Bird
Raised Fist0
Intro to Computingfundamentals~20 mins

Firewalls and network protection in Intro to Computing - Practice Problems & Coding Challenges

Choose your learning style10 modes available

Start learning this pattern below

Jump into concepts and practice - no test required

or
Recommended
Test this pattern10 questions across easy, medium, and hard to know if this pattern is strong
Challenge - 5 Problems
🎖️
Firewall Mastery Badge
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
How does a firewall decide which network traffic to allow?

Imagine a security guard checking people entering a building. How does a firewall act like this guard when deciding which data packets to allow through a network?

AIt randomly blocks half of the incoming data to reduce network load.
BIt checks rules based on source, destination, and type of data to allow or block traffic.
CIt allows all data except those from unknown websites.
DIt only blocks data if the user manually approves each packet.
Attempts:
2 left
💡 Hint

Think about how a guard uses a list of allowed visitors rather than guessing randomly.

trace
intermediate
2:00remaining
Trace the firewall packet filtering process

Follow the steps a firewall takes to filter a packet with source IP 192.168.1.10, destination IP 10.0.0.5, and port 80. The firewall rules allow HTTP traffic (port 80) only from 192.168.1.0/24 subnet.

APacket allowed because source IP is in allowed subnet and port is 80.
BPacket blocked because destination IP is outside allowed subnet.
CPacket allowed because destination IP matches the firewall's IP.
DPacket blocked because port 80 is not allowed.
Attempts:
2 left
💡 Hint

Check if the source IP fits the allowed range and if the port matches the allowed service.

identification
advanced
2:00remaining
Identify the type of firewall from its description

A firewall inspects the contents of data packets deeply, checking the actual data and not just headers, to detect malicious content. What type of firewall is this?

ADeep packet inspection firewall
BStateful inspection firewall
CProxy firewall
DPacket-filtering firewall
Attempts:
2 left
💡 Hint

Think about which firewall looks inside the data, not just the envelope.

Comparison
advanced
2:00remaining
Compare stateful and stateless firewalls

Which statement correctly compares stateful and stateless firewalls?

ANeither stateful nor stateless firewalls check packet headers.
BStateless firewalls track connection states; stateful firewalls check packets individually without context.
CBoth stateful and stateless firewalls track connection states but differ in speed.
DStateful firewalls track connection states; stateless firewalls check packets individually without context.
Attempts:
2 left
💡 Hint

Think about whether the firewall remembers past packets or treats each one alone.

🚀 Application
expert
2:00remaining
Determine the effect of firewall rule order on traffic filtering

A firewall has these rules in order:
1. Block all traffic from IP 203.0.113.5
2. Allow all traffic to port 22 (SSH)
3. Allow all traffic from IP 203.0.113.5

If a packet comes from IP 203.0.113.5 to port 22, what happens?

AThe packet is allowed because the last rule allows traffic from the IP.
BThe packet is allowed because the allow rule for port 22 overrides the block.
CThe packet is blocked because the first matching rule blocks the IP before the allow rule.
DThe packet causes an error because conflicting rules exist.
Attempts:
2 left
💡 Hint

Remember firewalls usually apply rules in order and stop at the first match.

Practice

(1/5)
1. What is the main purpose of a firewall in network protection?
easy
A. To store large amounts of data
B. To speed up the internet connection
C. To control and filter incoming and outgoing network traffic
D. To create websites

Solution

  1. Step 1: Understand the role of a firewall

    A firewall acts like a security guard that checks data trying to enter or leave a network.
  2. Step 2: Identify the correct function

    Its main job is to allow or block traffic based on rules, controlling network access.
  3. Final Answer:

    To control and filter incoming and outgoing network traffic -> Option C
  4. Quick Check:

    Firewall = Traffic control [OK]
Hint: Firewalls control data flow like guards at a gate [OK]
Common Mistakes:
  • Thinking firewalls speed up internet
  • Confusing firewalls with data storage
  • Assuming firewalls create websites
2. Which of the following is the correct way to describe a firewall rule?
easy
A. Delete unwanted files from the computer
B. Increase the size of the network
C. Encrypt all data automatically
D. Allow or block traffic based on IP addresses or ports

