What is a firewall in network security?
*
A physical wall constructed around network servers to prevent access.
A security system that controls the incoming and outgoing network traffic based on predetermined security rules.
A piece of software used to manage data storage.
A protocol for transmitting private documents over the internet.
Which type of malware is designed to replicate itself from one computer to another without user intervention?
*
Virus
Adware
Spyware
Phishing tool
What does VPN stand for, and what is its primary purpose?
*
Virtual Public Network; it is used to create a public internet connection.
Very Private Network; it is used to increase browsing speed.
Virtual Private Network; it is used to secure internet connections and protect private web traffic from eavesdropping, interference, and censorship.
Variable Protocol Network; it is used for dynamic internet routing.
Which practice enhances security by ensuring only authenticated users can access network resources?
*
Creating multiple user accounts for each employee.
Network segmentation.
Installing antivirus software on all devices.
Multi-factor authentication.
What is the purpose of encryption in network security?
*
To speed up the data transmission over the network.
To convert data into a secure code to prevent unauthorized access.
To increase the data storage capacity on the network.
To monitor data usage over the network.
Which method is used to secure a wireless network?
*
Using strong, complex passwords.
Keeping the network open and accessible to monitor traffic.
Disabling the network firewall to allow for data flow optimization.
Connecting as many devices as possible to enhance signal strength.
What is ‘spoofing’ in the context of network security?
*
The practice of making a network available to external users.
The act of disguising communication from an unknown source as being from a known, trusted source.
The method of creating backup files for data.
The process of removing unwanted data from the network.
What should you do if you discover an unauthorized device connected to your network?
*
Do nothing unless the device starts transferring large amounts of data.
Immediately isolate the device and alert your network security team.
Try to communicate with the device to identify the user.
Turn off the entire network until the device can be removed.
Which of the following is considered a good practice for securing network devices?
*
Installing the latest gaming software to keep the network entertained.
Regularly updating device firmware and software to protect against vulnerabilities.
Using the same password across all devices for consistency.
Allowing devices to connect to the internet without a firewall.
How often should network security policies be reviewed and updated?
*
Only after a security breach occurs.
Once every five years.
Regularly, to adapt to new threats and incorporate advances in technology.
Never; once a security policy is set, it should not be changed to avoid confusion.
Full Name
Email
*