Upwork Test Answers: Get all the correct answers of most recent and possible Upwork Tests A to Z (Updated on Jan, 2016)
Cover Letter Templates: These cover letter samples are not only for Upwork job, but also you will have some idea about your real life job
 
Freelance Profile Overviews: Different Profile samples and overviews of experts, advanced and intermediate level freelancers
For Newbie of Upwork: Upwork Help - How to apply for a job in Upwork with 10 most important articles about Upwork

A to Z View - All Upwork Test Answers

Firewall Concepts Test Answers (new)

This test is Networking category test of Upwork. If you are a Networking expert and want your Upwork profile gives a better look then this post is for you. In this blog posts, you will have most recent Upwork test questions and answers of Firewall Concepts Test.

Search your desired answers of the Upwork Firewall Concepts test by pressing Ctrl + F button.
--------------------------------------------------------------------------------------------------------------------------
Answers: All of the above

 2. Which of the protocols listed below will you scan at the Gateway to block the Spam Mails?
 Answers: • SMTP or • POP3 or • IMAP

 3. Which of the following are Encryption algorithms?
 Answers: • AES or • 3DES or • DES

 4. Digital Certificates are used for___________.
 Answers: • Encryption or • Authentication

 5. Which of the following tools can be used to monitor the Packets?
 Answers: • Wireshark or • Nessus

 6. Which of the sources listed below are secured by Desktop Firewalls?
 Answers: • Scanners or • Printers

 7. Port-Scanning tools helps the administrator in which of the following?
 Answers: • Finding the vulnerabilities or • Building a strong security policy.

 8. Which of the reasons listed below lead to common attacks?
 Answers: • Operating System bugs or • Spoofing

 9. Which of the following can lead to the denial of service attacks?
 Answers: • Spoofing the Packets or • Sending SYN Packets using the Zombies

 10. Which protocol is used by the DNS?
 Answers: • TCP or • UDP

 11. Which of the following are hash algorithms?
 Answers: • MD5 or • SHA 1

 12. By using which command can you see the active TCP connections?
 Answers: • netstat

 13. What is the mode of operation of Firewalls?
 Answers: • Route mode

 14. The______________ TCP flag can launch a DoS attack.
 Answers: • SYN/ACK

 15. Which layer of the OSI model is used by Packet filtering?
 Answers: • Network Layer

 16. What exactly is a DoS?
 Answers: • It is a type of Attack

 17. What exactly is spoofing?
 Answers: • Pretending to be someone you are not

 18. Which of the following things should be kept in mind while troubleshooting the Firewall problems?
 Answers: • All of the above

 19. Which of the following tools can be used to find vulnerabilities?
 Answers: • SNORT

 20. Over which of the following can a VPN be established?
 Answers: • All of the above

 21. What are the functions of a Desktop Firewall?
 Answers: • It Controls the Access

 22. Which of the following ports is used by IMAP?
 Answers: • 143

 23. What is the action on Packet when we apply the action, REJECT?
 Answers: • The Packet is dropped

 24. What exactly is the Stateful Packet Filtering?
 Answers: • It is a Firewall Technology

 25. Which of the following are the functions of a Firewall?
 Answers: • All of the above

 26. Generally, a Firewall can not be managed by which of the following:
 Answers: • FTP

 27. Suppose Matt is the Network Security Engineer for XYZ Company. He is asked by his manager to create a security policy in the Firewalls so that host_A(172.16.0.3) may be able to access the HTTP service from the internet cloud. NAT rule already exists for the host. How will Matt create the security policy in the Firewalls?
 Answers: • Source: Host_A(172.16.0.3), Destination:Any , Service: HTTP(80), Action :Accept

 28. Suppose Eric is a Network Security Engineer in ABC Company. He is asked by his manager to block the access to unauthorized web sites being accessed by the users of the company. Can these unauthorized web sites be blocked with the Firewalls?
 Answers: • Yes, the sites can be blocked

 29. What does sniffing mean?
 Answers: • Capturing data traveling across the network

 30. Which type of Firewalls keep a track on the state of the connection?
 Answers: • Session Firewall

 31. At which layer does the Circuit-Level Firewall work?
 Answers: • Session Layer

 32. Which zone is the un-trusted zone in Firewalls architecture?
 Answers: • Wide Area Network(WAN)

 33. What are the advantages of Stateful Inspection Firewall?
 Answers: • All of the above

 34. Auditing is the process of tracking ________________________ on a system.
 Answers: • All the above

 35. What is the sequence in which the rules are executed in the Rule Base?
 Answers: • From the top of the rule base to the bottom of the rule base

