250+ TOP MCQs on Attack Vectors – Reverse Engineering and Answers

Cyber Security Multiple Choice Questions on “Attack Vectors – Reverse Engineering”.

1. ______________ can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development.
a) Reverse hacking
b) Cracking
c) Social engineering
d) Reverse engineering

Answer: d
Clarification: Reverse engineering can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development. This process involves how the system or the application works and what needs to be done in order to crack it.

2. _____________ can be made functional to diverse aspects of software development & hardware improvement activities.
a) Reverse hacking
b) Cracking
c) Reverse engineering
d) Social engineering

Answer: c
Clarification: Reverse engineering can be made functional to diverse aspects of software development & hardware improvement activities. This practice absorbs how the system or the application works & what concepts have to implement in order to crack or duplicate it.

3. RE is often defined as the crafting technique of ____________ who uses his skills to remove copy protection or trial versions from software or media.
a) crackers
b) risk assessment team
c) auditors
d) surveillance monitoring team

Answer: a
Clarification: Reverse Engineering is often defined as the crafting technique of crackers who uses his skills to remove copy protection or trial versions from software or media. Reverse engineering can be made functional to diverse aspects of software development & hardware improvement activities.

4. Which of the following activity is a good aspect of reverse engineering in ethical hacking?
a) Cracking the trial version of the product to make it full-version
b) Removing the product key insertion step
c) Jumping the code for premium facilities
d) Determining the vulnerabilities in the product.

Answer: d
Clarification: Reverse engineering (RE) can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development. Determining the vulnerabilities in the product is one good aspect of RE.

5. Which of the following activity is a good aspect of reverse engineering in ethical hacking?
a) Cracking the trial version of the product to make it full-version
b) Removing the product key insertion step
c) Jumping the code for premium facilities
d) Determine whether the app contains any undocumented functionality

Answer: d
Clarification: The duplication of another creation or developed product trailing thorough examination of its production or development is termed as Reverse Engineering. Determine whether the app contains any undocumented functionality is one good aspect of RE.

6. Which of the following is not a proper use of RE for ethical hackers?
a) Check for poorly designed protocols
b) Check for error conditions
c) Cracking for making paid apps free for use
d) Testing for boundary conditions

Answer: c
Clarification: Cracking for making paid apps free for use is not an acceptable reverse engineering work for ethical hackers. This process involves how the system or the application works internally and how to change the logic to crack the system or app.

7. ________________ is the opposite of assembler.
a) Reassembler
b) Disassembler
c) Compiler
d) Interpreter

Answer: b
Clarification: An assembler converts code written in assembly language to binary/machine code, disassembler does the reverse for cracking purpose. The disassembler is the opposite of assembler.

8. ______________ comes under tools for reverse engineering (RE).
a) Reassembler
b) Compiler
c) Disassembler
d) Interpreter

Answer: c
Clarification: Disassembler is the opposite of assembler. As assemblers are used to convert code written in assembly language to binary/machine code, disassembler does the reverse for cracking purpose & it comes under reverse engineering tool.

9. De-compilation is not done for _______________
a) Recovery of lost source code
b) Migration of assembly language
c) Determining the existence of malicious code in any app
d) Targeting users with stealing code

Answer: d
Clarification: De-compilation is a technique of reverse engineering which is used for recovery of lost source code, migration of assembly language or determining the existence of malicious code in any app.

10. Which of the following is not a disassembler tool?
a) IDA Pro
b) PE Explorer
c) Turbo C
d) W32DASM

Answer: c
Clarification: As assembler converts code written in assembly language to binary/machine code, disassembler does the reverse for cracking purpose & it comes under reverse engineering tool. Turbo C is not a disassembler tool.

11. There are ______ types of reverse engineering methodologies.
a) 6
b) 2
c) 5
d) 3

Answer: b
Clarification: There are two types of reverse engineering methodologies. One is where the source-code is obtainable, but the high-level aspects of the program are not. For the other type, the software’s source code is not obtainable.

