5.6 Network security

1. The main goal of network security is to:
A. Prevent unauthorized access
B. Increase data redundancy
C. Improve bandwidth
D. Reduce latency
Answer: A. Prevent unauthorized access

 


2. Which of the following is not a type of network attack?
A. Phishing
B. SQL Injection
C. Encryption
D. Denial of Service
Answer: C. Encryption

 


3. A firewall operates mainly at which layer of the OSI model?
A. Network layer
B. Physical layer
C. Transport layer
D. Data Link layer
Answer: A. Network layer

 


4. Which of the following ensures data confidentiality?
A. Encryption
B. Compression
C. Firewall
D. Caching
Answer: A. Encryption

 


5. Which encryption technique uses two keys—one public and one private?
A. Symmetric encryption
B. Asymmetric encryption
C. Hashing
D. Steganography
Answer: B. Asymmetric encryption

 


6. The process of converting plaintext into ciphertext is called:
A. Encoding
B. Decoding
C. Encryption
D. Decryption
Answer: C. Encryption

 


7. SSL and TLS protocols are used to provide:
A. Secure communication over the Internet
B. File transfer services
C. Email delivery
D. Domain name resolution
Answer: A. Secure communication over the Internet

 


8. What does VPN stand for?
A. Virtual Private Network
B. Virtual Public Network
C. Verified Private Network
D. Virtual Packet Network
Answer: A. Virtual Private Network

 


9. Which of the following is used to detect unauthorized access or anomalies in a network?
A. IDS (Intrusion Detection System)
B. DNS
C. SMTP
D. FTP
Answer: A. IDS (Intrusion Detection System)

 


10. Which protocol is used for secure file transfer over the Internet?
A. FTP
B. SFTP
C. HTTP
D. SNMP
Answer: B. SFTP

 


11. Which algorithm is commonly used for symmetric encryption?
A. RSA
B. DES
C. DSA
D. Diffie-Hellman
Answer: B. DES

 


12. The technique of hiding secret data inside another file is called:
A. Cryptography
B. Steganography
C. Phishing
D. Spoofing
Answer: B. Steganography

 


13. Which of the following best describes a DoS attack?
A. Stealing passwords
B. Overloading a system to make it unavailable
C. Intercepting data packets
D. Encrypting data for secure transfer
Answer: B. Overloading a system to make it unavailable

 


14. Digital signatures are mainly used for:
A. Authentication and integrity
B. Confidentiality
C. Compression
D. Error correction
Answer: A. Authentication and integrity

 


15. Which of the following is a strong password?
A. 123456
B. password123
C. ezexpln@2025#Net
D. admin
Answer: C. ezexpln@2025#Net

 


16. What is the main purpose of a proxy server?
A. Hide user identity and cache web content
B. Increase download speed
C. Translate web pages
D. Control hardware usage
Answer: A. Hide user identity and cache web content

 


17. Which protocol provides security for email communication?
A. SMTP
B. POP3
C. PGP (Pretty Good Privacy)
D. IMAP
Answer: C. PGP (Pretty Good Privacy)

 


18. Which of the following is a physical security measure?
A. Firewall
B. Password
C. CCTV surveillance
D. Antivirus software
Answer: C. CCTV surveillance

 


19. Which key management technique is used in symmetric cryptography?
A. Single shared key
B. Public-private key pair
C. Digital certificate
D. Hash function
Answer: A. Single shared key

 


20. Which of the following is not a common cybersecurity goal?
A. Confidentiality
B. Integrity
C. Availability
D. Simplicity
Answer: D. Simplicity