Chapter 13: Network Security and Protective Technologies (Set-1)

A firewall mainly helps a network by

A Increasing internet speed
B Repairing hard disks
C Blocking unwanted traffic
D Creating user accounts

A packet-filtering firewall makes decisions using

A User keyboard input
B File names only
C Screen resolution
D Packet header fields

A stateful firewall is different because it

A Tracks active sessions
B Ignores all ports
C Works only offline
D Encrypts all data

A proxy firewall typically works at

A Physical layer only
B Data link layer
C Application layer
D Power supply level

A hardware firewall is commonly used as

A Mobile app feature
B Router-based security device
C Printer driver
D Spreadsheet tool

A software firewall is installed on

A Network cables
B Power adapters
C Monitor screens
D Individual devices

Inbound firewall rules mainly control

A Outgoing web browsing
B Keyboard shortcuts
C Incoming connections
D File compression

Outbound firewall rules mainly control

A Leaving network traffic
B Incoming VPN tunnels
C Screen brightness
D Wi-Fi password reset

A “port” in networking refers to

A Hard disk slot
B Keyboard connector
C RAM section
D Logical service number

A DMZ is best described as

A Private home folder
B Antivirus update file
C Isolated network zone
D Wireless password type

Firewall “logging” is useful because it

A Increases RAM size
B Records traffic events
C Changes IP address
D Formats hard drives

IDS stands for

A Internet Data System
B Internal DNS Service
C Intrusion Detection System
D Input Device Security

IPS mainly differs from IDS because it

A Cannot detect attacks
B Works without network
C Deletes all logs
D Actively blocks threats

Encryption is the process of

A Converting to ciphertext
B Making files larger
C Removing passwords
D Copying data faster

Decryption converts

A Files to folders
B Images to videos
C Ciphertext to plaintext
D Password to username

“Plaintext” means

A Encrypted message
B Readable original data
C Random noise data
D Broken file format

“Ciphertext” means

A Public IP address
B Backup file name
C Router firmware version
D Encrypted unreadable data

Symmetric-key encryption uses

A Two different keys
B No key required
C One shared key
D Only public key

Asymmetric encryption uses

A Public and private keys
B Single shared key
C Only password text
D No encryption algorithm

A public key is typically

A Kept secret always
B Stored only offline
C Same as private key
D Shared with others

A private key should be

A Posted on website
B Shared to speed login
C Kept confidential
D Printed on router label

SSL/TLS is mainly used for

A Faster printing
B Secure web communication
C File deletion
D Disk partitioning

A digital certificate mainly links

A Domain to public key
B User to keyboard
C Folder to file name
D Router to printer

A hash function output is

A Reversible always
B Larger than file
C Same as plaintext
D Fixed-length digest

A digital signature mainly provides

A Faster Wi-Fi speed
B Extra storage space
C Integrity and authenticity
D Screen privacy filter

“Key exchange” helps two parties

A Share keys securely
B Change monitor settings
C Remove malware
D Boost CPU speed

A VPN primarily creates

A Faster browser cache
B Bigger email inbox
C New antivirus database
D Encrypted tunnel

VPN tunneling means

A Physical cable drilling
B Deleting old logs
C Encapsulating network traffic
D Changing file extension

A VPN client is usually

A Server room device
B User-side software
C Firewall rule list
D Router antenna

A site-to-site VPN connects

A Two mobile apps
B Printer to scanner
C Mouse to keyboard
D Two network locations

A remote-access VPN is used when

A Linking two data centers
B Formatting a USB drive
C Employee connects from home
D Installing RAM modules

Split tunneling means

A Some traffic bypasses VPN
B VPN blocks all internet
C VPN disables encryption
D Only email uses VPN

A limitation of VPN is that it

A Stops all malware
B Removes need of passwords
C Guarantees anonymity
D Depends on VPN provider

IP masking with VPN means

A Hiding local printer
B Removing MAC address
C Showing VPN server IP
D Changing file type

SIEM is mainly used for

A Image editing
B Security log correlation
C Keyboard driver update
D Creating user accounts

Log monitoring helps security teams by

A Compressing files
B Improving monitor display
C Increasing Wi-Fi range
D Detecting unusual activity

A packet sniffer is used to

A Encrypt hard drives
B Format memory cards
C Capture network packets
D Delete spyware files

Vulnerability scanning is done to

A Find security weaknesses
B Increase download speed
C Replace router hardware
D Clean browser history

Patch management mainly ensures

A New wallpapers installed
B Updates applied regularly
C More RAM available
D Faster keyboard response

Authentication means

A Giving permissions
B Encrypting backups
C Verifying identity
D Creating VLANs

Authorization means

A Verifying identity
B Changing encryption keys
C Blocking all ports
D Granting allowed access

Auditing in security refers to

A Cleaning computer fans
B Increasing screen size
C Reviewing security records
D Renaming folders

A full backup includes

A All selected data
B Only changed files
C Only system settings
D Only cloud files

An incremental backup saves

A All files daily
B Only old data
C Only large files
D Changes since last backup

A differential backup saves

A Only system drivers
B Changes since full backup
C Only deleted files
D All data every time

The 3-2-1 backup rule suggests

A Three passwords daily
B 3 servers, 2 routers, 1 switch
C 3 copies, 2 media, 1 offsite
D 3 users, 2 admins, 1 guest

Backup verification means

A Deleting old backups
B Renaming backup folder
C Compressing backup files
D Testing restore works

Disaster recovery focuses on

A Restoring services quickly
B Screen repairs
C Making new passwords
D Installing new games

Network segmentation helps security by

A Making cables shorter
B Limiting attack spread
C Increasing printer speed
D Removing encryption

Router firmware updates are important to

A Change screen colors
B Increase keyboard size
C Fix security flaws
D Remove file duplicates

Leave a Reply

Your email address will not be published. Required fields are marked *