1
2
3
4
100

1. What does a router do in a network?

A) Routes data within a local area network (LAN)
B) Connects different networks and routes data between them
C) Provides wireless connectivity
D) Manages IP addresses

Answer: B) Connects different networks and routes data between them

Justification: A router is responsible for directing data packets between different networks, including connecting a local area network (LAN) to the internet or other networks

100

5. What does the term PHISHING "refer to in cybersecurity?

A) A method of attacking physical hardware
B) Sending fraudulent communications to steal sensitive information
C) Scanning networks for vulnerabilities
D) Hacking into wireless networks

Answer: B) Sending fraudulent communications to steal sensitive information

Justification: Phishing involves tricking individuals into providing sensitive information through deceptive emails or websites .

100

9. Which project management methodology is best suited for netw cybersecurity projects that require frequent changes and updates?

A) Waterfall
B) Agile
C) PRINCE2
D) Critical Path Method

Answer: B) Agile

Justification: Agile is suited for projects that need flexibility, with regular updates and changes based on user feedback .

100

13. What does the term "spoofing" refer to in cybersecurity?

A) Creating fake user identities to gain unauthss
B) Using complex passwords to secure networks
C) Encrypting data to prevent unauthorized access
D) Monitoring network traffic for malicious activities

Answer: A) Creating fake user identities to gain unauthorized access

Justification: Spoofing involves impersonating another entity to gain unauthorized access to resources .

200

2. Which of the following is NOT a function of a firewall?

A) Filtering incoming and outgoing traffic
B) Blocking unauthorized access
C) Encrypting data
D) Monitoring network activity

Answer: C) Encrypting data

Justification: Firewalls are designed to control traffic, block unauthorized access, and monitor network traffic. They do not handle encryption, which is a separate function .

200

6. Which of the following is a WPA2 in wireless network security?

A) It uses a pre-shared key (PSK) for encryption
B) It requires a physical key for authentication
C) It is used exclusively for wireless routers
D) It disables MAC address filtering

Answer: A) It uses a pre-shared key (PSK) for encryption

Justification: WPA2 uses strong encryption with a pre-shared key (PSK) to secure wireless networks .

200

10. Which of the following is a common use of VPNs (Virtual Private Netw) Securing wireless network access

B) Securing communication over public networks
C) Preventing DoS attacks
D) Filtering website content

Answer: B) Securing communication over public networks

Justification: VPNs encrypt data traffic, securing communication over public networks like the internet .

200

14. Which of the following cable types is used for high-speed network connections and is immune to electromagnetic interf

A) Coaxial cable

B) Fiber optic cable
C) Twisted pair cable
D) Ethernet cable

Answer: B) Fiber optic cable

Justification: Fiber optic cables transmit data via light signals and are immune to electromagnetic interference, making them ideal for high-speed network connections .

300

3. The following is a characteristic of IP version 4 (IPv4) addresses?

A) 128-bit address format
B) Written in hexadecimal format
C) Dotted decimal notation
D) No public and private address distinction

Answer: C) Dotted decimal notation

Justification: IPv4 addresses are written in dotted decimal format (e.g., 192.168.0.1), and they distinguish between public and private addresses .

300

7. Which type of network attack uses multiple systems to flood a target with traffic?

A) Phishing
B) Denial of Service (DoS)
C) Man-in-the-middle
D) Backdoor

Answer: B) Denial of Service (DoS)

Justification: A Denial of Service (DoS) attack involves overwhelming a network or server with excessive traffic, often using multiple compromised systems (DDoS) .

300

11. What is a key function of an intrusion detection system (IDS)?

A) Encrypti) Blocking unauthorized users from the network
C) Monitoring network traffic for suspicious activity
D) Preventing network traffic from reaching the firewall

Answer: C) Monitoring network traffic for suspicious activity

Justification: IDS systems monitor network traffic to detect and alert on suspicious or unauthorized activity .

300

15. What is a common security control for protecting passwords?

A) Encryption
B) User permissions
C) Password policy enforceetwork segmentation

Answer: C) Password policy enforcement

Justification: Enforcing strong password policies (e.g., minimum length, complexity) helps protect accounts from unauthorized access .

400

4. What is the a subnet mask in networking?

A) To increase the speed of data transfer
B) To divide a network into smaller sub-networks
C) To provide security against external threats
D) To encrypt network traffic

Answer: B) To divide a network into smaller sub-networks

Justification: A subnet mask is used to divide larger networks into smaller, more manageable subnetworks, improving efficiency and security .

400

8. What is the main role of a Domain Name System (DNS

A) To secure data transmission
B) To resolve domain names to IP addresses
C) To assign IP addresses to devices
D) To filter network traffic

Answer: B) To resolve domain names to IP addresses

Justification: DNS servers translate human-readable domain names (like www.example.com) into IP addresses that computers can use to communicate .

400

12. Which of the following is NOT considered a network topology?

A) Star
B) Ring
C) Mesh

D) IP address


Answer (D) 

Justification: Topology refers to the physical or logical layout of a network. IP addresses are identifiers for devices within a network, not a topology .

400

16. What does the term "access control" refer to in networking?

A) Restricting physical access to network hardware
B) Assigning user peles
C) Managing the transmission speed of the network
D) Encrypting sensitive data during transmission

Answer: B) Assigning user permissions based on roles

Justification: Access control involves managing who can access network resources and what actions they can perform based on roles and permissions .

M
e
n
u