KEMBAR78
Multiple Choice Questions | PDF | Transport Layer Security | Computer Network
0% found this document useful (0 votes)
127 views16 pages

Multiple Choice Questions

The document contains multiple-choice questions covering network monitoring and security topics. Key areas include the objectives and benefits of network monitoring, types of attacks, and security measures such as firewalls and VPNs. Each question is followed by the correct answer, providing a comprehensive overview of essential concepts in network management.

Uploaded by

afmis1652
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views16 pages

Multiple Choice Questions

The document contains multiple-choice questions covering network monitoring and security topics. Key areas include the objectives and benefits of network monitoring, types of attacks, and security measures such as firewalls and VPNs. Each question is followed by the correct answer, providing a comprehensive overview of essential concepts in network management.

Uploaded by

afmis1652
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Multiple Choice Questions (chapter 1)

1. What is the main objective of network monitoring?


o a) To discover and map the network
o b) To track the performance and availability of network devices and infrastructure
o c) To install security patches
o d) To configure network devices
o Answer: b)
2. Which of the following is a key benefit of network monitoring?
o a) Increasing network complexity
o b) Reducing network uptime
o c) Enhancing capacity planning
o d) Eliminating the need for network security monitoring
o Answer: c)
3. What does device health monitoring track?
o a) Unauthorized access attempts
o b) CPU usage, memory, and temperature of network devices
o c) Network topology
o d) Network traffic patterns
o Answer: b)
4. Which of the following helps improve operational efficiency in network monitoring?
o a) Increasing manual intervention
o b) Automating network tasks and reducing the need for constant oversight
o c) Ignoring alerts that seem non-critical
o d) Centralizing security management
o Answer: b)
5. What type of monitoring helps identify issues like traffic congestion and bandwidth
hogging?
o a) Fault management
o b) Device health monitoring
o c) Traffic analysis
o d) Security monitoring
o Answer: c)
6. What is the primary function of fault management in network monitoring?
o a) Ensuring high availability of the network
o b) Detecting and addressing network issues quickly
o c) Tracking network traffic patterns
o d) Securing the network from unauthorized access
o Answer: b)
7. What does configuration management in network monitoring focus on?
o a) Detecting security vulnerabilities
o b) Tracking and managing changes in device configurations
o c) Monitoring network traffic flow
o d) Ensuring device uptime
oAnswer: b)
8. Why is centralized control important in network monitoring?
o a) It allows for better security control only.
o b) It provides complete oversight of the entire network environment from one
console.
o c) It enables monitoring only for hardware components.
o d) It eliminates the need for fault management.
o Answer: b)
9. Which of the following is an essential function of network monitoring?
o a) Monitoring only the security aspects of the network
o b) Ensuring complete uptime by responding after failures occur
o c) Continuously monitoring and evaluating network health, performance, and faults
o d) Preventing all types of hardware failures
o Answer: c)
10.What does scalability in network monitoring allow?

 a) To monitor fewer devices


 b) To extend the network monitoring capabilities as the network grows
 c) To limit monitoring only to the most critical devices
 d) To only monitor the network performance and nothing else
 Answer: b)

11.What is the purpose of proactive alerts in network monitoring?

 a) To alert administrators only after a failure happens


 b) To prevent administrators from managing their network
 c) To send timely notifications of potential issues before they escalate
 d) To decrease network traffic
 Answer: c)

12.What does network monitoring help visualize in real-time?

 a) Network performance logs


 b) Network topology, devices, and connections
 c) Device temperatures
 d) Alerts and notifications
 Answer: b)

13.How does network monitoring enhance capacity planning?

 a) By enabling accurate forecasts of network resource needs


 b) By eliminating the need for network growth considerations
 c) By tracking past network performance without forecasting
 d) By focusing only on network faults
 Answer: a)
14.Which of the following is a key feature of flexibility in network monitoring?

 a) Customizing monitoring settings based on network needs


 b) Limiting monitoring to specific vendors
 c) Ensuring a fixed monitoring schedule
 d) Ignoring any network problems
 Answer: a)

15.What is the benefit of setting monitoring thresholds in network monitoring?

