Professional Documents
Culture Documents
a. pump
b. dhcpcd
c. dhcpd
d. dhclient
7. _________________ is the kind of firewall is connected between the device and the
network connecting to internet.
a) You can control where goes in three networks
b) you can do load balancing
c) improve network performance
d) you can do state full packet filtering
8. _________________ is the kind of firewall is connected between the device and the
network connecting to internet.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall
Answer: a
Explanation: Hardware firewalls are those firewalls that need to be connected as
additional hardware between the device through which the internet is coming to the
system and the network used for connecting to the internet.
9. _________ is software that is installed using an internet connection or they come by-
default with operating systems.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall
Answer: b
Explanation: Software firewalls are those kinds of firewalls that are installed in the
system using internet connection as we install normal applications and update them.
Some operating system vendors provide default firewalls with their operating systems.
Answer: d
Explanation: Windows Firewall, Outpost Firewall Pro and Endian Firewall are software
firewalls that are installed in the system. Linksys firewall is not an example of a
software firewall.
11 Firewall examines each ____________ that are entering or leaving the internal
network.
a) emails users
b) updates
c) connections
d) data packets
Answer: d
Explanation: Firewalls examines each data packets that are entering or leaving the
internal network which ultimately prevents unauthorized access.
15: In the ______________ layer of OSI model, packet filtering firewalls are implemented.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer
Answer: d
Explanation: In the network layer, which is the third layer of the OSI (Open Systems
Interconnection) model, packet filtering firewalls are implemented.
18. When a packet does not fulfil the ACL criteria, the packet is _________
a) resend
b) dropped
c) destroyed
d) acknowledged as received
Answer: b
Explanation: In the packet filtering firewall, when the rules defined by the Access
Control List is not meet by any data packet, the packet is dropped & logs are updated in
the firewall.
19 Network administrators can create their own ACL rules based on _______ ________
and _______
a) Address, Protocols and Packet attributes
b) Address, Protocols and security policies
c) Address, policies and Packet attributes
d) Network topology, Protocols and data packets
Answer: a
Explanation: Network administrators can create their own ACL rules based on Address,
Protocols and Packet attributes. This is generally done where the specific customised
type of data packets need to pass through firewall screening.
29) What is the effect of the overload keyword in a static NAT translation
configuration?
A. It enables port address translation.*
B. It enables the use of a secondary pool of IP addresses when the first pool is
depleted.
C. It enables the inside interface to receive traffic.
D. It enables the outside interface to forward traffic.
30) Which type of address is the public IP address of a NAT device?
A. outside global
B. outside local
C. inside global*
D. inside local
E. outside public
F. inside public
31) Which NAT function can map multiple inside addresses to a single
outside address?
A. PAT*
B. SFTP
C. RARP
D. ARP
E. TFTP
32) What is the first step in the NAT configuration process?
A. NAT protects network security because private networks are not advertised.*
B. NAT accelerates the routing process because no modifications are made on
the packets.
C. Dynamic NAT facilitates connections from the outside of the network.
D. NAT facilitates end-to-end communication when IPsec is enable.
E. NAT eliminates the need to re-address all host that require external access.*
F. NAT conserves addresses through host MAC-level multiplexing.
1. 35 Which configuration can be used with PAT to allow multiple inside address to
be translated to a single outside address?
A. Dynamic Routing
B. DNS
C. Preempt
D. Overload*
36 What Are Tables Used In Iptables ?(not mcq)
Answer :
o Nat Table
o Mangle Table
o Filter Table
37) What Is Iptables ?
Answer :
iptables is a user space application program that allows a system administrator to
configure the tables provided by the Linux kernel firewall (implemented as different
Netfilter modules) and the chains and rules it stores. Different kernel modules and
programs are currently used for different protocols; iptables applies to IPv4, ip6tables to
IPv6, arptables to ARP, and ebtables to Ethernet frames.
38) What Is The Configuration File Of Iptables In Linux ?
Answer :
/etc/sysconfig/iptables
39. How To Enable Iptables ?
Answer :
o # /etc/init.d/iptables start
o # chkconfig iptables on
o # iptables-save > /root/working.fw
40 How To Disable Iptables ?
Answer :
# Service iptables save
# Service iptables stop
# chkconfig iptables off
41 Which of the following are valid iptable chains?
a) Forward , input , output
b) none
c) accept , drop , reject
d) in , out , through
B. 3 only
C. 1, 3 and 5