#1
What is the primary function of a firewall?
To prevent unauthorized access to or from a private network
ExplanationFirewall prevents unauthorized access to/from a network.
#2
What is the purpose of Intrusion Detection Systems (IDS) in network security?
To detect and alert about suspicious activities or potential security breaches
ExplanationIDS detects and alerts on suspicious activities.
#3
Which of the following is NOT a common type of firewall?
Database Firewall
ExplanationDatabase Firewall is not a common type of firewall.
#4
Which of the following is NOT a common authentication method used in network security?
Domain Name System (DNS)
ExplanationDNS is not a common authentication method.
#5
Which layer of the OSI model do firewalls primarily operate on?
Network Layer
ExplanationFirewalls operate primarily on the Network Layer.
#6
What is a DMZ in the context of network security?
Demilitarized Zone - an isolated network segment between the internal network and an external network, typically the internet
ExplanationDMZ isolates internal network from external, like the internet.
#7
Which type of firewall examines each packet in isolation without considering the context of other packets?
Packet Filtering Firewall
ExplanationPacket Filtering Firewall examines packets individually.
#8
What is a VPN (Virtual Private Network) primarily used for?
To create a secure connection over a public network, such as the internet
ExplanationVPN creates secure connections over public networks.
#9
What does NAT (Network Address Translation) do in the context of firewall and network security?
Translates private IP addresses to public IP addresses and vice versa
ExplanationNAT translates private IPs to public IPs and vice versa.
#10
What is the role of a proxy server in network security?
To intercept and forward network traffic on behalf of clients
ExplanationProxy server intercepts and forwards network traffic.
#11
What is the purpose of a DDoS mitigation system?
To detect and mitigate Distributed Denial of Service (DDoS) attacks
ExplanationDDoS mitigation system detects and mitigates DDoS attacks.
#12
What is a 'Stateful Inspection' in firewall terminology?
Inspecting the state of active connections and determining whether incoming packets are allowed based on the connection state
ExplanationStateful Inspection checks connection state for packet allowance.
#13
What is the purpose of a honeypot in network security?
To simulate vulnerable systems to attract attackers and gather information about their techniques and motives
ExplanationHoneypot attracts attackers to gather information.
#14
Which of the following is a characteristic of a zero-day exploit?
It exploits vulnerabilities that are unknown to software vendors and have no available patch
ExplanationZero-day exploit targets unknown vulnerabilities.
#15
What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different keys
ExplanationSymmetric: same key for encryption/decryption, asymmetric: different keys.
#16
What is a man-in-the-middle (MITM) attack?
An attack where an attacker intercepts and alters communication between two parties without their knowledge
ExplanationMITM attack intercepts and alters communication.
#17
What is a rainbow table in the context of password security?
A precomputed table used to reverse cryptographic hash functions to plaintext passwords
ExplanationRainbow table reverses cryptographic hashes to plaintext passwords.
#18
What is the purpose of network segmentation in network security?
To isolate sensitive or critical assets from other parts of the network, reducing the impact of a security breach
ExplanationNetwork segmentation isolates critical assets, reducing breach impact.