Chapter 13: Network Security and Protective Technologies (Set-2)

A basic firewall rule usually matches traffic using

A Screen resolution
B File extension
C Battery level
D IP and ports

Stateful firewalls reduce risk mainly by

A Allowing only replies
B Ignoring return packets
C Blocking all websites
D Removing encryption keys

A proxy firewall can improve privacy because it

A Stores files locally
B Hides internal IPs
C Changes monitor size
D Speeds up CPU

IDS output is most commonly

A Printed reports
B Auto traffic blocks
C Disk formatting
D Security alerts

IPS often stops attacks by

A Changing passwords
B Encrypting backups
C Dropping packets
D Replacing router cables

A DMZ server is usually placed

A Inside LAN only
B Inside CPU cabinet
C Under monitor stand
D Between LAN and internet

Firewall logging is most useful for

A Incident investigation
B Faster downloads
C Extra disk space
D Better screen colors

“Allow outbound DNS” typically permits port

A 22
B 53
C 25
D 3389

Encryption mainly protects data

A At rest only
B In transit only
C From power failure
D From unauthorized reading

In symmetric encryption, both sides need

A Same shared key
B Different public keys
C Only username
D No secret at all

Asymmetric encryption is helpful because it

A Needs no keys
B Removes passwords
C Solves key sharing
D Blocks all malware

A digital certificate is mainly issued by

A Keyboard vendor
B Antivirus scanner
C ISP modem
D Certificate Authority

HTTPS indicates the website uses

A FTP security
B TLS encryption
C Printer sharing
D Offline mode

A hash is mainly used to check

A Data integrity
B Battery status
C Screen brightness
D Wi-Fi range

A digital signature is created using

A Receiver public key
B Symmetric shared key
C Router admin password
D Sender private key

TLS handshake mainly helps to

A Clean browser cache
B Format hard disk
C Agree on session keys
D Increase monitor size

A VPN is best used when

A Using public Wi-Fi
B Playing offline games
C Printing documents
D Cleaning keyboard

A VPN server mainly provides

A Screen sharing
B File compression
C CPU overclocking
D Tunnel endpoint

“Site-to-site VPN” is common for

A Home printer setup
B Branch office links
C Mouse driver update
D Audio streaming only

A VPN protocol is basically

A Tunneling method
B Routing table name
C File system type
D Monitor refresh rate

Split tunneling can increase risk because

A VPN is faster
B Passwords auto-save
C Some traffic unencrypted
D Logs become smaller

A packet sniffer is often used for

A Screen recording
B Battery testing
C File renaming
D Network troubleshooting

SIEM helps security teams by

A Centralizing log data
B Editing images
C Printing backup labels
D Increasing RAM speed

A vulnerability scan usually finds

A Strong passwords
B Missing security patches
C Faster CPU settings
D New hardware drivers

Patch management should include

A Random updates
B Sharing admin keys
C Disabling all logs
D Testing before rollout

Access control mainly answers

A What you can do
B Who you are
C How fast internet is
D Which printer works

MFA improves account security by

A Removing passwords
B Blocking all emails
C Adding second factor
D Increasing storage size

Antivirus console mainly helps to

A Change DNS servers
B Create VLANs
C Encrypt Wi-Fi signals
D Manage many endpoints

A security alert should trigger

A Initial incident review
B Ignoring the event
C Immediate disk format
D Router factory reset

A full backup is best when

A Storage is very limited
B Simple restore is needed
C Network is always down
D Only one file changed

Incremental backups mainly reduce

A Screen flicker
B Password strength
C Router range
D Backup time

Differential backups become larger because they

A Accumulate changes daily
B Store system logs only
C Delete old backups
D Encrypt less data

A restore point is mainly used for

A Increasing disk capacity
B Adding new printer
C Undoing system changes
D Speeding up Wi-Fi

The 3-2-1 rule improves protection against

A Slow internet plans
B Keyboard damage
C Printer paper jams
D Single point failure

Cloud backup is useful mainly because it

A Needs no internet
B Gives offsite copy
C Removes encryption need
D Prevents all hacking

Backup retention policy decides

A How long to keep backups
B Wi-Fi channel number
C Monitor refresh rate
D Password reset speed

Data loss prevention aims to

A Increase disk speed
B Improve screen quality
C Reduce printer ink use
D Stop sensitive data leaks

Network segmentation is often done using

A Mouse drivers
B VLANs
C Screen savers
D Browser cookies

VLAN security should include

A Proper access controls
B Open trunk ports
C Shared admin passwords
D Disabled logging

Router admin passwords should be

A Default factory
B Same everywhere
C Printed publicly
D Strong and unique

Firmware updates on security devices help to

A Add wallpapers
B Reduce internet speed
C Fix known vulnerabilities
D Disable encryption

Secure DNS mainly protects against

A DNS spoofing risk
B Keyboard logging
C Screen burn-in
D USB corruption

HTTPS enforcement is important because it

A Blocks all ads
B Deletes cookies
C Speeds up CPU
D Encrypts website traffic

Endpoint security refers to protecting

A Only network cables
B User devices
C Only internet routers
D Only cloud servers

Device encryption is mainly used to

A Increase battery
B Remove malware
C Protect lost devices
D Speed up boot

Secure remote desktop should include

A Open internet access
B Default port only
C No password needed
D MFA and VPN

A basic security policy mainly provides

A Security guidelines
B Gaming rules
C Printer shortcuts
D Screen theme list

During incident handling, the first step is

A Erase all evidence
B Buy new hardware
C Share passwords
D Identify the incident

Containment in incident response aims to

A Spread the issue
B Limit further damage
C Delete all backups
D Increase internet speed

Recovery after an incident includes

A Restoring clean systems
B Ignoring patching
C Sharing private keys
D Disabling antivirus

Leave a Reply

Your email address will not be published. Required fields are marked *