in Education by
When a packet does not fulfil the ACL criteria, the packet is _________ (a) resend (b) dropped (c) destroyed (d) acknowledged as received I have been asked this question during an online interview. Query is from Firewalls topic in chapter Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right choice is (b) dropped Easy explanation: In the packet filtering firewall, when the rules defined by the Access Control List is not meet by any data packet, the packet is dropped & logs are updated in the firewall.

Related questions

0 votes
    Packet filtering firewalls work effectively in _________ networks. (a) very simple (b) smaller (c) large (d) very ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ACL stands for _____________ (a) Access Condition List (b) Anti-Control List (c) Access Control Logs (d) Access ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Network administrators can create their own ACL rules based on _______ ________ and _______ (a) Address, Protocols and ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Packet filtering firewalls are deployed on ________ (a) routers (b) switches (c) hubs (d) repeaters I have been ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In the ______________ layer of OSI model, packet filtering firewalls are implemented. (a) Application layer (b) Session ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    The __________ defines the packet filtering firewall rules. (a) Access Control List (b) Protocols (c) Policies (d ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    One advantage of Packet Filtering firewall is __________ (a) more efficient (b) less complex (c) less costly (d) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Packet filtering firewalls are vulnerable to __________ (a) hardware vulnerabilities (b) MiTM (c) phishing (d) spoofing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Packet filtering firewalls are also called ____________ (a) first generation firewalls (b) second generation firewalls (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker may verify the ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    __________ is a popular command-line packet analyser. (a) Wireshark (b) Snort (c) Metasploit (d) Tcpdump The ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    ________________ is a tool which uses traceroute-like techniques for analyzing IP packet responses. (a) ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    ___________ is a command-line TCP/IP packet assembler and analyzer tool. (a) IGMP Ping (b) Hping2 (c) ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    When integrity is lacking in a security system, _________ occurs. (a) Database hacking (b) Data deletion (c) Data ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    When any IT product, system or network is in need for testing for security reasons, then the term used is called ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...