Top 250+ Solved Information Cyber Security (ICS) MCQ Questions Answer

From 76 to 90 of 239

Q. Which layer of the OSI reference model does PPTP work at?

a. layer 1

b. layer 2

c. layer 3

d. layer 4

  • b. layer 2

Q. Which layer of the OSI reference model does IPsec work at?

a. layer 1

b. layer 2

c. layer 3

d. layer 4

  • c. layer 3

Q. Firewalls can be of _______ kinds.

a. 1

b. 2

c. 3

d. 4

Q. _________________ is the kind of firewall is connected between the device and the network connecting to internet.

a. hardware firewall

b. software firewall

c. stateful inspection firewall

d. microsoft firewall

  • a. hardware firewall

Q. _________ is software that is installed using an internet connection or they come by-default with operating systems.

a. hardware firewall

b. software firewall

c. stateful inspection firewall

d. microsoft firewall

  • b. software firewall

Q. Which of the following is not a software firewall?

a. windows firewall

b. outpost firewall pro

c. endian firewall

d. linksys firewall

  • d. linksys firewall

Q. Firewall examines each ____________ that are entering or leaving the internal network.

a. emails users

b. updates

c. connections

d. data packets

  • d. data packets

Q. A firewall protects which of the following attacks?

a. phishing

b. dumpster diving

c. denial of service (dos)

d. shoulder surfing

  • c. denial of service (dos)

Q. There are ______ types of firewall.

a. 5

b. 4

c. 3

d. 2

Q. Packet filtering firewalls are deployed on ________

a. routers

b. switches

c. hubs

d. repeaters

  • a. routers

Q. In the ______________ layer of OSI model, packet filtering firewalls are implemented.

a. application layer

b. session layer

c. presentation layer

d. network layer

  • d. network layer

Q. The __________ defines the packet filtering firewall rules.

a. access control list

b. protocols

c. policies

d. ports

  • a. access control list

Q. ACL stands for _____________

a. access condition list

b. anti-control list

c. access control logs

d. access control list

  • d. access control list

Q. When a packet does not fulfil the ACL criteria, the packet is _________

a. resend

b. dropped

c. destroyed

d. acknowledged as received

  • b. dropped

Q. Network administrators can create their own ACL rules based on _______ ________ and _______

a. address, protocols and packet attributes

b. address, protocols and security policies

c. address, policies and packet attributes

d. network topology, protocols and data packets

  • a. address, protocols and packet attributes
Subscribe Now

Get All Updates & News