1. |
Third generation of firewall offers_ to prevent web fingerprint attacks. |
A. | web application firewall |
B. | packet filter |
C. | stateful filter |
D. | none of them |
Answer» A. web application firewall |
2. |
The identity management system binds logical addresses to for reputed servers. |
A. | mac address |
B. | specific programs |
C. | other computers |
D. | none of them |
Answer» A. mac address |
3. |
IPS in firewall stands for . |
A. | intrusion protection system |
B. | intrusion prevention software |
C. | internet prevention system |
D. | intrusion prevention system |
Answer»
D. intrusion prevention system
view more info and meaning of IPS |
4. |
Third generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» C. application filters |
5. |
Second generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» B. stateful filters |
6. |
First generation firewalls were otherwise called . |
A. | packet filters |
B. | stateful filters |
C. | application filters |
D. | none of them |
Answer» A. packet filters |
7. |
Third general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» D. 7 |
8. |
Second general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» B. 4 |
9. |
First general firewalls operated at layer of the OSI model. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 7 |
Answer» A. 3 |
10. |
Filtering connections and disallowing prohibited connections is carried out using . |
A. | modem |
B. | router |
C. | firewall |
D. | bridge |
Answer» C. firewall |
11. |
Connection to the Internet requires enforcement of security. |
A. | low |
B. | high |
C. | zero |
D. | no |
Answer» B. high |
12. |
The address 2001:db8:a0b:12f0::1 is formatted in . |
A. | ipv0 |
B. | ipv2 |
C. | ipv4 |
D. | ipv6 |
Answer» D. ipv6 |
13. |
Internet is constituted of . |
A. | network of networks |
B. | hard disk |
C. | dvd |
D. | pen drive |
Answer» A. network of networks |
14. |
Computers and devices can be connected using technology to create a network. |
A. | wired |
B. | wireless |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
15. |
Most of the wired network connections use . |
A. | optical fibre cable (ofc) |
B. | usb cable |
C. | pen drive |
D. | hard drive |
Answer» A. optical fibre cable (ofc) |
16. |
The port for connecting broadband cable to a computer is called . |
A. | ethernet port |
B. | registered jack 45 (rj-45) |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
17. |
Wireless network connections use technologies. |
A. | wireless fidelity (wifi) |
B. | bluetooth |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
18. |
are the hardware devices that help the computer to connect to a network. |
A. | routers |
B. | modems |
C. | wireless modems |
D. | all of them |
Answer» D. all of them |
19. |
MODEM stands for . |
A. | modulation democracy |
B. | modulation demodulation |
C. | modern demodulation |
D. | moderate demodulation |
Answer» B. modulation demodulation |
20. |
Routers help in . |
A. | transmission of data between networks |
B. | connecting different devices using appropriate protocol |
C. | both a & b |
D. | neither a nor b |
Answer» C. both a & b |
21. |
IP address helps to a computer connected to a network. |
A. | uniquely identify |
B. | format |
C. | reset |
D. | reject |
Answer» A. uniquely identify |
22. |
Port number on a computer host connected to a network denotes a . |
A. | background server program |
B. | client program |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
23. |
A program which runs in the background and sends results requested by a client is called a . |
A. | server |
B. | client |
C. | port |
D. | ip address |
Answer» A. server |
24. |
Firewall can . |
A. | deny access to specific sites |
B. | allow access to only white listed sites |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
25. |
Firewall can be implemented through . |
A. | hardware |
B. | software |
C. | both a & b |
D. | none of them |
Answer» C. both a & b |
We're developing a website for study materials for students.
We would love to hear your answers to some of the questions.