1. Which protocol is commonly used to secure communication
between remote users and a corporate network?
A. HTTP
B. FTP
C. VPN
D. DNS
Answer: C) VPN
Rationale: A VPN (Virtual Private Network) encrypts the
communication between remote users and a corporate network,
ensuring that data remains secure over untrusted networks like
the internet.
2. Which network design feature helps in isolating sensitive data
and systems from the rest of the network?
A. DMZ
B. VPN
C. VLAN
D. IDS
Answer: C) VLAN
,Rationale: A VLAN is a logical segmentation of a network that
isolates sensitive data and systems, providing added security by
restricting access to only authorized users.
3. Which type of encryption is commonly used for securing
wireless network traffic?
A. RSA
B. WPA2
C. AES
D. DES
Answer: B) WPA2
Rationale: WPA2 (Wi-Fi Protected Access 2) is the most
commonly used encryption standard for securing wireless
networks, providing stronger security than WEP.
4. Which of the following tools is used to detect unauthorized
access to a network?
A. IDS (Intrusion Detection System)
B. DNS (Domain Name System)
C. Load balancer
D. SMTP server
Answer: A) IDS (Intrusion Detection System)
, Rationale: An IDS monitors network traffic and analyzes it for
suspicious patterns that may indicate an unauthorized attempt to
access the network.
5. What is a common attack vector for exploiting network
vulnerabilities?
A. Phishing
B. Denial of Service (DoS)
C. Man-in-the-middle attacks
D. All of the above
Answer: D) All of the above
Rationale: Attackers can exploit various vectors like phishing,
DoS, and man-in-the-middle attacks to compromise network
security, making it essential to secure networks from all angles.
6. What is a key benefit of using a stateful firewall over a stateless
firewall?
A. It can track the state of network connections
B. It operates faster than a stateless firewall
C. It requires less configuration
D. It can filter traffic based only on IP addresses
Answer: A) It can track the state of network connections
between remote users and a corporate network?
A. HTTP
B. FTP
C. VPN
D. DNS
Answer: C) VPN
Rationale: A VPN (Virtual Private Network) encrypts the
communication between remote users and a corporate network,
ensuring that data remains secure over untrusted networks like
the internet.
2. Which network design feature helps in isolating sensitive data
and systems from the rest of the network?
A. DMZ
B. VPN
C. VLAN
D. IDS
Answer: C) VLAN
,Rationale: A VLAN is a logical segmentation of a network that
isolates sensitive data and systems, providing added security by
restricting access to only authorized users.
3. Which type of encryption is commonly used for securing
wireless network traffic?
A. RSA
B. WPA2
C. AES
D. DES
Answer: B) WPA2
Rationale: WPA2 (Wi-Fi Protected Access 2) is the most
commonly used encryption standard for securing wireless
networks, providing stronger security than WEP.
4. Which of the following tools is used to detect unauthorized
access to a network?
A. IDS (Intrusion Detection System)
B. DNS (Domain Name System)
C. Load balancer
D. SMTP server
Answer: A) IDS (Intrusion Detection System)
, Rationale: An IDS monitors network traffic and analyzes it for
suspicious patterns that may indicate an unauthorized attempt to
access the network.
5. What is a common attack vector for exploiting network
vulnerabilities?
A. Phishing
B. Denial of Service (DoS)
C. Man-in-the-middle attacks
D. All of the above
Answer: D) All of the above
Rationale: Attackers can exploit various vectors like phishing,
DoS, and man-in-the-middle attacks to compromise network
security, making it essential to secure networks from all angles.
6. What is a key benefit of using a stateful firewall over a stateless
firewall?
A. It can track the state of network connections
B. It operates faster than a stateless firewall
C. It requires less configuration
D. It can filter traffic based only on IP addresses
Answer: A) It can track the state of network connections