T4Tutorials .PK

NSCT – Network Security MCQs

1. . Network Security is the practice of:

(A) Increasing internet speed


(B) Repairing network cables


(C) Installing new software only


(D) Protecting computer networks from unauthorized access or attacks




2. . A firewall is used to:

(A) Block unauthorized network access


(B) Increase computer storage


(C) Print documents


(D) Scan viruses only




3. . VPN stands for:

(A) Virtual Private Network


(B) Very Private Network


(C) Virtual Public Network


(D) Verified Protocol Network




4. . Which of the following is a network security threat?

(A) Malware


(B) Phishing


(C) All of the above


(D) DDoS attack




5. . DDoS attack stands for:

(A) Distributed Data Over System


(B) Direct Data Online Service


(C) Distributed Denial of Service


(D) Digital Denial of Security




6. . Intrusion Detection System (IDS) is used to:

(A) Repair hardware


(B) Detect unauthorized network activity


(C) Encrypt files


(D) Delete malware




7. . Intrusion Prevention System (IPS) differs from IDS because it:

(A) Only detects attacks


(B) Increases network speed


(C) Detects and blocks attacks


(D) Deletes files automatically




8. . Which of the following is a type of network attack?

(A) Man-in-the-Middle attack


(B) All of the above


(C) Spoofing


(D) Phishing




9. . Man-in-the-Middle (MITM) attack occurs when:

(A) Computers are connected to a printer


(B) Files are deleted automatically


(C) Internet speed increases


(D) An attacker intercepts communication between two parties




10. . Network sniffing is used to:

(A) Monitor network traffic for unauthorized activity


(B) Increase storage


(C) Compress files


(D) Encrypt data




11. . A proxy server is used to:

(A) Delete network files


(B) Act as an intermediary between client and server


(C) Encrypt hardware


(D) Increase internet speed only




12. . MAC address filtering is a method of:

(A) Encrypting data


(B) Deleting files


(C) Controlling network access based on device addresses


(D) Installing software




13. . Which protocol is used to securely access a remote computer?

(A) FTP


(B) SSH


(C) HTTP


(D) SMTP




14. . SSL/TLS is used to:

(A) Encrypt data transmitted over networks


(B) Increase computer speed


(C) Delete malware


(D) Compress files




15. . A honeypot is used to:

(A) Block emails


(B) Attract attackers to study their behavior


(C) Encrypt files


(D) Increase internet speed




16. . Wireless networks are vulnerable to attacks like:

(A) All of the above


(B) Rogue access points


(C) MITM attacks


(D) Eavesdropping




17. . VPN helps in network security by:

(A) Encrypting internet traffic


(B) All of the above


(C) Securing data over public networks


(D) Hiding the user’s IP address




18. . Network segmentation improves security by:

(A) Dividing the network into smaller, secure zones


(B) Increasing internet speed


(C) Deleting files


(D) Installing software




19. . A brute force attack in networks targets:

(A) VPN


(B) Firewalls


(C) Hardware


(D) Passwords




20. . The main goal of network security is to ensure:

(A) Confidentiality, Integrity, and Availability of network resources


(B) Faster downloads


(C) More storage


(D) Better graphics




Exit mobile version