12. Which of the following is not an actual Reverse Engineering tool?
a) Debugger
b) Disassembler
c) Text Editor
d) Hex Editor

Answer: c
Clarification: Reverse engineering is the art of finding out & duplication of another creator’s or developer’s product by examination of any product or development methodologies. A text editor is not a Reverse Engineering tool.

13. Hex editors permit programmers to inspect & alter binaries based on some software requirements.
a) True
b) False

Answer: a
Clarification: Hex editors are reverse engineering tools that permit programmers to inspect & alter binaries based on some software requirements. They help in manipulating fundamental binary data in an app.

14. PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software.
a) PE & Resource Viewer
b) Debugger
c) Disassembler
d) Hex Editor

Answer: a
Clarification: There are various categories of reverse engineering tools. PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software.

15. IDAPro is used as a _________________ in manual binary code analysis and also used a debugger.
a) PE & Resource Viewer
b) Debugger
c) Disassembler
d) Hex Editor

Answer: c
Clarification: Disassembler in Reverse Engineering used to slice up binary codes into assembly codes. IDAPro is used as a disassembler in manual binary code analysis and also used as a debugger.

250+ TOP MCQs on Firewalls and Answers

Cyber Security Multiple Choice Questions on “Firewalls”.

1. Firewalls can be of _______ kinds.
a) 1
b) 2
c) 3
d) 4

Answer: c
Clarification: Firewalls are of three kinds – one is the hardware firewalls, another is software firewalls and the other is a combination of both hardware and software.

2. _________________ is the kind of firewall is connected between the device and the network connecting to internet.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall

Answer: a
Clarification: Hardware firewalls are those firewalls that need to be connected as additional hardware between the device through which the internet is coming to the system and the network used for connecting to the internet.

3. _________ is software that is installed using an internet connection or they come by-default with operating systems.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall

Answer: b
Clarification: Software firewalls are those kinds of firewalls that are installed in the system using internet connection as we install normal applications and update them. Some operating system vendors provide default firewalls with their operating systems.

4. Which of the following is not a software firewall?
a) Windows Firewall
b) Outpost Firewall Pro
c) Endian Firewall
d) Linksys Firewall

Answer: d
Clarification: Windows Firewall, Outpost Firewall Pro and Endian Firewall are software firewalls that are installed in the system. Linksys firewall is not an example of a software firewall.

5. Firewall examines each ____________ that are entering or leaving the internal network.
a) emails users
b) updates
c) connections
d) data packets

Answer: d
Clarification: Firewalls examines each data packets that are entering or leaving the internal network which ultimately prevents unauthorized access.

6. A firewall protects which of the following attacks?
a) Phishing
b) Dumpster diving
c) Denial of Service (DoS)
d) Shoulder surfing

Answer: c
Clarification: Firewalls are used to protect the computer network and restricts illicit traffic. Denial of Service (DoS) attack is one such automated attack which a firewall with proper settings and the updated version can resist and stop from getting executed.

7. There are ______ types of firewall.
a) 5
b) 4
c) 3
d) 2

Answer: b
Clarification: There are four types of firewall based on their working and characteristics. These are Packet Filtering Firewalls, Circuit Level Gateway Firewalls, Application level Gateway Firewalls, and Stateful Multilayer Inspection Firewalls.

8. Packet filtering firewalls are deployed on ________
a) routers
b) switches
c) hubs
d) repeaters

Answer: a
Clarification: Packet filtering firewalls are deployed on routers that help in connecting internal network worldwide via the internet.

9. In the ______________ layer of OSI model, packet filtering firewalls are implemented.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer

Answer: d
Clarification: In the network layer, which is the third layer of the OSI (Open Systems Interconnection) model, packet filtering firewalls are implemented.

10. The __________ defines the packet filtering firewall rules.
a) Access Control List
b) Protocols
c) Policies
d) Ports

Answer: a
Clarification: The Access Control List is a table containing rules that instruct the firewall system to provide the right access. It checks all the packets and scans them against the defined rule set by Network administrator in the packet filtering firewall.

