-
web.groovymark@gmail.com
- November 28, 2024
Question 01
What is the primary function of a firewall in network security?
a) To speed up internet connections
b) To monitor network performance
c) To block unauthorized access
d) To store backups
Correct Answer: c) To block unauthorized access
Explanation: A firewall is a combination of hardware and software designed to prevent unauthorized access to or from a private network.
Question 02
Which of the following best defines malware?
a) Software designed to update a computer
b) Software that helps the computer run faster
c) Software specifically designed to damage or disrupt a computer system
d) Software used to manage passwords
Correct Answer: c) Software specifically designed to damage or disrupt a computer system
Explanation: Malware is any software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Question 03
What does a Trojan horse malware typically do?
a) Encrypt files on a computer
b) Allow hackers to control a computer remotely
c) Send spam emails
d) Seem harmless at first but execute malicious activities when run
Correct Answer: d) Seem harmless at first but execute malicious activities when run
Explanation: A Trojan horse appears to be a legitimate program, but it carries out harmful activities once executed.
Question 04
Which of the following is an example of phishing?
a) An email that claims to be from a bank asking for personal information
b) A popup ad promoting antivirus software
c) A text message from your phone service provider
d) An automatic software update
Correct Answer: a) An email that claims to be from a bank asking for personal information
Explanation: Phishing is an attempt to obtain sensitive information by pretending to be a legitimate entity, often through email.
Question 05
What is the role of a proxy server?
a) To store files
b) To enhance video streaming quality
c) To act as an intermediary between a client and the internet
d) To prevent phishing attempts
Correct Answer: c) To act as an intermediary between a client and the internet
Explanation: A proxy server serves as an intermediary for requests from clients seeking resources from other servers, providing anonymity or filtering services.
Question 06
What is a key benefit of using a VPN (Virtual Private Network)?
a) Increased browsing speed
b) Access to restricted content
c) Enhanced data compression
d) Increased battery life
Correct Answer: b) Access to restricted content
Explanation: A VPN allows users to access content that may be restricted in their geographical location by creating a secure connection to a different network.
Question 07
What does the term ‘Denial-of-Service (DoS) attack’ refer to?
a) An attack that steals user credentials
b) An attack that encrypts files
c) An attack that attempts to overwhelm a system, rendering it unavailable
d) An attack that installs malicious software
Correct Answer: c) An attack that attempts to overwhelm a system, rendering it unavailable
Explanation: A DoS attack floods a server or network with requests, overwhelming it and making it unavailable to legitimate users.
Question 08
Which of the following is a typical sign of ransomware infection?
a) The computer runs slower than usual
b) A pop-up message demanding payment to unlock files
c) Files get deleted automatically
d) A system error report from the OS
Correct Answer: b) A pop-up message demanding payment to unlock files
Explanation: Ransomware typically encrypts the user's files and then demands a ransom to decrypt them.
Question 09
Which term refers to software that tracks user activities without their consent?
a) Adware
b) Spyware
c) Malware
d) Ransomware
Correct Answer: b) Spyware
Explanation: Spyware is software that gathers user information without consent, often for advertising or data theft purposes.
Question 10
What is the function of a CAPTCHA in online security?
a) To verify a user’s identity
b) To prevent automated bots from submitting forms
c) To increase encryption
d) To enhance password security
Correct Answer: b) To prevent automated bots from submitting forms
Explanation: CAPTCHA is used to differentiate between human users and bots, preventing automated scripts from abusing web services.
Question 11
Which network topology connects all devices in a loop?
a) Star topology
b) Ring topology
c) Bus topology
d) Mesh topology
Correct Answer: b) Ring topology
Explanation: In a ring topology, each device is connected to two other devices, forming a loop.
Question 12
What is a key difference between a LAN and a WAN?
a) A LAN is for wireless networks, and a WAN is for wired networks
b) A LAN covers a small area, while a WAN covers a large geographical area
c) A LAN is slower than a WAN
d) A WAN is restricted to a single building
Correct Answer: b) A LAN covers a small area, while a WAN covers a large geographical area
Explanation: A Local Area Network (LAN) covers a small geographic area, such as a building, while a Wide Area Network (WAN) spans large geographical areas.
Question 13
What does the term ‘default-deny firewall rule’ mean?
a) All traffic is allowed unless specifically denied
b) No traffic is allowed unless explicitly permitted
c) All incoming traffic is allowed but outgoing traffic is blocked
d) All outgoing traffic is allowed but incoming traffic is blocked
Correct Answer: b) No traffic is allowed unless explicitly permitted
Explanation: In a default-deny rule, the firewall blocks all traffic unless it is explicitly allowed by rules.
Question 14
What is the primary role of a Network Administrator?
a) Designing network hardware
b) Ensuring smooth network operations and security
c) Writing software applications
d) Creating backup systems
Correct Answer: b) Ensuring smooth network operations and security
Explanation: A network administrator manages and maintains the network, ensuring it functions properly and securely.
Question 15
Which of the following best defines a ‘peer-to-peer’ (P2P) network?
a) A network with a central server managing traffic
b) A network where devices connect directly to each other without a central server
c) A network with encrypted data
d) A network for wireless connections only
Correct Answer: b) A network where devices connect directly to each other without a central server
Explanation: In a peer-to-peer network, devices communicate directly with each other without needing a central server.
Question 16
Which protocol is responsible for translating domain names into IP addresses?
a) TCP/IP
b) HTTP
c) DNS
d) HTTPS
Correct Answer: c) DNS
Explanation: The Domain Name System (DNS) translates human-readable domain names into IP addresses used for routing requests over the internet.
Question 17
What is the purpose of data encryption?
a) To speed up data transmission
b) To compress files for storage
c) To protect data from unauthorized access
d) To increase storage space
Correct Answer: c) To protect data from unauthorized access
Explanation: Data encryption converts data into a code to prevent unauthorized access to the information.
Question 18
Which of the following is an example of an internal security threat?
a) A phishing attack
b) A disgruntled employee stealing company data
c) A ransomware attack
d) A denial-of-service attack
Correct Answer: b) A disgruntled employee stealing company data
Explanation: Internal threats come from within the organization, often involving employees who misuse their access to sensitive data.
Question 19
What is a MAC address used for in networking?
a) Encrypting network traffic
b) Identifying devices on a network
c) Managing network connections
d) Speeding up data transmission
Correct Answer: b) Identifying devices on a network
Explanation: A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communication on a network.
Question 20
Which type of network topology uses a central hub to connect devices?
a) Star topology
b) Ring topology
c) Bus topology
d) Mesh topology
Correct Answer: a) Star topology
Explanation: In a star topology, each device is connected to a central hub or switch, which manages the data transmission.