 a) To provide alerts for every small network change


 b) To detect only major performance issues
 c) To allow network administrators to ignore alerts
 d) To help automate device configuration changes
 Answer: b)

16.What is an example of a network monitoring challenge?

 a) Ensuring that only security aspects are monitored


 b) Monitoring network traffic patterns without using any tools
 c) Managing too many alerts and false positives
 d) Reducing network capacity
 Answer: c)

17.Which of the following does security monitoring focus on in network monitoring?

 a) Preventing unauthorized access and identifying vulnerabilities


 b) Managing bandwidth usage
 c) Handling device health checks
 d) Managing network topology mapping
 Answer: a)

18.What is the importance of traffic analysis in network monitoring?

 a) It only tracks network device performance.


 b) It helps monitor data flow and detect congestion or bandwidth issues.
 c) It eliminates the need for fault management.
 d) It focuses only on network security.
 Answer: b)

19.What role does proactive monitoring play in network management?

 a) It prevents all network issues from occurring.


 b) It delays response time and only acts after an issue occurs.
 c) It sends alerts before issues become critical, allowing preventive action.
 d) It only resolves issues related to security.
 Answer: c).

20.What is the purpose of monitoring network availability?

 a) To ensure the network is always unavailable


 b) To proactively monitor the network to maintain consistent uptime
 c) To only monitor network performance during working hours
 d) To ignore network faults
 Answer: b)

Multiple Choice Questions (chapter 2):


1. What is the primary reason for an organization to focus on network security?
o A) To increase network traffic
o B) To ensure confidentiality, integrity, and availability
o C) To improve network speed
o D) To reduce the cost of hardware
o Answer: B
2. What is the primary concern of a network administrator when managing internal threats?
o A) Protecting from phishing
o B) Preventing unauthorized access by insiders
o C) Ensuring the speed of the network
o D) Reducing the cost of hardware
o Answer: B
3. What type of external attack is typically executed by inexperienced individuals?
o A) Structured external attack
o B) Unstructured external attack
o C) Insider attack
o D) Phishing attack
o Answer: B
4. What is a common result of end-user carelessness in network security?
o A) Denial of Service
o B) Data leakage
o C) Hardware failure
o D) System updates
o Answer: B
5. What is the primary cause of external attacks?
o A) Lack of firewall configurations
o B) Misconfigured software
o C) Exploitation of existing vulnerabilities
o D) Insider negligence
o Answer: C
6. What is the main goal of a network administrator when identifying attacks?
o A) To improve network traffic
o B) To monitor and identify vulnerabilities
o C) To prevent unauthorized access
o D) To conduct a security audit
o Answer: B
7. What is the main risk of using outdated software in a network?
o A) Increased network speed
o B) Higher risk of data loss
o C) Increased protection from attacks
o D) Enhanced performance
o Answer: B
8. What is the purpose of firewalls and VPNs in network security?
o A) To store data securely
o B) To prevent unauthorized network access
o C) To monitor network traffic
o D) To improve system performance
o Answer: B
9. What is one of the key reasons behind external attacks?
o A) Lack of security awareness
o B) Revenge or frustration
o C) Curiosity, financial gain, or reputation damage
o D) Misconfigured hardware
o Answer: C
10.Which action can help prevent insider threats?
o A) Regularly changing passwords
o B) Restricting access to sensitive data
o C) Ignoring user behavior
o D) Reducing employee access to the internet
o Answer: B
11.Which of the following is a type of reconnaissance attack?
o a) Denial-of-Service
o b) Packet sniffing
o c) Malware
o d) Social engineering
o Answer: b)
12.What is the goal of a Denial-of-Service (DoS) attack?
o a) To steal sensitive data
o b) To cause network downtime
o c) To infect systems with malware
o d) To escalate privileges
o Answer: b)
13.What tool is commonly used for port scanning and conducting reconnaissance and security
auditing?
o a) Nmap
o b) DNSlookup
o c) Netcat
o d) Telnet
o Answer: a)
14.Which of the following is NOT a form of social engineering attack?
o a) Phishing
o b) Impersonation
o c) Packet sniffing
o d) Pretexting
o Answer: c)
15.Which reconnaissance technique helps attackers monitor packets passing through a
network?
o a) Ping sweeping
o b) Packet sniffing
o c) Port scanning
o d) DNS footprinting
o Answer: b)
16.What is the primary purpose of an access attack?
o a) To cause network downtime
o b) To identify vulnerabilities
o c) To gain unauthorized access to a network or system
o d) To inject malware into a system
o Answer: c)
17.What is the primary objective of social engineering attacks?
o a) To exploit software vulnerabilities
o b) To gain unauthorized access to the system
o c) To manipulate individuals into revealing sensitive information
o d) To perform a denial-of-service attack
o Answer: c)
18.What is the purpose of DNS footprinting in reconnaissance attacks?
o a) To find vulnerabilities in DNS servers
o b) To map out the network’s topology
o c) To gather information about DNS servers and related IP addresses
o d) To perform social engineering attacks
o Answer: c)
19.What type of attack attempts to exploit weaknesses in a network by flooding it with
traffic?
o a) Man-in-the-middle attack
o b) Port scanning
o c) Denial-of-Service
o d) Social engineering
o Answer: c)
20.Which of the following best describes a man-in-the-middle attack?
o a) Attackers intercept and modify communications between two parties
o b) Attackers send ICMP requests to detect live systems
o c) Attackers flood a system with traffic to disrupt services
o d) Attackers manipulate employees into providing sensitive information
o Answer: a)
21.What does packet sniffing capture in network traffic?
o a) Usernames and passwords
o b) ICMP packets
o c) Port scanning results
o d) Malware payloads
o Answer: a)
22.Which of the following is an active reconnaissance attack?
o a) DNS footprinting
o b) Port scanning
o c) Packet sniffing
o d) Social engineering
o Answer: b)
23.What type of attack targets vulnerabilities in a network’s configuration to gain
unauthorized access?
o a) Access attack
o b) Social engineering
o c) Malware attack
o d) Denial-of-Service
o Answer: a)
24.Which of the following methods can be used to detect reconnaissance attacks?
o a) Encrypted traffic
o b) IDS (Intrusion Detection Systems)
o c) Malware analysis
o d) Denial-of-Service tools
o Answer: b)

