Network Security Trivia Quiz Questions! Trivia

58 Questions | Total Attempts: 739

SettingsSettingsSettings
Please wait...
Network Security Quizzes & Trivia

Questions and Answers
  • 1. 
    Name four goals of network security
  • 2. 
    Most network threats originate from which of the following?
    • A. 

      Inside the company

    • B. 

      Script kiddies

    • C. 

      Back doors

    • D. 

      Industrial spies

  • 3. 
    What are some of the reasons for network attacks?
    • A. 

      Industrial espionage

    • B. 

      Revenge

    • C. 

      Financial gain

    • D. 

      All of the above

  • 4. 
    The capability to prevent one participant in an electronic transaction from denying that it performed an action is called ____________.
    • A. 

      Plausible deniability

    • B. 

      Integrity

    • C. 

      Nonrepudiation

    • D. 

      Undeniability

  • 5. 
    Servers with outside access to the public should be located on __________. (Choose all that apply)
    • A. 

      Their own subnet

    • B. 

      A DMZ

    • C. 

      An internal LAN

    • D. 

      A network perimeter

  • 6. 
    Packet filters can block or allow transmission of packets based on which of the following criteria?  (Choose all that apply)
    • A. 

      Port number

    • B. 

      Open ports

    • C. 

      Time of access attempts

    • D. 

      IP address

  • 7. 
    An attacker who causes harm to systems in support of some principle is categorized as which of the following?
    • A. 

      Cracker

    • B. 

      Hacker

    • C. 

      Industrial spy

    • D. 

      Cyberterrorist

  • 8. 
    An IP address combined with a TCP/IP port number is called which of the following?
    • A. 

      Network address

    • B. 

      Socket

    • C. 

      Script

    • D. 

      Port ID

  • 9. 
    Firewall enforcement of policies is handled primarily through setting up packet-filtering rules, a set of which is contained in the _____________.
    • A. 

      Routing table

    • B. 

      Rule base

    • C. 

      Access control list

    • D. 

      Packet filter

  • 10. 
    An uninterruptible power supply is a component of _____________ security.
    • A. 

      Virtual

    • B. 

      Auditing

    • C. 

      Physical

    • D. 

      Password

  • 11. 
    The Stuxnet worm was designed to ____________>
    • A. 

      Shut down Internet DNS servers

    • B. 

      Disrupt computer-controlled industrial operations

    • C. 

      Steal financial information

    • D. 

      Be used by script kiddies

  • 12. 
    A packet filtering device evaluates data in the payload and compares it with a predefined set of rules.
    • A. 

      True

    • B. 

      False

  • 13. 
    Which of the following malware is designed to replicate itself?
    • A. 

      Worm

    • B. 

      Virus

    • C. 

      Trojan horse

    • D. 

      SYN flood

  • 14. 
    In a restrictive firewall policy, what is the starting point for developing a rule base?
    • A. 

      Allow all traffic

    • B. 

      Block all traffic except specified types

    • C. 

      Allow all traffic except specified types

    • D. 

      Block all traffic

  • 15. 
    In an IDPS, specific indications of a possible attack are called _____________.
    • A. 

      Signatures

    • B. 

      Signals

    • C. 

      True positives

    • D. 

      Alerts

  • 16. 
    What advantages does IPv6 have over IPv4 (Choose all that apply)
    • A. 

      IPv6 uses DHCP for its configuration settings

    • B. 

      IPv6 uses a 128-bit address space

    • C. 

      IPv4 cannot support IPsec

    • D. 

      IPv6 incorporates IPsec

  • 17. 
    A Class C address has a first octet decimal range of ____________ to ____________.
    • A. 

      172, 191

    • B. 

      191, 224

    • C. 

      192, 239

    • D. 

      192, 223

  • 18. 
    Which of the following is a method of hiding internal host IP addresses? (Choose all that apply)
    • A. 

      Network Address Translation (NAT)

    • B. 

      Configuring the computer to insert a fake source IP address into outgoing messages

    • C. 

      Proxy servers

    • D. 

      Setting up software firewalls on all internal hosts

  • 19. 
    The Class A address of 127.0.0.1 is used for which of the following?
    • A. 

      Broadcasting to all hosts on a subnet

    • B. 

      Testing the local TCP/IP software implementation

    • C. 

      Experimentation

    • D. 

      Testing the local NIC

  • 20. 
    Why is UDP considered unreliable?
    • A. 

      The header does not contain a checksum

    • B. 

      The data is transmitted in clear text

    • C. 

      It is connectionless

    • D. 

      Routers typically drop a large number of UDP packets

  • 21. 
    In CIDR notation, the IP address and subnet mask 191.9.205.22  255.255.192.0 are written as __________________.
    • A. 

      191.9.205.22/19

    • B. 

      191.9.205.22/18

    • C. 

      191.9.205.22/17

    • D. 

      191.9.205.22/16

  • 22. 
    How do routers handle packets that are too large to pass through because of frame size limitations?
    • A. 

      Routers drop packets that are too large.

    • B. 

      Routers bounce packets back to the sender to be resized.

    • C. 

      Routers adjust their MTUs to accommodate the oversized packet.

    • D. 

      Routers break packets into smaller pieces called fragments.

  • 23. 
    Which of the following is an IPv6 Protocol?  (Choose all that apply)
    • A. 

      Multicast Listening Detection

    • B. 

      IGMPv6

    • C. 

      Multicast Listener Discovery

    • D. 

      Neighbor Discovery

  • 24. 
    A DNS server translates ________________ to _______________.
    • A. 

      Encrypted IP addresses, clear text

    • B. 

      IP addresses, MAC addresses

    • C. 

      FQDNs, IP addresses

    • D. 

      Static addresses, DHCP

  • 25. 
    Why is fragmentation considered a security risk?
    • A. 

      Fragments numbered 0 contain port information

    • B. 

      Fragments numbered 1 or higher are passed through filters

    • C. 

      Fragmented packets cannot be assembled

    • D. 

      Fragmentation is frequently used

Back to Top Back to top