Preview

Windows Firewall: Quiz

Satisfactory Essays
Open Document
Open Document
436 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Windows Firewall: Quiz
Question 1
Regarding firewall configuration, __________ is the most secure position to start from.
Block all traffic

Question 2
Which of the following items is not found in the Security section of the Windows 8.1 Action Center?
a. Virus Protection
b. Automatic maintenance
c. Network firewall
d. Windows SmartScreen

Question 3
Which of the following is not an item that can be used when building Windows Firewall rules?
a. IP addresses of computers
b. Protocol numbers
c. Packet sequence numbers
d. Port numbers

Question 4
The Windows Firewall in Windows 8.1 can have rules configured that allows traffic to flow in which direction(s)?
a. Either inbound or outbound, but not both
b. Only inbound
c. Both inbound and outbound
d. Only outbound

Question 5
When do data protection technologies such as the Windows 8.1 Encrypting File System (EFS) and BitLocker protect data?
a. At all times
b. Only when the data is stored on a disk
c. Only when the data is transmitted on the network
d. Only when the computer is turned off

Question 6
When using the Windows Firewall with Advanced Security console, you will see three distinct network locations that impact the behavior of the Windows Firewall. Which of the following is not one of these network locations used by the Windows Firewall?
a. Default
b. Public
c. Domain
d. Private

Question 7
In most cases, how is malware introduced into a computer system?
a. Through a deliberate act of a bad actor (attacker)
b. Through an accidental act of the computer’s user
c. Through a deliberate act of the computer’s user
d. Through an accidental act of a bad actor (attacker)

Question 8
The ___________ is a single user virus scanner that Microsoft supplies in each of its monthly operating system updates.
Virus Protection

Question 9
IPsec protects data in transit by ___________, in which data packets are encapsulated within other packets for their protection.
Tunneling

Question 10
A Windows Firewall policy file has what file extension?
a. .wfp
b.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    7. Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items except for which of the following? Routing method…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 1591 Words
    • 9 Pages

    7. What is the piece of hardware that allows a device to physically access a network?…

    • 1591 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    5) Firewall: A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Question 10: Why can you not simply leave Windows Firewall turned off when you deploy an actual web server?…

    • 560 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Unit 8 eCommerce P1

    • 1328 Words
    • 6 Pages

    Firewall: A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analysing the data packets and determining whether they should be allowed through or not, based on a rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.…

    • 1328 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    Answer: Computer Name, OS, Security Settings for Windows Firewall, Drives, Running Programs, and Installed Programs and Versions.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays