Chapter 13: Network Security and Protective Technologies (Set-7)

In a firewall rule, “protocol” commonly means

A Screen refresh rate
B TCP or UDP
C File folder type
D Keyboard language

Blocking unused ports is important because open ports

A Improve Wi-Fi speed
B Reduce backup size
C Increase attack surface
D Fix malware automatically

An “allow list” firewall policy means

A Block only needed
B Allow all traffic
C Disable all rules
D Allow only needed

A host-based firewall is best described as

A On internet cable
B On one device
C On Wi-Fi tower
D On cloud only

The main benefit of a DMZ is

A Extra isolation layer
B Faster internet speed
C Bigger storage space
D Better screen quality

Firewall “egress filtering” mainly controls

A Incoming print jobs
B Screen capture tools
C Outgoing connections
D Router fan speed

IDS is commonly used to

A Encrypt email messages
B Detect suspicious traffic
C Create VPN tunnels
D Replace firewall rules

IPS is commonly used to

A Store backup copies
B Increase router range
C Manage user accounts
D Stop malicious traffic

A firewall is NOT primarily meant to

A Control network access
B Block unwanted ports
C Scan files for viruses
D Enforce traffic rules

Plaintext refers to

A Encrypted message text
B Original readable data
C Random hash output
D VPN tunnel header

Ciphertext refers to

A Encrypted unreadable data
B Router login page
C DNS query result
D Backup schedule file

Symmetric encryption is fast because it uses

A Two separate keys
B Simple shared key
C No key at all
D Only certificates

Asymmetric encryption is useful for

A Faster bulk storage
B Battery saving mode
C Secure key exchange
D Screen color tuning

A public key is usually

A Kept secret always
B Stored only offline
C Same as password
D Shared openly

A private key must be

A Posted on website
B Kept confidential
C Shared with friends
D Printed on router

TLS is widely used in

A Offline spreadsheets
B Printer cable setup
C HTTPS websites
D Battery calibration

A digital certificate helps users trust

A Server identity
B Keyboard layout
C Screen brightness
D File compression

A hash is mainly used for

A Hiding IP address
B Integrity checking
C Creating VPN tunnel
D Increasing bandwidth

A digital signature provides

A Faster download speed
B Larger disk space
C Better Wi-Fi signal
D Integrity and proof

A VPN helps most when using

A Offline desktop apps
B Local file copying
C Public Wi-Fi hotspots
D Printer test page

VPN “tunneling” means

A Deleting browsing history
B Wrapping traffic inside
C Sharing admin password
D Clearing system cache

A VPN server is the

A Printer controller
B Screen driver
C USB adapter
D Tunnel endpoint

IDS vs IPS difference is that IPS

A Only alerts
B Blocks automatically
C Prints reports
D Encrypts backups

SIEM tools mainly collect

A Security event logs
B Keyboard driver files
C Screen saver themes
D Printer ink levels

Patch management reduces risk of

A Faster typing
B Printer errors
C Known exploits
D Screen flicker

Vulnerability scanning is useful before

A Buying new keyboard
B Security hardening work
C Changing wallpapers
D Printing certificates

Authentication checks

A What user can do
B How fast internet
C Which VPN protocol
D Who the user is

Authorization decides

A User identity
B Backup timing
C Allowed permissions
D DNS server choice

Auditing in security means

A Speeding downloads
B Reviewing access records
C Creating new VLAN
D Changing encryption key

A full backup includes

A Entire selected data
B Only changed files
C Only system settings
D Only cloud emails

Incremental backup saves

A All files always
B Only deleted items
C Only old versions
D Recent changes only

Differential backup saves

A Changes since last
B Only system files
C Changes since full
D Only media files

The 3-2-1 rule improves

A Screen sharpness
B Backup reliability
C Keyboard comfort
D Router speed

Backup scheduling should match

A RPO requirement
B Monitor settings
C Printer toner
D Browser cache

Backup verification ensures

A Less storage used
B Faster internet speed
C Better Wi-Fi signal
D Restore actually works

Disaster recovery planning includes

A New wallpapers
B Recovery steps
C Screen calibration
D Mouse sensitivity

Network segmentation helps by

A Increasing ink saving
B Enlarging screen text
C Limiting attacker movement
D Fixing power issues

VLANs are mainly used for

A Faster CPU clock
B Disk file recovery
C Email encryption
D Logical separation

Firmware updates are important because they

A Increase screen size
B Fix device flaws
C Remove backups
D Block all emails

Strong router passwords help prevent

A Screen freezing
B Printer paper jam
C Device takeover
D File duplication

MFA is most useful against

A Password compromise
B Power failure
C Disk fragmentation
D Screen scratches

Secure DNS practices help reduce

A Mouse lag
B DNS spoofing risk
C Screen glare
D Printer noise

Enforcing HTTPS helps protect

A CPU temperature
B Printer ink level
C Monitor refresh
D Login data in transit

Endpoint security usually includes

A Printer toner checks
B File renaming tools
C Antivirus and patching
D Keyboard remapping

Device encryption mainly protects

A Faster internet speed
B Lost device data
C Screen resolution
D Printer sharing

Secure remote desktop should use

A VPN plus MFA
B Open internet port
C Default credentials
D No lockout policy

A security policy should define

A Monitor brightness rules
B Acceptable user actions
C Printer paper size
D Mouse DPI settings

First incident response step is

A Delete all logs
B Share admin access
C Identify and confirm
D Ignore warnings

Containment means

A Increase internet speed
B Remove all backups
C Reset wallpapers
D Limit further damage

Recovery step includes

A Disable all patches
B Restore clean services
C Open every port
D Share private keys

Leave a Reply

Your email address will not be published. Required fields are marked *