You are on page 1of 11

SNA bullet 10 MCQS-50

1. Which types of network hardware does Linux support ?


a) Token Ring
b) Ethernet
c) DHCP
d) Fiber Channel

2. You want to set up a computer on a local network via a static TCP/IP


configuration, but you lack a gateway address. Which of the following is
true?
a. Because the gateway address is necessary, no TCP/IP networking functions will work.
b. TCP/IP networking will function, but you’ll be unable to convert hostname to IP
addresses or vice versa.
c. You’ll be able to communicate with machines on your local network segment but not with
other systems.
d. The computer won’t be able to tell which other computers are local and w hich are remote.

3. Which of the following is not a Linux DHCP clien t ?

a. pump
b. dhcpcd
c. dhcpd
d. dhclient

4-Which of the following program can be used to perform a DNS lookup?


a. host
b. dnslookup
c. pump
d. ifconfig
5. Which of the following commands should you use to add to host
192.168.0.10 a default gateway to 192.168.0.1?
a. route add default gw 192.168.0.10 192.168.0.1
b. route add default gw 192.168.0.1
c. route add 192.168.0.10 default 192.168.0.1
d. route 192.168.0.10 gw 192.168.0.1
6. Firewalls can be of _______ kinds.
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: Firewalls are of three kinds – one is the hardware firewalls, another is
software firewalls and the other is a combination of both hardware and software.

7. _________________ is the kind of firewall is connected between the device and the
network connecting to internet.
a) You can control where goes in three networks
b) you can do load balancing
c) improve network performance
d) you can do state full packet filtering
8. _________________ is the kind of firewall is connected between the device and the
network connecting to internet.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall
Answer: a
Explanation: Hardware firewalls are those firewalls that need to be connected as
additional hardware between the device through which the internet is coming to the
system and the network used for connecting to the internet.

9. _________ is software that is installed using an internet connection or they come by-
default with operating systems.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall
Answer: b
Explanation: Software firewalls are those kinds of firewalls that are installed in the
system using internet connection as we install normal applications and update them.
Some operating system vendors provide default firewalls with their operating systems.

10 -Which of the following is not a software firewall?


a) Windows Firewall
b) Outpost Firewall Pro
c) Endian Firewall
d) Linksys Firewall

Answer: d
Explanation: Windows Firewall, Outpost Firewall Pro and Endian Firewall are software
firewalls that are installed in the system. Linksys firewall is not an example of a
software firewall.

11 Firewall examines each ____________ that are entering or leaving the internal
network.
a) emails users
b) updates
c) connections
d) data packets
Answer: d
Explanation: Firewalls examines each data packets that are entering or leaving the
internal network which ultimately prevents unauthorized access.

12. A firewall protects which of the following attacks?


a) Phishing
b) Dumpster diving
c) Denial of Service (DoS)
d) Shoulder surfing
Answer: c
Explanation: Firewalls are used to protect the computer network and restricts illicit
traffic. Denial of Service (DoS) attack is one such automated attack which a firewall with
proper settings and the updated version can resist and stop from getting executed.
13. . There are ______ types of firewall.
a) 5
b) 4
c) 3
d) 2
Answer: b
Explanation: There are four types of firewall based on their working and characteristics.
These are Packet Filtering Firewalls, Circuit Level Gateway Firewalls, Application level
Gateway Firewalls, and Stateful Multilayer Inspection Firewalls.

14. Packet filtering firewalls are deployed on ________


a) routers
b) switches
c) hubs
d) repeaters
Answer: a
Explanation: Packet filtering firewalls are deployed on routers that help in connecting
internal network worldwide via the internet.

15: In the ______________ layer of OSI model, packet filtering firewalls are implemented.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer
Answer: d
Explanation: In the network layer, which is the third layer of the OSI (Open Systems
Interconnection) model, packet filtering firewalls are implemented.

16. The __________ defines the packet filtering firewall rules.


a) Access Control List
b) Protocols
c) Policies
d) Ports
Answer: a
Explanation: The Access Control List is a table containing rules that instruct the firewall
system to provide the right access. It checks all the packets and scans them against the
defined rule set by Network administrator in the packet filtering firewall.

17. . ACL stands for _____________


a) Access Condition List
b) Anti-Control List
c) Access Control Logs
d) Access Control List
Answer: d
Explanation: The Access Control List is a table containing to check all the packets and
scans them against the defined rule set by Network administrator in any particular
system or firewall.

18. When a packet does not fulfil the ACL criteria, the packet is _________
a) resend
b) dropped
c) destroyed
d) acknowledged as received
Answer: b
Explanation: In the packet filtering firewall, when the rules defined by the Access
Control List is not meet by any data packet, the packet is dropped & logs are updated in
the firewall.

19 Network administrators can create their own ACL rules based on _______ ________
and _______
a) Address, Protocols and Packet attributes
b) Address, Protocols and security policies
c) Address, policies and Packet attributes
d) Network topology, Protocols and data packets
Answer: a
Explanation: Network administrators can create their own ACL rules based on Address,
Protocols and Packet attributes. This is generally done where the specific customised
type of data packets need to pass through firewall screening.

