Which of the following is the primary goal of network security? Flashcards
Which of the following is the primary goal of network security?
a) Increase network speed
b) Reduce network complexity
c) Protect data, devices, and users from threats
d) Improve hardware performance
c) Protect data, devices, and users from threats
What does the CIA triad stand for in cybersecurity?
a) Confidentiality, Integrity, Availability
b) Cybersecurity, Intelligence, Authentication
c) Compliance, Integrity, Access
d) Control, Identification, Authorization
a) Confidentiality, Integrity, Availability
Which of the following is an example of social engineering?
a) Brute-force attack
b) Phishing email
c) SQL injection
d) DDoS attack
b) Phishing email
Which security model enforces the principle of “least privilege”?
a) Bell-LaPadula Model
b) Biba Model
c) Role-Based Access Control (RBAC)
d) Open Systems Interconnection (OSI) Model
c) Role-Based Access Control (RBAC)
Which of the following is NOT an example of malware?
a) Trojan horse
b) Rootkit
c) Firewall
d) Ransomware
c) Firewall
Defense in Depth (DiD) is a cybersecurity strategy that employs multiple layers of security controls to protect information and networks.
What is a firewall, and how does it contribute to network security?
a) A firewall is a physical barrier that prevents unauthorized personnel from entering a server room.
b) A firewall is a security device that monitors and controls network traffic based on predefined rules to prevent unauthorized access and cyber threats.
c) A firewall is a type of antivirus software designed to detect and remove malware from individual devices.
d) A firewall is a tool used to increase internet speed by filtering out unnecessary data packets.
b) A firewall is a security device that monitors and controls network traffic based on predefined rules to prevent unauthorized access and cyber threats.
Which of the following are types of firewalls?
a) Packet Filtering Firewall and Stateful Inspection Firewall
b) DNS Firewall and Proxy Firewall
c) VPN Firewall and Encryption Firewall
d) Trojan Firewall and Malware Firewall
a) Packet Filtering Firewall and Stateful Inspection Firewall
How does Multi-Factor Authentication (MFA) enhance security?
a) It requires multiple methods of verification, reducing the risk of unauthorized access.
b) It replaces passwords with a single security question.
c) It encrypts all network traffic automatically.
d) It prevents phishing attacks by blocking all external communications.
a) It requires multiple methods of verification, reducing the risk of unauthorized access.
What are the three common factors used in Multi-Factor Authentication (MFA)?
a) Username, Password, and IP Address
b) Something You Know, Something You Have, and Something You Are
c) Fingerprint, Facial Recognition, and CAPTCHA
d) Email, SMS Code, and Security Question
b) Something You Know, Something You Have, and Something You Are
What is the primary difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)?
a) IDS blocks malicious traffic, while IPS only detects and logs threats.
b) IDS detects and alerts on suspicious activities, while IPS actively blocks and mitigates threats.
c) IDS replaces firewalls, while IPS replaces antivirus software.
d) IDS and IPS perform the same function but use different algorithms.
b) IDS detects and alerts on suspicious activities, while IPS actively blocks and mitigates threats.
Which network security protocol is primarily used to encrypt web traffic over the internet?
a) HTTP
b) FTP
c) TLS/SSL
d) Telnet
c) TLS/SSL
What is the primary purpose of the IPsec (Internet Protocol Security) protocol?
a) To encrypt email communications
b) To establish secure VPN connections by encrypting IP packets
c) To prevent SQL injection attacks
d) To filter network traffic based on domain names
b) To establish secure VPN connections by encrypting IP packets
Which protocol is used for securely accessing network devices remotely?
a) Telnet
b) SSH
c) HTTP
d) SNMP
b) SSH
What does WPA2 (Wi-Fi Protected Access 2) use to secure wireless networks?
a) AES encryption
b) WEP encryption
c) MD5 hashing
d) DES encryption
a) AES encryption
Which protocol is commonly used for secure email transmission?
a) SMTP over TLS
b) HTTP
c) FTP
d) SNMP
a) SMTP over TLS
Which of the following network security protocols is used for authentication and authorization in wireless networks and VPNs?
a) RADIUS
b) FTP
c) Telnet
d) ICMP
a) RADIUS
What is the main function of the HTTPS protocol?
a) To encrypt and secure web traffic between a browser and a server
b) To establish VPN tunnels for secure communication
c) To secure file transfers over a network
d) To detect and prevent network intrusions
a) To encrypt and secure web traffic between a browser and a server
Which of the following protocols provides encryption for emails at the application layer?
a) IMAP
b) PGP (Pretty Good Privacy)
c) DHCP
d) SNMP
b) PGP (Pretty Good Privacy)
What is the primary role of the Kerberos authentication protocol?
a) To provide secure file transfers
b) To encrypt network packets at the transport layer
c) To authenticate users and services securely using tickets
d) To establish secure wireless connections
c) To authenticate users and services securely using tickets
Which protocol is used to securely transfer files between a client and a server?
a) FTP
b) TFTP
c) SFTP
d) POP3
c) SFTP
What is the primary purpose of access control in network security?
a) To improve network speed
b) To prevent unauthorized access to systems and data
c) To block all users from accessing resources
d) To allow unrestricted access to all users
b) To prevent unauthorized access to systems and data
Which of the following best describes the Principle of Least Privilege (PoLP)?
a) Users should have full administrative access at all times
b) Users should only have the minimum permissions necessary to perform their tasks
c) All employees should share the same login credentials
d) Users should have unrestricted access to enhance productivity
b) Users should only have the minimum permissions necessary to perform their tasks
What are the three main components of access control?
a) Authentication, Authorization, and Accounting (AAA)
b) Encryption, Hashing, and Firewalls
c) Backup, Recovery, and Logging
d) Identification, Notification, and Execution
a) Authentication, Authorization, and Accounting (AAA)