Q. In the TCP/IP model, which layer is responsible for ensuring reliable data transmission?
A.
Application Layer
B.
Transport Layer
C.
Internet Layer
D.
Network Access Layer
Show solution
Solution
The Transport Layer in the TCP/IP model is responsible for ensuring reliable data transmission through protocols like TCP.
Correct Answer:
B
— Transport Layer
Learn More →
Q. What does the term 'encryption' refer to in network security?
A.
The process of compressing data
B.
The process of converting data into a coded format
C.
The process of backing up data
D.
The process of deleting data
Show solution
Solution
Encryption is the process of converting data into a coded format to prevent unauthorized access.
Correct Answer:
B
— The process of converting data into a coded format
Learn More →
Q. What does the term 'VPN' stand for in network security?
A.
Virtual Private Network
B.
Virtual Public Network
C.
Variable Private Network
D.
Virtual Protected Network
Show solution
Solution
VPN stands for Virtual Private Network, which creates a secure connection over a less secure network, such as the Internet.
Correct Answer:
A
— Virtual Private Network
Learn More →
Q. What is the function of a VPN in network security?
A.
To increase bandwidth
B.
To create a secure connection over a public network
C.
To manage network devices
D.
To monitor network traffic
Show solution
Solution
A VPN (Virtual Private Network) creates a secure connection over a public network, ensuring privacy and security.
Correct Answer:
B
— To create a secure connection over a public network
Learn More →
Q. What is the main function of a network intrusion detection system (NIDS)?
A.
To block unauthorized access
B.
To monitor network traffic for suspicious activity
C.
To manage IP addresses
D.
To encrypt data
Show solution
Solution
A network intrusion detection system (NIDS) monitors network traffic for suspicious activity and potential threats.
Correct Answer:
B
— To monitor network traffic for suspicious activity
Learn More →
Q. What is the main function of an Intrusion Detection System (IDS)?
A.
To block unauthorized access
B.
To monitor network traffic for suspicious activity
C.
To encrypt data
D.
To manage IP addresses
Show solution
Solution
An Intrusion Detection System (IDS) monitors network traffic for suspicious activity and alerts administrators.
Correct Answer:
B
— To monitor network traffic for suspicious activity
Learn More →
Q. What is the primary purpose of a firewall in a network?
A.
To increase bandwidth
B.
To filter incoming and outgoing traffic
C.
To provide wireless connectivity
D.
To manage IP addresses
Show solution
Solution
A firewall is used to filter incoming and outgoing traffic based on predetermined security rules.
Correct Answer:
B
— To filter incoming and outgoing traffic
Learn More →
Q. What is the primary purpose of a firewall in network security?
A.
To increase network speed
B.
To filter incoming and outgoing traffic
C.
To manage IP addresses
D.
To provide wireless connectivity
Show solution
Solution
A firewall is used to filter incoming and outgoing traffic based on predetermined security rules.
Correct Answer:
B
— To filter incoming and outgoing traffic
Learn More →
Q. What is the primary role of the Network Layer in the OSI model regarding security?
A.
To provide end-to-end communication
B.
To route packets between devices
C.
To encrypt data
D.
To manage sessions
Show solution
Solution
The Network Layer is responsible for routing packets between devices, which is crucial for maintaining secure communication paths.
Correct Answer:
B
— To route packets between devices
Learn More →
Q. What is the purpose of a VPN?
A.
To increase network speed
B.
To create a secure connection over the Internet
C.
To manage network devices
D.
To assign IP addresses
Show solution
Solution
A VPN (Virtual Private Network) creates a secure connection over the Internet, protecting data from eavesdropping.
Correct Answer:
B
— To create a secure connection over the Internet
Learn More →
Q. What is the purpose of IPsec in network security?
A.
To provide secure email communication
B.
To encrypt IP packets for secure transmission
C.
To manage network traffic
D.
To authenticate users
Show solution
Solution
IPsec (Internet Protocol Security) is used to encrypt and authenticate IP packets, providing secure communication over IP networks.
Correct Answer:
B
— To encrypt IP packets for secure transmission
Learn More →
Q. What is the purpose of using VLANs in network security?
A.
