13.3.4 Review
Quiz by Kwok Louie
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
17 questions
Show answers
- Q1Which of the following functionalities is primarily provided by Windows Firewall?Improves computer graphicsBlocks unauthorized access to a networkOptimizes hard drive spaceIncreases internet speed30s
- Q2What is the default state of Windows Firewall when a new installation of Windows is completed?Partially enabledEnabledDisabledRequires user activation30s
- Q3Which of the following actions is NOT a function of Windows Firewall?Allowing safe outbound connectionsConfiguring application-specific rulesBlocking harmful inbound trafficMonitoring user behavior30s
- Q4What happens if Windows Firewall is turned off?The internet speed increasesAll applications will crashNo changes occurThe computer is more vulnerable to unauthorized access30s
- Q5How can users modify the settings of Windows Firewall?Using Command PromptBy installing a third-party applicationThrough the Control PanelFrom the Task Manager30s
- Q6Which feature of Windows Firewall allows users to specify which applications can receive inbound network traffic?Outbound rulesNAT traversalNetwork monitoringInbound rules30s
- Q7What is the purpose of the 'Allow an app through Windows Firewall' feature?To block internet access completelyTo create a backup of firewall settingsTo uninstall Windows FirewallTo enable specific applications to communicate over the network30s
- Q8What is the primary purpose of a demilitarized zone (DMZ) in network security, particularly when using Windows Defender?To serve as a storage area for sensitive dataTo completely isolate a device from all networksTo enhance the speed of internal network communicationsTo create a separate zone for networked devices that may be less secure, providing an extra layer of protection.30s
- Q9What is a key benefit of using a demilitarized zone (DMZ) in conjunction with Windows Defender?It increases the speed of data transfers between the DMZ and the internal networkIt reduces the risk of attacks on the internal network by isolating public-facing services.It guarantees complete protection against all types of malwareIt eliminates the need for a firewall30s
- Q10What is a common misconception about using a DMZ with Windows Defender?That it alone is sufficient to protect the internal network without additional security measures.That all devices in a DMZ are unmonitoredThat it completely isolates the internal network from all external threatsThat it eliminates the need for a firewall30s
- Q11Which of the following is a common feature of a host-based firewall?Load balancingNetwork address translationIntrusion detection systemApplication filtering30s
- Q12What is the primary purpose of a host-based firewall?To monitor and control incoming and outgoing network traffic on a single deviceTo replace antivirus softwareTo improve the internet speed of a deviceTo secure an entire network from external threats30s
- Q13How does a host-based firewall differ from a network-based firewall?A host-based firewall is more expensive than a network-based firewallA host-based firewall operates on individual devices while a network-based firewall protects the entire network.A host-based firewall encrypts data, while a network-based firewall does notA host-based firewall requires more hardware than a network-based firewall30s
- Q14What type of traffic can be monitored by a host-based firewall?Both inbound and outbound trafficTraffic from the entire networkOnly incoming trafficOnly outgoing traffic30s
- Q15What is a common way to configure a host-based firewall?Using a graphical user interface (GUI)Editing system files in the command lineNo configuration options availableAutomatic configuration based on usage30s