Chapter 13: Network Security and Protective Technologies (Set-6)

A firewall is mainly used to control

A Network traffic flow
B Screen display size
C Battery charging speed
D File naming rules

Packet filtering firewalls usually check

A Monitor pixels
B File content only
C IP and port
D Keyboard settings

A stateful firewall is better because it

A Deletes all viruses
B Repairs broken cables
C Encrypts every file
D Tracks session state

A proxy firewall works as a

A Middleman server
B Power supply unit
C Disk partition tool
D Keyboard driver

A hardware firewall is typically a

A Spreadsheet file
B Dedicated device
C Mobile wallpaper
D Printer plugin

A software firewall is usually installed on

A Ethernet cable
B Monitor screen
C Single computer
D Router antenna

Inbound rules mainly control

A Incoming traffic
B Outgoing backups
C Screen recording
D Keyboard shortcuts

Outbound rules mainly control

A Printer toner level
B Monitor brightness
C USB file copy
D Outgoing traffic

A network port identifies a

A Keyboard key
B Disk sector
C Service endpoint
D Screen corner

A DMZ is mainly used for

A Public-facing servers
B Storing passwords
C Printing documents
D Changing DNS

Firewall logging helps by

A Increasing Wi-Fi
B Recording connections
C Cleaning malware
D Speeding downloads

IDS mainly provides

A Disk encryption
B Faster internet
C Attack alerts
D Auto patching

IPS is designed to

A Block attacks
B Print logs
C Replace VPN
D Change passwords

Encryption converts data into

A Folder structure
B Disk partitions
C Screen pixels
D Ciphertext form

Decryption converts data into

A Zip archives
B System logs
C Plaintext form
D Browser cache

Symmetric encryption uses

A One shared key
B Two public keys
C No key needed
D Only passwords

Asymmetric encryption uses

A Single key
B Key pair
C No algorithm
D Same PIN always

SSL/TLS mainly provides

A File compression
B Faster typing
C Encrypted connection
D Disk formatting

A digital certificate links

A Mouse to USB
B Screen to GPU
C Printer to Wi-Fi
D Identity to key

A hash function output is

A Fixed digest
B Reversible text
C Larger file
D Random password

A digital signature helps ensure

A Screen privacy
B Printer speed
C Integrity proof
D Cable strength

A VPN is best described as a

A Secure tunnel
B Local printer
C File explorer
D USB driver

VPN tunneling means

A Deleting cookies
B Encapsulating traffic
C Speeding CPU
D Resetting routers

A VPN client runs on

A Network switch
B Printer cable
C Power adapter
D User device

A remote-access VPN is used when

A User connects remotely
B Two offices connect
C Printer shares ink
D Monitor shows error

A site-to-site VPN connects

A Two keyboards
B Two screens
C Two networks
D Two printers

Split tunneling allows

A Some traffic bypass
B All traffic blocked
C No encryption used
D Only email tunnels

SIEM is used for

A Disk cleaning
B Cable repair
C Keyboard mapping
D Log correlation

Log monitoring helps detect

A Faster downloads
B New wallpapers
C Unusual activity
D Battery status

A packet sniffer can

A Capture packets
B Patch systems
C Encrypt files
D Create VLANs

Vulnerability scanning aims to

A Speed up CPU
B Find weaknesses
C Increase RAM
D Change DNS zone

Patch management focuses on

A Applying updates
B Removing backups
C Printing reports
D Changing icons

Authentication checks

A Disk errors
B Wi-Fi speed
C User identity
D Screen size

Authorization decides

A User identity
B VPN protocol
C Hash length
D Allowed actions

Auditing helps by

A Reviewing records
B Increasing storage
C Blocking all ports
D Reducing latency

A full backup stores

A Only changed files
B Only system logs
C All selected data
D Only cloud files

Incremental backup stores

A Changes since last
B All files always
C Only old versions
D Only media files

Differential backup stores

A Only system drivers
B Changes since full
C Only deleted files
D All data always

3-2-1 rule means

A 3 keys, 2 users, 1 admin
B 3 routers, 2 switches, 1 hub
C 3 backups, 2 deletes, 1 keep
D 3 copies, 2 media, 1 offsite

Cloud backup provides

A Offsite storage
B Screen security
C Faster typing
D Router firmware

Backup verification means

A Delete old backups
B Rename backup folder
C Test restore works
D Disable scheduling

Disaster recovery focuses on

A Restore services
B Change passwords
C Install games
D Clean keyboard

Network segmentation reduces

A Printer ink use
B Screen glare
C Disk size
D Attack spread

A VLAN is used for

A Faster CPU
B Logical segmentation
C File encryption
D Disk cleanup

Secure router passwords should be

A Strong unique
B Default factory
C Same everywhere
D Written publicly

Firmware updates help to

A Increase storage
B Remove backups
C Fix vulnerabilities
D Stop encryption

MFA improves security by

A Adding second factor
B Removing passwords
C Disabling logs
D Opening all ports

HTTPS enforcement ensures

A Faster CPU speed
B Bigger hard disk
C Better keyboard feel
D Encrypted web traffic

Endpoint security mainly protects

A Power cables
B Screen pixels
C User devices
D Printer trays

First incident handling step is

A Share passwords
B Identify incident
C Delete evidence
D Ignore alerts

Leave a Reply

Your email address will not be published. Required fields are marked *