Network and Security Concepts November 29, 2023 Contents Results - #1. What does VPN stand for, providing a secure way to connect to a private network over the internet? Virtual Private Network Virtual Private Network Very Private Network Very Private Network Virtual Public Network Virtual Public Network Volatile Private Network Volatile Private Network #2. Which protocol is commonly used for secure communication over a computer network, ensuring data integrity and confidentiality? HTTP HTTP FTP FTP SMTP SMTP HTTPS HTTPS #3. The process of converting plaintext into unreadable gibberish to secure data transmission is called: Encryption Encryption Compression Compression Decryption Decryption Encoding Encoding #4. Which type of attack involves an attacker intercepting communication between two parties without their knowledge? Spoofing Spoofing Phishing Phishing Sniffing (MIMA) Sniffing (MIMA) DDoS DDoS #5. In networking, what does the term "firewall"0 refer to A physical barrier to prevent network access A physical barrier to prevent network access A security device that monitors and controls incoming and outgoing network traffic A security device that monitors and controls incoming and outgoing network traffic An encryption algorithm An encryption algorithm A type of antivirus software A type of antivirus software #6. The IP address 127.0.0.1 is reserved for: Localhost Localhost Router Router Broadcast address Broadcast address Gateway Gateway #7. Which encryption protocol is commonly used to secure wireless networks? WPA (Wi-Fi Protected Access) WPA (Wi-Fi Protected Access) SSL (Secure Socket Layer) SSL (Secure Socket Layer) FTP FTP SMTP SMTP #8. What is the purpose of DNS (Domain Name System) in networking? To encrypt data transmission To encrypt data transmission To convert domain names to IP addresses To convert domain names to IP addresses To authenticate users To authenticate users To prevent DDoS attacks To prevent DDoS attacks #9. Which of the following is an example of a strong password? 123456 123456 Password123 Password123 $tr0ngP@ss $tr0ngP@ss qwerty qwerty #10. What is the role of a router in a network? Connects devices within the same local network Connects devices within the same local network Connects different networks and routes data between them Connects different networks and routes data between them Filters spam emails Filters spam emails Encrypts data for secure transmission Encrypts data for secure transmission #11. Which of the following is a common authentication factor? Something you know Something you know Something you see Something you see Something you hear Something you hear Something you taste Something you taste #12. What does the acronym HTTPS stand for in the context of web browsing? Hypertext Transfer Protocol Secure Hypertext Transfer Protocol Secure Hyperlink Text System Hyperlink Text System Hypertext Transfer Protocol Standard Hypertext Transfer Protocol Standard Hypertext Transmission Protocol Secure Hypertext Transmission Protocol Secure #13. A DDoS attack aims to: Steal sensitive information Steal sensitive information Overwhelm a system with traffic, causing a denial of service Overwhelm a system with traffic, causing a denial of service Spoof IP addresses Spoof IP addresses Bypass firewalls Bypass firewalls #14. What is the purpose of an SSL certificate on a website? To speed up website loading times To speed up website loading times To encrypt data transmitted between the user's browser and the server To encrypt data transmitted between the user's browser and the server To display advertisements To display advertisements To block access to the website To block access to the website #15. Which protocol is used for sending and receiving emails? HTTP HTTP FTP FTP SMTP SMTP DHCP DHCP #16. What is the purpose of NAT (Network Address Translation) in networking? Encrypt data transmission Encrypt data transmission Assign unique public IP addresses to devices on a private network Assign unique public IP addresses to devices on a private network Authenticate users Authenticate users Block malicious websites Block malicious websites #17. Which of the following is a common method to prevent unauthorized access to a network? Port forwarding Port forwarding Virtualization Virtualization Access control lists Access control lists Packet sniffing Packet sniffing #18. What is the primary purpose of a proxy server in a network? To host websites To host websites To filter and forward network traffic To filter and forward network traffic To encrypt emails To encrypt emails To assign IP addresses dynamically To assign IP addresses dynamically #19. Which encryption algorithm is commonly used for secure data transmission over the internet? DES (Data Encryption Standard) DES (Data Encryption Standard) AES (Advanced Encryption Standard) AES (Advanced Encryption Standard) RSA (Rivest-Shamir-Adleman) RSA (Rivest-Shamir-Adleman) MD5 (Message Digest Algorithm 5) MD5 (Message Digest Algorithm 5) #20. What is a phishing attack? An attack that floods a network with traffic An attack that floods a network with traffic An attack that intercepts communication between two parties An attack that intercepts communication between two parties An attempt to trick individuals into revealing sensitive information by posing as a trustworthy entity An attempt to trick individuals into revealing sensitive information by posing as a trustworthy entity A physical intrusion into a secure facility A physical intrusion into a secure facility #21. What is the purpose of a subnet mask in networking? To identify the network portion of an IP address To identify the network portion of an IP address To hide the IP address of a device To hide the IP address of a device To encrypt data transmission To encrypt data transmission To assign IP addresses dynamically To assign IP addresses dynamically #22. Which of the following is a common security measure to protect against malware? Firewall Firewall Load balancing Load balancing Domain Name System Domain Name System Router Router #23. What is a VLAN (Virtual Local Area Network) used for in networking? To physically connect devices within the same area To physically connect devices within the same area To create isolated logical networks within a physical network To create isolated logical networks within a physical network To secure email communication To secure email communication To authenticate users To authenticate users #24. Which protocol is commonly used for secure file transfer over a network? FTP FTP SFTP SFTP SMTP SMTP HTTP HTTP #25. What does ICMP (Internet Control Message Protocol) primarily handle? File transfer File transfer Network diagnostics and error reporting Network diagnostics and error reporting Email communication Email communication Web browsing Web browsing #26. Which of the following is a common method of encrypting wireless network traffic? WEP, WPA, WPA2 (Wi-Fi Protected Access) WEP, WPA, WPA2 (Wi-Fi Protected Access) HTTP HTTP DHCP DHCP POP3 POP3 #27. The concept of "pharming" is related to: Harvesting sensitive information through fake websites Harvesting sensitive information through fake websites Flooding a network with traffic Flooding a network with traffic Intercepting emails Intercepting emails Unauthorized access to a network Unauthorized access to a network #28. What is the purpose of a MAC address in networking? To identify devices on a network To identify devices on a network To encrypt data transmission To encrypt data transmission To assign IP addresses dynamically To assign IP addresses dynamically To authenticate users To authenticate users #29. Which of the following is a common type of social engineering attack? Firewall attack Firewall attack Man-in-the-middle attack Man-in-the-middle attack Spoofing attack Spoofing attack Phishing attack Phishing attack #30. What is the role of an intrusion detection system (IDS) in network security? To prevent unauthorized access To prevent unauthorized access To detect and respond to suspicious activities or attacks To detect and respond to suspicious activities or attacks To encrypt data transmission To encrypt data transmission To assign IP addresses dynamically To assign IP addresses dynamically Finish