1. Which of the following is NOT a security control used in a
layered defense approach?
A. Physical security
B. Firewalls
C. Authentication mechanisms
D. Using unencrypted protocols
Answer: D) Using unencrypted protocols
Rationale: Unencrypted protocols are vulnerable to interception
and attacks. Layered defense approaches involve using multiple
security measures like firewalls, physical security, and encryption.
2. Which of the following is used to prevent unauthorized wireless
access to a network?
A. WPA2
B. NAT
C. DHCP
D. IPsec
Answer: A) WPA2
Rationale: WPA2 (Wi-Fi Protected Access 2) is a security
protocol used to protect wireless networks by encrypting traffic
and authenticating users.
,3. What is the primary goal of a secure network design?
A. To ensure high availability of network services
B. To protect network resources from unauthorized access
C. To provide fast network connections
D. To monitor network traffic efficiently
Answer: B) To protect network resources from unauthorized
access
Rationale: A secure network design focuses on ensuring that
unauthorized access to network resources is prevented while
maintaining confidentiality, integrity, and availability.
4. What does the concept of least privilege refer to in network
security?
A. Granting users only the permissions they need to perform their
tasks
B. Providing unlimited access to critical resources
C. Granting admin rights to all users for ease of access
D. Preventing external connections to the network
Answer: A) Granting users only the permissions they need to
perform their tasks
Rationale: The least privilege principle restricts user access to the
minimum necessary to complete their tasks, reducing the risk of
accidental or intentional misuse of network resources.
, 5. What is a common attack vector for exploiting network
vulnerabilities?
A. Phishing
B. Denial of Service (DoS)
C. Man-in-the-middle attacks
D. All of the above
Answer: D) All of the above
Rationale: Attackers can exploit various vectors like phishing,
DoS, and man-in-the-middle attacks to compromise network
security, making it essential to secure networks from all angles.
6. What is a security risk associated with poorly configured
wireless networks?
A. Unauthorized access to the network
B. Increased data throughput
C. Reduced network latency
D. Faster communication between devices
Answer: A) Unauthorized access to the network
Rationale: Poorly configured wireless networks may allow
unauthorized users to access sensitive resources without proper
security controls, exposing the network to various risks.
layered defense approach?
A. Physical security
B. Firewalls
C. Authentication mechanisms
D. Using unencrypted protocols
Answer: D) Using unencrypted protocols
Rationale: Unencrypted protocols are vulnerable to interception
and attacks. Layered defense approaches involve using multiple
security measures like firewalls, physical security, and encryption.
2. Which of the following is used to prevent unauthorized wireless
access to a network?
A. WPA2
B. NAT
C. DHCP
D. IPsec
Answer: A) WPA2
Rationale: WPA2 (Wi-Fi Protected Access 2) is a security
protocol used to protect wireless networks by encrypting traffic
and authenticating users.
,3. What is the primary goal of a secure network design?
A. To ensure high availability of network services
B. To protect network resources from unauthorized access
C. To provide fast network connections
D. To monitor network traffic efficiently
Answer: B) To protect network resources from unauthorized
access
Rationale: A secure network design focuses on ensuring that
unauthorized access to network resources is prevented while
maintaining confidentiality, integrity, and availability.
4. What does the concept of least privilege refer to in network
security?
A. Granting users only the permissions they need to perform their
tasks
B. Providing unlimited access to critical resources
C. Granting admin rights to all users for ease of access
D. Preventing external connections to the network
Answer: A) Granting users only the permissions they need to
perform their tasks
Rationale: The least privilege principle restricts user access to the
minimum necessary to complete their tasks, reducing the risk of
accidental or intentional misuse of network resources.
, 5. What is a common attack vector for exploiting network
vulnerabilities?
A. Phishing
B. Denial of Service (DoS)
C. Man-in-the-middle attacks
D. All of the above
Answer: D) All of the above
Rationale: Attackers can exploit various vectors like phishing,
DoS, and man-in-the-middle attacks to compromise network
security, making it essential to secure networks from all angles.
6. What is a security risk associated with poorly configured
wireless networks?
A. Unauthorized access to the network
B. Increased data throughput
C. Reduced network latency
D. Faster communication between devices
Answer: A) Unauthorized access to the network
Rationale: Poorly configured wireless networks may allow
unauthorized users to access sensitive resources without proper
security controls, exposing the network to various risks.