- web.groovymark@gmail.com
- December 4, 2024
Question 21
Which of the following best describes a honeypot?
A. A system used to attack other systems
B. A high-value system that attackers target
C. A decoy system set up to attract and trap attackers
D. A system used to scan for vulnerabilities
Correct Answer: C. A decoy system set up to attract and trap attackers
Explanation: A honeypot is a decoy system designed to attract and trap attackers, allowing administrators to study attack techniques and protect actual systems.
Question 22
Which of the following is used to manage digital certificates and public-key encryption?
A. Data Loss Prevention (DLP)
B. Public Key Infrastructure (PKI)
C. SIEM
D. Firewall
Correct Answer: B. Public Key Infrastructure (PKI)
Explanation: PKI manages digital certificates and public-key encryption to secure communications. DLP, SIEM, and firewalls serve different security roles.
Question 23
Which of the following is a security feature that restricts devices by their hardware MAC addresses?
A. MAC filtering
B. SSL
C. IDS
D. SIEM
Correct Answer: A. MAC filtering
Explanation: MAC filtering restricts network access based on a device's MAC address, providing a layer of security at the network level.
Question 24
What is the purpose of patch management in an organization?
A. To prevent data leaks
B. To monitor network traffic
C. To ensure systems are updated with the latest security fixes
D. To back up critical data
Correct Answer: C. To ensure systems are updated with the latest security fixes
Explanation: Patch management ensures systems are updated with the latest security patches to protect against vulnerabilities.
Question 25
Which of the following protects against unauthorized access to wireless networks by using a preshared key?
A. WEP
B. WPA2-PSK
C. MAC filtering
D. SSL
Correct Answer: B. WPA2-PSK
Explanation: WPA2-PSK protects wireless networks by using a preshared key for authentication and encryption.
Question 26
Which of the following protocols is used to encrypt email communications?
A. FTP
B. HTTP
C. IMAP
D. S/MIME
Correct Answer: D. S/MIME
Explanation: S/MIME is a protocol used to encrypt and sign email communications, providing confidentiality and integrity.
Question 27
Which of the following is used to manage user permissions and access rights in an enterprise environment?
A. Role-based access control (RBAC)
B. IDS
C. SIEM
D. Firewall
Correct Answer: A. Role-based access control (RBAC)
Explanation: RBAC manages user permissions and access rights based on their roles within an organization.
Question 28
Which of the following is designed to disrupt the availability of a network or system by overwhelming it with traffic?
A. Phishing attack
B. SQL injection
C. Denial of Service (DoS) attack
D. Man-in-the-middle attack
Correct Answer: C. Denial of Service (DoS) attack
Explanation: A DoS attack overwhelms a network or system with traffic, disrupting its availability.
Question 29
Which of the following describes the use of encryption to protect data stored on a device?
A. Data at rest encryption
B. Data in motion encryption
C. Data tokenization
D. Data hashing
Correct Answer: A. Data at rest encryption
Explanation: Data at rest encryption protects stored data using encryption, ensuring its confidentiality even if the device is compromised.
Question 30
Which of the following types of malware disguises itself as legitimate software to gain access to systems?
A. Worm
B. Trojan
C. Spyware
D. Ransomware
Correct Answer: B. Trojan
Explanation: A trojan disguises itself as legitimate software to trick users into installing it, allowing attackers to gain access to the system.
Question 31
What is the primary purpose of a firewall in a network?
A. To prevent unauthorized access to a network
B. To scan for malware
C. To monitor employee activities
D. To back up data
Correct Answer: A. To prevent unauthorized access to a network
Explanation: Firewalls are designed to prevent unauthorized access to or from a private network by controlling incoming and outgoing network traffic based on security rules.
Question 32
Which of the following protocols provides secure remote command-line access to a device?
A. FTP
B. SSH
C. Telnet
D. SMTP
Correct Answer: B. SSH
Explanation: SSH (Secure Shell) provides secure remote command-line access and data transfer over unsecured networks, using encryption.
Question 33
Which security measure helps protect a system by isolating it from other network devices?
A. Encryption
B. Network segmentation
C. Antivirus
D. Backup
Correct Answer: B. Network segmentation
Explanation: Network segmentation involves dividing a network into smaller parts to isolate systems, improving security by limiting access and reducing the attack surface.
Question 34
Which of the following protects data during transmission by encrypting it?
A. IDS
B. VPN
C. DLP
D. SIEM
Correct Answer: B. VPN
Explanation: A VPN (Virtual Private Network) encrypts data during transmission to secure communication over public networks.
Question 35
Which type of malware can self-replicate without requiring user interaction?
A. Trojan
B. Worm
C. Spyware
D. Adware
Correct Answer: B. Worm
Explanation: Worms are a type of malware that can self-replicate and spread across networks without requiring user interaction, unlike trojans or spyware.
Question 36
What is the purpose of an Intrusion Detection System (IDS)?
A. To prevent unauthorized access
B. To monitor network traffic for suspicious activity
C. To encrypt data in transit
D. To block malicious IP addresses
Correct Answer: B. To monitor network traffic for suspicious activity
Explanation: An IDS monitors network traffic for suspicious activity and potential threats, alerting administrators to take action.
Question 37
Which of the following refers to the use of encryption keys that are valid for only one session?
A. Symmetric encryption
B. Public-key encryption
C. Ephemeral key
D. Hashing
Correct Answer: C. Ephemeral key
Explanation: Ephemeral keys are encryption keys that are used only for a single session and then discarded, providing forward secrecy.
Question 38
Which of the following ensures data is accessible only by authorized users?
A. Integrity
B. Confidentiality
C. Availability
D. Non-repudiation
Correct Answer: B. Confidentiality
Explanation: Confidentiality ensures that sensitive data is accessed only by authorized users, protecting it from unauthorized disclosure.
Question 39
Which type of malware collects personal information from a user’s device without their knowledge?
A. Ransomware
B. Spyware
C. Worm
D. Trojan
Correct Answer: B. Spyware
Explanation: Spyware secretly collects personal information, such as browsing habits or login credentials, and transmits it to third parties without the user's knowledge.
Question 40
Which of the following is a best practice for securing wireless networks?
A. Using WEP encryption
B. Disabling MAC filtering
C. Using WPA2 encryption
D. Enabling SSID broadcasting
Correct Answer: C. Using WPA2 encryption
Explanation: WPA2 provides stronger security for wireless networks compared to older protocols like WEP. It uses AES encryption to protect data.