Network Security Features
Network Security Solutions
Network Security Protocols
Network Security Short Scenarios
Potpourri
100

This feature checks a user’s identity before allowing access to a network or system.

What is authentication?

100

This device or software filters incoming and outgoing traffic based on security rules.

What is a firewall?

100

This protocol is used to securely send email from a client to a mail server.

What is SMTP?

100

A student tries several wrong passwords and then gets locked out of the account. What security measure caused this?

What is account lockout?

100

This type of malware pretends to be legitimate software in order to trick users.

What is a Trojan horse?

200

This feature limits what a user can see or do on a network based on their role or permissions.

What is access control?

200

This solution monitors network traffic for suspicious activity and alerts administrators.

What is an IDS or intrusion detection system?

200

This protocol is used to securely connect to and manage remote devices over a network.

What is SSH?

200

A security team reviews records showing which users logged in, what files they opened, and when those actions happened. What network security feature are they using?

What is an audit trail?

200

This attack attempts to overwhelm a network or server with too much traffic.

What is a DDoS attack?

300

This security feature scrambles data so unauthorized users cannot read it.

What is encryption?

300

This security solution can detect and actively block attacks in real time.

What is an IPS or intrusion protection system?

300

This protocol is commonly used to secure website traffic by combining HTTP with encryption.

What is HTTPS?

300

A school blocks certain websites for students based on safety rules. What security device or solution is likely doing this?

What is a firewall?

300

This principle means giving users only the access they need to do their jobs.

What is the principle of least privilege?

400

This feature keeps a record of user activity and security events for review.

What is logging?

400

This solution allows employees to securely access a private network from a remote location.

What is a VPN or virtual private network?

400

This wireless security protocol replaced WPA and improves protection for Wi-Fi networks.

What is WPA3?

400

A network administrator receives an alert that unusual traffic patterns may indicate an attack, but the traffic is not blocked automatically. What tool detected it?

What is an IDS?

400

This type of attack tricks users into revealing passwords or personal information through fake messages or websites.

What is phishing?

500

This feature automatically signs a user out after a period of inactivity.

What is session timeout?

500

This solution scans files and systems for malicious software.

What is antivirus?

500

This protocol encrypts email in transit between mail servers.

What is TLS?

500

A user must enter a password and then a code from a phone app to log in. What security feature is this?

What is multi-factor authentication (MFA)?

500

This process identifies weaknesses in a system before attackers can exploit them.

What is a vulnerability scan?