Foundation Latest Update Already
Passed
What does the acronym VPN stand for?
✔✔Virtual Private Network
What is the role of encryption in securing network communications?
✔✔To convert data into an unreadable format that can only be deciphered by authorized users
What is the purpose of an Intrusion Detection System (IDS)?
✔✔To monitor network traffic and detect potential security breaches or malicious activity
What is the OSI model used for in networking?
✔✔To provide a framework for understanding and troubleshooting network communication
across seven distinct layers
What does an IP address do in a network?
✔✔It identifies and locates devices on a network
1
,What is a Denial of Service (DoS) attack?
✔✔An attack aimed at disrupting the normal functioning of a network by overwhelming it with
excessive traffic
What is the function of a router in a network?
✔✔To forward data packets between different networks, ensuring they reach their correct
destination
What is a DMZ (Demilitarized Zone) in network security?
✔✔A separate network segment that provides a buffer between an internal network and the
internet for additional security
What does SSL/TLS stand for, and what is its purpose?
✔✔Secure Sockets Layer/Transport Layer Security – they provide secure encryption for data
transmitted over a network
What is a common method of preventing unauthorized access to a wireless network?
✔✔Using WPA2 or WPA3 encryption to secure the connection
2
, What is a key feature of multi-factor authentication (MFA)?
✔✔It requires users to provide two or more forms of identification before granting access
What is the purpose of a proxy server in a network?
✔✔To act as an intermediary between client devices and the internet, providing anonymity and
security
What is a botnet?
✔✔A network of infected devices controlled by an attacker to launch large-scale attacks
What is the primary purpose of patch management?
✔✔To regularly update software to fix security vulnerabilities and improve system performance
What is a VPN tunnel?
✔✔A secure connection between two points over the internet, ensuring data is encrypted and
private
3