Firewall and Network Security Basics: MCQ Exam for Beginners

Enhance your understanding of firewalls and network security with this MCQ exam designed for beginners. Learn key concepts, firewall types and essential security practices to boost your knowledge and exam readiness!

📌 Important Instructions

  • This is a free test. Beware of scammers who ask for money to attend this test.
  • 📋 Total Number of Questions: 30
  • Time Allotted: 30 Minutes
  • 📝 Marking Scheme: Each question carries 1 mark. There is no negative marking.
  • ⚠️ Do not refresh or close the page during the test, as it may result in loss of progress.
  • 🔍 Read each question carefully before selecting your answer.
  • 🎯 All the best! Give your best effort and ace the test! 🚀
Time Left: 00:00
1. What is the primary purpose of a firewall in a network?
  • To block all incoming and outgoing traffic
  • To monitor network traffic for potential threats
  • To filter and control incoming and outgoing network traffic
  • To increase network speed
2. Which type of firewall filters traffic based on the source and destination IP address?
  • Stateful firewall
  • Proxy firewall
  • Packet filtering firewall
  • Deep packet inspection firewall
3. What does a stateful firewall track?
  • The physical devices in a network
  • The state of active connections
  • The type of data packets being transferred
  • The content of network traffic
4. Which of the following is a characteristic of a packet filtering firewall?
  • It checks the content of packets
  • It examines the state of a connection
  • It filters traffic based on predefined rules like IP addresses and ports
  • It encrypts traffic
5. What does NAT (Network Address Translation) do in a firewall?
  • Converts private IP addresses into public IP addresses
  • Encrypts data to enhance security
  • Monitors network traffic
  • Routes data packets between different networks
6. What type of firewall is capable of acting as an intermediary between users and the internet?
  • Stateful firewall
  • Proxy firewall
  • Packet filtering firewall
  • Hybrid firewall
7. Which firewall is best suited for monitoring and controlling traffic in real-time?
  • Proxy firewall
  • Stateless firewall
  • Stateful firewall
  • Packet filtering firewall
8. What does the "default deny" policy in a firewall mean?
  • All traffic is allowed unless explicitly denied
  • All incoming traffic is blocked by default
  • All outgoing traffic is allowed unless explicitly denied
  • All traffic is denied unless explicitly allowed
9. Which of the following is a function of an intrusion detection system (IDS)?
  • To prevent unauthorized access to the network
  • To detect and alert on suspicious network activity
  • To monitor network performance
  • To encrypt network traffic
10. Which security protocol is commonly used to secure communication over a network?
  • HTTP
  • FTP
  • HTTPS
  • SNMP
11. Which of the following best describes a "deny all" firewall rule?
  • It allows all traffic except for a list of denied sources
  • It blocks all traffic except for a list of allowed sources
  • It only allows encrypted traffic
  • It filters traffic based on protocol type
12. Which firewall type is most commonly used to prevent attacks from the internet?
  • Proxy firewall
  • Stateless firewall
  • Packet filtering firewall
  • Stateful firewall
13. What is the key purpose of a proxy firewall?
  • To monitor and block unauthorized applications
  • To act as an intermediary for users requesting internet access
  • To track and manage bandwidth usage
  • To provide secure remote access
14. Which of the following is NOT typically a feature of network security management?
  • Traffic analysis
  • Encryption of sensitive data
  • Virus scanning
  • Web browsing history
15. What does an SSL/TLS certificate do?
  • Secures email communications
  • Encrypts traffic between web browsers and servers
  • Filters malicious traffic
  • Creates a VPN tunnel
16. What is the purpose of an anti-virus software in network security?
  • To scan and remove malicious files from devices connected to the network
  • To monitor bandwidth usage
  • To filter incoming network traffic
  • To provide secure remote access
17. What is a man-in-the-middle attack?
  • A type of attack where the attacker intercepts and potentially alters communications between two parties
  • An attack on the physical network cables
  • An attack targeting the hardware of network devices
  • A phishing attack aimed at stealing user credentials
18. Which protocol is primarily used for securing web traffic on the internet?
  • TCP
  • UDP
  • HTTPS
  • SNMP
19. What is the role of a "honeypot" in network security?
  • To detect and divert unauthorized traffic
  • To block incoming attacks
  • To track traffic patterns
  • To encrypt sensitive data
20. Which of the following does NOT represent a form of network access control?
  • Firewalls
  • VPNs
  • Antivirus software
  • User authentication
21. What is the most common form of an authentication attack?
  • Phishing
  • DoS attack
  • Packet sniffing
  • Brute force attack
22. What is a Distributed Denial of Service (DDoS) attack?
  • An attack that targets physical hardware components
  • An attack that floods a target system with traffic to disrupt services
  • A malicious attack that steals sensitive data
  • An attack aimed at altering the content of network communications
23. What is the function of the security feature called "two-factor authentication"?
  • To increase the complexity of passwords
  • To provide an extra layer of protection by requiring two forms of identification
  • To monitor network traffic
  • To automatically log out inactive users
24. Which of the following is an example of an authentication factor?
  • A username and password
  • A packet filter rule
  • An encryption algorithm
  • A secure VPN connection
25. What does the term "Zero Trust" refer to in network security?
  • A model where access to all network resources is denied until verified
  • A method of encrypting data transmissions
  • A rule to grant access based on geographical location
  • A security policy that allows unrestricted access to trusted devices
26. Which of the following attacks is commonly prevented by firewalls?
  • Phishing
  • Man-in-the-middle attacks
  • Denial of Service (DoS)
  • SQL injection
27. What is the main goal of an IDS (Intrusion Detection System)?
  • To block malicious network traffic
  • To detect and alert on suspicious activities within a network
  • To encrypt data sent over the network
  • To prevent data theft
28. Which of the following is a valid example of network security policy?
  • A rule about which types of network traffic are allowed
  • A specification for network cable types
  • A procedure for creating network IP addresses
  • A rule for data packet encapsulation
29. Which of the following is NOT a common firewall configuration?
  • Proxy mode
  • Router-based firewall
  • Stateful inspection
  • HTTPS protocol
30. Which of the following protocols is considered unencrypted and is less secure for network communications?
  • HTTP
  • HTTPS
  • FTP
  • SFTP