Quiz #1, Security Fundamentals
Please wait…
1.
What is the primary function of a firewall in network security?
To distribute network traffic across multiple servers for redundancy.
To connect different networks and forward traffic between them.
To inspect and filter network traffic based on a predefined set of rules.
To provide an encrypted connection for remote users.
2.
What is the key difference between a Network Intrusion Detection System (NIDS) and a Network Intrusion Prevention System (NIPS)?
NIDS is always hardware-based, while NIPS is always software-based.
NIDS can only detect and alert on malicious activity, whereas NIPS can also block it.
NIDS analyzes web traffic, while NIPS analyzes email traffic.
NIDS is used for wireless networks, while NIPS is used for wired networks.
3.
In the context of firewall rules, what is the principle of “Implicit Deny”?
All traffic is allowed unless a specific rule blocks it.
Traffic that does not match any specific “allow” rule is blocked by default.
All traffic is logged for later analysis, but none is blocked.
The firewall prompts the administrator for every new connection type.
4.
What is the purpose of a Demilitarized Zone (DMZ) in network design?
To create a highly secure, internal network for sensitive data only.
To provide a buffer network for hosting public-facing services like web servers, separating them from the internal network.
To combine multiple physical networks into a single virtual network.
To encrypt all communications between the internal network and the internet.
5.
What is the fundamental difference between a network router and a network switch?
Routers operate based on MAC addresses, while switches operate based on IP addresses.
Routers connect different networks together, while switches connect devices within the same network.
Routers are considered “dumb” devices, while switches are “smart” devices.
Routers are used for wireless connections, while switches are only for wired connections.
6.
Which protocol is described as HTTP utilizing a TLS/SSL connection for security, typically operating on port 443?
FTPS
SSH
HTTPS
SNMP
7.
Which default port is used by the Domain Name System (DNS) protocol for resolving hostnames to IP addresses?
80
443
22
53
8.
The File Transfer Protocol (FTP) uses two TCP ports for its operation. What are these ports and their functions?
Port 22 for both control and data.
Port 23 for control and Port 80 for data.
Port 21 for control and Port 20 for data.
Port 990 for control and Port 989 for data.
9.
Which of the following wireless security standards is considered the most secure and is the recommended standard for both home and enterprise use?
WEP (Wired Equivalent Privacy)
WPA (Wi-Fi Protected Access)
WPA2 (Wi-Fi Protected Access 2)
SSID Broadcast
10.
WPA2 provides enhanced security over WPA primarily by mandating the use of which encryption protocol?
TKIP
RC4
CCMP
LEAP
11.
A network administrator wants to allow only specific, pre-approved company laptops to connect to the wireless network. Which method would be most effective for controlling access based on the device’s hardware address?
Disabling the SSID broadcast.
Implementing MAC filtering.
Using WEP encryption.
Setting up a proxy server.
12.
What is the primary function of Network Address Translation (NAT)?
To filter web content based on URLs.
To authenticate users before granting them network access.
To map multiple private IP addresses to a single or few public IP addresses.
To divide a large network into smaller logical networks.
13.
Secure Shell (SSH) is a protocol primarily used for what purpose?
Translating domain names into IP addresses.
Providing secure, encrypted remote command-line access.
Transferring files using an unencrypted channel.
Requesting and serving unsecured web pages.
14.
An administrator is concerned about Denial of Service (DoS) attacks that exhaust server resources by initiating multiple connections and never completing the handshake. What technology can help mitigate this specific type of “SYN flood” attack?
URL Filtering
Flood Guards
Loop Protection
Subnetting
15.
If a company uses a web-based email service where they only manage their users and data, but not the underlying servers or software, which cloud computing model are they using?
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Virtual Private Network (VPN)
Loading…