1. . Network Security is the practice of:
(A) Increasing internet speed
(B) Repairing network cables
(C) Installing new software only
(D) Protecting computer networks from unauthorized access or attacks
2. . A firewall is used to:
(A) Block unauthorized network access
(B) Increase computer storage
(C) Print documents
(D) Scan viruses only
3. . VPN stands for:
(A) Virtual Private Network
(B) Very Private Network
(C) Virtual Public Network
(D) Verified Protocol Network
4. . Which of the following is a network security threat?
(A) Malware
(B) Phishing
(C) All of the above
(D) DDoS attack
5. . DDoS attack stands for:
(A) Distributed Data Over System
(B) Direct Data Online Service
(C) Distributed Denial of Service
(D) Digital Denial of Security
6. . Intrusion Detection System (IDS) is used to:
(A) Repair hardware
(B) Detect unauthorized network activity
(C) Encrypt files
(D) Delete malware
7. . Intrusion Prevention System (IPS) differs from IDS because it:
(A) Only detects attacks
(B) Increases network speed
(C) Detects and blocks attacks
(D) Deletes files automatically
8. . Which of the following is a type of network attack?
(A) Man-in-the-Middle attack
(B) All of the above
(C) Spoofing
(D) Phishing
9. . Man-in-the-Middle (MITM) attack occurs when:
(A) Computers are connected to a printer
(B) Files are deleted automatically
(C) Internet speed increases
(D) An attacker intercepts communication between two parties
10. . Network sniffing is used to:
(A) Monitor network traffic for unauthorized activity
(B) Increase storage
(C) Compress files
(D) Encrypt data
11. . A proxy server is used to:
(A) Delete network files
(B) Act as an intermediary between client and server
(C) Encrypt hardware
(D) Increase internet speed only
12. . MAC address filtering is a method of:
(A) Encrypting data
(B) Deleting files
(C) Controlling network access based on device addresses
(D) Installing software
13. . Which protocol is used to securely access a remote computer?
(A) FTP
(B) SSH
(C) HTTP
(D) SMTP
14. . SSL/TLS is used to:
(A) Encrypt data transmitted over networks
(B) Increase computer speed
(C) Delete malware
(D) Compress files
15. . A honeypot is used to:
(A) Block emails
(B) Attract attackers to study their behavior
(C) Encrypt files
(D) Increase internet speed
16. . Wireless networks are vulnerable to attacks like:
(A) All of the above
(B) Rogue access points
(C) MITM attacks
(D) Eavesdropping
17. . VPN helps in network security by:
(A) Encrypting internet traffic
(B) All of the above
(C) Securing data over public networks
(D) Hiding the user’s IP address
18. . Network segmentation improves security by:
(A) Dividing the network into smaller, secure zones
(B) Increasing internet speed
(C) Deleting files
(D) Installing software
19. . A brute force attack in networks targets:
(A) VPN
(B) Firewalls
(C) Hardware
(D) Passwords
20. . The main goal of network security is to ensure:
(A) Confidentiality, Integrity, and Availability of network resources
(B) Faster downloads
(C) More storage
(D) Better graphics