Dfn5033 Network Security Test Dis 2017

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Faizul Ghazi
F
Faizul Ghazi
Community Contributor
Quizzes Created: 1 | Total Attempts: 196
Questions: 30 | Attempts: 260

SettingsSettingsSettings
Dfn5033 Network Security Test Dis 2017 - Quiz

.


Questions and Answers
  • 1. 

    Three characteristics of information must be protected by information security, EXCEPT

    • A.

      Availability

    • B.

      Confidentiality

    • C.

      Stability

    • D.

      Integrity

    Correct Answer
    C. Stability
    Explanation
    Stability is not a characteristic of information that needs to be protected by information security. The three characteristics that must be protected are availability, confidentiality, and integrity. Availability ensures that information is accessible and usable when needed. Confidentiality ensures that information is only accessed by authorized individuals. Integrity ensures that information is accurate and reliable, and has not been tampered with or altered. Stability, on the other hand, refers to the consistency and reliability of a system or network, rather than a characteristic of information itself.

    Rate this question:

  • 2. 

    Which of the following is NOT considered as potential risk to network security?

    • A.

      Criminal element

    • B.

      Hackers

    • C.

      Terrorist

    • D.

      Human

    Correct Answer
    A. Criminal element
    Explanation
    The correct answer is "Criminal element" because criminals are actually considered a potential risk to network security. Criminals can engage in activities such as hacking, identity theft, and fraud, which can compromise the security of a network. Therefore, they should be considered as a potential risk to network security.

    Rate this question:

  • 3. 

    Select which threats are the most serious.

    • A.

      External threats

    • B.

      Internal threats

    • C.

      Unknown threats

    • D.

      Unstructured threats

    Correct Answer
    B. Internal threats
    Explanation
    Internal threats refer to risks and vulnerabilities that come from within an organization or company. These threats can include actions by employees, such as data breaches, unauthorized access to sensitive information, or intentional sabotage. Internal threats are considered serious because they can cause significant damage to an organization's reputation, financial stability, and overall security. It is crucial for organizations to have robust security measures in place to mitigate and prevent internal threats.

    Rate this question:

  • 4. 

    Select option is the term for a weakness in a system or its design that can be exploited by a threat

    • A.

      Attack

    • B.

      Exploit

    • C.

      Risk

    • D.

      Vulnerability

    Correct Answer
    D. Vulnerability
    Explanation
    During the night the high contrast between the bright moon and the night's dark skies make the Moon look white.

    Rate this question:

  • 5. 

    Identify the first step you should take when considering securing your network?

    • A.

      Install a firewall

    • B.

      Install an Intrusion Prevention System

    • C.

      Update servers and user PCs with the latest patches

    • D.

      Develop a security policy

    Correct Answer
    A. Install a firewall
    Explanation
    Installing a firewall is the first step to take when considering securing your network. A firewall acts as a barrier between your internal network and the external network, filtering incoming and outgoing traffic based on predetermined security rules. By installing a firewall, you can control and monitor network traffic, preventing unauthorized access and potential security breaches. It is a fundamental security measure that helps protect your network from external threats and provides a basic level of network security.

    Rate this question:

  • 6. 

    In VPNs, the term “tunneling” refers to

    • A.

      An optional feature that increases network performance when turned on

    • B.

      The encapsulation of packets inside packets of different protocol to create and maintain the virtual circuit

    • C.

      The method a system administrator uses to detect hackers on the network

    • D.

      A marketing strategy to sell VPN products cheaply in return for expensive service contracts

    Correct Answer
    B. The encapsulation of packets inside packets of different protocol to create and maintain the virtual circuit
    Explanation
    In VPNs, tunneling refers to the process of encapsulating packets inside packets of a different protocol. This technique is used to create a virtual circuit between the sender and receiver, allowing secure transmission of data over an untrusted network. By encapsulating the original packets, the VPN protocol ensures that the data remains private and protected from potential eavesdropping or tampering. The encapsulated packets are then transmitted through the network, creating a secure tunnel for the data to travel through. This process helps maintain the confidentiality and integrity of the transmitted data in a VPN.

