CORRECT ANSWERS (VERIFIED ANSWERS) PLUS
RATIONALES Q $A 2026 INSTANTANT
DOWNOAD PDF
1. What is the primary goal of network security?
A. Increasing network speed
B. Protecting data and resources
C. Reducing bandwidth usage
D. Upgrading hardware
Correct Answer: B – Protecting data and resources ensures
confidentiality, integrity, and availability.
2. Which of the following is a common type of malware?
A. Virus
B. Worm
C. Trojan horse
D. All of the above
Correct Answer: D – All these are types of malicious software designed
to harm or exploit systems.
3. What does a firewall do in a network?
,A. Filters incoming and outgoing traffic
B. Stores large files
C. Optimizes CPU performance
D. Monitors user emails only
Correct Answer: A – Firewalls act as a barrier between trusted and
untrusted networks, filtering traffic.
4. Which protocol is secure for transferring files over a network?
A. FTP
B. SFTP
C. Telnet
D. HTTP
Correct Answer: B – SFTP (Secure File Transfer Protocol) encrypts data
during transfer, unlike FTP.
5. What is a common symptom of a Denial-of-Service (DoS) attack?
A. Slow or unavailable services
B. Unauthorized data modification
C. Increased battery life
D. Faster internet speed
Correct Answer: A – DoS attacks overwhelm resources, making services
slow or inaccessible.
6. What is the function of an Intrusion Detection System (IDS)?
,A. Encrypts emails
B. Monitors network traffic for suspicious activity
C. Increases Wi-Fi signal
D. Manages cloud storage
Correct Answer: B – IDS identifies potential threats and alerts
administrators to take action.
7. Which of the following is considered a strong password practice?
A. Using "123456"
B. Mixing letters, numbers, and symbols
C. Using personal birthdays
D. Reusing the same password across accounts
Correct Answer: B – A strong password includes complex combinations
to resist brute-force attacks.
8. What is the purpose of VPN (Virtual Private Network)?
A. Encrypts network traffic and hides IP addresses
B. Increases download speed
C. Limits Wi-Fi coverage
D. Scans for viruses automatically
Correct Answer: A – VPNs create a secure connection over the internet,
protecting data from eavesdropping.
9. Which of the following is a social engineering attack?
, A. Phishing emails
B. SQL injection
C. Man-in-the-middle attack
D. Denial-of-Service attack
Correct Answer: A – Phishing tricks users into revealing sensitive
information through deceptive communication.
10. What is multi-factor authentication (MFA)?
A. Using only a username and password
B. Using two or more verification methods
C. Logging in anonymously
D. Changing passwords monthly
Correct Answer: B – MFA increases security by requiring multiple forms
of verification, e.g., password and code.
11. What type of attack intercepts communication between two
parties?
A. Spoofing
B. Man-in-the-middle (MITM)
C. Phishing
D. Brute force
Correct Answer: B – MITM attacks capture or alter data transmitted
between two systems.
12. Which layer of the OSI model does encryption often operate at?