Network security involves strategies and measures to protect the integrity, confidentiality, and availability of computer networks and data. It encompasses technologies, processes, and policies designed to prevent unauthorized access, misuse, or disruption of a network’s resources.
Given the rise of cyber threats, network security is a critical component in safeguarding sensitive information and maintaining system functionality.
1. What does the term “firewall” in network security refer to?
a) A physical barrier
b) A type of antivirus software
c) A system designed to prevent unauthorized access
d) A malware detection tool
Answer: c) A system designed to prevent unauthorized access
Explanation: Firewalls act as gatekeepers, controlling incoming and outgoing network traffic based on security rules.
2. What is the main purpose of encryption in network security?
a) To store data securely
b) To convert data into unreadable formats
c) To delete sensitive data
d) To monitor network activity
Answer: b) To convert data into unreadable formats
Explanation: Encryption ensures data confidentiality by converting it into a secure format that can only be accessed with a decryption key.
3. Which of the following is an example of a network security protocol?
a) HTTP
b) SSL/TLS
c) DNS
d) FTP
Answer: b) SSL/TLS
Explanation: SSL/TLS protocols are used to secure communications over a network.
4. What type of attack involves overwhelming a network with excessive traffic?
a) Phishing
b) SQL Injection
c) Denial-of-Service (DoS)
d) Man-in-the-Middle (MITM)
Answer: c) Denial-of-Service (DoS)
Explanation: DoS attacks flood a network with traffic to make it unavailable to legitimate users.
5. What does VPN stand for?
a) Virtual Public Network
b) Virtual Private Network
c) Variable Packet Network
d) Verified Protocol Network
Answer: b) Virtual Private Network
Explanation: A VPN creates a secure connection over a public network.
6. What is the purpose of intrusion detection systems (IDS)?
a) To encrypt data
b) To detect unauthorized access
c) To repair network hardware
d) To monitor user behavior
Answer: b) To detect unauthorized access
Explanation: IDS monitors network traffic for suspicious activity and potential breaches.
7. Which of the following is a common authentication method in network security?
a) CAPTCHA
b) Biometric scanning
c) Cookie storage
d) URL filtering
Answer: b) Biometric scanning
Explanation: Biometric authentication uses physical traits like fingerprints to verify identity.
8. What is the primary purpose of a proxy server?
a) To store user credentials
b) To act as an intermediary between users and resources
c) To manage email traffic
d) To prevent phishing attacks
Answer: b) To act as an intermediary between users and resources
Explanation: Proxy servers help improve security and privacy by masking user identity.
9. Which of the following best describes phishing?
a) Unauthorized scanning of a network
b) Fraudulent attempts to obtain sensitive information
c) Redirecting traffic to fake websites
d) Deploying malware onto a system
Answer: b) Fraudulent attempts to obtain sensitive information
Explanation: Phishing involves tricking users into sharing private data through deceptive communications.
10. What is MAC filtering used for?
a) To monitor network traffic
b) To allow or block devices based on MAC addresses
c) To detect malware
d) To enhance encryption protocols
Answer: b) To allow or block devices based on MAC addresses
Explanation: MAC filtering permits or denies access to a network based on device hardware addresses.
11. What does “zero trust” mean in network security?
a) Always assuming a network is secure
b) Trusting all devices connected to the network
c) Verifying every access request regardless of origin
d) Avoiding use of encryption
Answer: c) Verifying every access request regardless of origin
Explanation: Zero trust requires strict verification for all users and devices attempting to access network resources.
12. What type of attack exploits software vulnerabilities to gain unauthorized access?
a) Malware injection
b) Buffer overflow
c) Social engineering
d) Packet sniffing
Answer: b) Buffer overflow
Explanation: Buffer overflow attacks manipulate software bugs to execute malicious code.
13. What does two-factor authentication (2FA) involve?
a) Encrypting all user data
b) Using two steps to verify identity
c) Connecting to two networks simultaneously
d) Using the same password twice
Answer: b) Using two steps to verify identity
Explanation: 2FA enhances security by requiring an additional verification step beyond the password.
14. What is the role of a DMZ (Demilitarized Zone) in network security?
a) To isolate sensitive data
b) To store backup files
c) To provide a buffer zone between internal and external networks
d) To monitor internet speed
Answer: c) To provide a buffer zone between internal and external networks
Explanation: A DMZ protects internal networks by isolating externally accessible systems.
15. Which of the following is NOT a network security threat?
a) Malware
b) Social engineering
c) Firewall configuration
d) Denial-of-Service attacks
Answer: c) Firewall configuration
Explanation: Firewall configuration is a security measure, not a threat.
16. What is a botnet?
a) A collection of software updates
b) A network of infected devices controlled by attackers
c) A method for encrypting data
d) A type of hardware firewall
Answer: b) A network of infected devices controlled by attackers
Explanation: Botnets are used to perform coordinated cyberattacks like DDoS.
17. What is “port scanning” used for in network attacks?
a) To identify active services on a network
b) To block unauthorized access
c) To optimize network performance
d) To encrypt data
Answer: a) To identify active services on a network
Explanation: Port scanning checks open ports to find vulnerabilities in a network.
18. What is the function of a honeypot in network security?
a) To store sensitive data
b) To attract and analyze attackers
c) To prevent malware infections
d) To block phishing attempts
Answer: b) To attract and analyze attackers
Explanation: Honeypots act as decoy systems to lure attackers and study their techniques.
19. What is the purpose of network segmentation?
a) To combine all network resources
b) To divide networks into smaller, secure sections
c) To increase data storage capacity
d) To improve encryption algorithms
Answer: b) To divide networks into smaller, secure sections
Explanation: Network segmentation limits access and minimizes potential damage from breaches.
20. What is a “man-in-the-middle” attack?
a) Eavesdropping on communication between two parties
b) Blocking network traffic
c) Sending spam emails
d) Encrypting user data
Answer: a) Eavesdropping on communication between two parties
Explanation: Man-in-the-middle attacks intercept and manipulate communication between users or systems.
You may also like:- 20 Multiple Choice Questions on Website Security
- Top 20 Common Questions on Computer Security
- Top 10 Computer Fundamentals Questions and Answers
- Quiz Time – Testing Your Knowledge on Popular Computer Questions
- 15 Important Questions Related to Computer
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 14
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 13
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 12
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 11
- Certified Ethical Hacker v10 – Multiple Choice Questions with Answers – Part 10