    Rate this question:

  • 7. 

    A combination of hardware components and appropriate software that controls or filters access between two networks is called

    • A.

      An antivirus/antivirus

    • B.

      A firewall

    • C.

      A port

    • D.

      A trojan

    Correct Answer
    B. A firewall
    Explanation
    A combination of hardware components and appropriate software that controls or filters access between two networks is called a firewall. Firewalls act as a barrier between a trusted internal network and an untrusted external network, such as the internet. They monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewalls help protect against unauthorized access, malicious attacks, and the spread of malware.

    Rate this question:

  • 8. 

    A firewall needs to be ____ so that it can grow with the network it protects

    • A.

      Robust

    • B.

      Expensive

    • C.

      Fast

    • D.

      Scalable

    Correct Answer
    D. Scalable
    Explanation
    A firewall needs to be scalable so that it can accommodate the growth of the network it is protecting. As the network expands and more devices are added, the firewall should be able to handle the increased traffic and workload without compromising its effectiveness. A scalable firewall can easily adapt to the changing needs of the network, allowing for seamless expansion and ensuring that the network remains secure.

    Rate this question:

  • 9. 

    Select the TRUE statement of intrusion prevention systems

    • A.

      They operate in promiscuous mode

    • B.

      They have no potential impact on the data segment being monitored

    • C.

      They operate in inline mode

    • D.

      They are more vulnerable to evasion techniques than IDS

    Correct Answer
    C. They operate in inline mode
    Explanation
    Intrusion prevention systems (IPS) operate in inline mode, which means that they actively monitor and inspect network traffic in real-time. Unlike intrusion detection systems (IDS), which only passively monitor and alert on suspicious activity, IPS can take immediate action to prevent or block any detected intrusions. By operating in inline mode, IPS can actively intervene and stop malicious activities before they can cause any harm to the data segment being monitored. This makes IPS a more proactive and effective security solution compared to IDS.

    Rate this question:

  • 10. 

    Most difficult to implement, All security measures are implemented, Assumes that the protected assets are premium (top), all users are not trustworthy and threats are frequent. Relate which security model is being described by the above statement.

    • A.

      Easy Security Model

    • B.

      Open Security Model

    • C.

      Close Security Model

    • D.

      Restrictive Security Model

    Correct Answer
    C. Close Security Model
    Explanation
    The given statement describes the Close Security Model. This security model is considered the most difficult to implement as it assumes that all security measures are implemented, all users are not trustworthy, threats are frequent, and the protected assets are of high value. In this model, access to resources is tightly controlled, and only authorized individuals are granted access. It emphasizes strict controls and restrictions to ensure the highest level of security for the protected assets.

    Rate this question:

  • 11. 

    Which type of attack denies authorized users access to network resources?

    • A.

      DoS

    • B.

      Logic bomb

    • C.

      Social engineering

    • D.

      Worm

    Correct Answer
    A. DoS
    Explanation
    A Denial of Service (DoS) attack is a type of cyber attack that aims to disrupt or deny authorized users access to network resources. This is typically achieved by overwhelming the targeted network or system with a flood of illegitimate requests or traffic, causing it to become unavailable to legitimate users. The attacker does not gain unauthorized access or steal information, but rather renders the network or system unusable for its intended users.

    Rate this question:

  • 12. 

    Which of the following attack techniques does not require deep technical knowledge?

    • A.

      Password guessing

    • B.

      Social engineering

    • C.

      Man in the middle attack

    • D.

      Sniffing

    Correct Answer
    B. Social engineering
    Explanation
    Social engineering does not require deep technical knowledge because it relies on manipulating human psychology and exploiting human trust rather than exploiting technical vulnerabilities or weaknesses. It involves tricking or deceiving individuals into revealing sensitive information or performing actions that may compromise security. This can be done through techniques such as impersonation, deception, or manipulation, without the need for advanced technical skills or knowledge.

    Rate this question:

  • 13. 

