Computer Security


101. What is a man-in-the-middle attack?
a. An attack that involves intercepting and altering network traffic.
b. An attack that involves guessing a password or encryption key through trial and error.
c. An attack that involves tricking individuals into revealing sensitive information.
d. None of the above.

View Answer >

102. What is the purpose of a firewall?
a. To prevent unauthorized access to a network.
b. To prevent malware from spreading across a network.
c. To monitor network traffic for suspicious activity.
d. All of the above.

View Answer >

103. What is a packet-filtering firewall?
a. A firewall that examines packets of data as they are sent between two devices and blocks packets that do not meet certain criteria.
b. A firewall that encrypts all network traffic to prevent unauthorized access.
c. A firewall that uses artificial intelligence to detect and respond to security threats.
d. None of the above.

View Answer >

104. What is a stateful firewall?
a. A firewall that monitors network traffic and stores information about the state of each connection in a table to determine whether incoming traffic should be allowed.
b. A firewall that blocks all network traffic unless it is specifically allowed by a rule.
c. A firewall that uses machine learning to detect and respond to security threats.
d. None of the above.

View Answer >

105. What is an application-layer firewall?
a. A firewall that examines the content of packets to identify and block specific types of traffic.
b. A firewall that blocks all network traffic unless it is specifically allowed by a rule.
c. A firewall that uses machine learning to detect and respond to security threats.
d. None of the above.

View Answer >

106. What is a proxy firewall?
a. A firewall that sits between a client and a server and mediates network traffic between them.
b. A firewall that blocks all network traffic unless it is specifically allowed by a rule.
c. A firewall that uses artificial intelligence to detect and respond to security threats.
d. None of the above.

View Answer >

107. What is a DMZ (demilitarized zone)?
a. A network segment that is isolated from the rest of a network and contains only publicly accessible servers.
b. A network segment that is highly secured and contains critical resources.
c. A type of encryption algorithm.
d. None of the above.

View Answer >

108. What is port forwarding?
a. The process of forwarding incoming network traffic to a specific device or server on a network.
b. The process of encrypting all network traffic to prevent unauthorized access.
c. The process of blocking all network traffic unless it is specifically allowed by a rule.
d. None of the above.

View Answer >

109. What is a virtual private network (VPN)?
a. A secure network connection that allows remote access to a private network over the internet.
b. A type of encryption algorithm.
c. A firewall that examines the content of packets to identify and block specific types of traffic.
d. None of the above.

View Answer >

110. What is a VPN tunnel?
a. A secure connection established between a client and a server over a public network, such as the internet.
b. A network segment that is highly secured and contains critical resources.
c. A type of encryption algorithm.
d. None of the above.

View Answer >


Leave a Comment

telegram Join Telegram
Join Now Join Now