Chapter 13: Network Security and Protective Technologies (Set-9)

While migrating services, the safest firewall change method is

A Allow all temporarily
B Disable logging
C Stage and test
D Open any-any

A “shadowed” firewall rule is one that

A Never matches traffic
B Blocks all packets
C Encrypts packets
D Updates automatically

Stateful firewall timeouts must be tuned to avoid

A Screen flicker
B Disk partition loss
C Printer queue growth
D Table exhaustion

A proxy firewall can enforce policy by

A CPU overclocking
B Content filtering
C Disk defragmenting
D Wi-Fi boosting

The main reason to use an internal firewall is

A Faster internet speed
B Better screen output
C Segment isolation
D More storage space

IDS placed on a SPAN port is used to

A Monitor copied traffic
B Block traffic inline
C Store backup sets
D Renew certificates

IPS should often be deployed first in

A Always-block mode
B No-rule mode
C Offline mode
D Detect-only mode

A DMZ web server should typically access the LAN only for

A Any internal service
B All database tables
C Required backend ports
D All admin shares

For secure admin access, best practice is to

A Use open RDP
B Restrict by VPN
C Share one login
D Disable audit logs

In TLS, a certificate primarily proves

A Server identity
B Faster browsing
C Larger bandwidth
D Smaller packets

A certificate chain is validated to ensure

A Faster DNS response
B Less encryption used
C Trusted CA path
D VPN tunnel stability

TLS uses symmetric encryption mainly because it is

A Harder to manage
B Public by design
C Keyless method
D Faster for bulk

A strong hash function should resist

A Collisions
B Screen capture
C VPN timeouts
D Printer errors

A digital signature is verified using the signer’s

A Private key
B Shared password
C Public key
D VPN secret

Key exchange is necessary because it allows

A Faster screen refresh
B Secure session key
C Disk space increase
D Malware removal

VPN client software must handle

A Disk formatting
B Screen locking
C Printer sharing
D Tunnel setup

A site-to-site VPN is best for

A Single user travel
B Local file rename
C Branch connectivity
D Printer driver update

Split tunneling can weaken security monitoring because

A Traffic bypasses tunnel
B DNS never works
C VPN always disconnects
D Logs become smaller

VPN “IP masking” means websites see

A User real IP
B VPN server IP
C Router private IP
D DNS server IP

SIEM is most helpful when logs come from

A One device only
B Printer devices
C Many sources
D Only web browser

Security alert “triage” means

A Prioritize and assess
B Delete all logs
C Disable firewall
D Share admin access

A packet sniffer can expose risk by capturing

A Screen resolution
B Battery percentage
C Printer ink levels
D Credentials in plaintext

Vulnerability scanning is not enough unless followed by

A Wallpaper update
B Cable replacement
C Remediation actions
D Screen calibration

Patch management should track

A Mouse pad sizes
B Patch status records
C Screen color themes
D Printer paper types

Access control is improved most by

A Least privilege
B Shared passwords
C Open guest accounts
D No audit logs

Authentication is strengthened by

A Default passwords
B Shared accounts
C MFA enabled
D Open admin port

Authorization should be reviewed regularly to prevent

A Faster browsing
B Better printing
C Bigger backups
D Privilege creep

A full backup plus incrementals is risky if

A Internet is fast
B One incremental corrupt
C VPN is enabled
D Logs are stored

Differential backups are easier to restore because

A Fewer sets needed
B Smaller than incrementals
C Need no full backup
D Always offline

Backup “retention” policies should consider

A Keyboard comfort
B Screen brightness
C Compliance needs
D Mouse speed

Backup “air gap” is best described as

A Faster cloud access
B Encrypted email link
C Printer network setup
D Offline isolated copy

Backup verification should be scheduled because

A Backups can fail
B Logs are always correct
C VPN blocks backups
D Encryption is optional

Disaster recovery planning should define

A Printer brand
B Screen resolution
C RTO and RPO
D Keyboard layout

Network segmentation reduces risk of

A Faster web browsing
B Lateral movement
C Better audio quality
D Lower battery drain

VLAN security improves when you

A Enable all trunks
B Use default VLAN
C Disable all ACLs
D Limit trunk VLANs

Router security improves by disabling

A Firewall rules
B Firmware updates
C Remote admin access
D Strong passwords

Secure DNS is important because attackers can

A Redirect domain queries
B Increase RAM speed
C Block CPU fans
D Change screen tone

HTTPS enforcement prevents attackers from reading

A Monitor pixels
B Login credentials
C Printer paper size
D Disk partitions

Endpoint security should include device

A Wallpaper themes
B Printer settings
C Screen savers
D Patch updates

Device encryption is ineffective if

A Disk is full
B Screen is dim
C Keys are stolen
D Router is slow

Secure remote desktop should enforce

A MFA and lockout
B Open internet port
C Default credentials
D No logging set

A strong security policy should include

A Printer troubleshooting
B Reporting procedures
C Screen calibration
D Mouse cleaning

Incident response “containment” aims to

A Delete evidence
B Disable backups
C Limit spread
D Open all ports

Incident response “eradication” means

A Remove root cause
B Increase server load
C Create new accounts
D Disable SIEM alerts

Incident response “recovery” includes

A Share admin passwords
B Disable patches
C Delete audit logs
D Restore clean services

Centralized logging improves investigations by

A Reducing encryption
B Correlating events
C Blocking all traffic
D Increasing bandwidth

Time sync for logs is often provided by

A VPN protocol
B TLS certificate
C NTP service
D DMZ firewall

Backup encryption is important because backups may contain

A Only public files
B No user info
C Only system icons
D Complete sensitive data

A good ransomware-ready backup plan includes

A Immutable backups
B Single online copy
C No restore tests
D No retention rules

The best way to reduce repeated security incidents is

A Ignore alerts
B Lessons learned
C Disable monitoring
D Share admin access

Leave a Reply

Your email address will not be published. Required fields are marked *