11. ACL stands for _____________
a) Access Condition List
b) Anti-Control List
c) Access Control Logs
d) Access Control List

Answer: d
Clarification: The Access Control List is a table containing to check all the packets and scans them against the defined rule set by Network administrator in any particular system or firewall.

12. When a packet does not fulfil the ACL criteria, the packet is _________
a) resend
b) dropped
c) destroyed
d) acknowledged as received

Answer: b
Clarification: In the packet filtering firewall, when the rules defined by the Access Control List is not meet by any data packet, the packet is dropped & logs are updated in the firewall.

13. Network administrators can create their own ACL rules based on _______ ________ and _______
a) Address, Protocols and Packet attributes
b) Address, Protocols and security policies
c) Address, policies and Packet attributes
d) Network topology, Protocols and data packets

Answer: a
Clarification: Network administrators can create their own ACL rules based on Address, Protocols and Packet attributes. This is generally done where the specific customised type of data packets need to pass through firewall screening.

14. One advantage of Packet Filtering firewall is __________
a) more efficient
b) less complex
c) less costly
d) very fast

Answer: c
Clarification: Packet filtering firewalls are more advantageous because they are less costly and they use fewer resources and are used effectively in small networks.

15. Packet filtering firewalls work effectively in _________ networks.
a) very simple
b) smaller
c) large
d) very large complex

Answer: b
Clarification: Packet Filtering Firewalls are applied within routers which connect the internal Network system with the outside network using the internet. It works effectively if the internal network is smaller in size.

250+ TOP MCQs on How Security Breach Takes Place and Answers

Advanced Cyber Security Questions and Answers on “How Security Breach Takes Place”.

1. ___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
a) Data-hack
b) Data-stealing
c) Database altering
d) Data breach

Answer: d
Clarification: Data breach an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information. This is either done using a network to steal all local files or get access physically to a system.

2. Which of these is not a step followed by cyber-criminals in data breaching?
a) Research and info-gathering
b) Attack the system
c) Fixing the bugs
d) Exfiltration

Answer: c
Clarification: During a hack, the cyber-criminals first do a research on the victim gathers information on the victim’s system as well as network. Then perform the attack. Once the attacker gains access it steals away confidential data.

3. What types of data are stolen by cyber-criminals in most of the cases?
a) Data that will pay once sold
b) Data that has no value
c) Data like username and passwords only
d) Data that is old

Answer: a
Clarification: Usually, cyber-criminals steal those data that are confidential and adds value once they are sold to the dark-market or in different deep web sites. Even these days, different companies buy customer data at large for analyzing data and gain profit out of it.

4. Which of the companies and organizations do not become the major targets of attackers for data stealing?
a) Business firms
b) Medical and Healthcare
c) Government and secret agencies
d) NGOs

Answer: d
Clarification: Attackers target large organizations and firms that consists of business firms, financial corporations, medical and healthcare firms, government and secret agencies, banking sectors. They’ve valuable information which can cost them huge so major targets for hackers such firms only.

5. ___________ will give you an USB which will contain ___________ that will take control of your system in the background.
a) Attackers, Trojans
b) White hat hackers, antivirus
c) White hat hackers, Trojans
d) Attackers, antivirus

Answer: a
Clarification: To do a security breaching in your system, your friend or anyone whom you deal with may come up with a USB drive and will give you to take from you some data. But that USB drive may contain Trojan that will get to your computer once triggered. So try using updated antivirus in your system.

6. An attacker, who is an employee of your firm may ___________ to know your system password.
a) do peeping
b) perform network jamming
c) do shoulder surfing
d) steal your laptop

Answer: c
Clarification: An attacker, who is an employee of your firm may do shoulder surfing to know your system password. Shoulder surfing is a social engineering technique used to secretly peep to gain knowledge of your confidential information.