Solution

  1. Step 1: Define what a firewall rule does

    Firewall rules decide which data packets can pass based on details like IP addresses or ports.
  2. Step 2: Match the correct description

    Only Allow or block traffic based on IP addresses or ports correctly describes this filtering process.
  3. Final Answer:

    Allow or block traffic based on IP addresses or ports -> Option D
  4. Quick Check:

    Firewall rule = Allow/block by IP/port [OK]
Hint: Firewall rules filter by IP or port, not by size or encryption [OK]
Common Mistakes:
  • Confusing firewall rules with encryption
  • Thinking firewall rules delete files
  • Assuming firewall rules change network size
3. Consider this simple firewall rule diagram:



If the rule blocks all traffic from IP 192.168.1.10, what happens when a packet from this IP tries to enter?
medium
A. The packet is blocked and dropped
B. The packet is allowed through
C. The packet is redirected to another IP
D. The packet is logged but allowed

Solution

  1. Step 1: Analyze the firewall rule

    The rule explicitly blocks traffic from IP 192.168.1.10, meaning no packets from this IP can pass.
  2. Step 2: Determine the packet's fate

    Since the packet comes from the blocked IP, it will be stopped and dropped by the firewall.
  3. Final Answer:

    The packet is blocked and dropped -> Option A
  4. Quick Check:

    Blocked IP = Packet dropped [OK]
Hint: Blocked IP means no entry, packet dropped [OK]
Common Mistakes:
  • Assuming blocked packets are allowed or redirected
  • Confusing logging with blocking
  • Thinking packets are modified instead of dropped
4. A firewall rule is written as: allow from 10.0.0.0/24 to any port 80. However, users report they cannot access websites on port 80. What is the likely error?
medium
A. The rule only allows traffic from 10.0.0.0/24, blocking others
B. Port 80 is blocked by default and cannot be allowed
C. The syntax is incorrect; 'allow' should be 'block'
D. The firewall is turned off

Solution

  1. Step 1: Understand the rule's scope

    The rule allows traffic only from IP addresses in the 10.0.0.0/24 range to port 80.
  2. Step 2: Identify the problem from user reports

    Users outside this IP range are blocked, causing access issues.
  3. Final Answer:

    The rule only allows traffic from 10.0.0.0/24, blocking others -> Option A
  4. Quick Check:

    Rule limits IP range = Access blocked [OK]
Hint: Check IP range limits in rules when access fails [OK]
Common Mistakes:
  • Assuming port 80 cannot be allowed
  • Thinking 'allow' means block
  • Ignoring firewall status
5. You want to create a firewall rule that blocks all incoming traffic except from your office IP 203.0.113.5 and allows outgoing traffic freely. Which rule setup achieves this?
hard
A. Allow all incoming; block outgoing from 203.0.113.5
B. Block all incoming; allow incoming from 203.0.113.5; allow all outgoing
C. Block all outgoing; allow incoming from 203.0.113.5
D. Allow all incoming and outgoing traffic

Solution

  1. Step 1: Define incoming traffic rules

    To block all incoming except from one IP, first block all incoming, then add an exception to allow that IP.
  2. Step 2: Define outgoing traffic rules

    Allow all outgoing traffic freely as required.
  3. Step 3: Match the correct option

    Block all incoming; allow incoming from 203.0.113.5; allow all outgoing correctly describes this setup.
  4. Final Answer:

    Block all incoming; allow incoming from 203.0.113.5; allow all outgoing -> Option B
  5. Quick Check:

    Block all except office IP + allow outgoing = Block all incoming; allow incoming from 203.0.113.5; allow all outgoing [OK]
Hint: Block all then allow exceptions for incoming; allow all outgoing [OK]
Common Mistakes:
  • Allowing all incoming traffic
  • Blocking outgoing traffic by mistake
  • Not adding exception for office IP