    Select a protocol that can be protect traffic inside a VPN tunnel.

    • A.

      Telnet

    • B.

      SSL

    • C.

      SSH

    • D.

      SMTP

    Correct Answer
    B. SSL
    Explanation
    SSL (Secure Sockets Layer) is a protocol that provides secure communication over a network. It encrypts the data transmitted between a client and a server, ensuring that it cannot be intercepted or tampered with by unauthorized parties. In the context of a VPN tunnel, SSL can be used to protect the traffic flowing between the client and the VPN server, making it an appropriate choice for ensuring the confidentiality and integrity of the data being transmitted. Telnet, SSH, and SMTP are not specifically designed for securing VPN traffic, making them less suitable options.

    Rate this question:

  • 14. 

    Find the best describes malware that takes advantage of a security hole, and then automatically replicates to other systems running the same software?

    • A.

      Spyware

    • B.

      Trojan

    • C.

      Virus

    • D.

      Worm

    Correct Answer
    C. Virus
    Explanation
    A virus is a type of malware that can exploit vulnerabilities in a system's security and replicate itself to other systems running the same software. Unlike other types of malware such as spyware, trojans, or worms, viruses specifically target security holes and use them to spread and infect other systems. They can cause damage to files, steal information, and disrupt the normal functioning of a computer system.

    Rate this question:

  • 15. 

    Find one of the following is not an attack, but a search for vulnerabilities to attack?

    • A.

      Dumpster diving

    • B.

      Port scanning

    • C.

      Denial of service

    • D.

      Man in the middle attack

    Correct Answer
    B. Port scanning
    Explanation
    Port scanning is a method used to search for open ports on a computer or network. It involves sending network requests to various ports to determine which ones are open and potentially vulnerable to attack. Unlike the other options listed, port scanning itself is not considered an attack, but rather a reconnaissance technique to identify potential vulnerabilities that could be exploited in a future attack.

    Rate this question:

  • 16. 

    _______________ refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of attack prior to launching an attack.

    • A.

      Scanning

    • B.

      Reconnaissance

    • C.

      Sniffing

    • D.

      Access

    Correct Answer
    B. Reconnaissance
    Explanation
    Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of attack prior to launching an attack. During this phase, the attacker aims to identify vulnerabilities, weaknesses, and potential entry points in the target's system or network. This information gathering process helps the attacker to plan and execute the attack more effectively, increasing the chances of success. Scanning, sniffing, and access are not the correct answers as they do not specifically refer to the information gathering phase of an attack.

    Rate this question:

  • 17. 

    VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.

    • A.

      SSL, tunneling

    • B.

      IPSec,SSL

    • C.

      IPSec,tunneling

    • D.

      IPSec,SSH

    Correct Answer
    C. IPSec,tunneling
    Explanation
    VPN technology uses two simultaneous techniques to guarantee privacy for an organization: IPSec and tunneling. IPSec (Internet Protocol Security) is a protocol suite that provides secure communication over IP networks. It ensures the confidentiality, integrity, and authentication of data transmitted between devices. Tunneling, on the other hand, is the process of encapsulating data packets within other packets to create a secure "tunnel" through which the data can travel. By combining IPSec and tunneling, VPNs can establish secure connections and protect sensitive information from unauthorized access.

    Rate this question:

  • 18. 

    Select which of the following devices should be placed in the DMZ

    • A.

      Web server

    • B.

      Server Network switch

    • C.

      Database server

    • D.

      File/print server

    Correct Answer
    A. Web server
    Explanation
    A DMZ (Demilitarized Zone) is a network segment that is isolated from the internal network and exposed to the external network. It acts as a buffer zone between the internet and the internal network, providing an additional layer of security. Placing a web server in the DMZ allows external users to access the website while keeping the internal network protected. The web server handles incoming HTTP requests and serves web pages to users, making it an ideal candidate for placement in the DMZ.

    Rate this question:

  • 19. 

