Está en la página 1de 2

19/01/2020 Firewall Quiz

 The Evolution of Cybersecurity

Started on Sunday, 19 January 2020, 7:30 PM


State Finished
Completed on Sunday, 19 January 2020, 7:34 PM
Time taken 4 mins 30 secs
Marks 5/5
Grade 100 out of 100
Feedback Congratulations, you have passed!

Question 1 What do third generation firewalls do that previous generations did not?
Correct

Mark 1 out of 1

Select one:
Provide application layer filtering as they understand different protocols. 

Provide a risk score to let the recipient know if any suspect packets are being received.

Ensure that HTTPS traffic is not corrupted.

Filter the conversation to ensure that only relevant data is sent to the recipient.

Question 2 Second generation firewalls were designed to add more functionality. What additional functionality did they bring? 
Correct

Mark 1 out of 1

Select one:
They observe network connections over time and continuously examine conversations between endpoints. 

They examine packet headers to detect if the packet contains viruses.

They block any conversation that uses bad language.

They look up the IP address of the sender to determine if the source is on a suspect network.

Question 3 What is Fortinet’s range of firewall devices called?


Correct

Mark 1 out of 1

Select one:
FortiGate 

FortiGuard

FortiBlocker

FortiFirewall

Question 4 What did early packet filter firewalls do when they detected a packet that did not comply with their rules? (Choose two.)
Correct

Mark 1 out of 1

Select one or more:


Mark the packet as suspect but continue to send to the destination IP address.

Launch a DDOS attack on the sender’s IP address.

Block the packet and send a message to the sender. 

Block all network traffic to the destination IP address.

Silently drop the packet. 

https://training.fortinet.com/mod/quiz/review.php?attempt=2207321&cmid=12846 1/2
19/01/2020 Firewall Quiz

Question 5 In network security, what is the purpose of a firewall? 


Correct

Mark 1 out of 1

Select one:
Prevent unauthorized USB devices from being plugged into a user’s endpoint.

Limit the number of users on the network.

Control the flow of network traffic. 

Prevent authorized users from accessing corporate servers.

https://training.fortinet.com/mod/quiz/review.php?attempt=2207321&cmid=12846 2/2