You are on page 1of 2

22/4/2020 Firewall Quiz

 The Evolution of Cybersecurity

Started on Thursday, April 23, 2020, 2:44 AM


State Finished
Completed on Thursday, April 23, 2020, 3:01 AM
Time taken 16 mins 32 secs
Points 4/5
Grade 80 out of 100
Feedback Congratulations, you passed!

Question 1 What three key, additional security features do next-generation firewalls provide, that legacy firewalls do not? (Choose three.)
Incorrect

0 points out of 1 Select one or more:


Application visibility and control 

Intrusion prevention system (IPS) 

Web application firewall

Packet-filtering based on IP address 

Question 2 In network security, what is the purpose of a firewall? 


Correct

1 points out of 1 Select one:


To prevent authorized users from accessing corporate servers

To limit the number of users on the network

To control the flow of network traffic 

To prevent unauthorized USB devices from being plugged in to a user’s endpoint

Question 3 With the explosion of the World Wide Web, the composition of network protocols skewed heavily towards HTTP. What challenge did
Correct this shift pose to legacy firewalls?
1 points out of 1
Select one:
Firewalls did not have visibility into HTTP ports.

HTTP request methods were too complex and diverse.

Different web applications used the same HTTP port number, making it difficult for firewalls to distinguish between
applications. 

HTTP was an application layer protocol that relied heavily on TCP.

Question 4 What works closely with FortiGate next-generation firewall products to provide the highest level of network security?
Correct

1 points out of 1 Select one:


RFCs

FortiGuard Labs 

NSS Labs

Gartner

https://training.fortinet.com/mod/quiz/review.php?attempt=3144330&cmid=50613 1/2
22/4/2020 Firewall Quiz

Question 5 What additional functionality did second generation firewalls provide that early packet filter firewalls did not?
Correct

1 points out of 1 Select one:


They observed network connections over time and continuously examined conversations between endpoints. 

They were stateless firewalls that allowed rogue packets that did not belong to an existing connection to pass through the
firewall.

They examined packet headers to detect if the packet contained viruses.

They looked up the IP address of the sender to determine if the source was on a suspect network.

https://training.fortinet.com/mod/quiz/review.php?attempt=3144330&cmid=50613 2/2

You might also like