Home
41.
Which of the following mechanisms is used most often in firewall rules to allow traffic onto the network?
  • A.
    Hardware addresses
  • B.
    IP addresses
  • C.
    Protocol numbers
  • D.
    Port numbers
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
A. Incorrect: Firewalls can conceivably use hardware addresses to filter network traffic, but this is rarely a practical solution.
B. Incorrect: Firewalls typically filter specific types of network traffic, not entire IP addresses.
C. Incorrect: Filtering by protocol number typically does not provide the granularity needed to create an efficient firewall configuration.
D. Correct: Firewalls typically use port numbers to allow traffic onto the network.
Report
Name Email  
42.
Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?
  • A.
    EFS
  • B.
    IPsec
  • C.
    UAC
  • D.
    Kerberos
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A. Incorrect: Encrypting File System only provides security for the storage medium, not for network traffic. B. Correct: Connection security rules require that network traffic allowed through the firewall use IPsec for security. C. Incorrect: User Account Control cannot restrict network traffic. D. Incorrect: Kerberos is an authentication protocol. It cannot restrict network traffic.
Report
Name Email  
43.
Which of the following actions cannot be performed from the Windows Firewall control panel?
  • A.
    Allowing an application through the firewall in all three profiles
  • B.
    Blocking all incoming connections for any of the three profiles
  • C.
    Creating firewall exceptions based on port numbers for all three profiles
  • D.
    Turning Windows Firewall off for all three profiles
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
A. Incorrect: You can allow an application through the firewall for all three profiles by using the Windows Firewall control panel. B. Incorrect: You can use the Windows Firewall control panel to block all incoming connections for all three profiles. C. Correct: You cannot block traffic based on port numbers for all three profiles by using the Windows Firewall control panel. D. Incorrect: You can use the Windows Firewall control panel to turn the firewall on and off for any of the three profiles.
Report
Name Email  
44.
Which of the following tools cannot enable and disable the Network Discovery firewall rules?
  • A.
    File Explorer
  • B.
    Network and Sharing Center
  • C.
    Action Center
  • D.
    Allowed Apps dialog box
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
A. Incorrect: File Explorer displays a link that enables the Network Discovery rules. B. Incorrect: The Network and Sharing Center control panel contains a link that provides access to controls for the Network Discovery tools. C. Correct: The Action Center control panel does not contain Network Discovery controls. D. Incorrect: The Allowed Apps dialog box contains controls for the Network Discovery rules.
Report
Name Email  
45.
Which of the following statements about Windows Firewall are true? (Choose all that apply.)
  • A.
    Applying firewall rules by using Group Policy overwrites all the firewall rules on the target computer.
  • B.
    Applying firewall rules by using Group Policy combines the newly deployed rules with the ones already there.
  • C.
    Importing firewall rules saved from another computer overwrites all the rules on the target system.
  • D.
    Importing firewall rules saved from another computer combines both sets of settings.
  • Answer & Explanation
  • Report
Answer : [B, C]
Explanation :
A. Incorrect: Firewall rules applied with Group Policy combine with the existing rules. B. Correct: Firewall rules applied with Group Policy combine with the existing rules. C. Correct: Importing Windows Firewall rules from another system overwrites all the existing rules. D. Incorrect: Importing rules overwrites the existing rules; it does not combine them.
Report
Name Email