    A high profile company has been receiving a high volume of attacks on their website. The network administrator wants to be able to collect information on the attacker(s) so legal action can be taken. Select a device should be implemented? 

    • A.

      DMZ

    • B.

      Honey pot

    • C.

      firewall

    • D.

      New subnet

    Correct Answer
    B. Honey pot
    Explanation
    A honey pot should be implemented in this scenario. A honey pot is a decoy system that is designed to attract and deceive attackers. By deploying a honey pot, the network administrator can monitor and collect information on the attackers without risking the security of the actual company website. This information can then be used as evidence for legal action against the attackers.

    Rate this question:

  • 20. 

    Why proxy server is used in network?

    • A.

      To provide security against unauthorized users

    • B.

      To process client requests for Web pages

    • C.

      To process client requests for database access

    • D.

      To provide TCP/IP

    Correct Answer
    A. To provide security against unauthorized users
    Explanation
    A proxy server is used in a network to provide security against unauthorized users. It acts as an intermediary between clients and servers, allowing clients to make requests for web pages or database access through the proxy server instead of directly connecting to the target server. This helps to hide the client's IP address, making it difficult for unauthorized users to track or access the client's information. The proxy server can also implement various security measures such as authentication, encryption, and filtering to ensure that only authorized users can access the network resources.

    Rate this question:

  • 21. 

    Which of the following security devices act more like a detective rather than a preventative measure?

    • A.

      NAT

    • B.

      Proxy

    • C.

      IDS

    • D.

      DMZ

    Correct Answer
    C. IDS
    Explanation
    IDS stands for Intrusion Detection System. Unlike preventative measures such as NAT (Network Address Translation), Proxy, and DMZ (Demilitarized Zone), IDS acts more like a detective. It monitors network traffic and system activities to identify any suspicious or malicious behavior. IDS detects and alerts administrators about potential security breaches or attacks, allowing them to take appropriate actions to mitigate the risks. However, IDS alone does not actively prevent or block these attacks, making it more of a detective tool rather than a preventative measure.

    Rate this question:

  • 22. 

    The following is the component of a firewall EXCEPT :

    • A.

      Packet Filter

    • B.

      Dynamic Network Address Translation (DNAT)

    • C.

      Network Address Translation (NAT)

    • D.

      Proxy Server

    Correct Answer
    B. Dynamic Network Address Translation (DNAT)
    Explanation
    Dynamic Network Address Translation (DNAT) is not a component of a firewall. A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Packet Filter, Network Address Translation (NAT), and Proxy Server are all components commonly found in firewalls. Packet Filter examines individual packets of data and filters them based on specific criteria. NAT translates IP addresses between different networks to allow for communication. Proxy Server acts as an intermediary between client devices and the internet, providing additional security and anonymity. DNAT, on the other hand, is a technique used in network routing and does not directly relate to firewall functionality.

    Rate this question:

  • 23. 

    ____________ defines the way in which messages are transmitted over the Internet.

    • A.

      HTTP

    • B.

      POP

    • C.

      SMTP

    • D.

      SNMP

    Correct Answer
    C. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is a communication protocol that defines the way in which email messages are transmitted over the Internet. It is responsible for sending and receiving emails between mail servers. SMTP ensures that emails are properly formatted, addressed, and delivered to the intended recipients. It works in conjunction with other protocols like POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) to enable users to access and manage their emails. Therefore, SMTP is the correct answer as it specifically deals with the transmission of messages over the Internet.

    Rate this question:

  • 24. 

    ______ is defined as the protection of networks and their services from unauthorized modification, destruction, or disclosure.

    • A.

      Network security

    • B.

      Physical security

    • C.

      Buffer Overflow

    • D.

      Ethical Hacking

    Correct Answer
    A. Network security
    Explanation
    Network security is the correct answer because it refers to the measures taken to protect networks and their services from unauthorized access, modification, destruction, or disclosure. It involves implementing various security protocols, such as firewalls, encryption, and intrusion detection systems, to ensure the confidentiality, integrity, and availability of network resources. Network security aims to prevent unauthorized individuals or entities from gaining access to sensitive information or causing harm to the network infrastructure.

