Total Questions : 50
Expected Time : 50 Minutes

1. What is the primary purpose of a Security Incident Response Plan in network security?

2. What does the term 'Penetration Testing' mean in the context of network security?

3. In network security, what does the term 'Man-in-the-Middle (MitM) attack' involve?

4. In the context of network security, what does the term 'Cryptanalysis' refer to?

5. What is the purpose of a VPN (Virtual Private Network) in network security?

6. Which of the following is a common security practice for email communication?

7. In the context of network security, what does the term 'Rootkit' refer to?

8. In network security, what does the term 'Ransomware' refer to?

9. What is the purpose of Network Address Translation (NAT) in network security?

10. What is the primary purpose of antivirus software?

11. What is the primary purpose of a firewall in network security?

12. In network security, what is the concept of 'Least Privilege'?

13. In the context of network security, what does the term 'Phishing' refer to?

14. Which cybersecurity concept involves creating a replica of a system or network for testing and analysis?

15. In the context of network security, what does the term 'Man-in-the-Middle (MitM) attack' involve?

16. What does the term 'Malware' stand for?

17. Which of the following is a common method of securing data in transit?

18. What is the purpose of a Security Audit in network security?

19. In network security, what does the term 'Phishing' refer to?

20. What is the purpose of a Security Incident Response Plan in network security?

21. What is the purpose of a Security Policy in network security?

22. Which of the following is a common security measure for protecting sensitive information stored on mobile devices?

23. What does the term 'Egress Filtering' refer to in network security?

24. In network security, what does the term 'Two-Factor Authentication' involve?

25. What is the role of a Security Information and Event Management (SIEM) system in network security?

26. Which authentication method involves confirming a user's identity through physical traits like fingerprints or retinal scans?

27. In network security, what does the term 'Covert Channel' mean?

28. Which security measure involves analyzing patterns and behaviors to identify potential threats?

29. Which of the following is an example of a common social engineering tactic?

30. What is the first line of defense against unauthorized access in a network?

31. In network security, what does the term 'Pharming' refer to?

32. What is the significance of a Red Team in cybersecurity?

33. What is the purpose of a security patch in network security?

34. What is the primary purpose of a Proxy Server in network security?

35. What is the purpose of a Digital Certificate in network security?

36. What is the purpose of an antivirus software in network security?

37. What is the purpose of a Security Token in two-factor authentication?

38. Which of the following is a common recommendation for securing a home Wi-Fi network?

39. Which of the following is an example of a strong password?

40. In the context of network security, what is a 'Denial-of-Service (DoS) attack'?

41. What does the term 'Zero Trust' refer to in the context of network security?

42. Why is it important to use unique passwords for different online accounts?

43. What is the purpose of a Threat Intelligence Feed in network security?

44. What is the purpose of biometric authentication in enhancing network security?

45. Which cybersecurity measure involves preventing unauthorized physical access to computer systems?

46. Which of the following is an example of a cybersecurity vulnerability?

47. What is the purpose of a Security Awareness Training program in an organization?

48. In network security, what does the term 'Firewall' refer to?

49. What is the purpose of regular software updates in enhancing network security?

50. What does the term 'Phishing' refer to in the context of network security?