7. You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________
a) Dumpster diving
b) Shoulder surfing
c) Phishing
d) Spamming

Answer: a
Clarification: Dumpster diving is a social engineering technique used by hackers to grab your personal and confidential data from that thrown-away file also. Using these data attackers may use password guessing or fraud calls (if they find your personal phone number).

8. ATM Skimmers are used to take your confidential data from your ATM cards.
a) True
b) False

Answer: a
Clarification: ATM card skimmers are set up by attackers in ATM machines which look exactly same but that secretly inserted machine will take information from the magnetic strip of your card and store it in its memory card or storage chip.

9. _____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system.
a) Scareware
b) Ransomware
c) Adware
d) Spyware

Answer: b
Clarification: Ransomware is special types of malware that will infect your system, compromise all data by encrypting them and will pop up asking you for a ransom which will be in the form of Bitcoins (so that the attacker do not get tracked) and once the ransom is paid, it will release all files.

10. ______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems.
a) Scareware
b) Ransomware
c) Adware
d) Spyware

Answer: d
Clarification: Spywares are special malware programs written by elite hackers and black hat hackers to spies your mobile phones and systems. This program secretly spy on the target system or user and takes their browsing activities, app details and keeps track of their physical locations.

11. The antivirus or PC defender software in a system helps in detecting virus and Trojans.
a) True
b) False

Answer: a
Clarification: The antivirus or PC defender software in a system helps in detecting virus and Trojans provided the antivirus or the defender application needs to be up-to-date.

12. Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system.
a) that vendor’s site
b) security solution site
c) malicious site
d) software downloading site

Answer: c
Clarification: Clicking a link which is there in your email which came from an unknown source can redirect you to a malicious site that will automatically install malware in your system. The mail will be sent by the attacker.

13. An attacker may use automatic brute forcing tool to compromise your ____________
a) username
b) employee ID
c) system / PC name
d) password

Answer: d
Clarification: In most of the cases, the attacker uses automated brute force tools for compromising your PIN or password. This makes fetching of your password easier by a combination of different letters as a trial-and-error approach.

14. The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________
a) Distributed Denial-of-Service (DDoS)
b) Permanent Denial-of-Service (PDoS)
c) Denial-of-Service (DoS)
d) Controlled Denial-of-Service (CDoS)

Answer: a
Clarification: Here the attacker uses multiple PCs and floods the bandwidth/resources of the victim’s system, (usually 1 or many web-servers). The attack uses zombie PCs and each of the PC’s are remotely controlled by the attacker.

15. Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information.
a) True
b) False

Answer: a
Clarification: Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information. This type of hacking comes under physical hacking.

250+ TOP MCQs on Cyber Security Types – Mobile Phone Security

Cyber Security Multiple Choice Questions on “Cyber Security Types – Mobile Phone Security”.

1. Which of the following is not an appropriate way of targeting a mobile phone for hacking?
a) Target mobile hardware vulnerabilities
b) Target apps’ vulnerabilities
c) Setup Keyloggers and spyware in smart-phones
d) Snatch the phone

Answer: d
Clarification: Snatching is not a type of hacking any smart-phone. Targeting the hardware and application level vulnerabilities and setting some keylogger or spyware in the target mobile can help get valuable info about the victim.

2. Which of the following is not an OS for mobile?
a) Palm
b) Windows
c) Mango
d) Android

Answer: c
Clarification: A mobile/smart-phone operating system is software which allows smart-phones, tablets, phablets & other devices to run apps & programs within it. Palm OS, Windows OS, and Android OS are some of the examples of Mobile OS.

3. Mobile Phone OS contains open APIs that may be _____________ attack.
a) useful for
b) vulnerable to
c) easy to
d) meant for

Answer: b
Clarification: Mobile phone operating systems contain open APIs that or may be vulnerable to different attacks. OS has a number of connectivity mechanisms through which attackers can spread malware.

4. ____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.
a) Worms
b) Antivirus
c) Malware
d) Multimedia files

Answer: c
Clarification: Malware gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.