25.Which attack involves capturing and interpreting network packets?

a) Brute Force Attack


b) Sniffing
c) MiTM Attack
d) DNS Spoofing
Answer: b)

26.In a MiTM attack, the attacker:


a) Attempts to gain administrative privileges
b) Redirects traffic to a rogue server
c) Intercepts and modifies communications
d) Disables a victim’s DHCP server
Answer: c)

27.Which of the following is an example of privilege escalation?

a) Gaining access to higher-level resources


b) Stealing login credentials from a victim
c) Redirecting a user to a fake website
d) Eavesdropping on network traffic
Answer: a)

28.What does DNS poisoning achieve?

a) Redirects a user to an attacker’s server


b) Encrypts network traffic
c) Hijacks user credentials
d) Compromises user passwords directly
Answer: a)

29.In an ARP poisoning attack, the attacker:

a) Spoofs MAC addresses to intercept traffic


b) Redirects DNS traffic to malicious websites
c) Floods a DHCP server with requests
d) Sends a large number of data packets to crash the system
Answer: a)

30.Which of the following prevents a DHCP starvation attack?

a) DNS Spoofing
b) Port Security
c) MiTM Attack
d) Privilege Escalation
Answer: b) Port Security

31.The main goal of a rogue DHCP server attack is to:

a) Flood the network with fake IP addresses


b) Redirect user traffic to a malicious server
c) Spoof MAC addresses to gain network access
d) Crack weak passwords on a network
Answer: b)
32.What does sniffing allow an attacker to capture?

a) Email login credentials only


b) Encrypted passwords
c) All network traffic including sensitive data
d) Network configuration settings
Answer: c)

33.Which is a primary method of defending against DNS poisoning?

a) Encrypting all data traffic


b) Using DNSSEC (DNS Security Extensions)
c) Blocking network sniffers
d) Implementing MiTM attack detection tools
Answer: b)

