with Detailed Rationales latest 2026 Latest
version Q&A |INSTANT DOWNLOAD
1. Which of the following is a common method to prevent
unauthorized access to a network?
A. Antivirus software
B. Firewall
C. VPN
D. Defragmentation
Answer: B. Firewall – A firewall controls incoming and outgoing network
traffic based on predetermined security rules, preventing unauthorized
access.
2. What is the primary purpose of a VPN?
A. Increase bandwidth
B. Encrypt data transmitted over the internet
C. Reduce malware infections
D. Manage IP addresses
Answer: B. Encrypt data transmitted over the internet – VPNs create a
secure, encrypted tunnel to protect data from interception.
3. Which attack involves intercepting communication between two
parties?
A. Phishing
B. Man-in-the-Middle (MITM)
C. SQL Injection
,D. Brute Force
Answer: B. Man-in-the-Middle (MITM) – MITM attacks occur when an
attacker secretly intercepts and possibly alters communication between
two parties.
4. What is a strong password recommendation?
A. Use your birthdate
B. Include letters, numbers, and symbols
C. Use the word "password"
D. Only letters
Answer: B. Include letters, numbers, and symbols – Complex passwords
reduce the likelihood of being guessed or cracked.
5. Which protocol is considered secure for transmitting sensitive
information?
A. HTTP
B. HTTPS
C. FTP
D. Telnet
Answer: B. HTTPS – HTTPS encrypts data between the browser and
server using SSL/TLS, making it secure.
6. Which type of malware restricts access to data until a ransom is
paid?
A. Spyware
B. Ransomware
C. Worm
D. Adware
Answer: B. Ransomware – Ransomware encrypts files or locks users out
and demands payment to regain access.
7. What is the purpose of two-factor authentication (2FA)?
A. To eliminate passwords
, B. To require two forms of verification
C. To encrypt files
D. To prevent network scanning
Answer: B. To require two forms of verification – 2FA increases security
by combining something you know (password) with something you have
(code/token).
8. Which of the following best describes phishing?
A. Network sniffing
B. Deceptive emails or messages to steal credentials
C. Hacking into firewalls
D. Installing antivirus software
Answer: B. Deceptive emails or messages to steal credentials – Phishing
tricks users into revealing sensitive information.
9. What is a brute force attack?
A. Guessing passwords repeatedly until the correct one is found
B. Stealing cookies from browsers
C. Exploiting software vulnerabilities
D. Sniffing network packets
Answer: A. Guessing passwords repeatedly until the correct one is found
– Brute force attacks systematically try all possible combinations.
10. Which device monitors network traffic for suspicious activity?
A. Router
B. IDS (Intrusion Detection System)
C. Modem
D. Switch
Answer: B. IDS (Intrusion Detection System) – IDS monitors network
traffic to detect and alert on potential threats.
11. What does SSL/TLS provide in network communication?
A. Faster connection