Network Security MCQs

Network Security MCQs

Try to answer these 30+ Network Security MCQs and check your understanding of the Network Security subject.
Scroll down and let's begin!

1: A ________ attack is when a webserver is flooded with application layer web requests.

A.   SYN flood

B.   Ping flood

C.   HTTP flood

D.   None of the above

2: _________________ uses a device's gps to define geographical boundaries where an app can be used.

A.   Tablets

B.   ​Track stolen devices

C.   Geo-fencing

D.   Flash memory

3: _____ is a satellite-based tracking system that enables users to determine a persons position.

A.   Near field communications

B.   Global positioning system

C.   Wireless electronic payment system

D.   High, long, line-of-sight

4: Dns poisoning _____.

A.   Substitutes DNS addresses so that the computer is automatically redirected to another device

B.   XSRF

C.   Makes a copy of the transmission for use at a later time

D.   None of this

5: A padded cell is a hardened honeynet. _________________________

A.   Honeypot

B.   Opt-out

C.   Intergrity

D.   Botnet

6: In 802.11i, ________ authentication always uses ssl/tls.

A.   Inner

B.   Outer

C.   Both A and B

D.   Neither

7: A nos that contains a back dooris an example of a risk associated with ____.

A.   Protocols and software

B.   Router's

C.   Gateway's

8: The result from anding 11001111 with 10010001 is ____.

A.   11001111

B.   00000001

C.   10000001

D.   10010001

9: A directional antenna issues wireless signals along a(n) ____ direction.

A.   Iwconfig

B.   Interference

C.   Uplink

D.   Signal

10: A vpn ____ authenticates vpn clients and establishes tunnels for vpn connections.

A.   Service

B.   Concentrator

C.   Certificate authority

D.   Router

11: A unique characteristic of the 802.11 data frame is its ____ field.

A.   Interference

B.   Frequency

C.   Frame Aggregation

D.   Sequence Control

12: If the eap authentication is successful, a success packet is sent to the ____________________.

A.   Slave

B.   Supplicant

C.   Site survey

D.   Scanning

13: A(n) __________ is an event that triggers an alarm when no actual attack is in progress.

A.   False negative

B.   False neutral

C.   Noise

D.   False attack stimulus

14: All modern programming languages support ____ types of relational comparison operators.

A.   Five

B.   Six

C.   Nine

D.   Ten

15: When a wireless device looks for beacon frames it is known as ____________________.

A.   Supplicant

B.   Site survey

C.   Parked

D.   Scanning

16: A dmz is a subnet of _____________ accessible servers placed outside the internal network.

A.   Firewall

B.   Publicly

C.   Network

D.   Client

17: Acls filter packets by using a __________ base to determine whether to allow a packet to pass.

A.   Entry

B.   Management

C.   Rule

D.   Target

18: An idps __________________ server is the central repository for sensor and agent data.

A.   Management

B.   Detection

C.   Encryption

D.   Application logs

19: ________ is one method of thwarting dos attacks by dropping all ip packets from an attacker.

A.   Black holing

B.   ICMP echo

C.   P2P redirect

D.   None of the above

20: By default, the pfsense firewall __________ outbound access from the lan interface.

A.   Allows restricted

B.   Allows unrestricted

C.   Allows permissive

D.   Does not allowany

21: Closing all routes of attack into an organization's system(s) is called ________.

A.   Defense in depth

B.   Comprehensive security

C.   Total security

D.   Access control

22: In 802.1x, the heavy authentication work is done on ________.

A.   Authenticators

B.   Clients

C.   Both A and B

D.   Neither A nor B

23: The ____ handles computer crimes that are categorized as felonies.

A.   DEA

B.   NIST

C.   CIA

D.   FBI

24: The announcement of an operational csirt should minimally include ____.

A.   Nist

B.   Scope of operations

C.   Contact methods and numbers

D.   Scope of operations

25: Ethernet lan networks utilize the physical _________________ address to send packets.

A.   ARPAnet

B.   Synchronize message, or SYN

C.   Media Access Control (MAC)

D.   Hypertext Transport Protocol (HTTP)

26: Security keys are more ideal than otp generators because they're resistant to _______ attacks.

A.   DDoS

B.   Password

C.   Phishing

D.   Brute force

27: Smtp server listens on port ______ and pop3 listens on port ________.

A.   25,101

B.   25,26

C.   22,25

D.   25,110.

28: The __________ is a form of tcp scanning that is less intrusive on the target host.

A.   Xmas scan

B.   SYN scan

C.   Ping scan

D.   Fin scan

29: When designing a security policy, many organizations follow a standard set of ____________________.

A.   Principles

B.   Pedagogical

C.   Standard

D.   ​Privacy policy

30: In the lab, you enabled __________ in windows firewall to allow the http connection.

A.   Cookies

B.   A predefined rule

C.   A deny policy

D.   A configuration policy

31: In most systems, a user logging in would be asked to ____________________ herself.

A.   Attack

B.   Force

C.   Identify

D.   Husam