Network Security # MCQs Practice set

Q.1 What does the term 'firewall' refer to in network security?

A device that blocks viruses
A system that monitors and controls network traffic
A software to speed up internet
A tool to hack networks
Explanation - A firewall acts as a barrier between trusted and untrusted networks, filtering incoming and outgoing traffic based on rules.
Correct answer is: A system that monitors and controls network traffic

Q.2 Which of the following is a type of network attack?

SQL Injection
Denial of Service (DoS)
Buffer Overflow
All of the above
Explanation - All listed options are network-related attacks that can disrupt services or exploit vulnerabilities.
Correct answer is: All of the above

Q.3 What is the main purpose of encryption in network security?

To speed up data transfer
To compress data
To prevent unauthorized access
To store data
Explanation - Encryption ensures confidentiality by converting data into unreadable form for unauthorized users.
Correct answer is: To prevent unauthorized access

Q.4 Which protocol is commonly used for secure web communication?

HTTP
HTTPS
FTP
SMTP
Explanation - HTTPS (Hypertext Transfer Protocol Secure) uses TLS/SSL to encrypt communication between browser and server.
Correct answer is: HTTPS

Q.5 In network security, VPN stands for?

Virtual Personal Network
Virtual Private Network
Verified Private Node
Virtual Protected Net
Explanation - VPN provides a secure encrypted tunnel for data transmission over public networks.
Correct answer is: Virtual Private Network

Q.6 Which of these is NOT a common network security threat?

Phishing
Malware
Load Balancing
Man-in-the-Middle attack
Explanation - Load balancing is a technique to distribute workload across systems, not a threat.
Correct answer is: Load Balancing

Q.7 What does IDS stand for in network security?

Internet Data System
Intrusion Detection System
Internal Defense Setup
Information Delivery Service
Explanation - IDS monitors network traffic for suspicious activities and generates alerts.
Correct answer is: Intrusion Detection System

Q.8 Which port is used by HTTPS by default?

21
25
80
443
Explanation - Port 443 is the default port for HTTPS, while port 80 is for HTTP.
Correct answer is: 443

Q.9 What is a DDoS attack?

Distributed Data Optimization Service
Distributed Denial of Service
Direct Download of Software
Data Delivery Over Secureline
Explanation - DDoS overwhelms a server or network with massive traffic from multiple sources to make it unavailable.
Correct answer is: Distributed Denial of Service

Q.10 Which layer of the OSI model does a router operate on?

Application Layer
Network Layer
Transport Layer
Data Link Layer
Explanation - Routers operate at the Network Layer (Layer 3) to forward packets between networks.
Correct answer is: Network Layer

Q.11 Which of the following is a symmetric encryption algorithm?

RSA
AES
ECC
DSA
Explanation - AES (Advanced Encryption Standard) is a symmetric key encryption algorithm.
Correct answer is: AES

Q.12 What is the function of a proxy server in network security?

Directly connect clients to servers
Filter requests and hide client identity
Encrypt emails
Store passwords
Explanation - A proxy server acts as an intermediary between client and server, providing anonymity and filtering requests.
Correct answer is: Filter requests and hide client identity

Q.13 Which of these is used to detect anomalies in network traffic?

Firewall
IDS
Switch
Hub
Explanation - An Intrusion Detection System (IDS) is specifically designed to detect abnormal or malicious activity.
Correct answer is: IDS

Q.14 In public key cryptography, what is shared publicly?

Private Key
Public Key
Symmetric Key
Password
Explanation - Public keys can be shared openly, while private keys must remain confidential.
Correct answer is: Public Key

Q.15 Which of the following ensures data integrity?

Hashing
Encryption
Decryption
VPN
Explanation - Hashing verifies integrity by generating unique values that change if data is altered.
Correct answer is: Hashing

Q.16 What does SSL stand for?

Secure Socket Layer
System Security Lock
Safe Server Login
Secure Service Link
Explanation - SSL is a cryptographic protocol that provides secure communication over the internet.
Correct answer is: Secure Socket Layer

Q.17 Which protocol is considered insecure because it transmits data in plain text?

SSH
Telnet
HTTPS
SFTP
Explanation - Telnet transmits data, including credentials, without encryption.
Correct answer is: Telnet

Q.18 Which network device prevents unauthorized access based on MAC addresses?

Router
Switch
Firewall
Access Control List
Explanation - ACLs restrict access to resources based on IP or MAC addresses.
Correct answer is: Access Control List

Q.19 What does the term 'zero-day attack' mean?

An attack exploiting a vulnerability before it is patched
An attack that lasts zero days
A malware-free attack
A test attack by developers
Explanation - Zero-day attacks target newly discovered vulnerabilities before developers release fixes.
Correct answer is: An attack exploiting a vulnerability before it is patched

Q.20 Which of the following is an example of two-factor authentication?

Password only
PIN code only
Password + OTP
Fingerprint only
Explanation - Two-factor authentication combines two different methods, like a password and a one-time passcode.
Correct answer is: Password + OTP

Q.21 What is the role of a honeypot in network security?

Trap attackers by simulating vulnerabilities
Speed up traffic
Encrypt sensitive data
Manage IP addresses
Explanation - A honeypot is a decoy system used to lure attackers and study their behavior.
Correct answer is: Trap attackers by simulating vulnerabilities

Q.22 Which of these protocols is used for secure remote login?

SSH
Telnet
FTP
HTTP
Explanation - SSH (Secure Shell) allows encrypted remote login to network devices or servers.
Correct answer is: SSH

Q.23 Which attack tries to guess passwords by systematically checking all possibilities?

Phishing
Brute Force
Man-in-the-Middle
SQL Injection
Explanation - Brute force attacks involve repeatedly trying different password combinations until the correct one is found.
Correct answer is: Brute Force

Q.24 Which of the following best describes 'phishing'?

Unauthorized port scanning
Tricking users into giving sensitive information
Intercepting data packets
Encrypting unauthorized data
Explanation - Phishing is a social engineering attack to obtain sensitive information through deceptive means.
Correct answer is: Tricking users into giving sensitive information

Q.25 Which of these is an example of asymmetric encryption?

AES
DES
RSA
Blowfish
Explanation - RSA uses a pair of public and private keys, making it an asymmetric encryption algorithm.
Correct answer is: RSA