Computer Science 202: Network and System Security  /  Computer Science Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Network Firewall Systems Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Spoofing:

Question 2 2. The network administrator of Chocolate Biscuit International company noticed a sudden spike in the volume of messages transmitted message packets into the network. He starts processes to investigate the reason for the surge. Before his investigation could yield any results, the system crashes and shuts down. Chocolate Biscuit International may be a victim of _____ attacks.

Question 3 3. In what way is a peer-to-peer network different from client/server networks?

Question 4 4. What is NOT true about a computer network?

Question 5 5. The _____ is a service that runs on the network and reports back on the health and status of devices.

Page 2

Question 6 6. A/An _____ is an addressable device on a network that can receive, process, and respond to network signals.

Question 7 7. Which internet protocol is responsible for moving data packets along the Internet network?

Question 8 8. IPv4 requires that every system with connectivity to the Internet have a unique _____ internet address.

Question 9 9.

What is(are) the principal difference(s) between a smartphone and a tablet?

a) screen size

b) ability to make and receive calls over the cellular network

c) use of touchscreen technology

d) processing speed

Question 10 10. A device that you can use to make and receive calls using a wireless connection and also contain some of the functionality of a computer is called a _____.

Page 3

Question 11 11. What is the maximum number of zones that can be associated to a firewall?

Question 12 12. Which of the following is the purpose of a firewall access policy?

Question 13 13. This incorporated feature of a firewall system can monitor network traffic for potential breaches:

Question 14 14. Packet filtering relies on _____ to accept or reject packets.

Question 15 15. In the OSI model, the hyperlink uses a(n) ____ to name the pages on the web.

Page 4

Question 16 16. In the OSI model, the application layer is:

Question 17 17. SSH proxy tunneling is

Question 18 18. Port forwarding

Question 19 19. Typically, an IPv4 packet is composed of how many fields?

Question 20 20. Which protocol below is used to format most data packets for transmission over the Internet?

Page 5

Question 21 21. Which organization created the suggested standard for communications that describes how data is sent and received over a network?

Question 22 22. Which of the following problems would the OSI Model solve?

Question 23 23. Which of the following is the strongest password?

Question 24 24. A firewall is a _____.

Question 25 25. Janet receives an email from her bank requesting she update her personal details on the banking website by clicking the link included in the email. The sender's email address, however, is characterized by a domain name similar but not identical to that of her bank's. Janet may be a victim of a/an _____.

Page 6

Question 26 26. The bandwidth of a computer network refers to _____.

Question 27 27. Network management tools can:

Question 28 28. Which of these is not one of TCP/IP's five protocol layers?

Question 29 29. In the context of wireless computing devices, the term PDA stands for _____ _____ _____ ?

Question 30 30. Live threat-intelligence helps the firewall to identify and stop _____.

Network Firewall Systems Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Support