Firewall and Network Security Basics: MCQ Exam for Beginners
Enhance your understanding of firewalls and network security with this MCQ exam designed for beginners. Learn key concepts, firewall types and essential security practices to boost your knowledge and exam readiness!
📌 Important Exam Instructions
✅ This is a free online test. Do not pay anyone claiming otherwise.
📋 Total Questions: 30
⏳ Time Limit: 30 minutes
📝 Marking Scheme: +1 for each correct answer. No negative marking.
⚠️ Avoid page refresh or closing the browser tab to prevent loss of test data.
🔍 Carefully read all questions before submitting your answers.
🎯 Best of Luck! Stay focused and do your best. 🚀
Time Left (min): 00:00
1. What is the primary purpose of a firewall in a network?
To block all incoming and outgoing traffic
To monitor network traffic for potential threats
To filter and control incoming and outgoing network traffic
To increase network speed
2. Which type of firewall filters traffic based on the source and destination IP address?
Stateful firewall
Proxy firewall
Packet filtering firewall
Deep packet inspection firewall
3. What does a stateful firewall track?
The physical devices in a network
The state of active connections
The type of data packets being transferred
The content of network traffic
4. Which of the following is a characteristic of a packet filtering firewall?
It checks the content of packets
It examines the state of a connection
It filters traffic based on predefined rules like IP addresses and ports
It encrypts traffic
5. What does NAT (Network Address Translation) do in a firewall?
Converts private IP addresses into public IP addresses
Encrypts data to enhance security
Monitors network traffic
Routes data packets between different networks
6. What type of firewall is capable of acting as an intermediary between users and the internet?
Stateful firewall
Proxy firewall
Packet filtering firewall
Hybrid firewall
7. Which firewall is best suited for monitoring and controlling traffic in real-time?
Proxy firewall
Stateless firewall
Stateful firewall
Packet filtering firewall
8. What does the "default deny" policy in a firewall mean?
All traffic is allowed unless explicitly denied
All incoming traffic is blocked by default
All outgoing traffic is allowed unless explicitly denied
All traffic is denied unless explicitly allowed
9. Which of the following is a function of an intrusion detection system (IDS)?
To prevent unauthorized access to the network
To detect and alert on suspicious network activity
To monitor network performance
To encrypt network traffic
10. Which security protocol is commonly used to secure communication over a network?
HTTP
FTP
HTTPS
SNMP
11. Which of the following best describes a "deny all" firewall rule?
It allows all traffic except for a list of denied sources
It blocks all traffic except for a list of allowed sources
It only allows encrypted traffic
It filters traffic based on protocol type
12. Which firewall type is most commonly used to prevent attacks from the internet?
Proxy firewall
Stateless firewall
Packet filtering firewall
Stateful firewall
13. What is the key purpose of a proxy firewall?
To monitor and block unauthorized applications
To act as an intermediary for users requesting internet access
To track and manage bandwidth usage
To provide secure remote access
14. Which of the following is NOT typically a feature of network security management?
Traffic analysis
Encryption of sensitive data
Virus scanning
Web browsing history
15. What does an SSL/TLS certificate do?
Secures email communications
Encrypts traffic between web browsers and servers
Filters malicious traffic
Creates a VPN tunnel
16. What is the purpose of an anti-virus software in network security?
To scan and remove malicious files from devices connected to the network
To monitor bandwidth usage
To filter incoming network traffic
To provide secure remote access
17. What is a man-in-the-middle attack?
A type of attack where the attacker intercepts and potentially alters communications between two parties
An attack on the physical network cables
An attack targeting the hardware of network devices
A phishing attack aimed at stealing user credentials
18. Which protocol is primarily used for securing web traffic on the internet?
TCP
UDP
HTTPS
SNMP
19. What is the role of a "honeypot" in network security?
To detect and divert unauthorized traffic
To block incoming attacks
To track traffic patterns
To encrypt sensitive data
20. Which of the following does NOT represent a form of network access control?
Firewalls
VPNs
Antivirus software
User authentication
21. What is the most common form of an authentication attack?
Phishing
DoS attack
Packet sniffing
Brute force attack
22. What is a Distributed Denial of Service (DDoS) attack?
An attack that targets physical hardware components
An attack that floods a target system with traffic to disrupt services
A malicious attack that steals sensitive data
An attack aimed at altering the content of network communications
23. What is the function of the security feature called "two-factor authentication"?
To increase the complexity of passwords
To provide an extra layer of protection by requiring two forms of identification
To monitor network traffic
To automatically log out inactive users
24. Which of the following is an example of an authentication factor?
A username and password
A packet filter rule
An encryption algorithm
A secure VPN connection
25. What does the term "Zero Trust" refer to in network security?
A model where access to all network resources is denied until verified
A method of encrypting data transmissions
A rule to grant access based on geographical location
A security policy that allows unrestricted access to trusted devices
26. Which of the following attacks is commonly prevented by firewalls?
Phishing
Man-in-the-middle attacks
Denial of Service (DoS)
SQL injection
27. What is the main goal of an IDS (Intrusion Detection System)?
To block malicious network traffic
To detect and alert on suspicious activities within a network
To encrypt data sent over the network
To prevent data theft
28. Which of the following is a valid example of network security policy?
A rule about which types of network traffic are allowed
A specification for network cable types
A procedure for creating network IP addresses
A rule for data packet encapsulation
29. Which of the following is NOT a common firewall configuration?
Proxy mode
Router-based firewall
Stateful inspection
HTTPS protocol
30. Which of the following protocols is considered unencrypted and is less secure for network communications?