5. ____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.
a) OS Security
b) Database security
c) Cloud security
d) Mobile security

Answer: d
Clarification: Mobile security is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.

6. Mobile security is also known as ____________
a) OS Security
b) Wireless security
c) Cloud security
d) Database security

Answer: b
Clarification: Mobile security also known as wireless security is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.

7. DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.
a) worms
b) virus
c) botnets
d) programs

Answer: c
Clarification: Botnets on compromised mobile devices wait for instructions from their owner. After getting the owner’s instruction it launches DDoS flood attack. This result in a failure in connecting calls or transmitting data.

8. Hackers cannot do which of the following after compromising your phone?
a) Steal your information
b) Rob your e-money
c) Shoulder surfing
d) Spying

Answer: c
Clarification: Shoulder surfing is done before compromising the mobile. So, hackers can steal your information; rob your e-money or do spying after compromising your smart-phone.

9. Hackers cannot do which of the following after compromising your phone?
a) Shoulder surfing
b) Accessing your voice mail
c) Steal your information
d) Use your app credentials

Answer: a
Clarification: Shoulder surfing is done before compromising the mobile. So, hackers can steal your information; accessing your voice mail or use your app credentials after compromising your smart-phone.

10. App permissions can cause trouble as some apps may secretly access your memory card or contact data.
a) True
b) False

Answer: a
Clarification: App permissions can cause trouble as some apps may secretly access your memory card or contact data. Almost all applications nowadays ask for such permission, so make sure you do a proper survey on these apps before allowing such access.

11. Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.
a) Flash Light
b) App updates
c) Bluetooth
d) Rotation

Answer: c
Clarification: Activate Bluetooth when you’re required it to use, otherwise turn it off for security purpose. This is because; there are various tools and vulnerabilities that may gain access to your smart-phone using Bluetooth.

12. Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.
a) Biometric
b) PIN-based
c) Alphanumeric
d) Short

Answer: a
Clarification: Try not to keep biometric passwords, especially fingerprint for your smart-phone containing very confidential data, because anyone can do physical hacking if you’re not aware or asleep.

13. Which of the following tool is used for Blackjacking?
a) BBAttacker
b) BBProxy
c) Blackburried
d) BBJacking

Answer: b
Clarification: BBProxy (installed on blackberry phones) is the name of the tool used to conduct blackjacking. What attackers do is they install BBProxy on user’s blackberry and once the tool is activated it opens a covert channel between the hacker and the compromised host.

14. BBProxy tool is used in which mobile OS?
a) Android
b) Symbian
c) Raspberry
d) Blackberry

Answer: d
Clarification: BBProxy (installed on blackberry phones) is the name of the tool used to conduct blackjacking. What attackers do is they install BBProxy on user’s blackberry and once the tool is activated it opens a covert channel between the hacker and the compromised host.

15. Which of the following is not a security issue for PDAs?
a) Password theft
b) Data theft
c) Reverse engineering
d) Wireless vulnerability

Answer: c
Clarification: Reverse engineering is not an issue of PDA (Personal Digital Assistant). Password theft, data theft, wireless vulnerability exploitation, data corruption using virus are some of them.

250+ TOP MCQs on Attack Vectors – Reverse Engineering and Answers

Cyber Security Assessment Questions and Answers on “Attack Vectors – Reverse Engineering”.

1. ________________ is a type of reverse engineering tool that is used to dissect binary codes into assembly codes.
a) PE & Resource Viewer
b) Debugger
c) Disassembler
d) Hex Editor

Answer: c
Clarification: Disassembler is a type of reverse engineering tool that is used to dissect binary codes into assembly codes. They are also in use to extract functions, strings, libraries, and other parts of a program.

2. Which of the following is not a function or use of disassembler?
a) Extracting functions & libraries
b) Extracting strings and values
c) Assemble medium-level codes
d) Dissect binary codes

Answer: c
Clarification: Assembling of medium-level codes is not the use of disassembler. The disassembler is a type of reverse engineering tool that is used to dissect binary codes into assembly codes.