    Rate this question:

  • 25. 

    ___________ is a computer that is completely vulnerable to attacks.

    • A.

      Bastion host

    • B.

      Application Server

    • C.

      Firewall Server

    • D.

      Rogue Server

    Correct Answer
    A. Bastion host
    Explanation
    A bastion host is a computer that is intentionally exposed to the internet and is designed to be the first line of defense against attacks. It is typically hardened and has minimal services running, making it more vulnerable to attacks compared to other servers. The purpose of a bastion host is to monitor and log incoming traffic, as well as provide a secure gateway for remote access to internal networks.

    Rate this question:

  • 26. 

    __________ is the technique attackers use to gain access to a network, sending messages to a computer with an IP address indicating that the message is coming from a trusted host.

    • A.

      IP spoofing

    • B.

      MAC Flooding

    • C.

      Phishing

    • D.

      Spammer

    Correct Answer
    A. IP spoofing
    Explanation
    IP spoofing is the technique attackers use to gain unauthorized access to a network by sending messages to a computer with an IP address indicating that the message is coming from a trusted host. This allows the attacker to deceive the target system into thinking that the communication is legitimate and from a trusted source. By spoofing the IP address, the attacker can bypass security measures and potentially gain control over the targeted network.

    Rate this question:

  • 27. 

    Activities to breaks into someone else's computer system or bypass passwords or licenses in computer programs are known as

    • A.

      Hackers

    • B.

      Spoofing

    • C.

      Cracking

    • D.

      Mobisodes

    Correct Answer
    A. Hackers
    Explanation
    The correct answer is "Hackers" because activities such as breaking into someone else's computer system, bypassing passwords, or licenses in computer programs are typically associated with individuals who have advanced computer skills and use them to gain unauthorized access or manipulate systems. These individuals are commonly referred to as hackers.

    Rate this question:

  • 28. 

    The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack scripts.

    • A.

      Spam

    • B.

      Virus

    • C.

      Malware

    • D.

      Phish

    Correct Answer
    C. Malware
    Explanation
    The phrase "Malware" describes viruses, worms, Trojan horse attack applets, and attack scripts. Malware is a broad term used to refer to any malicious software designed to harm or exploit computer systems. This includes various types of harmful programs such as viruses, worms, Trojan horses, and attack scripts. These malicious software can cause damage to computer systems, steal sensitive information, or disrupt normal operations.

    Rate this question:

  • 29. 

    Find of the following best describes a DDoS attack?

    • A.

      An attacker takes advantage of the add/grace period to monopolize names without ever paying for them

    • B.

      Packets are captured, the pertinent information is extracted, and then packets are placed back on the network

    • C.

      An attack that typically involves flooding a listening port on a machine with packets to disrupt the resources

    • D.

      An attacker intercepts traffic and then tricks the parties at both ends into believing that they are communicating with each other

    Correct Answer
    C. An attack that typically involves flooding a listening port on a machine with packets to disrupt the resources
    Explanation
    A DDoS (Distributed Denial of Service) attack is a type of cyber attack where multiple compromised computers or devices flood a target system with a high volume of traffic, overwhelming its resources and causing it to become unavailable to legitimate users. The correct answer accurately describes this type of attack, as it involves flooding a listening port on a machine with packets to disrupt its resources.

    Rate this question:

  • 30. 

    Select a  technique used to protect data and passwords

    • A.

      Encryption

    • B.

      Authentication

    • C.

      Authorization

    • D.

      Non-repudiation

    Correct Answer
    A. Encryption
    Explanation
    Encryption is a technique used to protect data and passwords by converting them into a coded form that can only be deciphered with a specific key or password. It ensures that even if unauthorized individuals gain access to the data, they will not be able to understand or use it without the encryption key. Encryption provides an additional layer of security to prevent data breaches and unauthorized access, making it an effective technique for protecting sensitive information.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 20, 2018
    Quiz Created by
    Faizul Ghazi
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.