0% found this document useful (0 votes)
2K views3 pages

Lab Quiz

The document appears to be a series of multiple choice questions about firewalls and Windows Firewall. It covers topics like how firewall rules are indicated in Windows Firewall, common functions of firewalls like blocking unauthorized traffic and using rules to allow authorized access, and how Windows Firewall can be configured for different network profiles and uses rules and ports to allow HTTP connections.

Uploaded by

Prasanthi Koneru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views3 pages

Lab Quiz

The document appears to be a series of multiple choice questions about firewalls and Windows Firewall. It covers topics like how firewall rules are indicated in Windows Firewall, common functions of firewalls like blocking unauthorized traffic and using rules to allow authorized access, and how Windows Firewall can be configured for different network profiles and uses rules and ports to allow HTTP connections.

Uploaded by

Prasanthi Koneru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

 Question 1

1 out of 1 points
In the Windows Firewall, a __________ arrow in front of the rule indicates that the rule is already
enabled.

Selected green
Answer:

 Question 2
1 out of 1 points
Which of the following is a personal firewall that filters incoming and outgoing traffic by blocking
unauthorized traffic to the local computer?

Selected Windows Firewall with Advanced Security


Answer:

 Question 3
1 out of 1 points
Enabled on the network and properly configured, a firewall can block:

Selected outside sources from being able to insert malware and viruses.
Answer:
 Question 4
1 out of 1 points
Which of the following does a firewall use to block unauthorized access to the system?

Selected Inbound rules


Answer:
 Question 5
1 out of 1 points
In the lab, how could you tell that the HTTP connection was accepted and the firewall rules were applied
successfully?

Selected The Internet Explorer browser displayed the IIS Server homepage on the Windows
Answer: 2012 server.
 Question 6
1 out of 1 points
In the lab, you used a Web browser to attempt to connect to a Windows 2012 server using:

Selected HTTP.
Answer:

 Question 7
1 out of 1 points
Using __________, network traffic can be filtered based on Active Directory users and groups, both
source and destination IP addresses, port number, or specific programs and services.

Selected the Advanced Security profiles


Answer:
 Question 8
1 out of 1 points
By default, the Windows Firewall disables several important services such as File Transfer Protocol (FTP)
and Internet Control Message Protocol (ICMP), which includes the:

Selected Ping command.


Answer:

 Question 9
1 out of 1 points
Today, an enterprise must consider __________ when considering access to its Web servers or any other
servers exposed to the Internet.

Selected multiple layers of defense


Answer:

 Question 10
1 out of 1 points
Windows Firewall with Advanced Security can be configured to support separate profiles based on
whether:

Selected the computer is connected to a network at the office, home, or a public location.
Answer:

 Question 11
1 out of 1 points
Which of the following does a firewall use to block unauthorized access from the system?

Selected Outbound rules


Answer:

 Question 12
1 out of 1 points
In the lab, you enabled a firewall rule that allowed users on an external network to connect to a Web
server using HTTP. Which port is used for these connections?

Selected TCP port 80


Answer:

 Question 13
1 out of 1 points
In the lab, you verified that the new rule:

Selected allows HTTP connections.


Answer:
 Question 14
1 out of 1 points
Why would you want to use both host firewalls and network firewalls?

Selected Multiple layers of defense must be considered regarding access to Web servers or other
Answer: servers exposed to the Internet.
 Question 15
1 out of 1 points
The firewall’s secondary role is to:

Selected allow specific authorized access to the system using the same rules it uses to block
Answer: unauthorized access.
 Question 16
1 out of 1 points
The primary role of the firewall is to:

Selected block unauthorized access to and from the system.


Answer:

 Question 17
1 out of 1 points
Starting with Windows XP, all Windows operating systems come equipped with a built-in __________
capable of protecting them from network-based attacks.

Selected firewall
Answer:

 Question 18
1 out of 1 points
In the Windows Firewall, any rules preceded by a __________ arrow have not been enabled.

Selected gray
Answer:
 Question 19
1 out of 1 points
By default, firewalls adopt a(n) __________ policy for any access request not specifically granted
(allowed) through the firewall’s rules.

Selected deny
Answer:
 Question 20
1 out of 1 points
In the lab, you enabled __________ in Windows Firewall to allow the HTTP connection.

Selected a predefined rule


Answer:

You might also like