Cloud Storage Flashcards

1
Q

What is a firewall?

A

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Firewalls can only be hardware-based.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: A ___ firewall filters traffic based on IP addresses and ports.

A

packet-filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two main types of firewalls?

A

Network firewalls and host-based firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multiple Choice: Which of the following is NOT a function of a firewall? A) Packet filtering B) VPN support C) Web hosting

A

C) Web hosting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a stateful firewall do?

A

A stateful firewall keeps track of the state of active connections and makes decisions based on the context of the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Firewalls can only block unwanted traffic.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: A ___ firewall can inspect and filter traffic at the application layer.

A

next-generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary purpose of a firewall?

A

To protect networks from unauthorized access and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multiple Choice: Which protocol is commonly used for remote access through firewalls? A) FTP B) SSH C) HTTP

A

B) SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a DMZ in the context of firewalls?

A

A DMZ (Demilitarized Zone) is a physical or logical subnetwork that contains and exposes external-facing services to an untrusted network, usually the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Firewalls can prevent all types of cyber attacks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: Firewalls use ___ rules to determine whether to allow or block traffic.

A

access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between a hardware firewall and a software firewall?

A

A hardware firewall is a physical device placed between a network and its gateway, while a software firewall is installed on individual devices or computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multiple Choice: Which type of firewall is typically easier to manage on a single device? A) Hardware firewall B) Software firewall

A

B) Software firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a proxy firewall?

A

A proxy firewall acts as an intermediary between a user’s device and the internet, filtering requests and responses.

17
Q

True or False: All firewalls are capable of deep packet inspection.

18
Q

Fill in the blank: A firewall can log traffic data to aid in ___ and compliance.

A

monitoring

19
Q

What is a firewall rule set?

A

A firewall rule set is a collection of rules that define how the firewall should handle network traffic.

20
Q

Multiple Choice: Which of the following is a common firewall configuration mistake? A) Allowing all inbound traffic B) Blocking all outbound traffic C) Regularly updating rules

A

A) Allowing all inbound traffic

21
Q

What does NAT stand for, and how is it related to firewalls?

A

NAT stands for Network Address Translation, and it is often used in conjunction with firewalls to hide internal IP addresses from external networks.

22
Q

True or False: A firewall can protect against internal threats.

23
Q

Fill in the blank: Firewalls can be used to implement ___ policies to control access to resources.

24
Q

What is an intrusion detection system (IDS), and how does it relate to firewalls?

A

An IDS monitors network traffic for suspicious activity and can work alongside firewalls to enhance security.

25
Q

Multiple Choice: Which type of firewall typically requires more resources to operate? A) Packet-filtering firewall B) Stateful firewall C) Proxy firewall

A

C) Proxy firewall