NSE 2 Lesson 12 – NSE 2 Web Application Firewall
Question 1
Question text
Which action can a modern WAF do?
Select one:
- Segment the network based on device type and user role
- Connect all tools in the security stack into defined workflows
- Stop any user action should it exceed their network permissions
- Survey the network and calculate a value to represent the security posture
Question 2
Question text
Which event was the motivation for web application firewall (WAFs)?
Select one:
- The debut of the World Wide Web
- ARPANET was brought online
- The development of the hypertext transfer protocol
- The first wide area network (WAN)
Question 3
Question text
Which firewall is positioned between a web application and the Internet?
Select one:
- Edge firewall
- Packet filter firewall
- Web application firewall
- Segmentation firewall
Question 4
Question text
Which new feature characterized second-generation WAFs?
Select one:
- Port and protocol blocking
- Packet analysis
- Heuristics
- Machine learning without human supervision
Question 5
Question text
Which protocol traffic does a web application firewall (WAF) monitor?
Select one:
- CLNP
- HTTP
- IP
- TCP
Question 6
Question text
Which firewall is positioned between a web application and the Internet?
Select one:
- Packet filter firewall
- Segmentation firewall
- Web application firewall
- Edge firewall
Question 7
Question text
Which three features are characteristics of the latest generation WAF? (Choose three.)
Select one or more:
- DLP
- DDoS defense
- Network segmentation
- SPU
- IP reputation
Question 8
Question text
Which new feature characterized second-generation WAFs?
Select one:
- Machine learning without human supervision
- Heuristics
- Port and protocol blocking
- Packet analysis
Question 9
Question text
Which protocol traffic does a web application firewall (WAF) monitor?
Select one:
- TCP
- IP
- CLNP
- HTTP
Question 10
Question text
Which action can a modern WAF do?
Select one:
- Connect all tools in the security stack into defined workflows
- Survey the network and calculate a value to represent the security posture
- Segment the network based on device type and user role
- Stop any user action should it exceed their network permissions