34.Which attack involves flooding a network with fake DHCP requests?

a) MiTM Attack
b) DHCP Starvation Attack
c) Rainbow Table Attack
d) DNS Spoofing
Answer: b)

35.What does vertical privilege escalation allow an attacker to do?

a) Access other users’ data


b) Increase their privileges to gain admin-level access
c) Capture packets on the network
d) Eavesdrop on encrypted communications
Answer: b)

36.What type of attack involves changing a victim’s ARP table to redirect network traffic?

a) DHCP Spoofing
b) ARP Poisoning
c) DNS Poisoning
d) Hybrid Attack
Answer: b)

37.Which attack type is particularly dangerous on unsecured Wi-Fi networks?

a) Brute Force Attack


b) MiTM Attack
c) Birthday Attack
d) DNS Spoofing
Answer: b)

38.Which of the following is used to defend against rogue DHCP servers?

a) DHCP Snooping
b) Rainbow Table Protection
c) Sniffer Detection
d) Strong Encryption
Answer: a)

39.What does a Denial-of-Service (DoS) attack primarily target?


o A) System data
o B) Network bandwidth or connectivity
o C) User privacy
o D) Software vulnerabilities
o Answer: B)

40.Which of the following is a characteristic of a DDoS attack?


o A) Attack from a single compromised system
o B) Attack from many compromised systems
o C) No impact on system performance
o D) Aimed to steal sensitive data
o Answer: B)

Multiple Choice Questions (chapter 3)


1. What is the primary function of a firewall?
o A) Block external attacks
o B) Monitor internal network traffic
o C) Provide encryption for sensitive data
o Answer: A
2. A proxy server can:
o A) Hide a user's real IP address
o B) Serve as a backup server
o C) Monitor bandwidth usage
o Answer: A
3. Which of the following is NOT a typical use of a honeypot?
o A) Protecting sensitive data
o B) Capturing traffic from attackers
o C) Detecting malicious behavior
o Answer: A
4. Which security device provides alerts about potential intrusions?
o A) Intrusion Prevention System (IPS)
o B) Intrusion Detection System (IDS)
o C) Proxy Server
o Answer: B
5. Which of the following is NOT a benefit of using a proxy server?
o A) Hiding the IP address of internal users
o B) Enhancing bandwidth efficiency
o C) Providing antivirus protection
o Answer: C
6. A VPN uses which kind of network for secure communication?
o A) Public
o B) Private
o C) Both public and private
o Answer: A
7. A DMZ is used to:
o A) Isolate the internal network from public access
o B) Allow full access to the internet
o C) Monitor traffic between devices
o Answer: A
8. What is a disadvantage of using Unified Threat Management (UTM)?
o A) High maintenance cost
o B) Single point of failure
o C) Requires multiple devices for security
o Answer: B
9. What does Network Access Control (NAC) primarily help with?
o A) Preventing physical damage to network hardware
o B) Restricting unauthorized access to the network
o C) Detecting network intrusions
o Answer: B
10.What type of protocol is commonly used in a VPN for encryption?

 A) SSL
 B) FTP
 C) HTTP
 Answer: A

11.Which of the following does an IDS primarily monitor?

 A) Web traffic only


 B) Network traffic for suspicious activities
 C) Server performance
 Answer: B
12.What type of system is a low-interaction honeypot?

 A) A full production server mimicking a real system


 B) A system with minimal services, used for attracting attackers
 C) A high-security firewall
 Answer: B

13.A proxy server can be used to:

 A) Improve server performance


 B) Filter out specific types of content
 C) Automatically patch vulnerabilities
 Answer: B

14.Which feature of the IDS makes it useful for network security?

 A) It can prevent attacks


 B) It can analyze network traffic for policy violations
 C) It can block malicious websites
 Answer: B

15.Which of the following is an example of a benefit of using a Network Protocol Analyzer?

 A) It can prevent network attacks


 B) It helps identify configuration errors in network services
 C) It improves the internet speed
 Answer: B

16.What does an IPS do that an IDS do not?

 A) Monitors network traffic


 B) Detects security incidents
 C) Blocks malicious activities
 Answer: C

17.Which of the following is a benefit of using a honeypot in network security?

