Chapter 13: Network Security and Protective Technologies (Set-10)

A stateful firewall is most vulnerable to resource exhaustion during

A DNS cache refresh
B VLAN tagging error
C SYN flood attack
D HTTPS certificate check

“State table timeout” tuning helps reduce risk from

A Stale session entries
B Printer driver conflicts
C Screen resolution change
D Disk defragmentation

A packet-filter firewall cannot reliably stop attacks hidden inside

A Unused closed port
B Allowed HTTPS port
C Blocked ICMP traffic
D Private VLAN only

TLS inspection at a proxy can reduce privacy because it

A Blocks all websites
B Removes certificates
C Changes router MAC
D Decrypts user traffic

A common DMZ risk is a server with two interfaces that

A Bridges LAN access
B Improves redundancy
C Speeds backups
D Shrinks log size

IDS may miss malware when traffic is

A Plain text FTP
B Unencrypted HTTP
C End-to-end encrypted
D Using fixed ports

IPS inline deployment risk is highest when it becomes

A Single failure point
B Extra storage system
C DNS resolver role
D Backup retention tool

Certificate revocation checks help when a certificate is

A Newly issued today
B Larger key length
C Stored in browser
D Compromised or stolen

Perfect Forward Secrecy matters because past sessions stay safe if

A DNS server is down
B Router reboots daily
C Server key leaks later
D Backups are full

Hash collision resistance is crucial because collisions can enable

A Forged signed content
B Faster encryption speed
C Stronger Wi-Fi signal
D Smaller backup files

Password hashing is still unsafe if you store

A Strong passwords
B Unsalted hashes
C Login attempts logs
D HTTPS certificates

MFA can be bypassed if attackers steal a valid

A Router firmware
B VLAN tag value
C Session token
D Backup schedule

Split tunneling is risky because it creates

A Two routing paths
B Longer passwords
C Smaller log files
D Stronger encryption

VPN privacy is reduced if DNS queries

A Use encrypted HTTPS
B Use strong cipher
C Use long password
D Bypass the tunnel

A site-to-site VPN risk is “over-broad routing” which can

A Reduce encryption strength
B Expose extra subnets
C Delete server logs
D Increase screen brightness

SIEM alert fatigue happens when

A No logs are collected
B Encryption is disabled
C Too many noisy alerts
D Backups are offline

Central logging is stronger when logs are stored in

A Tamper-resistant storage
B User-writable folder
C Public shared drive
D Browser cache only

Accurate incident timelines require

A Faster Wi-Fi speed
B Smaller packet size
C NTP time sync
D More RAM installed

Credentialed vulnerability scans are better because they can check

A Screen saver time
B Keyboard drivers
C Printer ink status
D Internal patch levels

Patch delays are most dangerous for

A Internet-facing services
B Offline spreadsheets
C Local printers only
D Screen calibration apps

Incremental backup chains are risky because

A They are always huge
B One link can fail
C Restore needs one set
D Encryption is impossible

Differential backups are chosen when you want

A Smallest storage use
B No encryption used
C Simpler restore
D No full backups

The 3-2-1 rule can still fail if backups are

A Never tested
B Stored offsite
C On two media
D Kept as three copies

Immutable backups help most by preventing

A HTTPS certificate expiry
B Backup deletion changes
C VPN tunnel overload
D VLAN misrouting

DLP systems are effective when they inspect

A CPU temperature
B Monitor pixels
C Keyboard clicks
D Outbound sensitive data

VLAN segmentation fails if inter-VLAN routing is

A Properly restricted
B Logged and audited
C Too permissive
D Protected by ACLs

VLAN hopping risk increases if trunking is

A Auto-negotiated
B Manually fixed
C Limited VLAN list
D Disabled on access

Router takeover risk rises sharply when remote admin is

A Disabled completely
B Exposed to internet
C Restricted by VPN
D Logged and monitored

Secure DNS reduces redirection attacks by preventing

A Battery drain
B Disk corruption
C Spoofed responses
D Screen burn-in

HSTS protects users mainly by blocking

A HTTP downgrade
B Wi-Fi sniffing
C Disk failure
D Printer queue

Device encryption fails if attackers obtain

A Screen lock time
B Router IP address
C DNS cache file
D Recovery keys

Secure remote desktop is best protected by combining

A VPN, MFA, logs
B Open port forwarding
C Default admin login
D Disabled lockouts

Incident containment may avoid full shutdown because it can

A Increase encryption strength
B Improve internet speed
C Lose volatile evidence
D Fix malware automatically

Eradication is incomplete if you only remove the malware but not

A Printer settings
B Persistence methods
C Screen resolution
D Backup scheduling

Recovery must include monitoring because attackers may

A Improve DNS speed
B Shrink log sizes
C Disable encryption
D Reinfect systems

Firewall misconfiguration is often detected by

A Unexpected open services
B Longer passwords
C Smaller backup size
D Faster ping time

A proxy that performs TLS inspection must install a

A VPN client app
B DNS cache file
C Trusted root cert
D Router firmware patch

Certificate pinning reduces risk mainly from

A Screen capture tools
B Rogue CA issuance
C Backup corruption
D VLAN misrouting

A strong incident response plan must define

A Roles and steps
B Keyboard layouts
C Printer drivers
D Screen brightness

Audit trails become unreliable if attackers can

A Use HTTPS
B Use VPN
C Modify logs
D Apply patches

Least privilege is hardest to maintain when permissions are

A Role-based
B Logged centrally
C Verified regularly
D Never reviewed

A “break-glass” admin account should be

A Used daily
B Highly restricted
C Shared broadly
D Stored in email

Backup encryption keys must be protected because compromise allows

A Reading backup data
B Faster backups
C Smaller log files
D Better VPN speed

A major backup risk during ransomware is when backups are

A Air-gapped offline
B Immutable storage
C Same network writable
D Offsite protected

DLP false positives often increase when rules are

A Too broad
B Narrow and tested
C Based on roles
D Verified weekly

A security baseline is valuable because it provides

A Faster internet speed
B Extra disk storage
C Better screen color
D Standard secure settings

Endpoint hardening includes reducing attack surface by

A Enabling all ports
B Disabling unused services
C Sharing admin logins
D Disabling updates

SIEM effectiveness drops if log sources are

A Centralized and synced
B Stored securely
C Incomplete or missing
D Reviewed regularly

A secure change-control process reduces risk by ensuring changes are

A Approved and documented
B Hidden and untracked
C Randomly applied
D Done without testing

The strongest overall approach for network security is

A Single firewall only
B VPN only
C Layered defenses
D Passwords only

Leave a Reply

Your email address will not be published. Required fields are marked *