Security Management
Security Management
A) Detecting viruses
B) Blocking unauthorized access
C) Scanning for malware
D) Performing network backups
Answer: B) Blocking unauthorized access
A) FTP
B) HTTP
C) SSH
D) SFTP
Answer: D) SFTP
A) Compression
B) Encryption
C) Tokenization
D) Fragmentation
Answer: B) Encryption
7. In which type of attack does the attacker impersonate another device’s MAC
address?
A) IP Spoofing
B) MAC Spoofing
C) Phishing
D) Social Engineering
Answer: B) MAC Spoofing
A) Firewalls
B) Passwords
C) CCTV cameras
D) Data encryption
Answer: C) CCTV cameras
A) Encrypt data
B) Verify data integrity
C) Compress files
D) Authenticate users
Answer: B) Verify data integrity
A) Brute-force attack
B) Phishing email
C) Virus injection
D) DDoS attack
Answer: B) Phishing email
14. Which of the following protocols provides end-to-end data encryption on the
web?
A) HTTP
B) HTTPS
C) FTP
D) SMTP
Answer: B) HTTPS
A) Sniffing
B) Tampering
C) Spoofing
D) Phishing
Answer: B) Tampering
A) SQL
B) Nmap
C) VPN
D) Wireshark
Answer: B) Nmap
17. The act of monitoring and managing system and network logs is known as:
A) Data mining
B) Log analysis
C) Security configuration
D) Network mapping
Answer: B) Log analysis
19. In a network, which device is often used to segment traffic and control flow
between subnets?
A) Hub
B) Switch
C) Router
D) Firewall
Answer: C) Router
A) VPN
B) Antivirus software
C) HTTPS
D) Firewall
Answer: B) Antivirus software
A) Patch management
B) Penetration testing
C) Risk assessment
D) Threat mapping
Answer: C) Risk assessment
A) Trojan
B) Spyware
C) Ransomware
D) Adware
Answer: C) Ransomware
A) Data availability
B) Data confidentiality
C) Data usability
D) Data integrity
Answer: B) Data confidentiality
27. Which layer of the OSI model is responsible for end-to-end data encryption?
A) Physical
B) Transport
C) Session
D) Application
Answer: D) Application
A) RADIUS
B) SIEM
C) NAT
D) DHCP
Answer: B) SIEM
A) To encrypt data
B) To divert attackers from real targets
C) To store backup files
D) To monitor network traffic
Answer: B) To divert attackers from real targets
30. Which principle is used to ensure that system resources are accessed only by
authorized users?
A) Access control
B) Redundancy
C) Layering
D) Virtualization
Answer: A) Access control
A) Phishing
B) DDoS
C) Spoofing
D) Tampering
Answer: B) DDoS
A) Encrypt data
B) Define permissions for users and devices
C) Scan for malware
D) Create system backups
Answer: B) Define permissions for users and devices
34. The process of reducing the risk of data breaches by limiting access is called:
A) Risk mitigation
B) Access control
C) Network isolation
D) Compliance monitoring
Answer: B) Access control
A) SMTP
B) IMAP
C) POP3
D) SMTP over TLS
Answer: D