Chapter 13: Network Security and Protective Technologies (Set-5)

A stateful firewall may fail under attack if its

A DNS cache clears
B State table fills
C Disk space drops
D VLAN tags change

“SYN flood” primarily targets

A CPU fan speed
B Email storage quota
C HTTPS certificates
D TCP handshake state

A packet-filtering firewall is weakest when traffic uses

A Random MAC names
B Static IP address
C Allowed service port
D Short packet size

Deep packet inspection is mainly needed to detect

A Cable damage
B Application-layer attacks
C Low Wi-Fi signal
D Printer queue delays

A transparent proxy differs because it

A Requires no client setup
B Uses offline encryption
C Removes firewall rules
D Disables logging

Incorrect DMZ design that allows “dual-homed” servers can cause

A Better redundancy
B Faster patching
C Smaller log files
D Direct LAN bridging

IDS can miss attacks when traffic is

A Plain HTTP only
B End-to-end encrypted
C Sent over UDP
D Using static ports

IPS “inline” placement risk includes

A Better visibility only
B More storage capacity
C Single point failure
D Reduced encryption

In TLS, certificate validation mainly prevents

A Packet loss
B Slow download speeds
C Router overheating
D Server impersonation

A revoked certificate is one that

A Is no longer trusted
B Has stronger encryption
C Has longer validity
D Is stored offline

Perfect Forward Secrecy helps when

A Password is forgotten
B DNS server is down
C Long-term key leaks
D Backup fails

A hash collision is dangerous for signatures because it

A Increases storage cost
B Enables forged documents
C Blocks all HTTPS
D Changes IP routes

“Salting” passwords mainly prevents

A Slow internet speed
B VPN disconnections
C Router firmware bugs
D Rainbow table attacks

A digital signature provides non-repudiation because

A It hides the IP
B Signer cannot deny
C It encrypts backups
D It blocks malware

A VPN can still leak identity if

A Browser fingerprinting
B IP changes
C Tunnel encrypts
D MFA is enabled

DNS leaks during VPN use happen when

A VPN uses encryption
B IP is masked
C TLS is enabled
D DNS bypasses tunnel

Split tunneling raises risk mainly because it

A Improves speed
B Reduces logging
C Creates dual paths
D Forces HTTPS

Site-to-site VPN misconfiguration risk includes

A Strong encryption
B Overly broad routes
C Fast failover
D Smaller packets

SIEM correlation is powerful because it can detect

A Single log entry
B Screen changes
C Printer faults
D Multi-step attacks

A common SIEM challenge is

A Too little data
B Better encryption
C Alert fatigue
D Extra bandwidth

Log time synchronization is critical to

A Increase storage
B Build accurate timeline
C Reduce malware
D Speed up VPN

A packet sniffer in a switched LAN misses traffic because

A Switch floods all ports
B DNS blocks packets
C TLS breaks routing
D Switch isolates ports

Vulnerability scanners may report false positives due to

A Service banner mismatch
B Strong encryption
C Short passwords
D VLAN segmentation

Patch management failure is most dangerous when

A Updates are logged
B Backups are tested
C Internet-facing systems
D VPN is enabled

Access control is weakest when using

A Least privilege
B Shared admin accounts
C Role-based groups
D Audit logs enabled

MFA can be bypassed by attackers using

A Power failure
B Strong passwords
C Disk encryption
D Session token theft

A full backup window becomes too long; best improvement is

A Disable encryption
B Remove retention
C Use incremental strategy
D Stop verification

Incremental chains are risky mainly because

A Need no storage
B One link can fail
C Restore is always quick
D Encrypts automatically

Differential backups are preferred over incremental when

A Faster restore needed
B Smallest storage needed
C No network exists
D Only cloud is used

3-2-1 rule can still fail if

A Offsite copy exists
B Two media used
C Three copies made
D Backups untested

A retention policy must consider legal need for

A Data destruction
B Faster internet
C Record preservation
D Printer availability

RTO is best described as

A Max data loss
B Max downtime allowed
C Backup size limit
D VPN tunnel time

RPO is best described as

A Max downtime allowed
B Firewall rule order
C Log storage method
D Max data loss allowed

DLP tools can block leaks by inspecting

A Outbound content patterns
B Screen resolution
C Keyboard drivers
D CPU temperature

Network segmentation is ineffective if

A VLANs used
B ACLs enforced
C Inter-VLAN routing open
D Logs reviewed

VLAN hopping mitigation includes

A Use default VLAN
B Disable unused trunks
C Allow DTP everywhere
D Share admin login

Secure router configuration should change

A Screen brightness
B File extensions
C Print settings
D Default admin credentials

Firmware updates are critical because they often fix

A Browser cookies
B File naming issues
C Remote exploit bugs
D Screen flicker

HSTS helps security by preventing

A Port scanning
B HTTP downgrade
C Disk corruption
D VPN disconnects

Endpoint encryption fails if attackers get

A Strong password
B Small file size
C VPN address
D Decryption keys

Secure remote desktop should avoid exposing

A RDP to internet
B Internal admin port
C VPN gateway
D MFA prompt

Incident “eradication” can fail if you only

A Patch exploited flaw
B Remove malware file
C Identify persistence
D Reset passwords

During containment, turning off all systems can be harmful because it

A Stops backups
B Increases encryption
C Speeds recovery
D Loses volatile evidence

Centralized logging is safer when logs are

A Stored locally only
B Editable by users
C Write-once protected
D Shared publicly

A firewall can be bypassed if an allowed service is exploited using

A Closed DMZ
B Same open port
C Disabled routing
D Strong hashing

Proxy firewall SSL inspection introduces risk if

A Certificates managed poorly
B VPN is enabled
C Logs are centralized
D VLANs are used

VPN authentication is strongest when using

A Password only
B Shared group login
C Default PIN code
D Certificate + MFA

The best control to reduce SIEM noise is

A Disable all alerts
B Delete old logs
C Tune detection rules
D Stop time sync

Backup encryption is important mainly because backups contain

A Only public data
B Sensitive full copies
C No credentials ever
D Only logs

Immutable backups help most against

A Hardware overheating
B Faster browsing
C Printer misfeeds
D Ransomware deletion

Leave a Reply

Your email address will not be published. Required fields are marked *