Q. In the TCP/IP model, which layer is responsible for ensuring reliable data transmission?
  • A. Application Layer
  • B. Transport Layer
  • C. Internet Layer
  • D. Network Access Layer
Q. What does the term 'encryption' refer to in network security?
  • A. The process of compressing data
  • B. The process of converting data into a coded format
  • C. The process of backing up data
  • D. The process of deleting data
Q. What does the term 'VPN' stand for in network security?
  • A. Virtual Private Network
  • B. Virtual Public Network
  • C. Variable Private Network
  • D. Virtual Protected Network
Q. What is the function of a VPN in network security?
  • A. To increase bandwidth
  • B. To create a secure connection over a public network
  • C. To manage network devices
  • D. To monitor network traffic
Q. What is the main function of a network intrusion detection system (NIDS)?
  • A. To block unauthorized access
  • B. To monitor network traffic for suspicious activity
  • C. To manage IP addresses
  • D. To encrypt data
Q. What is the main function of an Intrusion Detection System (IDS)?
  • A. To block unauthorized access
  • B. To monitor network traffic for suspicious activity
  • C. To encrypt data
  • D. To manage IP addresses
Q. What is the primary purpose of a firewall in a network?
  • A. To increase bandwidth
  • B. To filter incoming and outgoing traffic
  • C. To provide wireless connectivity
  • D. To manage IP addresses
Q. What is the primary purpose of a firewall in network security?
  • A. To increase network speed
  • B. To filter incoming and outgoing traffic
  • C. To manage IP addresses
  • D. To provide wireless connectivity
Q. What is the primary role of the Network Layer in the OSI model regarding security?
  • A. To provide end-to-end communication
  • B. To route packets between devices
  • C. To encrypt data
  • D. To manage sessions
Q. What is the purpose of a VPN?
  • A. To increase network speed
  • B. To create a secure connection over the Internet
  • C. To manage network devices
  • D. To assign IP addresses
Q. What is the purpose of IPsec in network security?
  • A. To provide secure email communication
  • B. To encrypt IP packets for secure transmission
  • C. To manage network traffic
  • D. To authenticate users
Q. What is the purpose of using VLANs in network security?
  • A. To increase network speed
  • B. To segment network traffic and enhance security
  • C. To provide redundancy
  • D. To manage IP addresses
Q. What layer of the OSI model is primarily responsible for data encryption and decryption?
  • A. Application Layer
  • B. Presentation Layer
  • C. Session Layer
  • D. Transport Layer
Q. What layer of the OSI model is responsible for encryption and decryption?
  • A. Application Layer
  • B. Presentation Layer
  • C. Session Layer
  • D. Transport Layer
Q. Which layer of the OSI model is primarily responsible for data encryption and decryption?
  • A. Application Layer
  • B. Presentation Layer
  • C. Session Layer
  • D. Transport Layer
Q. Which layer of the TCP/IP model is responsible for end-to-end communication and error recovery?
  • A. Application Layer
  • B. Transport Layer
  • C. Internet Layer
  • D. Network Access Layer
Q. Which of the following is a common method for securing wireless networks?
  • A. WEP
  • B. HTTP
  • C. FTP
  • D. SMTP
Q. Which of the following is a common method of error control in data transmission?
  • A. Checksum
  • B. Compression
  • C. Encryption
  • D. Segmentation
Q. Which of the following is a common method of securing wireless networks?
  • A. WEP
  • B. FTP
  • C. HTTP
  • D. SMTP
Q. Which of the following is NOT a type of malware?
  • A. Virus
  • B. Trojan
  • C. Firewall
  • D. Worm
Q. Which of the following is NOT a type of network attack?
  • A. Phishing
  • B. DDoS
  • C. Spoofing
  • D. Routing
Q. Which protocol is commonly used for secure data transmission over the Internet?
  • A. HTTP
  • B. FTP
  • C. HTTPS
  • D. SMTP
Q. Which protocol is used to securely transfer files over the Internet?
  • A. FTP
  • B. SFTP
  • C. HTTP
  • D. SMTP
Q. Which type of attack involves intercepting and altering communications between two parties?
  • A. Denial of Service
  • B. Man-in-the-Middle
  • C. Phishing
  • D. Spoofing
Showing 1 to 24 of 24 (1 Pages)
Soulshift Feedback ×

On a scale of 0–10, how likely are you to recommend The Soulshift Academy?

Not likely Very likely