Chapter 13: Network Security and Protective Technologies (Set-3)

To reduce rule mistakes, firewall policies should follow

A Maximum openness
B Random allowance
C Least privilege
D No documentation

An “implicit deny” firewall approach means

A Allow everything
B Block by default
C Encrypt all traffic
D Disable logging

For public web servers, safest placement is usually

A DMZ network
B Internal LAN
C User VLAN
D Printer subnet

Stateful firewall tables mainly store

A File hashes
B Password history
C Session state
D Printer queues

A proxy firewall can block threats by

A Increasing router speed
B Inspecting HTTP content
C Changing DNS zone
D Formatting disks

NAT with firewall helps mainly to

A Increase disk space
B Remove malware
C Boost CPU clock
D Hide internal hosts

Port-based blocking is weakest against

A Basic port scans
B Known service ports
C Encrypted malware traffic
D Simple inbound rules

IDS placed “out of band” usually means

A Monitors a copy
B Inline blocking device
C Works without power
D Replaces firewall

IPS is typically deployed to

A Detect only
B Prevent actively
C Store backups
D Manage VLANs

Best reason to enable firewall logging is

A Improve ping speed
B Increase Wi-Fi signal
C Trace suspicious access
D Reduce file size

“Encryption at rest” protects data

A During transmission
B While printed
C While scanned
D While stored

“Encryption in transit” protects data

A Stored on disk
B Moving over network
C Inside CPU cache
D Printed on paper

Symmetric encryption is preferred for

A Public key sharing
B Identity proof only
C Large data transfer
D Certificate issuing

Asymmetric encryption is commonly used for

A Fast bulk encryption
B Key exchange tasks
C Disk defragmentation
D Screen protection

A digital certificate warning in a browser usually indicates

A Trust problem
B Stronger encryption
C Faster connection
D More RAM usage

Hashing passwords is safer because it

A Is reversible easily
B Speeds login always
C Stores no plaintext
D Removes MFA need

A hash function should have strong

A Reversibility
B Collision resistance
C Screen scaling
D File compression

Digital signatures are mainly verified using

A Sender private key
B Shared VPN key
C Router admin key
D Sender public key

TLS helps prevent eavesdropping by

A Using compression only
B Blocking all ports
C Encrypting traffic
D Changing IP address

A VPN tunnel mainly protects

A Traffic to VPN server
B Local screen settings
C Printer sharing only
D USB file copying

VPN “remote access” is best described as

A Network-to-network link
B User-to-network link
C Switch-to-router link
D Server-to-printer link

VPN “site-to-site” is best described as

A User phone VPN
B Browser cookie security
C Network-to-network link
D Antivirus update channel

VPN anonymization is limited because

A VPN shows real IP
B Provider can log usage
C VPN blocks all DNS
D VPN removes cookies

SIEM correlation is valuable because it

A Links events together
B Speeds up gaming
C Removes encryption keys
D Prints audit reports

Log “retention” in security means

A Delete logs quickly
B Encrypt logs always
C Keep logs for time
D Print logs daily

A packet sniffer is risky if used by

A Authorized admin
B Network engineer
C Security analyst
D Unauthorized user

Vulnerability scanning should be followed by

A Ignoring results
B Fixing high risks
C Sharing admin passwords
D Disabling firewall rules

Patch management reduces risk mainly from

A Unknown hardware faults
B Slow internet speed
C Known vulnerabilities
D Power fluctuations

Authentication factors are commonly grouped as

A Cost and speed
B LAN and WAN
C TCP and UDP
D Know, have, are

Authorization checks are performed after

A DNS lookup
B Authentication
C Backup scheduling
D Virus scanning

Auditing helps most when it is

A Regularly reviewed
B Disabled for speed
C Kept on paper only
D Shared publicly

A full backup plus daily incrementals is called

A Mirror setup
B VLAN design
C Backup chain
D Proxy pattern

Backup “verification” is important because

A Backups always work
B Backups can be corrupt
C It reduces encryption
D It blocks malware

Differential backup restore typically needs

A Full plus differential
B Only last differential
C Only last incremental
D Full plus all incrementals

3-2-1 rule protects best against

A Only viruses
B Faster internet plans
C Local disasters
D Screen failures

Cloud backup security should include

A Public shared links
B Default passwords
C No encryption used
D Strong access control

Backup scheduling should consider

A Monitor size
B Recovery requirements
C Keyboard layout
D Mouse sensitivity

Disaster recovery planning should define

A Wallpaper themes
B Browser bookmarks
C RTO and RPO
D Email signatures

Network segmentation reduces risk of

A Faster printing
B Lateral movement
C Screen glare
D Battery drain

VLAN hopping attacks are reduced by

A Proper switch config
B Open trunk ports
C Default VLAN everywhere
D Disabling all VLANs

Router security improves most by disabling

A Strong encryption
B Firmware updates
C Remote admin access
D Firewall rules

A secure Wi-Fi network should use

A WEP encryption
B Open hotspot
C No password
D WPA2 or WPA3

HTTPS enforcement can be implemented using

A VLAN tagging
B HSTS policy
C DMZ routing
D DNS caching

Endpoint security is important because endpoints

A Never get infected
B Are always offline
C Face phishing and malware
D Only store public data

Device encryption is especially critical for

A Lost laptops
B Desktop wallpapers
C Faster browsing
D Better sound quality

Secure remote desktop should also enforce

A Weak passwords
B Account lockout
C Open ports public
D No logging

A good security policy should be

A Unwritten and secret
B Changed daily
C Clear and enforced
D Shared on social media

Incident response “eradication” means

A Identify the threat
B Inform all users
C Schedule backups
D Remove root cause

Incident response “lessons learned” helps to

A Hide evidence
B Improve future defenses
C Reduce backups
D Disable SIEM

A common sign of misconfigured firewall rules is

A Unexpected open services
B No internet anywhere
C Faster Wi-Fi always
D Smaller log files

Leave a Reply

Your email address will not be published. Required fields are marked *