Network & Security Foundations
3.0 Credits
Objective Assessment Review (Qns &
Ans)
2025
©2025
, Multiple Choice Questions
Question 1:
A multinational organization has deployed a network security solution
that inspects traffic at the application layer, filtering packets based on
deep-packet inspection and user identity. Which type of firewall best
describes this solution?
A. Packet Filtering Firewall
B. Stateful Inspection Firewall
C. Proxy Firewall
D. Next-Generation Firewall (NGFW)
Correct ANS: D. Next-Generation Firewall (NGFW)
Rationale:
Next-Generation Firewalls (NGFWs) go beyond traditional packet filtering
by incorporating deep packet inspection, application awareness, and user
identity integration. This approach allows the firewall to better detect
and block advanced threats while providing granular control over
applications and users.
---
Question 2:
To secure communications over an untrusted network, which protocol
suite offers encryption, authentication, and integrity for data in transit?
A. FTP/SMTP
B. Telnet/HTTP
C. IPsec with IKE and ESP
D. SNMP and ICMP
Correct ANS: C. IPsec with IKE and ESP
Rationale:
©2025
, IPsec (with its key management protocol IKE and the Encapsulating
Security Payload [ESP]) provides robust encryption, ensures proper
authentication, and guarantees data integrity. This makes it ideal for
securing data communication over untrusted networks such as the
Internet.
---
Question 3:
An organization segments its network into multiple sub-networks to
reduce the risk of lateral movement by attackers once a breach occurs.
What is this strategy called?
A. Network Partitioning
B. Network Segmentation
C. Network Slicing
D. Network Virtualization
Correct ANS: B. Network Segmentation
Rationale:
Network segmentation involves dividing a larger network into smaller,
controlled segments. This approach limits an attacker’s ability to move
laterally across the network, thereby containing breaches and enhancing
overall security.
---
Question 4:
A security administrator is responsible for ensuring that web traffic to a
public-facing server is secure and that sensitive data is transmitted
confidentially and with authentication. Which protocol should be
implemented?
A. HTTP
B. HTTPS (using TLS)
C. FTP
©2025