Firewall and Network Security Basics: MCQ Exam for Beginners

Enhance your understanding of firewalls and network security with this MCQ exam designed for beginners. Learn key concepts, firewall types and essential security practices to boost your knowledge and exam readiness!

📌 Important Exam Instructions

  • This is a free online test. Do not pay anyone claiming otherwise.
  • 📋 Total Questions: 30
  • Time Limit: 30 minutes
  • 📝 Marking Scheme: +1 for each correct answer. No negative marking.
  • ⚠️ Avoid page refresh or closing the browser tab to prevent loss of test data.
  • 🔍 Carefully read all questions before submitting your answers.
  • 🎯 Best of Luck! Stay focused and do your best. 🚀

Time Left (min): 00:00

1. What is the primary purpose of a firewall in a network?

  • To block all incoming and outgoing traffic
  • To monitor network traffic for potential threats
  • To filter and control incoming and outgoing network traffic
  • To increase network speed

2. Which type of firewall filters traffic based on the source and destination IP address?

  • Stateful firewall
  • Proxy firewall
  • Packet filtering firewall
  • Deep packet inspection firewall

3. What does a stateful firewall track?

  • The physical devices in a network
  • The state of active connections
  • The type of data packets being transferred
  • The content of network traffic

4. Which of the following is a characteristic of a packet filtering firewall?

  • It checks the content of packets
  • It examines the state of a connection
  • It filters traffic based on predefined rules like IP addresses and ports
  • It encrypts traffic

5. What does NAT (Network Address Translation) do in a firewall?

  • Converts private IP addresses into public IP addresses
  • Encrypts data to enhance security
  • Monitors network traffic
  • Routes data packets between different networks

6. What type of firewall is capable of acting as an intermediary between users and the internet?

  • Stateful firewall
  • Proxy firewall
  • Packet filtering firewall
  • Hybrid firewall

7. Which firewall is best suited for monitoring and controlling traffic in real-time?

  • Proxy firewall
  • Stateless firewall
  • Stateful firewall
  • Packet filtering firewall

8. What does the "default deny" policy in a firewall mean?

  • All traffic is allowed unless explicitly denied
  • All incoming traffic is blocked by default
  • All outgoing traffic is allowed unless explicitly denied
  • All traffic is denied unless explicitly allowed

9. Which of the following is a function of an intrusion detection system (IDS)?

  • To prevent unauthorized access to the network
  • To detect and alert on suspicious network activity
  • To monitor network performance
  • To encrypt network traffic

10. Which security protocol is commonly used to secure communication over a network?

  • HTTP
  • FTP
  • HTTPS
  • SNMP

11. Which of the following best describes a "deny all" firewall rule?

  • It allows all traffic except for a list of denied sources
  • It blocks all traffic except for a list of allowed sources
  • It only allows encrypted traffic
  • It filters traffic based on protocol type

12. Which firewall type is most commonly used to prevent attacks from the internet?

  • Proxy firewall
  • Stateless firewall
  • Packet filtering firewall
  • Stateful firewall

13. What is the key purpose of a proxy firewall?

  • To monitor and block unauthorized applications
  • To act as an intermediary for users requesting internet access
  • To track and manage bandwidth usage
  • To provide secure remote access

14. Which of the following is NOT typically a feature of network security management?

  • Traffic analysis
  • Encryption of sensitive data
  • Virus scanning
  • Web browsing history

15. What does an SSL/TLS certificate do?

  • Secures email communications
  • Encrypts traffic between web browsers and servers
  • Filters malicious traffic
  • Creates a VPN tunnel

16. What is the purpose of an anti-virus software in network security?

  • To scan and remove malicious files from devices connected to the network
  • To monitor bandwidth usage
  • To filter incoming network traffic
  • To provide secure remote access

17. What is a man-in-the-middle attack?

  • A type of attack where the attacker intercepts and potentially alters communications between two parties
  • An attack on the physical network cables
  • An attack targeting the hardware of network devices
  • A phishing attack aimed at stealing user credentials

18. Which protocol is primarily used for securing web traffic on the internet?

  • TCP
  • UDP
  • HTTPS
  • SNMP

19. What is the role of a "honeypot" in network security?

  • To detect and divert unauthorized traffic
  • To block incoming attacks
  • To track traffic patterns
  • To encrypt sensitive data

20. Which of the following does NOT represent a form of network access control?

  • Firewalls
  • VPNs
  • Antivirus software
  • User authentication

21. What is the most common form of an authentication attack?

  • Phishing
  • DoS attack
  • Packet sniffing
  • Brute force attack

22. What is a Distributed Denial of Service (DDoS) attack?

  • An attack that targets physical hardware components
  • An attack that floods a target system with traffic to disrupt services
  • A malicious attack that steals sensitive data
  • An attack aimed at altering the content of network communications

23. What is the function of the security feature called "two-factor authentication"?

  • To increase the complexity of passwords
  • To provide an extra layer of protection by requiring two forms of identification
  • To monitor network traffic
  • To automatically log out inactive users

24. Which of the following is an example of an authentication factor?

  • A username and password
  • A packet filter rule
  • An encryption algorithm
  • A secure VPN connection

25. What does the term "Zero Trust" refer to in network security?

  • A model where access to all network resources is denied until verified
  • A method of encrypting data transmissions
  • A rule to grant access based on geographical location
  • A security policy that allows unrestricted access to trusted devices

26. Which of the following attacks is commonly prevented by firewalls?

  • Phishing
  • Man-in-the-middle attacks
  • Denial of Service (DoS)
  • SQL injection

27. What is the main goal of an IDS (Intrusion Detection System)?

  • To block malicious network traffic
  • To detect and alert on suspicious activities within a network
  • To encrypt data sent over the network
  • To prevent data theft

28. Which of the following is a valid example of network security policy?

  • A rule about which types of network traffic are allowed
  • A specification for network cable types
  • A procedure for creating network IP addresses
  • A rule for data packet encapsulation

29. Which of the following is NOT a common firewall configuration?

  • Proxy mode
  • Router-based firewall
  • Stateful inspection
  • HTTPS protocol

30. Which of the following protocols is considered unencrypted and is less secure for network communications?

  • HTTP
  • HTTPS
  • FTP
  • SFTP