1. What is the primary purpose of network segmentation?
A. To reduce network congestion
B. To enhance the speed of the network
C. To isolate sensitive data and minimize attack surfaces
D. To increase the physical size of the network
Answer: C) To isolate sensitive data and minimize attack surfaces
Rationale: Network segmentation isolates different parts of the
network, limiting the impact of potential security breaches and
enhancing data protection.
2. Which of the following is the primary function of a network
IDS (Intrusion Detection System)?
A. To prevent attacks by blocking malicious traffic
B. To monitor traffic and alert administrators of suspicious
activity
C. To perform encryption on sensitive network traffic
D. To prevent unauthorized access to the network
Answer: B) To monitor traffic and alert administrators of
suspicious activity
,Rationale: An IDS detects potential threats and sends alerts to
administrators for further action but does not take direct action
to block traffic like an Intrusion Prevention System (IPS).
3. Which of the following technologies is used to secure email
communications?
A. SMTP
B. DNSSEC
C. S/MIME
D. FTP
Answer: C) S/MIME
Rationale: S/MIME (Secure/Multipurpose Internet Mail
Extensions) provides encryption and digital signatures for
securing email communication.
4. Which network design feature helps in isolating sensitive data
and systems from the rest of the network?
A. DMZ
B. VPN
C. VLAN
D. IDS
Answer: C) VLAN
, Rationale: A VLAN is a logical segmentation of a network that
isolates sensitive data and systems, providing added security by
restricting access to only authorized users.
5. What is a common security risk associated with using default
network configurations?
A. Increased system performance
B. Lack of adequate security controls
C. Increased network availability
D. Faster troubleshooting
Answer: B) Lack of adequate security controls
Rationale: Default network configurations often come with weak
or no security settings, making networks more vulnerable to
attacks.
6. Which of the following tools is used to detect unauthorized
access to a network?
A. IDS (Intrusion Detection System)
B. DNS (Domain Name System)
C. Load balancer
D. SMTP server
Answer: A) IDS (Intrusion Detection System)
A. To reduce network congestion
B. To enhance the speed of the network
C. To isolate sensitive data and minimize attack surfaces
D. To increase the physical size of the network
Answer: C) To isolate sensitive data and minimize attack surfaces
Rationale: Network segmentation isolates different parts of the
network, limiting the impact of potential security breaches and
enhancing data protection.
2. Which of the following is the primary function of a network
IDS (Intrusion Detection System)?
A. To prevent attacks by blocking malicious traffic
B. To monitor traffic and alert administrators of suspicious
activity
C. To perform encryption on sensitive network traffic
D. To prevent unauthorized access to the network
Answer: B) To monitor traffic and alert administrators of
suspicious activity
,Rationale: An IDS detects potential threats and sends alerts to
administrators for further action but does not take direct action
to block traffic like an Intrusion Prevention System (IPS).
3. Which of the following technologies is used to secure email
communications?
A. SMTP
B. DNSSEC
C. S/MIME
D. FTP
Answer: C) S/MIME
Rationale: S/MIME (Secure/Multipurpose Internet Mail
Extensions) provides encryption and digital signatures for
securing email communication.
4. Which network design feature helps in isolating sensitive data
and systems from the rest of the network?
A. DMZ
B. VPN
C. VLAN
D. IDS
Answer: C) VLAN
, Rationale: A VLAN is a logical segmentation of a network that
isolates sensitive data and systems, providing added security by
restricting access to only authorized users.
5. What is a common security risk associated with using default
network configurations?
A. Increased system performance
B. Lack of adequate security controls
C. Increased network availability
D. Faster troubleshooting
Answer: B) Lack of adequate security controls
Rationale: Default network configurations often come with weak
or no security settings, making networks more vulnerable to
attacks.
6. Which of the following tools is used to detect unauthorized
access to a network?
A. IDS (Intrusion Detection System)
B. DNS (Domain Name System)
C. Load balancer
D. SMTP server
Answer: A) IDS (Intrusion Detection System)