Protection
C) VPN Settings
D) System Updates
Answer: A) Reports Dashboard
27. What type of events are logged by the Intrusion Prevention System (IPS)?
A) Network attacks and exploits
B) Website visits
C) File downloads
D) USB device usage
Answer: A) Network attacks and exploits
28. Which authentication method is NOT supported by Sophos XG Firewall?
A) Local authentication
B) Active Directory authentication
C) Fingerprint authentication
D) RADIUS authentication
Answer: C) Fingerprint authentication
29. Which feature allows users to authenticate through a browser-based login
page?
A) Captive Portal
B) SSL VPN
C) IPSec Tunnel
D) MAC Filtering
Answer: A) Captive Portal
30. Which authentication protocol is commonly used for integrating third-party
authentication servers?
A) LDAP
B) FTP
C) SNMP
D) HTTP
Answer: A) LDAP
31. What is the primary purpose of NAT in a firewall?
A) Encrypt network traffic
B) Block malware
C) Translate private IPs to public IPs
D) Increase internet speed
Answer: C) Translate private IPs to public IPs
32. Which type of NAT allows multiple internal devices to share a single public
IP address?
A) Static NAT
B) Destination NAT
C) Source NAT (SNAT)
D) Loopback NAT
Answer: C) Source NAT (SNAT)
33. Which type of NAT is commonly used for publishing internal servers to the
internet?
A) Source NAT
B) Destination NAT
C) VPN NAT
D) MAC NAT
Answer: B) Destination NAT
34. What is the main purpose of High Availability (HA) in Sophos XG Firewall?
A) To enhance logging capabilities
B) To increase security alerts
C) To provide redundancy and failover
D) To improve internet speed
Answer: C) To provide redundancy and failover
35. Which HA mode allows automatic failover between two firewalls?
A) Active-Standby
B) Active-Active
C) Passive-Only
D) Backup-Only
Answer: A) Active-Standby
36. Which network connection is required between two firewalls in an HA setup?
A) VPN Tunnel
B) Heartbeat Link
C) FTP Connection
D) Wi-Fi Bridge
Answer: B) Heartbeat Link
37. What is the main purpose of Sandstorm Protection in Sophos XG Firewall?
A) To detect and block malware in real-time
B) To create secure VPN tunnels
C) To improve firewall rule management
D) To log all network activity
Answer: A) To detect and block malware in real-time
38. Which type of threats can Sandstorm Protection help detect?
A) Ransomware
B) Phishing emails
C) Keyloggers
D) All of the above
Answer: D) All of the above
39. How does Sandstorm Protection analyze suspicious files?
A) By scanning email headers
B) By sending files to a cloud sandbox for execution
C) By using firewall rules
D) By applying web filters
Answer: B) By sending files to a cloud sandbox for execution
40. What is the main function of Email Protection in Sophos XG Firewall?
A) To speed up email delivery
B) To encrypt all emails
C) To filter out spam and malicious emails
D) To store emails in the firewall
Answer: C) To filter out spam and malicious emails
41. Which protocol is commonly used for filtering incoming emails?
A) HTTP
B) SMTP
C) FTP
D) SNMP
Answer: B) SMTP
42. Which of the following email filtering techniques is used to verify email
sender authenticity?
A) SPF
B) DHCP
C) VLAN
D) NAT
Answer: A) SPF
43. What is the purpose of the Web Proxy feature in Sophos XG Firewall?
A) To encrypt web traffic
B) To cache and filter web content
C) To speed up internet access
D) To create VPN tunnels
Answer: B) To cache and filter web content
44. Which security technique is used to prevent users from accessing malicious
websites?
A) Web Categorization
B) VLAN Routing
C) SNMP Filtering
D) DHCP Forwarding
Answer: A) Web Categorization
45. Which filtering category would block access to gambling and adult content
websites?
A) Entertainment
B) High Risk
C) Business
D) Secure Browsing
Answer: B) High Risk
46. What is the recommended method for updating Sophos XG Firewall
firmware?
A) Manually downloading and installing updates
B) Automatically downloading updates from Sophos servers
C) Using third-party update tools
D) Resetting the firewall to factory defaults
Answer: B) Automatically downloading updates from Sophos servers
47. What happens when a firmware update fails?
A) The firewall automatically rolls back to the previous version
B) The firewall becomes unusable
C) All firewall rules are deleted
D) Internet access is blocked
Answer: A) The firewall automatically rolls back to the previous version
48. Where can an administrator check for available firmware updates?
A) WebAdmin Console > Administration > Firmware
B) Firewall Rules > Update Settings
C) DHCP Server > Update Manager
D) VPN Settings > Firmware Status
Answer: A) WebAdmin Console > Administration > Firmware
49. Which tool in Sophos XG Firewall helps diagnose network connectivity
issues?
A) Ping and Traceroute
B) Email Filtering
C) Active Directory Integration
D) Web Proxy
Answer: A) Ping and Traceroute
50. Which log file should be checked for failed authentication attempts?
A) Authentication Logs
B) NAT Logs
C) Web Proxy Logs
D) Firmware Update Logs
Answer: A) Authentication Logs