1. What does a router do in a network?
A) Routes data within a local area network (LAN)
B) Connects different networks and routes data between them
C) Provides wireless connectivity
D) Manages IP addresses
Answer: B) Connects different networks and routes data between them
Justification: A router is responsible for directing data packets between different networks, including connecting a local area network (LAN) to the internet or other networks
5. What does the term PHISHING "refer to in cybersecurity?
A) A method of attacking physical hardware
B) Sending fraudulent communications to steal sensitive information
C) Scanning networks for vulnerabilities
D) Hacking into wireless networks
Answer: B) Sending fraudulent communications to steal sensitive information
Justification: Phishing involves tricking individuals into providing sensitive information through deceptive emails or websites .
9. Which project management methodology is best suited for netw cybersecurity projects that require frequent changes and updates?
A) Waterfall
B) Agile
C) PRINCE2
D) Critical Path Method
Answer: B) Agile
Justification: Agile is suited for projects that need flexibility, with regular updates and changes based on user feedback .
13. What does the term "spoofing" refer to in cybersecurity?
A) Creating fake user identities to gain unauthss
B) Using complex passwords to secure networks
C) Encrypting data to prevent unauthorized access
D) Monitoring network traffic for malicious activities
Answer: A) Creating fake user identities to gain unauthorized access
Justification: Spoofing involves impersonating another entity to gain unauthorized access to resources .
2. Which of the following is NOT a function of a firewall?
A) Filtering incoming and outgoing traffic
B) Blocking unauthorized access
C) Encrypting data
D) Monitoring network activity
Answer: C) Encrypting data
Justification: Firewalls are designed to control traffic, block unauthorized access, and monitor network traffic. They do not handle encryption, which is a separate function .
6. Which of the following is a WPA2 in wireless network security?
A) It uses a pre-shared key (PSK) for encryption
B) It requires a physical key for authentication
C) It is used exclusively for wireless routers
D) It disables MAC address filtering
Answer: A) It uses a pre-shared key (PSK) for encryption
Justification: WPA2 uses strong encryption with a pre-shared key (PSK) to secure wireless networks .
10. Which of the following is a common use of VPNs (Virtual Private Netw) Securing wireless network access
B) Securing communication over public networks
C) Preventing DoS attacks
D) Filtering website content
Answer: B) Securing communication over public networks
Justification: VPNs encrypt data traffic, securing communication over public networks like the internet .
14. Which of the following cable types is used for high-speed network connections and is immune to electromagnetic interf
A) Coaxial cable
B) Fiber optic cable
C) Twisted pair cable
D) Ethernet cable
Answer: B) Fiber optic cable
Justification: Fiber optic cables transmit data via light signals and are immune to electromagnetic interference, making them ideal for high-speed network connections .
3. The following is a characteristic of IP version 4 (IPv4) addresses?
A) 128-bit address format
B) Written in hexadecimal format
C) Dotted decimal notation
D) No public and private address distinction
Answer: C) Dotted decimal notation
Justification: IPv4 addresses are written in dotted decimal format (e.g., 192.168.0.1), and they distinguish between public and private addresses .
7. Which type of network attack uses multiple systems to flood a target with traffic?
A) Phishing
B) Denial of Service (DoS)
C) Man-in-the-middle
D) Backdoor
Answer: B) Denial of Service (DoS)
Justification: A Denial of Service (DoS) attack involves overwhelming a network or server with excessive traffic, often using multiple compromised systems (DDoS) .
11. What is a key function of an intrusion detection system (IDS)?
A) Encrypti) Blocking unauthorized users from the network
C) Monitoring network traffic for suspicious activity
D) Preventing network traffic from reaching the firewall
Answer: C) Monitoring network traffic for suspicious activity
Justification: IDS systems monitor network traffic to detect and alert on suspicious or unauthorized activity .
15. What is a common security control for protecting passwords?
A) Encryption
B) User permissions
C) Password policy enforceetwork segmentation
Answer: C) Password policy enforcement
Justification: Enforcing strong password policies (e.g., minimum length, complexity) helps protect accounts from unauthorized access .
4. What is the a subnet mask in networking?
A) To increase the speed of data transfer
B) To divide a network into smaller sub-networks
C) To provide security against external threats
D) To encrypt network traffic
Answer: B) To divide a network into smaller sub-networks
Justification: A subnet mask is used to divide larger networks into smaller, more manageable subnetworks, improving efficiency and security .
8. What is the main role of a Domain Name System (DNS
A) To secure data transmission
B) To resolve domain names to IP addresses
C) To assign IP addresses to devices
D) To filter network traffic
Answer: B) To resolve domain names to IP addresses
Justification: DNS servers translate human-readable domain names (like www.example.com) into IP addresses that computers can use to communicate .
12. Which of the following is NOT considered a network topology?
A) Star
B) Ring
C) Mesh
D) IP address
Answer (D)
Justification: Topology refers to the physical or logical layout of a network. IP addresses are identifiers for devices within a network, not a topology .
16. What does the term "access control" refer to in networking?
A) Restricting physical access to network hardware
B) Assigning user peles
C) Managing the transmission speed of the network
D) Encrypting sensitive data during transmission
Answer: B) Assigning user permissions based on roles
Justification: Access control involves managing who can access network resources and what actions they can perform based on roles and permissions .