Total Questions : 40
Expected Time : 40 Minutes

1. Which encryption algorithm is commonly used for securing wireless networks?

2. What is the primary purpose of a Security Operations Center (SOC) in network security?

3. In the context of network security, what is a 'Denial-of-Service (DoS) attack'?

4. What is the role of a Security Information and Event Management (SIEM) system in network security?

5. What does the term 'Egress Filtering' refer to in network security?

6. In network security, what does the term 'Phishing' refer to?

7. Which cybersecurity measure involves the use of a Security Information and Event Management (SIEM) system?

8. In network security, what does the term 'Firewall' refer to?

9. What is the purpose of a Security Awareness Training program in an organization?

10. Which cybersecurity concept focuses on protecting data from unauthorized access and alterations?

11. Which security concept involves the protection of information by converting it into an unreadable format?

12. In the context of network security, what is the role of a Digital Forensic Analyst?

13. In network security, what does the term 'Man-in-the-Middle (MitM) attack' involve?

14. What is the purpose of a Security Audit in network security?

15. What is the first line of defense against unauthorized access in a network?

16. What is the primary purpose of a firewall in network security?

17. In the context of network security, what does the term 'Rootkit' refer to?

18. In network security, what does the term 'Two-Factor Authentication' involve?

19. What is the primary purpose of a Security Incident Response Plan in network security?

20. What does the term 'Zero Trust' refer to in the context of network security?

21. What is the purpose of a Security Assessment in network security?

22. What is the purpose of a Digital Certificate in network security?

23. Which authentication method is considered more secure than a simple username and password combination?

24. Which cryptographic protocol is commonly used to secure web communication through HTTPS?

25. What does the term 'Phishing' refer to in the context of network security?

26. Which of the following is an example of a strong password?

27. In the context of network security, what does the term 'Phishing' refer to?

28. What does the term 'Penetration Testing' mean in the context of network security?

29. What is the purpose of a VPN (Virtual Private Network) in network security?

30. Which of the following is a common recommendation for securing a home Wi-Fi network?

31. What is the purpose of Multi-Factor Authentication (MFA) in network security?

32. In the context of network security, what does the term 'Endpoint Security' involve?

33. Which of the following is a common method of protecting against SQL injection attacks?

34. What is the purpose of a security patch in network security?

35. What is the purpose of Network Address Translation (NAT) in network security?

36. Which cybersecurity concept involves creating a replica of a system or network for testing and analysis?

37. In the context of network security, what does the term 'Zero Trust' imply?

38. Which of the following is an example of a cybersecurity vulnerability?

39. What is the primary purpose of encryption in network security?

40. What is the primary function of a Honey Pot in network security?