
Sign up to save your podcasts
Or
Domain 4: Network Security (20 Questions)
What is the purpose of a firewall?
A. Detect malware
B. Filter traffic between networks
C. Encrypt sensitive information
D. Manage network bandwidth
Answer: B
What type of attack floods a network to make resources unavailable?
A. Man-in-the-middle
B. Phishing
C. Denial of Service (DoS)
D. Replay
Answer: C
Which protocol encrypts data between a browser and server?
A. FTP
B. HTTP
C. HTTPS
D. Telnet
Answer: C
What is the primary function of a VPN?
A. Secure email communications
B. Provide an encrypted remote-access tunnel
C. Monitor network activity
D. Block unauthorized users
Answer: B
What is the goal of network segmentation?
A. Reduce network congestion
B. Isolate sensitive data/systems
C. Increase encryption efficiency
D. Enhance speed
Answer: B
What device connects network segments?
A. Switch
B. Router
C. Firewall
D. Load Balancer
Answer: B
Which protocol resolves domain names to IPs?
A. HTTP
B. DNS
C. SMTP
D. SNMP
Answer: B
What does an IDS do?
A. Block unauthorized traffic
B. Detect/alert suspicious activity
C. Encrypt communications
D. Filter email spam
Answer: B
Which prevents ARP spoofing?
A. Dynamic IP allocation
B. Static ARP tables
C. NAT
D. Gateway reconfiguration
Answer: B
What is a key benefit of a proxy?
A. Hide internal IPs from external users
B. Block malicious traffic at the packet level
C. Encrypt all network traffic
D. Prevent social media access
Answer: A
What is port scanning?
A. Identify open ports on a device
B. Encrypt incoming traffic
C. Test firewall configurations
D. Block unauthorized IPs
Answer: A
What is the purpose of tools like Wireshark?
A. Test software vulnerabilities
B. Analyze/capture network traffic
C. Encrypt data in transit
D. Configure firewalls
Answer: B
Which control allows traffic based on rules?
A. Intrusion Prevention System (IPS)
B. Firewall
C. Network Access Control (NAC)
D. Honeypot
Answer: B
What is a key advantage of a honeypot?
A. Prevent phishing
B. Attract attackers to identify malicious activity
C. Improve encryption
D. Block brute-force attacks
Answer: B
What is the role of DNSSEC?
A. Secure email
B. Prevent DNS spoofing, ensure integrity
C. Encrypt DNS queries
D. Improve bandwidth
Answer: B
Which protocol provides secure file transfer?
A. FTP
B. SFTP
C. Telnet
D. HTTP
Answer: B
What type of attack alters communications?
A. Man-in-the-middle
B. DoS
C. Social engineering
D. Replay
Answer: A
What is the function of NAC?
A. Encrypt sensitive traffic
B. Enforce device security policies
C. Prevent malware
D. Monitor unauthorized logins
Answer: B
Which wireless security protocol is most secure?
A. WEP
B. WPA
C. WPA2
D. WPA3
Answer: D
What is the purpose of VLANs?
A. Increase speed
B. Segment/isolate traffic for security
C. Encrypt all traffic
D. Prevent malware
Answer: B
Patreon Support:
https://www.patreon.com/DecodedPodcast
Domain 4: Network Security (20 Questions)
What is the purpose of a firewall?
A. Detect malware
B. Filter traffic between networks
C. Encrypt sensitive information
D. Manage network bandwidth
Answer: B
What type of attack floods a network to make resources unavailable?
A. Man-in-the-middle
B. Phishing
C. Denial of Service (DoS)
D. Replay
Answer: C
Which protocol encrypts data between a browser and server?
A. FTP
B. HTTP
C. HTTPS
D. Telnet
Answer: C
What is the primary function of a VPN?
A. Secure email communications
B. Provide an encrypted remote-access tunnel
C. Monitor network activity
D. Block unauthorized users
Answer: B
What is the goal of network segmentation?
A. Reduce network congestion
B. Isolate sensitive data/systems
C. Increase encryption efficiency
D. Enhance speed
Answer: B
What device connects network segments?
A. Switch
B. Router
C. Firewall
D. Load Balancer
Answer: B
Which protocol resolves domain names to IPs?
A. HTTP
B. DNS
C. SMTP
D. SNMP
Answer: B
What does an IDS do?
A. Block unauthorized traffic
B. Detect/alert suspicious activity
C. Encrypt communications
D. Filter email spam
Answer: B
Which prevents ARP spoofing?
A. Dynamic IP allocation
B. Static ARP tables
C. NAT
D. Gateway reconfiguration
Answer: B
What is a key benefit of a proxy?
A. Hide internal IPs from external users
B. Block malicious traffic at the packet level
C. Encrypt all network traffic
D. Prevent social media access
Answer: A
What is port scanning?
A. Identify open ports on a device
B. Encrypt incoming traffic
C. Test firewall configurations
D. Block unauthorized IPs
Answer: A
What is the purpose of tools like Wireshark?
A. Test software vulnerabilities
B. Analyze/capture network traffic
C. Encrypt data in transit
D. Configure firewalls
Answer: B
Which control allows traffic based on rules?
A. Intrusion Prevention System (IPS)
B. Firewall
C. Network Access Control (NAC)
D. Honeypot
Answer: B
What is a key advantage of a honeypot?
A. Prevent phishing
B. Attract attackers to identify malicious activity
C. Improve encryption
D. Block brute-force attacks
Answer: B
What is the role of DNSSEC?
A. Secure email
B. Prevent DNS spoofing, ensure integrity
C. Encrypt DNS queries
D. Improve bandwidth
Answer: B
Which protocol provides secure file transfer?
A. FTP
B. SFTP
C. Telnet
D. HTTP
Answer: B
What type of attack alters communications?
A. Man-in-the-middle
B. DoS
C. Social engineering
D. Replay
Answer: A
What is the function of NAC?
A. Encrypt sensitive traffic
B. Enforce device security policies
C. Prevent malware
D. Monitor unauthorized logins
Answer: B
Which wireless security protocol is most secure?
A. WEP
B. WPA
C. WPA2
D. WPA3
Answer: D
What is the purpose of VLANs?
A. Increase speed
B. Segment/isolate traffic for security
C. Encrypt all traffic
D. Prevent malware
Answer: B
Patreon Support:
https://www.patreon.com/DecodedPodcast