Network Defense
LATEST MIDTERM GUIDE
Q&S
©2024/2025
,1. Multiple Choice: Which of the following is considered a
proactive network defense mechanism?
a) Intrusion Detection System (IDS)
b) Firewall
c) Antivirus software
d) All of the above
Correct Answer: d) All of the above
Rationale: Proactive network defense mechanisms are
those that prevent attacks before they occur. IDS, firewalls,
and antivirus software all work to identify and block potential
threats proactively.
2. Fill-in-the-Blank: __________ is the process of
monitoring and analyzing network traffic to detect
unauthorized access or anomalies.
Correct Answer: Network traffic analysis
Rationale: Network traffic analysis is crucial for identifying
suspicious activities that could indicate a security breach or
an ongoing attack.
3. True/False: A honeypot is designed to attract attackers
and divert them from legitimate targets.
Correct Answer: True
Rationale: Honeypots are decoy systems or networks set
up to gather information about attackers and their methods.
4. Multiple Response: Select all that apply. Which of the
following are types of network attacks?
a) DDoS attacks
b) Phishing
c) SQL injection
©2024/2025
, d) Man-in-the-middle attacks
Correct Answer: a), b), c), and d)
Rationale: These are all common types of network attacks
that can compromise the integrity, confidentiality, and
availability of network resources.
5. Multiple Choice: In the context of network security, what
does the acronym 'CIA' stand for?
a) Central Intelligence Agency
b) Confidentiality, Integrity, and Availability
c) Computer Information Agency
d) None of the above
Correct Answer: b) Confidentiality, Integrity, and
Availability
Rationale: In network security, CIA stands for
Confidentiality, Integrity, and Availability, which are the
three fundamental principles of information security.
6. Fill-in-the-Blank: The __________ is a set of rules that
determines what is allowed to enter or leave a network.
Correct Answer: Firewall policy
Rationale: The firewall policy defines the security rules for
controlling incoming and outgoing network traffic, helping to
protect the network from unauthorized access and other
threats.
7. True/False: Encryption can be used to ensure data
integrity during transmission.
Correct Answer: False
Rationale: While encryption does protect the
confidentiality of data, it is not primarily used for ensuring
data integrity. Instead, mechanisms like cryptographic
hashes and digital signatures are used to ensure integrity.
©2024/2025