Cyber Security Questions and Answers Part-15

1. Which of the following is the port number for FTP control?
a) 20
b) 21
c) 22
d) 23

Answer: b
Explanation: Port number 21 is the logical port number for FTP control service. FTP protocol is a standard protocol used for transmitting and receiving files from client to server through a network.

2. Which of the following is the port number for SSH (Secure Shell)?
a) 20
b) 21
c) 22
d) 23

Answer: c
Explanation: Port number 22 is the logical port number for Secure Shell service. SSH gives users (specifically system administrators), a way to securely access computers on unsecured network connectivity.

3. Which of the following is the port number for Telnet?
a) 20
b) 21
c) 22
d) 23

Answer: d
Explanation: Port number 23 is the logical port number for Telnet. Telnet is used for bi-directional communication over the internet in text-oriented format. It also gives virtual terminal connectivity.

4. Firewalls can be of _______ kinds.
a) 1
b) 2
c) 3
d) 4

Answer: c
Explanation: Firewalls are of three kinds – one is the hardware firewalls, another is software firewalls and the other is a combination of both hardware and software.

5. _________________ is the kind of firewall is connected between the device and the network connecting to internet.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall

Answer: a
Explanation: Hardware firewalls are those firewalls that need to be connected as additional hardware between the device through which the internet is coming to the system and the network used for connecting to the internet.

6. _________ is software that is installed using an internet connection or they come by-default with operating systems.
a) Hardware Firewall
b) Software Firewall
c) Stateful Inspection Firewall
d) Microsoft Firewall

Answer: b
Explanation: Software firewalls are those kinds of firewalls that are installed in the system using internet connection as we install normal applications and update them. Some operating system vendors provide default firewalls with their operating systems.

7. Which of the following is not a software firewall?
a) Windows Firewall
b) Outpost Firewall Pro
c) Endian Firewall
d) Linksys Firewall

Answer: d
Explanation: Windows Firewall, Outpost Firewall Pro and Endian Firewall are software firewalls that are installed in the system. Linksys firewall is not an example of a software firewall.

8. Firewall examines each ____________ that are entering or leaving the internal network.
a) emails users
b) updates
c) connections
d) data packets

Answer: d
Explanation: Firewalls examines each data packets that are entering or leaving the internal network which ultimately prevents unauthorized access.

9. A firewall protects which of the following attacks?
a) Phishing
b) Dumpster diving
c) Denial of Service (DoS)
d) Shoulder surfing

Answer: c
Explanation: Firewalls are used to protect the computer network and restricts illicit traffic. Denial of Service (DoS) attack is one such automated attack which a firewall with proper settings and the updated version can resist and stop from getting executed.

10. There are ______ types of firewall.
a) 5
b) 4
c) 3
d) 2

Answer: b
Explanation: There are four types of firewall based on their working and characteristics. These are Packet Filtering Firewalls, Circuit Level Gateway Firewalls, Application level Gateway Firewalls, and Stateful Multilayer Inspection Firewalls.