 A) Preventing all types of attacks


 B) Collecting valuable data on attacker behavior
 C) Storing sensitive organizational data
 Answer: B

18.What is the purpose of using content filtering on a network?

 A) To monitor internal network traffic


 B) To block access to malicious or inappropriate websites
 C) To allow unrestricted internet access for all users
 Answer: B

19.A proxy server typically helps improve:

 A) Web browsing speed


 B) Internal file storage management
 C) Data encryption for transactions
 Answer: A

20.What does a DMZ provide to an organization's internal network?

 A) Direct access to the internet


 B) Protection from external threats
 C) Full access to the network from the outside
 Answer: B

Multiple Choice Questions (Chapter 4)


1. Which of the following ensures the confidentiality of data?
a) Authentication
b) Authorization
c) Cryptography
Answer: c)
2. Which step is first in the general process of access control?
a) Validation
b) Providing credentials
c) Authorization
Answer: b)
3. What is the primary purpose of auditing in access control?
a) To track user permissions
b) To monitor access control instructions
c) To identify weaknesses in the system
Answer: c)
4. Which access control model provides the highest level of security?
a) DAC
b) MAC
c) RBAC
Answer: b)
5. What defines a user's ability to perform operations on resources?
a) Security policy
b) Authorization
c) Cryptography
Answer: b)
6. Which is an example of a physical access control?
a) Passwords
b) Biometrics
c) Encryption
Answer: b)
7. What does encryption primarily protect?
a) Physical assets
b) Transmitted data
c) Employee information
Answer: b)

8. Which of the following is NOT a factor in authentication?


a) Knowledge
b) Possession
c) Location
d) Inherence
Answer: c)

9. What is the main advantage of two-factor authentication?


a) It uses only passwords
b) It reduces the chances of identity theft and phishing
c) It requires only one credential
d) It is faster than single authentication
Answer: b)

10. What does Accounting in network security refer to?


a) Tracking actions performed by a user
b) Verifying the identity of a user
c) Providing access to resources
d) Preventing unauthorized access
Answer: a)

11. Multiple Choice Questions (with answers):


Which protocol is used for securing email communications?
a) SSL
b) S/MIME
c) IPsec
d) RADIUS
Answer: b)

12. What is the main benefit of SSO?


a) Increases security
b) Reduces the need for re-authentication
c) Requires more credentials
d) Reduces phishing
Answer: b)

13. Which protocol operates at the transport layer to ensure security?


a) IPsec
b) SSL
c) TLS
d) PGP
Answer: c)

14. Which of the following is a feature of the Kerberos protocol?


a) Uses public-key cryptography
b) Operates only on UDP
c) Provides email encryption
d) Secures web traffic
Answer: a)

15. What does the RADIUS protocol provide?


a) Secure communication between servers
b) Authentication for remote access
c) Encryption for web traffic
d) Email signing
Answer: b)

16. Which security protocol is most commonly used for web communication?
a) RADIUS
b) HTTPS
c) PGP
d) IPsec
Answer: b)

17. Which of the following is used in the authentication process of Kerberos?


a) Session Key
b) User Credentials
c) Ticket Granting Ticket (TGT)
d) Public Key Certificate
Answer: c)

18. What is the main function of IPsec?


a) Email encryption
b) Authentication of packets
c) Authentication of email
d) Secure website connections
Answer: b)
19. Which protocol is used for secure communication over HTTP?
a) PGP
b) HTTPS
c) RADIUS
d) S/MIME
Answer: b)

20. What does TLS provide for secure communication?


a) Encryption and authentication
b) Only encryption
c) Only authentication
d) Only integrity
Answer: a)

21. What type of data does SSL protect during communication?


a) Only user passwords
b) Only email data
c) All communication data
d) Only web traffic
Answer: c)

22. Which protocol is used for encrypting email messages?


a) SSL
b) PGP
c) HTTPS
d) RADIUS
Answer: b)

23. Which protocol works at the application layer to secure email?


a) IPsec
b) TLS
c) S/MIME
d) SSL
Answer: c)

You might also like