NSCT – Network Security MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Network Security is the practice of: (A) Increasing internet speed (B) Repairing network cables (C) Installing new software only (D) Protecting computer networks from unauthorized access or attacksShow All Answers 2. . A firewall is used to: (A) Block unauthorized network access (B) Increase computer storage (C) Print documents (D) Scan viruses only 3. . VPN stands for: (A) Virtual Private Network (B) Very Private Network (C) Virtual Public Network (D) Verified Protocol Network 4. . Which of the following is a network security threat? (A) Malware (B) Phishing (C) All of the above (D) DDoS attack 5. . DDoS attack stands for: (A) Distributed Data Over System (B) Direct Data Online Service (C) Distributed Denial of Service (D) Digital Denial of Security 6. . Intrusion Detection System (IDS) is used to: (A) Repair hardware (B) Detect unauthorized network activity (C) Encrypt files (D) Delete malware 7. . Intrusion Prevention System (IPS) differs from IDS because it: (A) Only detects attacks (B) Increases network speed (C) Detects and blocks attacks (D) Deletes files automatically 8. . Which of the following is a type of network attack? (A) Man-in-the-Middle attack (B) All of the above (C) Spoofing (D) Phishing 9. . Man-in-the-Middle (MITM) attack occurs when: (A) Computers are connected to a printer (B) Files are deleted automatically (C) Internet speed increases (D) An attacker intercepts communication between two parties 10. . Network sniffing is used to: (A) Monitor network traffic for unauthorized activity (B) Increase storage (C) Compress files (D) Encrypt data 11. . A proxy server is used to: (A) Delete network files (B) Act as an intermediary between client and server (C) Encrypt hardware (D) Increase internet speed only 12. . MAC address filtering is a method of: (A) Encrypting data (B) Deleting files (C) Controlling network access based on device addresses (D) Installing software 13. . Which protocol is used to securely access a remote computer? (A) FTP (B) SSH (C) HTTP (D) SMTP 14. . SSL/TLS is used to: (A) Encrypt data transmitted over networks (B) Increase computer speed (C) Delete malware (D) Compress files 15. . A honeypot is used to: (A) Block emails (B) Attract attackers to study their behavior (C) Encrypt files (D) Increase internet speed 16. . Wireless networks are vulnerable to attacks like: (A) All of the above (B) Rogue access points (C) MITM attacks (D) Eavesdropping 17. . VPN helps in network security by: (A) Encrypting internet traffic (B) All of the above (C) Securing data over public networks (D) Hiding the user’s IP address 18. . Network segmentation improves security by: (A) Dividing the network into smaller, secure zones (B) Increasing internet speed (C) Deleting files (D) Installing software 19. . A brute force attack in networks targets: (A) VPN (B) Firewalls (C) Hardware (D) Passwords 20. . The main goal of network security is to ensure: (A) Confidentiality, Integrity, and Availability of network resources (B) Faster downloads (C) More storage (D) Better graphics