3. Which of the following is not a feature of IDAPro?
a) Instant debugging
b) Connect local and remote systems easily
c) Explore in-depth binary data
d) Convert machine language to high-level code

Answer: d
Clarification: IDAPro is used as a disassembler in manual binary code analysis and also used as debugger which is used for instant debugging, connect local and remote systems easily and explore in-depth binary data.

4. A _____________ takes executable file as input and tries to generate high level code.
a) Debugger
b) Decompiler
c) Disassembler
d) Hex Editor

Answer: b
Clarification: A decompiler takes an executable file as input and tries to generate high-level code. They can be said as opposite of compiler. It does not attempt to reverse the actions of the compiler; rather it transforms the input program repeatedly until HLL code is achieved.

5. ________________ does not attempt to reverse the actions of compiler; rather it transforms the input program repeatedly until HLL code is achieved.
a) Debugger
b) Hex Editor
c) Disassembler
d) Decompiler

Answer: d
Clarification: Usually, decompiler is feed with executable files and it tries to produce high-level code. They can be said as opposite of compiler. It does not attempt to reverse the actions of a compiler; rather it transforms the input program repeatedly until HLL code is achieved.

6. _____________ will not recreate the original source file created by the compiler.
a) Debugger
b) Hex Editor
c) Decompiler
d) Disassembler

Answer: c
Clarification: Decompilers does not attempt to reverse the actions of a compiler; rather it transforms the input program repeatedly until HLL code is achieved. They will not recreate the original source file created by the compiler.

7. Which of the following is not a decompiler tool?
a) DCC decompiler
b) Borol and C
c) Boomerang Decompiler
d) ExeToC

Answer: b
Clarification: Decompilers are part of Reverse Engineering tools that try to generate high-level code. Some common decompiler tools are DCC decompiler, Boomerang Decompiler, ExeToC, REC (reverse engineering compiler) etc.

8. REC stands for ________________
a) Reverse Engineering Compiler
b) Reverse Engineering Computer
c) Return-to-Code Engineering Compiler
d) Reversing Engineered Compiler

Answer: a
Clarification: Reverse Engineering Compiler (REC) is a decompiler tool that is part of Reverse Engineering tools which takes an executable file as input and tries to generate high-level code.

9. _______________ is a universal interactive program environment for reverse engineering.
a) TurboC
b) Andromeda Decompiler
c) IDAPro
d) PE Explorer

Answer: b
Clarification: Andromeda Decompiler is a universal interactive program environment for reverse engineering. It is a popular interactive decompiler that tries to generate high-level code.

10. Which one is not an example of .Net application decompiler?
a) Salamander
b) Dis#
c) Decompiler.Net
d) MultiRipper

Answer: d
Clarification: Decompilers are part of Reverse Engineering tools that take an executable file as input and tries to generate high-level code. MultiRipper is a Delphi and C++ decompiler. Salamander, Dis#, Anakrino & Decompiler.Net are .NET application decompilers.

250+ TOP MCQs on Firewalls and Answers

Cyber Security Interview Questions and Answers for Experienced people on “Firewalls”.

1. Packet filtering firewalls are vulnerable to __________
a) hardware vulnerabilities
b) MiTM
c) phishing
d) spoofing

Answer: d
Clarification: One popular disadvantage of the packet filtering technique is that it cannot support the complex models of rules and is spoofing attack-prone in some cases as well.

2. Circuit-level gateway firewalls are installed in _______ layer of OSI model.
a) Application layer
b) Session layer
c) Presentation layer
d) Network layer

Answer: b
Clarification: In the session layer (which is the fifth layer) of the OSI model, circuit-level gateway firewalls are deployed for monitoring TCP sessions for 3-way handshakes.

3. Which of these comes under the advantage of Circuit-level gateway firewalls?
a) They maintain anonymity and also inexpensive
b) They are light-weight
c) They’re expensive yet efficient
d) They preserve IP address privacy yet expensive

Answer: a
Clarification: For a private network, or for organizations, circuit-level gateway firewalls maintain anonymity. They’re also inexpensive as compared to other firewall types.