To increase network speed
B.
To segment network traffic and enhance security
C.
To provide redundancy
D.
To manage IP addresses
Show solution
Solution
VLANs (Virtual Local Area Networks) are used to segment network traffic, enhancing security by isolating different network segments.
Correct Answer:
B
— To segment network traffic and enhance security
Learn More →
Q. What layer of the OSI model is primarily responsible for data encryption and decryption?
A.
Application Layer
B.
Presentation Layer
C.
Session Layer
D.
Transport Layer
Show solution
Solution
The Presentation Layer is responsible for data formatting, encryption, and decryption.
Correct Answer:
B
— Presentation Layer
Learn More →
Q. What layer of the OSI model is responsible for encryption and decryption?
A.
Application Layer
B.
Presentation Layer
C.
Session Layer
D.
Transport Layer
Show solution
Solution
The Presentation Layer is responsible for data translation and encryption, ensuring that data is presented in a readable format.
Correct Answer:
B
— Presentation Layer
Learn More →
Q. Which layer of the OSI model is primarily responsible for data encryption and decryption?
A.
Application Layer
B.
Presentation Layer
C.
Session Layer
D.
Transport Layer
Show solution
Solution
The Presentation Layer is responsible for data format translation, encryption, and decryption.
Correct Answer:
B
— Presentation Layer
Learn More →
Q. Which layer of the TCP/IP model is responsible for end-to-end communication and error recovery?
A.
Application Layer
B.
Transport Layer
C.
Internet Layer
D.
Network Access Layer
Show solution
Solution
The Transport Layer is responsible for end-to-end communication and error recovery.
Correct Answer:
B
— Transport Layer
Learn More →
Q. Which of the following is a common method for securing wireless networks?
A.
WEP
B.
HTTP
C.
FTP
D.
SMTP
Show solution
Solution
WEP (Wired Equivalent Privacy) is a security protocol designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.
Correct Answer:
A
— WEP
Learn More →
Q. Which of the following is a common method of error control in data transmission?
A.
Checksum
B.
Compression
C.
Encryption
D.
Segmentation
Show solution
Solution
Checksum is a common method of error control used to detect errors in data transmission.
Correct Answer:
A
— Checksum
Learn More →
Q. Which of the following is a common method of securing wireless networks?
A.
WEP
B.
FTP
C.
HTTP
D.
SMTP
Show solution
Solution
WEP (Wired Equivalent Privacy) is a security protocol for wireless networks, although it is considered weak by modern standards.
Correct Answer:
A
— WEP
Learn More →
Q. Which of the following is NOT a type of malware?
A.
Virus
B.
Trojan
C.
Firewall
D.
Worm
Show solution
Solution
A firewall is a security device, while virus, Trojan, and worm are types of malware.
Correct Answer:
C
— Firewall
Learn More →
Q. Which of the following is NOT a type of network attack?
A.
Phishing
B.
DDoS
C.
Spoofing
D.
Routing
Show solution
Solution
Routing is not a type of network attack; it is a process of selecting paths in a network along which to send network traffic.
Correct Answer:
D
— Routing
Learn More →
Q. Which protocol is commonly used for secure data transmission over the Internet?
A.
HTTP
B.
FTP
C.
HTTPS
D.
SMTP
Show solution
Solution
HTTPS (Hypertext Transfer Protocol Secure) is used for secure data transmission over the Internet.
Correct Answer:
C
— HTTPS
Learn More →
Q. Which protocol is used to securely transfer files over the Internet?
A.
FTP
B.
SFTP
C.
HTTP
D.
SMTP
Show solution
Solution
SFTP (Secure File Transfer Protocol) is used to securely transfer files over the Internet.
Correct Answer:
B
— SFTP
Learn More →
Q. Which type of attack involves intercepting and altering communications between two parties?
A.
Denial of Service
B.
Man-in-the-Middle
C.
Phishing
D.
Spoofing
Show solution
Solution
A Man-in-the-Middle attack involves intercepting and altering communications between two parties without their knowledge.
Correct Answer:
B
— Man-in-the-Middle
Learn More →
Showing 1 to 24 of 24 (1 Pages)