MCQs on Network Security

1. What is Network Security?
A) A method to speed up the internet
B) A technique to secure data from unauthorized access
C) A tool for encrypting email
D) A firewall brand

Answer: B) A technique to secure data from unauthorized access


2. What is the primary goal of network security?
A) To prevent unauthorized access, attacks, and data breaches
B) To make the network faster
C) To reduce bandwidth consumption
D) To allow anonymous access

Answer: A) To prevent unauthorized access, attacks, and data breaches


3. Which of the following is NOT a network security threat?
A) Phishing
B) Malware
C) Firewalls
D) Denial-of-Service (DoS)

Answer: C) Firewalls


4. Which of the following is an example of authentication?
A) IP address filtering
B) Entering a username and password
C) Data encryption
D) Firewall configuration

Answer: B) Entering a username and password


5. What is a Firewall?
A) A physical barrier to stop unauthorized users
B) A device that protects networks by filtering traffic
C) A tool that speeds up network performance
D) A wireless communication protocol

Answer: B) A device that protects networks by filtering traffic


Types of Network Attacks

6. Which attack involves sending multiple requests to overwhelm a system?
A) Phishing
B) Denial-of-Service (DoS)
C) Man-in-the-Middle (MITM)
D) Spyware

Answer: B) Denial-of-Service (DoS)


7. A Man-in-the-Middle (MITM) attack occurs when:
A) A hacker physically destroys a network
B) An attacker intercepts communication between two parties
C) A virus deletes all files
D) A user mistypes a password

Answer: B) An attacker intercepts communication between two parties


8. What is phishing?
A) A method of encrypting files
B) A technique used to steal sensitive information by impersonating a trusted entity
C) A type of firewall
D) A network security protocol

Answer: B) A technique used to steal sensitive information by impersonating a trusted entity


9. What is a Trojan horse in network security?
A) A security feature in Windows
B) A malware disguised as legitimate software
C) A tool for ethical hacking
D) A type of firewall

Answer: B) A malware disguised as legitimate software


10. Ransomware attacks involve:
A) Locking a user’s files and demanding payment for decryption
B) Sending spam emails
C) Hiding within legitimate applications
D) Crashing a network for fun

Answer: A) Locking a user’s files and demanding payment for decryption


Cryptography and Encryption

11. What does encryption do?
A) Converts readable data into unreadable format
B) Speeds up internet connections
C) Blocks advertisements
D) Improves computer performance

Answer: A) Converts readable data into unreadable format


12. What is the strongest encryption method?
A) Caesar Cipher
B) AES (Advanced Encryption Standard)
C) MD5
D) SHA-1

Answer: B) AES (Advanced Encryption Standard)


13. What is the purpose of hashing in security?
A) To encrypt data
B) To provide a unique fingerprint of data
C) To speed up network communication
D) To block unauthorized users

Answer: B) To provide a unique fingerprint of data


14. The process of converting plaintext into ciphertext is called:
A) Authentication
B) Encryption
C) Decryption
D) Digital Signing

Answer: B) Encryption


15. Which key is used to decrypt data in asymmetric encryption?
A) Public Key
B) Private Key
C) Symmetric Key
D) Secret Key

Answer: B) Private Key


Network Security Protocols

16. Which protocol is used for secure web browsing?
A) HTTP
B) HTTPS
C) FTP
D) Telnet

Answer: B) HTTPS


17. VPN stands for:
A) Virtual Personal Network
B) Very Private Network
C) Virtual Private Network
D) Verified Public Network

Answer: C) Virtual Private Network


18. What does SSL/TLS provide in network security?
A) Faster internet speeds
B) Secure communication over the internet
C) Virus protection
D) Anonymous browsing

Answer: B) Secure communication over the internet


19. What is the primary function of an Intrusion Detection System (IDS)?
A) To block all incoming traffic
B) To detect and alert on suspicious activities in a network
C) To speed up data transfers
D) To encrypt network packets

Answer: B) To detect and alert on suspicious activities in a network


20. Which of the following is NOT a network security protocol?
A) IPsec
B) WPA2
C) AES
D) SSL

Answer: C) AES


Ethical Hacking & Security Measures

21. What is ethical hacking?
A) Unauthorized hacking for financial gain
B) Testing systems for security vulnerabilities with permission
C) Stealing passwords legally
D) Creating malware

Answer: B) Testing systems for security vulnerabilities with permission


22. Which of the following is a common security measure for preventing unauthorized access?
A) Using weak passwords
B) Disabling firewalls
C) Implementing multi-factor authentication (MFA)
D) Keeping outdated software

Answer: C) Implementing multi-factor authentication (MFA)


23. What is the role of antivirus software?
A) To speed up the internet
B) To detect and remove malware
C) To increase computer storage
D) To block all network traffic

Answer: B) To detect and remove malware


24. What is penetration testing?
A) A test to check internet speed
B) A method of testing security vulnerabilities
C) A type of firewall
D) A technique to hack into social media accounts

Answer: B) A method of testing security vulnerabilities


25. What is the best way to prevent phishing attacks?
A) Clicking on every email link
B) Ignoring security updates
C) Verifying sender identity and avoiding suspicious links
D) Using public Wi-Fi without caution

Answer: C) Verifying sender identity and avoiding suspicious links


Leave a Reply

Your email address will not be published. Required fields are marked *