4. Which of the following is a disadvantage of Circuit-level gateway firewalls?
a) They’re expensive
b) They’re complex in architecture
c) They do not filter individual packets
d) They’re complex to setup

Answer: c
Clarification: Circuit-level gateway firewalls don’t filter packets individually which gives the attacker a chance to take access in the network.

5. _____________ gateway firewalls are deployed in application-layer of OSI model.
a) Packet Filtering Firewalls
b) Circuit Level Gateway Firewalls
c) Application-level Gateway Firewalls
d) Stateful Multilayer Inspection Firewalls

Answer: c
Clarification: Application level Gateway Firewalls are deployed in the application-layer of OSI model for protecting the network for different protocols of the application layer.

6. Application level gateway firewalls protect the network for specific _____________
a) application layer protocol
b) session layer protocol
c) botnet attacks
d) network layer protocol

Answer: a
Clarification: Some specific application layer protocols need protection from attacks which is done by the application level gateway firewall in the application layer of the OSI model.

7. Application level gateway firewalls are also used for configuring cache-servers.
a) True
b) False

Answer: a
Clarification: As caching servers, the application level gateway firewalls are configured that helps in increasing the network performance making it smooth for logging traffic.

8. ___________ firewalls are a combination of other three types of firewalls.
a) Packet Filtering
b) Circuit Level Gateway
c) Application-level Gateway
d) Stateful Multilayer Inspection

Answer: d
Clarification: Stateful Multilayer Inspection firewalls are a combination of other three types of firewalls. These combinations are Packet filtering, circuit level and application-level gateway firewalls.

9. Stateful Multilayer Inspection firewall cannot perform which of the following?
a) Filter network layer packets
b) Check for legitimate session
c) Scans for illicit data packets at the presentation layer
d) Evaluate packets at application lager

Answer: c
Clarification: Stateful Multilayer Inspection firewalls are designed to perform filtering packets in the network layer, check for legitimate sessions in the session layer as well as evaluate all packets at the application layer of OSI model. But it cannot scan for illicit data packets at the presentation layer.

10. We can also implement ____________ in Stateful Multilayer Inspection firewall.
a) external programs
b) algorithms
c) policies
d) algorithms and external programs

Answer: b
Clarification: Stateful Multilayer Inspection firewall can also allow us to implement algorithms as well as complex security modes making data transfer more secure.

11. One advantage of Stateful Multilayer Inspection firewall is __________
a) costlier but easy to understand
b) large to manage
c) complex internal architecture
d) large to manage but efficient

Answer: c
Clarification: Stateful Multilayer Inspection firewalls are complex internally due to multiple characteristics of different firewalls incorporated together which makes it powerful and more secure.

12. Packet filtering firewalls are also called ____________
a) first generation firewalls
b) second generation firewalls
c) third generation firewalls
d) fourth generation firewalls

Answer: a
Clarification: Packet filtering firewalls are also called the first generation firewalls. It came into the picture around the 1980s. Packet filtering technique cannot support the complex models of rules and is spoofing attack-prone in some cases as well.

13. Stateful Multilayer firewalls are also called ____________
a) first generation firewalls
b) second generation firewalls
c) third generation firewalls
d) fourth generation firewalls

Answer: b
Clarification: Stateful multilayer firewalls are also called second generation firewalls. They came into the picture in around 1989-1990. Due to multiple characteristics of different firewalls in Multilayer Inspection firewalls, it makes such type of firewalls powerful and more secure.

14. Application layer firewalls are also called ____________
a) first generation firewalls
b) second generation firewalls
c) third generation firewalls
d) fourth generation firewalls

Answer: c
Clarification: Application layer firewalls are also called third generation firewalls. They came into the picture in around 1995-1998. Application level gateway firewalls are helped in making the network performance smooth for logging traffic.