1. Which of the following is an example of a brute-force attack?
A. An attacker intercepting traffic between two systems
B. An attacker attempting to guess a password by trying all
possible combinations
C. An attacker exploiting a vulnerability to crash a server
D. An attacker sending a large volume of traffic to overwhelm a
network
Answer: B) An attacker attempting to guess a password by trying
all possible combinations
Rationale: A brute-force attack involves systematically trying all
possible combinations of passwords until the correct one is found.
2. What is a key benefit of using a stateful firewall over a stateless
firewall?
A. It can track the state of network connections
B. It operates faster than a stateless firewall
C. It requires less configuration
D. It can filter traffic based only on IP addresses
Answer: A) It can track the state of network connections
,Rationale: A stateful firewall tracks the state of network
connections, allowing it to make more informed decisions about
whether to allow or block traffic, unlike a stateless firewall.
3. Which of the following is used to prevent unauthorized wireless
access to a network?
A. WPA2
B. NAT
C. DHCP
D. IPsec
Answer: A) WPA2
Rationale: WPA2 (Wi-Fi Protected Access 2) is a security
protocol used to protect wireless networks by encrypting traffic
and authenticating users.
4. Which of the following can be used to segment a network for
security purposes?
A. VPN
B. VLAN
C. Proxy
D. NAT
Answer: B) VLAN
, Rationale: A VLAN (Virtual Local Area Network) is used to
logically separate networks into segments, allowing for better
control of traffic and enhancing security.
5. What is the primary benefit of using two-factor authentication
(2FA)?
A. It simplifies the login process
B. It ensures that users authenticate using two forms of
identification
C. It increases the speed of network connections
D. It prevents unauthorized network access
Answer: B) It ensures that users authenticate using two forms of
identification
Rationale: Two-factor authentication requires users to provide
two forms of identification, typically something they know
(password) and something they have (a code sent to their phone).
6. What is a common security risk associated with using default
network configurations?
A. Increased system performance
B. Lack of adequate security controls
C. Increased network availability
D. Faster troubleshooting
Answer: B) Lack of adequate security controls
A. An attacker intercepting traffic between two systems
B. An attacker attempting to guess a password by trying all
possible combinations
C. An attacker exploiting a vulnerability to crash a server
D. An attacker sending a large volume of traffic to overwhelm a
network
Answer: B) An attacker attempting to guess a password by trying
all possible combinations
Rationale: A brute-force attack involves systematically trying all
possible combinations of passwords until the correct one is found.
2. What is a key benefit of using a stateful firewall over a stateless
firewall?
A. It can track the state of network connections
B. It operates faster than a stateless firewall
C. It requires less configuration
D. It can filter traffic based only on IP addresses
Answer: A) It can track the state of network connections
,Rationale: A stateful firewall tracks the state of network
connections, allowing it to make more informed decisions about
whether to allow or block traffic, unlike a stateless firewall.
3. Which of the following is used to prevent unauthorized wireless
access to a network?
A. WPA2
B. NAT
C. DHCP
D. IPsec
Answer: A) WPA2
Rationale: WPA2 (Wi-Fi Protected Access 2) is a security
protocol used to protect wireless networks by encrypting traffic
and authenticating users.
4. Which of the following can be used to segment a network for
security purposes?
A. VPN
B. VLAN
C. Proxy
D. NAT
Answer: B) VLAN
, Rationale: A VLAN (Virtual Local Area Network) is used to
logically separate networks into segments, allowing for better
control of traffic and enhancing security.
5. What is the primary benefit of using two-factor authentication
(2FA)?
A. It simplifies the login process
B. It ensures that users authenticate using two forms of
identification
C. It increases the speed of network connections
D. It prevents unauthorized network access
Answer: B) It ensures that users authenticate using two forms of
identification
Rationale: Two-factor authentication requires users to provide
two forms of identification, typically something they know
(password) and something they have (a code sent to their phone).
6. What is a common security risk associated with using default
network configurations?
A. Increased system performance
B. Lack of adequate security controls
C. Increased network availability
D. Faster troubleshooting
Answer: B) Lack of adequate security controls