-
web.groovymark@gmail.com
- November 18, 2024
Question 41
What is a replay attack in network security?
a) An attack that encrypts data to prevent access
b) An attack where data packets are captured and retransmitted
c) An attack that floods a network with excessive traffic
d) An attack that modifies data in transit
Correct Answer: b) An attack where data packets are captured and retransmitted
Explanation: In a replay attack, an attacker captures valid network data and retransmits it to create unauthorized effects, such as gaining access to secure systems.
Question 42
What is the purpose of Kerberos in network security?
a) To encrypt data for secure transmission
b) To authenticate users and devices on a network
c) To assign dynamic IP addresses to devices
d) To filter network traffic based on predefined rules
Correct Answer: b) To authenticate users and devices on a network
Explanation: Kerberos is a network authentication protocol that securely verifies the identity of users and devices on a network through the use of tickets and encryption.
Question 43
What is the purpose of a router in a network?
a) To assign IP addresses to devices
b) To route data between different networks
c) To filter traffic based on MAC addresses
d) To encrypt data transmissions
Correct Answer: b) To route data between different networks
Explanation: A router is responsible for directing data between different networks, ensuring that packets reach their correct destination based on IP addresses.
Question 44
What does the acronym SSL stand for?
a) Secure Sockets Layer
b) Simple Security Layer
c) Standard Security Link
d) Secure System Layer
Correct Answer: a) Secure Sockets Layer
Explanation: SSL (Secure Sockets Layer) is a security protocol used to establish encrypted links between web servers and browsers, ensuring that data is transmitted securely.
Question 45
What is the purpose of NAT (Network Address Translation)?
a) To resolve domain names to IP addresses
b) To allow multiple devices on a private network to share a single public IP address
c) To encrypt data for secure communication
d) To filter network traffic based on predefined rules
Correct Answer: b) To allow multiple devices on a private network to share a single public IP address
Explanation: NAT enables devices on a private network to communicate with external networks (such as the internet) by translating private IP addresses into public ones.
Question 46
What is the purpose of a VLAN?
a) To assign dynamic IP addresses to devices
b) To segment a network into separate logical groups
c) To encrypt network traffic
d) To amplify weak network signals
Correct Answer: b) To segment a network into separate logical groups
Explanation: A VLAN (Virtual Local Area Network) allows for the logical segmentation of a network, enabling administrators to group devices based on function or department.
Question 47
What is a broadcast address used for in networking?
a) To send data to multiple recipients
b) To send data to all devices on a network
c) To encrypt network traffic
d) To route data between networks
Correct Answer: b) To send data to all devices on a network
Explanation: A broadcast address is used to send data to all devices on a network, typically for purposes such as network discovery or DHCP requests.
Question 48
What does a Certificate Authority (CA) provide in network security?
a) Encryption for data transmission
b) Authentication by issuing digital certificates
c) IP address assignment for devices
d) Network traffic filtering
Correct Answer: b) Authentication by issuing digital certificates
Explanation: A Certificate Authority (CA) issues digital certificates that are used to authenticate the identity of entities and enable secure communication over a network.
Question 49
What type of attack involves overwhelming a network with excessive traffic?
a) Replay attack
b) Denial of Service (DoS) attack
c) Man-in-the-middle attack
d) Phishing attack
Correct Answer: b) Denial of Service (DoS) attack
Explanation: A Denial of Service (DoS) attack overwhelms a network or server with excessive traffic, rendering it unavailable to legitimate users.
Question 50
What is the function of an IDS (Intrusion Detection System)?
a) To assign dynamic IP addresses to devices
b) To detect and alert administrators of unauthorized network activity
c) To route traffic between different networks
d) To encrypt data for secure communication
Correct Answer: b) To detect and alert administrators of unauthorized network activity
Explanation: An Intrusion Detection System (IDS) monitors network traffic for suspicious activity and alerts administrators to potential security threats.