Chapter 13: Network Security and Protective Technologies (Set-4)

A firewall “default deny” policy should be paired with

A Open all ports
B Disable NAT
C Documented allow list
D No change control

When reviewing firewall rules, a key risk is

A Shadow IT rules
B Too many backups
C Too much RAM
D Low monitor brightness

For outbound control, an egress firewall rule often blocks

A Web browsing
B Screen sharing
C Unknown app traffic
D Keyboard input

A stateful firewall can better stop spoofed packets because it

A Uses only MAC
B Tracks valid sessions
C Disables TCP
D Changes DNS zones

An application proxy may reduce risk from

A HTTP command abuse
B Cable damage
C Power outage
D Disk fragmentation

A common DMZ design mistake is

A Separate subnet used
B Logging enabled
C Firewall placed at edge
D Direct LAN access allowed

IDS signature detection is strongest against

A Unknown zero-days
B Power failures
C Known attack patterns
D Hardware theft

IPS tuning is important to reduce

A False positives
B Disk space
C CPU fan noise
D Cable length

Firewall “rule shadowing” means

A No rules exist
B Two rules overlap
C VPN tunnel drops
D Hash values match

A secure approach for admin access is

A Expose RDP to web
B Use default password
C Use VPN + MFA
D Disable logging

The main purpose of key exchange in TLS is

A Establish shared secret
B Choose screen size
C Remove certificates
D Speed up DNS

If a private key is leaked, attackers can

A Increase bandwidth
B Repair disk errors
C Disable VLANs
D Impersonate owner

A certificate “CN mismatch” means

A Weak password used
B Low disk space
C Wrong domain name
D VPN is offline

Hashing differs from encryption because hashing is

A Two-way process
B One-way process
C Always uses keys
D Used only in VPN

A strong password hash storage should include

A Unique salt value
B Plaintext copy
C Shared admin key
D Open database access

Digital signatures help prevent

A Power surge
B Cable theft
C Data tampering
D Screen glare

VPN split tunneling is sometimes enabled to

A Save bandwidth
B Remove encryption
C Stop patching
D Reduce latency

A VPN tunnel protects against

A Wi-Fi eavesdropping
B Local disk crash
C Monitor failure
D Printer jam

VPN protocols mainly differ in

A Screen resolution
B Keyboard layout
C Security and speed
D File name length

A VPN does NOT automatically protect

A Traffic inside tunnel
B Malware on device
C Data to VPN server
D IP masking

SIEM alert triage usually starts with

A Deleting all logs
B Disabling firewall
C Checking severity context
D Sharing private keys

Log integrity is improved by

A Central log server
B Editable log files
C No timestamps stored
D Public log sharing

A packet sniffer on a switched network often needs

A More RAM only
B Printer driver
C SPAN port access
D Screen capture tool

Vulnerability scanning can miss issues if

A Systems are patched
B Credentials unavailable
C Logs are enabled
D VPN is used

Patch management should prioritize

A Critical security fixes
B Low-risk updates
C Wallpaper updates
D Audio driver skins

Strong access control in networks often uses

A Same password for all
B Open guest accounts
C No account logs
D Role-based access

MFA is most effective against

A Hardware failure
B Printer issues
C Password theft
D Screen freeze

Auditing is essential for

A Proving compliance
B Increasing bandwidth
C Reducing backup size
D Removing viruses

A full backup + differential strategy restores using

A Only incrementals
B Full + latest differential
C Only full backup
D Latest differential only

Incremental backups can complicate restore because

A Need only one file
B Always unencrypted
C Many sets required
D Never verify

Backup “retention” must balance

A Screen brightness
B Keyboard speed
C Router range
D Storage cost

Backup scheduling should align with

A RPO target
B Wallpaper updates
C USB color
D Mouse pad size

Disaster recovery testing is important to confirm

A Faster internet
B Plan actually works
C More RAM installed
D DNS is disabled

Data loss prevention is focused on

A Faster file copying
B More disk partitions
C Stopping data exfiltration
D Printing security labels

Network segmentation is strongest when combined with

A Access control lists
B Flat network design
C Shared admin passwords
D Disabled firewall logs

VLAN security is improved by

A Using default VLAN
B Open trunk everywhere
C Disabling unused ports
D No change tracking

Secure DNS helps reduce risk of

A Monitor flicker
B USB malware only
C RAM overheating
D DNS cache poisoning

HTTPS enforcement mainly reduces

A Unencrypted login risk
B Printer queue errors
C Battery drain
D Screen burn-in

Endpoint security should include

A Default admin login
B Disabled antivirus
C Regular patching
D Open USB policy

Device encryption keys should be protected using

A Plain text notes
B Secure key storage
C Public web post
D Shared group chat

Secure remote desktop exposure should be limited by

A Internet port forwarding
B Default username
C VPN-only access
D No account lockout

A good security policy should include

A Incident reporting steps
B Game installation rules
C Screen saver timing
D Folder color guide

Incident response “containment” example is

A Buying new switches
B Ignoring alerts
C Deleting audit logs
D Isolating infected PC

Incident response “recovery” includes

A Sharing admin password
B Disabling patches
C Restoring from backups
D Opening all ports

Incident response “post-incident” output is

A New keyboard purchase
B Lessons learned report
C DNS cache clear only
D Disable SIEM alerts

Best way to reduce firewall misconfiguration is

A Change control process
B No rule reviews
C Share admin accounts
D Disable policy docs

A common egress monitoring indicator is

A Normal DNS queries
B Stable backup size
C Unusual outbound spikes
D Clean audit reports

VPN can fail to protect privacy if

A HTTPS is used
B MFA is enabled
C Logs are reviewed
D DNS leaks occur

Backup “air gap” concept means

A Faster cloud sync
B Stored offline copy
C Shared network folder
D Same disk partition

A strong backup practice for ransomware is

A Immutable backup storage
B Only cloud sync
C Disable backup logs
D Use one copy only

Leave a Reply

Your email address will not be published. Required fields are marked *