121. What are the benefits of using a proxy firewall?
a. Increased security by hiding the IP address of the internal network.
b. Increased control over access to the network.
c. Reduced bandwidth usage by caching frequently accessed content.
d. All of the above.
122. What is a caching proxy?
a. A type of proxy server that stores frequently accessed content to reduce bandwidth usage.
b. A type of encryption algorithm.
c. A type of firewall that examines the content of packets to identify and block specific types of traffic.
d. None of the above.
123. What is a reverse proxy?
a. A type of proxy server that sits between the client and the server and forwards requests to the appropriate server.
b. A type of encryption algorithm.
c. A type of firewall that examines the content of packets to identify and block specific types of traffic.
d. None of the above.
124. What is a transparent proxy?
a. A type of proxy server that intercepts network traffic without requiring any configuration on the client side.
b. A type of encryption algorithm.
c. A type of firewall that examines the content of packets to identify and block specific types of traffic.
d. None of the above.
125. What is a content filter?
a. A feature of a proxy firewall that allows filtering of network traffic based on the content of the packets.
b. A type of encryption algorithm.
c. A type of firewall that examines the content of packets to identify and block specific types of traffic.
d. None of the above.
126. What is a circuit-level gateway?
a. A type of firewall that filters network traffic based on the source and destination IP addresses.
b. A type of firewall that uses proxy servers to control access to a network.
c. A type of firewall that examines the content of packets to identify and block specific types of traffic.
d. None of the above.
127. What is an application-level gateway?
a. A type of firewall that filters network traffic based on the source and destination IP addresses.
b. A type of firewall that uses proxy servers to control access to a network.
c. A type of firewall that examines the content of packets to identify and block specific types of traffic.
d. None of the above.
128. What is a computer virus?
a. A type of hardware component that can infect computers.
b. A type of software that can replicate itself and infect other computers.
c. A type of computer network that is vulnerable to attacks.
d. None of the above.
129. How does a computer virus spread?
a. By infecting other files and programs on a computer.
b. By replicating itself and spreading to other computers.
c. By using email attachments or infected downloads.
d. All of the above.
130. What are the common types of computer viruses?
a. File infectors, boot sector viruses, macro viruses, and polymorphic viruses.
b. Trojan horses, worms, and spyware.
c. Denial of service attacks, phishing, and social engineering attacks.
d. All of the above.