20. One advantage of Packet Filtering firewall is __________


a) more efficient
b) less complex
c) less costly
d) very fast
Answer: c
Explanation: Packet filtering firewalls are more advantageous because they are less
costly and they use fewer resources and are used effectively in small networks.
21. Which of the following is likely to be located in a DMZ?
a) Domain controller\
b) User workstations
c) Backup server
d) FTP server
22. You have just installed a packet filtering firewall on your network. Which options will
you be able to set on your firewall?
 Sequence number
 Destination address of a packet
 Port number
 Acknowledgement number
 Source address of a packet
23. Which of the following does a router acting as a firewall use to control which
packets are forwarded or dropped?
 ACL
 IPsec
 RDP
 VNC
 PPP
24. Which of the following network services or protocols uses TCP/IP port 22?
 SSH
 TFTP
 NNTP
 IMAP4
25. Which of the following are characteristics of a packet filtering firewall? (Select
two.)
 Stateful
 Stateless
 Filters by session
 Filters by URL
 Filters IP addresses, but not ports
26. Which of the following is a firewall function?
 FTP hosting
 Encrypting
 Frame filtering
 Packet filtering
 Protocol conversion
27 Which of the following is the best device to deploy to protect your private
network from a public untrusted network?
 Firewall
 Router
 Hub
 Gateway

28. Which technology allows a large number of private IP addresses to be


represented by a smaller number of public IP addresses?
A. NAT*
B. NTP
C. RFC 1631
D. RFC 1918

29) What is the effect of the overload keyword in a static NAT translation
configuration?
A. It enables port address translation.*
B. It enables the use of a secondary pool of IP addresses when the first pool is
depleted.
C. It enables the inside interface to receive traffic.
D. It enables the outside interface to forward traffic.
30) Which type of address is the public IP address of a NAT device?

A. outside global
B. outside local
C. inside global*
D. inside local
E. outside public
F. inside public

31) Which NAT function can map multiple inside addresses to a single
outside address?
A. PAT*
B. SFTP
C. RARP
D. ARP
E. TFTP
32) What is the first step in the NAT configuration process?

A. Define inside and outside interfaces.*


B. Define public and private IP addresses.
C. Define IP address pools.
D. Define global and local interfaces.
33 Which NAT type is used to translate a single inside address to a single
outside address?
A. dynamic NAT
B. NAT overload
C. PAT
D. static NAT*
34) What are two benefits of using NAT? (Choose two)

A. NAT protects network security because private networks are not advertised.*
B. NAT accelerates the routing process because no modifications are made on
the packets.
C. Dynamic NAT facilitates connections from the outside of the network.
D. NAT facilitates end-to-end communication when IPsec is enable.
E. NAT eliminates the need to re-address all host that require external access.*
F. NAT conserves addresses through host MAC-level multiplexing.
1. 35 Which configuration can be used with PAT to allow multiple inside address to
be translated to a single outside address?
A. Dynamic Routing
B. DNS
C. Preempt
D. Overload*
36 What Are Tables Used In Iptables ?(not mcq)
Answer :
o Nat Table
o Mangle Table
o Filter Table
37) What Is Iptables ?
Answer :
iptables is a user space application program that allows a system administrator to
configure the tables provided by the Linux kernel firewall (implemented as different
Netfilter modules) and the chains and rules it stores. Different kernel modules and
programs are currently used for different protocols; iptables applies to IPv4, ip6tables to
IPv6, arptables to ARP, and ebtables to Ethernet frames.
38) What Is The Configuration File Of Iptables In Linux ?
Answer :
/etc/sysconfig/iptables
39. How To Enable Iptables ?
Answer :
o # /etc/init.d/iptables start
o # chkconfig iptables on
o # iptables-save > /root/working.fw
40 How To Disable Iptables ?
Answer :
# Service iptables save
# Service iptables stop
# chkconfig iptables off
41 Which of the following are valid iptable chains?
a) Forward , input , output
b) none
c) accept , drop , reject
d) in , out , through

42 Which are considered the methods of NAT?


1. Static
2. IP NAT pool
3. Dynamic
4. NAT double-translation
5. Overload
A. 1 and 6

B. 3 only

C. 1, 3 and 5

D. All of the above


43.Network layer firewall has two sub-categories as _________
a) State full firewall and stateless firewall
b) Bit oriented firewall and byte oriented firewall
c) Frame firewall and packet firewall
d) Network layer firewall and session layer firewall
44. A firewall is installed at the point where the secure internal network and untrusted
external network meet which is also known as __________
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
45. A proxy firewall filters at _________
a) Physical layer
b) Data link layer
c) Network layer
d) Application layer
46. A packet filter firewall filters at __________
a) Physical layer
b) Data link layer
c) Network layer or Transport layer
d) Application layer
47 A stateful firewall maintains a ___________ which is a list of active connections.
a) Routing table
b) Bridging table
c) State table
d) Connection table
48. . A firewall needs to be __________ so that it can grow proportionally with the
network that it protects.
a) Robust
b) Expansive
c) Fast
d) Scalable

You might also like