 36. Suppose Adrian is the Network Security Engineer for ABC Company. He is asked by his manager to create a security policy in the Firewalls to open the HTTP service for a host_A(192.168.1.2) so that host_A may be able to access the Web Server(172.16.0.2). NAT rule already exists for the host. How will Adrian create the security policy in the Firewalls?
 Answers: • Source: Host_A(192.168.1.2), Destination:Web_Server(172.16.0.2), Service: HTTP(80), Action :Accept

 37. Which command is used to determine the route taken by a Packet?
 Answers: • traceroute

 38. Syslog protocol is used for __________.
 Answers: • event notification

 39. State whether True or False.

 When a rule is matched for a particular incoming/outgoing Packet and is executed, the Firewalls look for another rule in the rule base for the same Packet.
 Answers: • False

 40. What are the advantages of DMZ?
 Answers: • All of the above

 41. Which Packet is sent by the source to initiate the connection in TCP 3-way handshake?
 Answers: • SYN

 42. You are asked by your manager to publish a web server.

 Which type of NATing will you use so that the Web Server can be accessed from the Internet?
 Answers: • Dynamic NAT

 43. Which of the following can be categorized as a threat to secured resources?
 Answers: • All of the above

 44. Which among the following Firewalls is the slowest?
 Answers: • Stateful Packet inspection

 45. A TCP connection is complete when it receives the_____________Packet.
 Answers: • ACK

 46. What is the CIA concept?
 Answers: • Confidentiality, Integrity and Availability

 47. Suppose Mark is the Network Security Engineer for ABC Company. He is asked by his manager to create a security policy in the Firewalls so that their internal network ABC_INTERNAL(172.16.0.0/24)may be able to access the DNS service from the server DNS_SERVER(192.168.1.5). NAT rule already exists for the Network. How will Mark create the security policy in the Firewalls?
 Answers: • Source: ABC_INTERNAL(172.16.0.0/24), Destination: DNS_SERVER(192.168.1.5), Service: DNS(53), Action :Accept

 48. Which of the following is a Firewall technology?
 Answers: • All of the above

 49. Which zone is the trusted zone in Firewalls architecture?
 Answers: • DMZ

 50. Which of the following things should be kept in mind before implementing/configuring the Firewalls?
 Answers: • All of the above

 51. Which of the following is a type of DoS attack?
 Answers: • All of the above

 52. At which layer do the Proxy Firewalls function?
 Answers: • Application Layer

 53. How many TCP flags are present in the Firewalls concept?
 Answers: • 6

 54. Layer 2 Tunneling Protocol is a type of__________.
 Answers: • VPN

 55. In a Stateful Inspection Firewall, the entries about the connection states are made in the_______________ table.
 Answers: • State Table

 56. What does RADIUS stand for?
 Answers: • Remote Access Dial-In User Service

 57. What is Spoofing?
 Answers: • It is a technique used to gain unauthorized access to computers

 58. What is the range of dynamic ports?
 Answers: • 49,152-65,535

 59. State whether True or False.

 The vulnerabilities in the Network/System can be exploited by threats.
 Answers: • True

 60. State whether True or False.

 When a user makes a request to open some access, he should be allowed to get whatever is required.
 Answers: • False

 61. What does AAA stand for?
 Answers: • Authentication, Authorization, and Accounting

 62. What is SSL?
 Answers: • Encryption Technology

 63. Suppose Sally is the Network Security Engineer for ABC Company. She is asked by her manager to create a security policy in the Firewalls so that their internal network ABC_INTERNAL(172.16.0.0/24) may be able to access the SMTP(25) service from the server MAIL_SERVER(192.168.1.15).NAT rule already exists for the network. How will Sally create the security policy in the Firewalls?
 Answers: • Source:ABC_INTERNAL(172.16.0.0/24), Destination:MAIL_SERVER(192.168.1.15), Service: SMTP(25), Action :Accept

 64. At which layer do the Firewalls generally work in the OSI model?
 Answers: • Transport Layer

 65. State whether True or False.

 The security of the Firewalls is a very important aspect.
 Answers: • True

 66. State whether True or False.

 Logging should be enabled for all the rules in the Rule Base.
 Answers: • True

 67. Which command is used to check whether a particular host is live or not?
 Answers: • ping

 68. State whether True or False.

 All the DoS attacks can be blocked with the Firewalls.
 Answers: • False

 69. Firewall can perform NAT to keep the record of various NAT entries. In which of the following tables does Firewall make those entries?
 Answers: • NAT Table

 70. At which layer does the IPSec work?
 Answers: • Network Layer

 71. What is the range of reserved ports?
 Answers: • 1-1024

 72. Which of the traffic listed below should be generally blocked?
 Answers: • All of the above

 73. State whether True or False.

 A Firewall installed at the Gateway makes the whole network secure.
 Answers: • False

 74. Which of the events listed below should be monitored?
 Answers: • All the above

 75. HTTPS uses ___________ encryption technology to encrypt the communication between Client's system and Firewalls.
 Answers: • SSL