1. Which of the following is a common strategy to mitigate DDoS
(Distributed Denial of Service) attacks?
A. Increasing the speed of the network connection
B. Blocking all incoming traffic
C. Using rate-limiting and content delivery networks (CDNs)
D. Using an unfiltered, open network
Answer: C) Using rate-limiting and content delivery networks
(CDNs)
Rationale: Rate-limiting and CDNs help mitigate DDoS attacks by
controlling traffic volume and distributing traffic to absorb the
attack.
2. What is a primary goal of traffic filtering in a network design?
A. To increase the speed of data transmission
B. To prevent unauthorized traffic from entering or leaving the
network
C. To monitor network devices' performance
D. To ensure network availability during peak usage times
Answer: B) To prevent unauthorized traffic from entering or
leaving the network
,Rationale: Traffic filtering helps to block unwanted or malicious
traffic from entering or leaving the network, thus ensuring
security and privacy.
3. Which of the following is an example of a brute-force attack?
A. An attacker intercepting traffic between two systems
B. An attacker attempting to guess a password by trying all
possible combinations
C. An attacker exploiting a vulnerability to crash a server
D. An attacker sending a large volume of traffic to overwhelm a
network
Answer: B) An attacker attempting to guess a password by trying
all possible combinations
Rationale: A brute-force attack involves systematically trying all
possible combinations of passwords until the correct one is found.
4. Which of the following is an example of an attack that targets
the availability of a network?
A. Man-in-the-middle attack
B. Phishing
C. Denial-of-Service (DoS)
D. SQL injection
Answer: C) Denial-of-Service (DoS)
, Rationale: A DoS attack aims to overwhelm a network or service,
making it unavailable to legitimate users.
5. Which of the following technologies is used to secure email
communications?
A. SMTP
B. DNSSEC
C. S/MIME
D. FTP
Answer: C) S/MIME
Rationale: S/MIME (Secure/Multipurpose Internet Mail
Extensions) provides encryption and digital signatures for
securing email communication.
6. Which of the following is the main function of a web
application firewall (WAF)?
A. To protect against cross-site scripting (XSS) and SQL injection
attacks
B. To filter malicious traffic between networks
C. To prevent unauthorized physical access to servers
D. To secure email communications
Answer: A) To protect against cross-site scripting (XSS) and SQL
injection attacks
(Distributed Denial of Service) attacks?
A. Increasing the speed of the network connection
B. Blocking all incoming traffic
C. Using rate-limiting and content delivery networks (CDNs)
D. Using an unfiltered, open network
Answer: C) Using rate-limiting and content delivery networks
(CDNs)
Rationale: Rate-limiting and CDNs help mitigate DDoS attacks by
controlling traffic volume and distributing traffic to absorb the
attack.
2. What is a primary goal of traffic filtering in a network design?
A. To increase the speed of data transmission
B. To prevent unauthorized traffic from entering or leaving the
network
C. To monitor network devices' performance
D. To ensure network availability during peak usage times
Answer: B) To prevent unauthorized traffic from entering or
leaving the network
,Rationale: Traffic filtering helps to block unwanted or malicious
traffic from entering or leaving the network, thus ensuring
security and privacy.
3. Which of the following is an example of a brute-force attack?
A. An attacker intercepting traffic between two systems
B. An attacker attempting to guess a password by trying all
possible combinations
C. An attacker exploiting a vulnerability to crash a server
D. An attacker sending a large volume of traffic to overwhelm a
network
Answer: B) An attacker attempting to guess a password by trying
all possible combinations
Rationale: A brute-force attack involves systematically trying all
possible combinations of passwords until the correct one is found.
4. Which of the following is an example of an attack that targets
the availability of a network?
A. Man-in-the-middle attack
B. Phishing
C. Denial-of-Service (DoS)
D. SQL injection
Answer: C) Denial-of-Service (DoS)
, Rationale: A DoS attack aims to overwhelm a network or service,
making it unavailable to legitimate users.
5. Which of the following technologies is used to secure email
communications?
A. SMTP
B. DNSSEC
C. S/MIME
D. FTP
Answer: C) S/MIME
Rationale: S/MIME (Secure/Multipurpose Internet Mail
Extensions) provides encryption and digital signatures for
securing email communication.
6. Which of the following is the main function of a web
application firewall (WAF)?
A. To protect against cross-site scripting (XSS) and SQL injection
attacks
B. To filter malicious traffic between networks
C. To prevent unauthorized physical access to servers
D. To secure email communications
Answer: A) To protect against cross-site scripting (XSS) and SQL
injection attacks