- web.groovymark@gmail.com
- November 28, 2024
Question 21
What is the primary function of a router in a network?
a) To store data
b) To direct traffic between different networks
c) To block unauthorized users
d) To provide wireless connectivity
Correct Answer: b) To direct traffic between different networks
Explanation: A router is responsible for directing data between different networks, ensuring that data reaches its correct destination.
Question 22
What is the function of a network switch?
a) To block unauthorized access
b) To manage data traffic within a local network
c) To provide internet access
d) To increase connection speed
Correct Answer: b) To manage data traffic within a local network
Explanation: A network switch manages data traffic within a local network by sending data packets to the correct device.
Question 23
Which type of malware spreads through network connections without user intervention?
a) Virus
b) Worm
c) Trojan horse
d) Adware
Correct Answer: b) Worm
Explanation: A worm is a type of malware that can spread across networks without any user intervention.
Question 24
What does the term ‘default-allow firewall rule’ mean?
a) No traffic is allowed unless explicitly permitted
b) All traffic is allowed unless specifically blocked
c) Only outgoing traffic is allowed
d) All traffic is blocked unless outgoing
Correct Answer: b) All traffic is allowed unless specifically blocked
Explanation: In a default-allow rule, all traffic is allowed by the firewall unless there is a specific rule to block it.
Question 25
What does a Virtual Private Network (VPN) do?
a) Protects your computer from malware
b) Encrypts internet traffic and hides your IP address
c) Increases your browsing speed
d) Disables firewalls on public networks
Correct Answer: b) Encrypts internet traffic and hides your IP address
Explanation: A VPN encrypts data and routes it through a secure server, hiding your IP address and ensuring secure browsing.
Question 26
Which of the following is an example of a DoS (Denial-of-Service) attack?
a) Sending multiple phishing emails
b) Flooding a website with too much traffic, making it unavailable
c) Infiltrating a network to steal data
d) Decrypting user passwords
Correct Answer: b) Flooding a website with too much traffic, making it unavailable
Explanation: A DoS attack overwhelms a server with traffic, making it unavailable for legitimate users.
Question 27
What does the term ‘social engineering’ refer to in cybersecurity?
a) Building strong firewalls
b) Manipulating people into divulging confidential information
c) Encrypting files for security
d) Using software to protect data
Correct Answer: b) Manipulating people into divulging confidential information
Explanation: Social engineering involves tricking people into providing sensitive information, such as passwords, rather than hacking a system.
Question 28
What is the main goal of a phishing attack?
a) To steal sensitive information
b) To slow down the network
c) To spread malware
d) To disable antivirus software
Correct Answer: a) To steal sensitive information
Explanation: Phishing attacks are designed to trick users into providing sensitive information like usernames, passwords, or credit card details.
Question 29
Which device assigns IP addresses to devices on a network?
a) Switch
b) Router
c) DHCP server
d) Firewall
Correct Answer: c) DHCP server
Explanation: A DHCP server dynamically assigns IP addresses to devices on a network, ensuring they have unique identifiers.
Question 30
Which technology allows multiple virtual machines to run on a single physical machine?
a) Cloud computing
b) Virtualization
c) Firewall
d) Load balancing
Correct Answer: b) Virtualization
Explanation: Virtualization allows a single physical machine to run multiple virtual machines, each operating as if it were a separate physical machine.
Question 31
What does a database administrator (DBA) do?
a) Manages and maintains an organization’s databases
b) Writes code for new software applications
c) Designs network infrastructure
d) Installs operating systems
Correct Answer: a) Manages and maintains an organization's databases
Explanation: A database administrator (DBA) is responsible for ensuring the performance, security, and integrity of databases in an organization.
Question 32
What is the main function of a firewall in network security?
a) To prevent malware infections
b) To block unauthorized access to a network
c) To manage network speeds
d) To provide wireless internet
Correct Answer: b) To block unauthorized access to a network
Explanation: A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules, blocking unauthorized access.
Question 33
Which of the following is considered a physical security measure?
a) Encryption
b) Firewall
c) Biometric access control
d) VPN
Correct Answer: c) Biometric access control
Explanation: Physical security measures like biometric access control prevent unauthorized individuals from physically accessing secure locations.
Question 34
What does SSL (Secure Sockets Layer) encryption protect?
a) Hard drive data
b) Email accounts
c) Data transmitted over the internet
d) Password storage
Correct Answer: c) Data transmitted over the internet
Explanation: SSL encryption ensures that data transmitted over the internet is secure and protected from interception.
Question 35
What is the role of a proxy server?
a) To provide extra storage
b) To serve as an intermediary between a client and the internet
c) To block malware
d) To enhance network speeds
Correct Answer: b) To serve as an intermediary between a client and the internet
Explanation: A proxy server acts as an intermediary between a user's computer and the internet, providing anonymity or filtering content.
Question 36
Which technology allows secure communication over the internet by using encryption?
a) VPN
b) Firewall
c) HTTP
d) DNS
Correct Answer: a) VPN
Explanation: A VPN (Virtual Private Network) encrypts internet traffic, ensuring secure communication over the internet.
Question 37
What is the main purpose of a phishing attack?
a) To trick users into providing personal information
b) To spread malware across a network
c) To disable firewalls
d) To install antivirus software
Correct Answer: a) To trick users into providing personal information
Explanation: Phishing attacks are designed to steal personal information by tricking individuals into providing their login credentials or financial data.
Question 38
Which of the following is an example of an internal threat to an organization?
a) A DDoS attack
b) An employee stealing confidential data
c) A phishing email
d) Malware infection from an external source
Correct Answer: b) An employee stealing confidential data
Explanation: Internal threats come from within the organization, often involving employees who misuse their access to confidential information.
Question 39
What does a network switch do in a local network?
a) Manages data traffic between devices on the same network
b) Assigns IP addresses to devices
c) Blocks malware from entering the network
d) Provides wireless access to devices
Correct Answer: a) Manages data traffic between devices on the same network
Explanation: A switch is responsible for managing and directing data traffic between devices in a local network.
Question 40
What is the purpose of DNS (Domain Name System)?
a) To assign IP addresses to devices
b) To encrypt data
c) To translate domain names into IP addresses
d) To manage network connections
Correct Answer: c) To translate domain names into IP addresses
Explanation: DNS is used to translate human-readable domain names into IP addresses that computers use to communicate with each other.