Networking Ch 6 - Firewalls

Networking Ch 6 - Firewalls

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Proxy Quiz

Proxy Quiz

11th - 12th Grade

20 Qs

Network and Computing Review - 2

Network and Computing Review - 2

10th Grade

22 Qs

Chapter 21 -Protecting Data

Chapter 21 -Protecting Data

11th - 12th Grade

26 Qs

Privacy and security

Privacy and security

7th - 9th Grade

20 Qs

Counter measures to mitigate cyber security threats

Counter measures to mitigate cyber security threats

11th Grade

20 Qs

ADMINISTRASI SISTEM JARINGAN

ADMINISTRASI SISTEM JARINGAN

11th Grade

20 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

7th - 12th Grade

20 Qs

Networking Ch 6 - Firewalls

Networking Ch 6 - Firewalls

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Brett Kottmann

Used 17+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A software- or hardware-based network security system that allows or denies network traffic according to a set of rules.

Firewall

Router

Switch

Bastion

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A list of filtering rules that firewalls use to identify allowed and blocked traffic.

Access Control List

Firewall

Chain Event Log

Filter Access List

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Network-based firewalls are more expensive and require more configuration than other types of firewalls, but they are much more robust and secure.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Most network-based firewalls are not considered hardware firewalls even though they use a combination of hardware and software to protect the network from internet attacks.

True

False

Answer explanation

Read each question twice to catch "not" statements!

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Almost all host-based firewalls are software firewalls.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You can use a host-based firewall in addition to a network-based firewall to provide multiple layers of protection.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Firewalls use filtering rules to identify allowed and blocked traffic. The filtering rules are also referred to as _________

Access Control Lists

File Access Lists

Chained Log Filters

Filter Control Lists

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?