Chapter 13: Network Security and Protective Technologies (Set-8)

When creating firewall rules for a new server, the safest starting approach is

A Allow all first
B Disable firewall
C Deny all first
D Open random ports

A firewall rule using “ANY-ANY” source/destination is risky because it

A Over-permits traffic
B Improves latency
C Reduces CPU use
D Encrypts sessions

A stateful firewall can block many unsolicited packets because it

A Removes malware files
B Replaces antivirus tools
C Disables TCP traffic
D Uses connection tracking

A proxy firewall may break some apps because it

A Increases RAM size
B Fixes IP conflicts
C Changes protocol flow
D Speeds DNS queries

Placing a database server in DMZ is usually

A Always required
B Not recommended
C Same as VPN
D Faster for queries

A common “defense-in-depth” setup uses firewall plus

A Screen recorder
B Disk defragmenter
C IDS or IPS
D Printer driver

IDS false positives can be reduced by

A Tuning rules
B Disabling updates
C Removing all logs
D Allowing all traffic

IPS can cause business disruption if

A Has extra storage
B Logs are enabled
C Uses VLAN tagging
D Blocks legitimate traffic

A DMZ-to-LAN rule should be

A Open and wide
B Same as inbound
C Minimal and specific
D Always disabled

Firewall rule reviews are important to remove

A Unused rules
B Keyboard shortcuts
C Screen settings
D Wi-Fi passwords

In encryption, the “key” is used to

A Increase storage
B Repair files
C Transform data
D Delete malware

Symmetric encryption key sharing is difficult because

A No key is needed
B Key must stay secret
C It is always public
D It changes screen color

Asymmetric encryption supports secure email by using

A Public key sharing
B No keys at all
C Only fast hashing
D Disk partitioning

A certificate chain is needed because it

A Speeds file transfer
B Removes encryption
C Blocks VPN traffic
D Builds trust path

TLS protects against packet sniffing because it

A Blocks all ports
B Deletes log files
C Encrypts data stream
D Changes MAC address

Hashing is commonly used to

A Verify integrity
B Hide VPN IP
C Replace encryption
D Increase bandwidth

Digital signatures are mainly used for

A Increasing Wi-Fi range
B Faster printing
C Proving sender authenticity
D Creating backups

A VPN is most useful when you need

A Bigger monitor size
B Secure remote access
C Faster hard disk
D More printer ink

VPN tunneling provides security mainly by

A Faster mouse speed
B Stronger Wi-Fi signal
C More RAM available
D Encapsulation and encryption

Split tunneling is avoided in high-security settings because

A VPN becomes faster
B Logs become bigger
C Some traffic bypasses
D Wi-Fi becomes stronger

VPN does not fully guarantee anonymity because

A Tracking still possible
B DNS never leaks
C Cookies are removed
D Malware is blocked

SIEM helps by collecting and then

A Formatting disks
B Printing invoices
C Correlating events
D Replacing antivirus

Good log monitoring requires

A Time synchronization
B Lower screen brightness
C More keyboard keys
D No firewall rules

A packet sniffer is best controlled by

A Public access
B Guest login
C Restricted permissions
D Open Wi-Fi

Vulnerability scans should be repeated after

A Wallpaper change
B Printer cleaning
C Screen calibration
D Patching changes

Patch management should include

A Sharing passwords
B Update testing
C Disabling backups
D Removing logs

Access control lists are used to

A Increase RAM speed
B Change screen size
C Limit network access
D Create passwords

Authentication is best improved by using

A MFA methods
B Default passwords
C Shared accounts
D Open admin access

Authorization problems often result in

A Faster internet
B Smaller backups
C Excess permissions
D Better encryption

Auditing helps detect

A Screen scratches
B Printer jams
C Cable faults
D Policy violations

Full backups are often scheduled weekly because they

A Need no storage
B Take longer time
C Are always small
D Never encrypt data

Incremental backups are smaller because they store

A Entire data copy
B Only system files
C Only daily changes
D Only old backups

Differential backups simplify restore because they require

A Full plus latest
B Latest only
C Incrementals only
D No full backup

The 3-2-1 rule reduces ransomware risk by

A Only cloud sync
B Sharing backups public
C Having offline copy
D Disabling encryption

Backup retention decides

A Screen resolution
B VPN protocol used
C Port numbers used
D How long stored

Backup verification should include

A Only renaming files
B Disabling schedules
C Test restores
D Deleting older sets

Disaster recovery requires knowing your

A Screen size
B RTO and RPO
C Printer speed
D Mouse DPI

Segmentation plus ACLs helps by

A Increasing storage capacity
B Improving monitor color
C Restricting lateral movement
D Speeding keyboard input

VLAN misconfiguration can cause

A Unwanted access
B Faster internet speed
C Better backup retention
D Stronger TLS

Secure DNS is important because DNS can be

A Faster than HTTPS
B Used for printing
C Stored in RAM only
D Spoofed or poisoned

Enforcing HTTPS helps protect against

A Screen flicker
B Printer noise
C Data interception
D Keyboard lag

Endpoint security is layered because it includes

A AV, patching, firewall
B Only screen lock
C Only VPN tunnel
D Only backups

Device encryption supports compliance by protecting

A Internet download speed
B Stored sensitive data
C Printer settings
D Keyboard shortcuts

Secure remote desktop should also enable

A Public port forwarding
B Default username
C Account lockout
D No activity logs

A clear security policy should include

A Wallpaper color rules
B Printer ink limits
C Monitor refresh settings
D Incident reporting steps

Incident containment example is

A Share admin password
B Delete all backups
C Isolate affected device
D Disable all logs

Eradication step mainly means

A Remove root cause
B Increase Wi-Fi range
C Create new VLAN
D Print log reports

Recovery step mainly includes

A Disable patches
B Open all firewall
C Restore clean systems
D Share private keys

Lessons learned helps by

A Reducing encryption
B Disabling SIEM alerts
C Removing all logs
D Improving future response

A common reason for security alerts is

A Bigger monitor size
B Lower printer speed
C Misconfigured rules
D Extra mouse buttons

Leave a Reply

Your email address will not be published. Required fields are marked *