Q.1 What is the primary purpose of a firewall in a computer network?
To block all internet traffic
To filter network traffic based on rules
To provide unlimited access to all users
To encrypt data between two computers
Explanation - A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
Correct answer is: To filter network traffic based on rules
Q.2 Which type of firewall inspects packets at the application layer?
Packet-filtering firewall
Circuit-level gateway
Application-level firewall
Stateful firewall
Explanation - Application-level firewalls (also known as proxy firewalls) filter traffic at the application layer, analyzing protocols like HTTP, FTP, etc.
Correct answer is: Application-level firewall
Q.3 Which protocol is commonly used for VPN tunneling?
HTTP
SMTP
IPSec
FTP
Explanation - IPSec (Internet Protocol Security) is a common protocol used to secure VPN tunnels by encrypting IP packets.
Correct answer is: IPSec
Q.4 What does VPN stand for?
Virtual Private Network
Virtual Public Node
Verified Protection Network
Variable Packet Network
Explanation - VPN stands for Virtual Private Network, which extends a private network across a public network securely.
Correct answer is: Virtual Private Network
Q.5 Which firewall technique keeps track of the state of active connections?
Stateless filtering
Packet sniffing
Stateful inspection
Proxy filtering
Explanation - Stateful inspection tracks active connections and makes decisions based on the state of the connection as well as the packet content.
Correct answer is: Stateful inspection
Q.6 Which of the following is NOT a benefit of using a VPN?
Data encryption
Remote access
Complete anonymity
Bypassing geo-restrictions
Explanation - VPNs encrypt traffic and provide security, but they do not guarantee complete anonymity as ISPs and VPN providers may still log activity.
Correct answer is: Complete anonymity
Q.7 In firewall terminology, what is a DMZ?
Danger Management Zone
De-Militarized Zone
Data Monitoring Zone
Distributed Management Zone
Explanation - A DMZ (De-Militarized Zone) is a subnetwork that exposes an organization's external services while protecting the internal network.
Correct answer is: De-Militarized Zone
Q.8 Which VPN type connects a user to a corporate network remotely?
Site-to-Site VPN
Remote Access VPN
Intranet VPN
Cloud VPN
Explanation - Remote Access VPN allows individual users to securely connect to a private network from a remote location.
Correct answer is: Remote Access VPN
Q.9 Which layer of the OSI model does packet-filtering firewalls mainly operate on?
Application Layer
Network Layer
Transport Layer
Presentation Layer
Explanation - Packet-filtering firewalls operate primarily at the network layer, filtering based on IP addresses and ports.
Correct answer is: Network Layer
Q.10 What is split tunneling in VPNs?
Using two VPNs at the same time
Encrypting only selected traffic
Blocking all non-VPN traffic
Switching between VPN servers automatically
Explanation - Split tunneling allows users to route some traffic through the VPN while other traffic goes directly to the internet.
Correct answer is: Encrypting only selected traffic
Q.11 Which type of firewall can filter traffic based on deep inspection of application data?
Stateless firewall
Next-Generation Firewall
Circuit firewall
Packet-filtering firewall
Explanation - Next-Generation Firewalls provide advanced filtering by inspecting application-level traffic deeply.
Correct answer is: Next-Generation Firewall
Q.12 Which of the following is an example of VPN encryption protocol?
SSL/TLS
SMTP
DHCP
SNMP
Explanation - SSL/TLS is commonly used for VPN encryption, especially in SSL VPNs.
Correct answer is: SSL/TLS
Q.13 What happens if a firewall is configured too restrictively?
Network becomes faster
Legitimate traffic may be blocked
Security decreases
Hackers gain easy access
Explanation - Overly restrictive firewalls may block legitimate users or applications, causing connectivity issues.
Correct answer is: Legitimate traffic may be blocked
Q.14 Which type of VPN connects two networks securely over the internet?
Remote Access VPN
Site-to-Site VPN
Cloud VPN
Personal VPN
Explanation - Site-to-Site VPN securely connects two networks, such as branch offices and headquarters.
Correct answer is: Site-to-Site VPN
Q.15 Which method does a firewall use to block suspicious packets?
Routing tables
Access Control Lists (ACLs)
Session management
ARP caching
Explanation - Firewalls use ACLs to define rules for allowing or blocking packets based on IP addresses, ports, and protocols.
Correct answer is: Access Control Lists (ACLs)
Q.16 What is a potential drawback of using a VPN?
Increased internet speed
Reduced latency
Slower connection due to encryption
More server access
Explanation - VPN encryption adds overhead, which can slow down internet speed slightly.
Correct answer is: Slower connection due to encryption
Q.17 Which firewall deployment is commonly used at the edge of a corporate network?
Host-based firewall
Cloud firewall
Network firewall
Personal firewall
Explanation - Network firewalls are deployed at the edge of corporate networks to filter traffic entering and leaving the network.
Correct answer is: Network firewall
Q.18 Which of the following is a limitation of traditional packet-filtering firewalls?
Cannot inspect packet headers
Do not support IP addresses
Cannot analyze application data
Do not work at the network layer
Explanation - Traditional packet-filtering firewalls only analyze packet headers, not the content of the traffic.
Correct answer is: Cannot analyze application data
Q.19 Which port does HTTPS VPN traffic usually use?
21
80
443
25
Explanation - HTTPS VPN traffic usually runs over port 443, the default port for secure web traffic.
Correct answer is: 443
Q.20 Why are Next-Generation Firewalls considered better than traditional firewalls?
They are cheaper
They only block viruses
They inspect application traffic and provide deep packet inspection
They don't require updates
Explanation - Next-Generation Firewalls combine traditional firewall functions with advanced features like deep packet inspection and intrusion prevention.
Correct answer is: They inspect application traffic and provide deep packet inspection
Q.21 What is the main function of a VPN?
To provide fast internet
To hide cookies
To securely connect users to private networks over public internet
To block malware
Explanation - VPNs create secure, encrypted tunnels over public networks, allowing safe access to private resources.
Correct answer is: To securely connect users to private networks over public internet
Q.22 Which of the following is a host-based firewall?
Windows Defender Firewall
Cisco ASA
Palo Alto NGFW
FortiGate
Explanation - Windows Defender Firewall is a host-based firewall installed on individual computers, while others are network firewalls.
Correct answer is: Windows Defender Firewall
Q.23 What is the main disadvantage of split tunneling in VPNs?
Slower internet
Increased vulnerability of direct internet traffic
No encryption at all
Higher subscription costs
Explanation - Split tunneling routes some traffic outside the VPN, which can expose it to security risks.
Correct answer is: Increased vulnerability of direct internet traffic
Q.24 Which technology allows firewalls to block applications like games or peer-to-peer traffic?
URL filtering
Application control
Packet routing
MAC filtering
Explanation - Application control allows firewalls to block specific applications regardless of port or protocol.
Correct answer is: Application control
Q.25 Which VPN protocol is known for speed but less security compared to others?
PPTP
IPSec
OpenVPN
IKEv2
Explanation - PPTP is one of the oldest VPN protocols, offering speed but relatively weak security compared to modern options.
Correct answer is: PPTP
