Netwokr Security Tutorials
Netwokr Security Tutorials
a) Symmetric uses two different keys for a) Steal confidential data from a network.
encryption and decryption, while
asymmetric uses the same key for both. b) Disrupt the normal operation of a
network by overwhelming it with traffic.
b) Asymmetric uses two different keys for
encryption and decryption, while symmetric c) Gain unauthorized access to a computer
uses the same key for both. system.
d) Asymmetric is faster and more efficient, 12. What is a common type of DoS attack
while symmetric is more secure. that floods a server with large amounts of
data packets?
9. What is a Digital Signature used for in
network security? a) Smurf attack
b) Man-in-the-Middle (MitM) attack c) A social engineering attack that tricks
users into revealing sensitive information.
c) Phishing attack
d) A Denial-of-Service (DoS) attack that
d) Zero-day attack floods a network with traffic.
13. What is a common security best 16. What is the purpose of a DMZ
practice for creating strong passwords? (Demilitarized Zone) in network security?
c) Use the same password for all your c) To provide a central location for storing
online accounts. user data and applications.
d) Share your passwords with trusted d) To encrypt all network traffic flowing
friends or colleagues. within the organization.
a) To encrypt data at rest and during a) To monitor and filter network traffic for
transmission. suspicious activity on wired networks.
d) To filter incoming and outgoing email d) To reduce the cost of network security
messages for malicious content. infrastructure.
19. What is a honeypot in network 22. What does DDoS stand for?
security?
a) Direct Denial of Service
a) A decoy system designed to lure attackers
and analyze their techniques. b) Distributed Denial of Service
b) A software program that scans for and c) Data Disruption Over System
removes malware from a system.
d)data description of standards
c) A security measure that restricts access to
specific network resources. 23. What is the primary goal of a DDoS
attack?
d) A system that monitors and detects
unauthorized access attempts. a) To steal sensitive data from a network.
b) To deploy security patches and updates d) To show the expertise of the hacker.
to address known vulnerabilities.
24. How does a DDoS attack typically
c) To train employees on cybersecurity best work?
practices and awareness.
a) By exploiting a software vulnerability in
d) To simulate cyberattacks to test the the target system.
effectiveness of network defenses.
b) By tricking users into clicking on
21. What is the importance of network malicious links.
segmentation in security?
c) By flooding the target system with a large
a) To simplify network management and volume of junk traffic, making it unavailable
administration tasks. to legitimate users.
29. What is the difference between a DoS b) Attacks are targeting Internet of Things
(Denial-of-Service) attack and a DDoS (IoT) devices more frequently.
attack?
c) Attacks are becoming easier to launch
and require less technical expertise.
d) All of the above. 35. What happens during a normal TCP
three-way handshake (without a SYN
32. How can individuals stay informed flood)?
about the latest DDoS threats?
a) The client sends a SYN packet, the server
a) By following cyber security news ignores it, and the connection is not
websites and blogs. established.
b) By clicking on links in suspicious emails. b) The client sends a SYN packet, the
server responds with a SYN-ACK packet,
c) By opening attachments from unknown and the client sends an ACK packet to
senders. establish the connection.
d) By attacking hackers online c) The server sends a SYN packet, the client
responds with a SYN-ACK packet, and the
33. What is the primary goal of a SYN server sends an ACK packet to establish the
flood attack? connection.
a) To steal data from a server. d) Both the client and server send SYN
packets simultaneously, followed by an
b) To gain unauthorized access to a server. ACK packet from each to establish the
connection.
c) To disrupt a server's operation by
exhausting resources. 36. What are some signs that a server
might be under a SYN flood attack?
d) To bypass security measures on a server.
a) Unusually slow response times for
34. How does a SYN flood attack work? legitimate users.
38. What are some limitations of SYN 1. Explain with a labeled diagram what
flood attacks? you understand by TCP/IP three way
handshake (10mks)
a) They are very difficult to launch and 2. Discuss briefly the following types
require advanced technical expertise.
of network attacks DDoS, man in
b) They are only effective against outdated the middle , phishing, bute force
server operating systems. and how can these attacks be
mitigated by network engineers.
c) They can be mitigated by increasing the (12mks)
server's processing power. 3. Briefly explain the main difference
between DDoS and DoS attacks .
d) They consume bandwidth on the
(4mks)
attacker's network as well.