Network Security MCQs January 8, 2026July 11, 2024 by u930973931_answers 40 min Score: 0 Attempted: 0/40 Subscribe 1. What does VPN stand for? (A) Virtual Personal Network (B) Virtual Private Network (C) Very Personal Network (D) Very Private Network 2. Which of the following is NOT a type of malicious software? (A) Virus (B) Worm (C) Firewall (D) Trojan Horse 3. What is the purpose of a firewall in network security? (A) To prevent unauthorized physical access to the network (B) To block unauthorized access to or from a private network (C) To encrypt data transmissions over the network (D) To provide secure authentication for network users 4. Which encryption protocol is commonly used for securing wireless networks? (A) AES (B) RSA (C) SSL (D) WEP 5. Which of the following is a characteristic of a DDoS attack? (A) Stealing confidential information (B) Encrypting files for ransom (C) Overwhelming a server with traffic (D) Installing backdoors on a system 6. What is the purpose of SSL/TLS certificates? (A) To verify the identity of a website (B) To encrypt data in transit between a client and a server (C) To prevent denial-of-service attacks (D) To block malicious email attachments 7. Which type of malware is specifically designed to block access to a computer system until a sum of money is paid? (A) Worm (B) Ransomware (C) Spyware (D) Adware 8. What does IDS stand for in the context of network security? (A) Internet Data Service (B) Intrusion Detection System (C) Internet Defense System (D) Information Disclosure System 9. Which authentication method typically requires the use of a physical token? (A) Biometric authentication (B) Two-factor authentication (C) Single sign-on authentication (D) Kerberos authentication 10. What is the main purpose of a vulnerability assessment? (A) To identify and mitigate security vulnerabilities in a system (B) To test the physical security of a network (C) To monitor network traffic for suspicious activity (D) To recover data after a cyberattack 11. Which protocol is used for secure email communication? (A) FTP (B) SMTP (C) IMAP (D) S/MIME 12. What does WPA2 stand for in wireless network security? (A) Wireless Protected Access 2 (B) Wi-Fi Privacy Algorithm 2 (C) Wireless Protocol Authentication 2 (D) Wi-Fi Protected Access 2 13. Which of the following is NOT a social engineering technique? (A) Phishing (B) Shoulder surfing (C) DDoS attack (D) Tailgating 14. What type of attack involves intercepting communication between two parties and altering it to gain unauthorized access? (A) Phishing (B) Man-in-the-Middle (MitM) (C) DDoS (D) Spoofing 15. Which security protocol is used to secure web browsing sessions? (A) HTTPS (B) FTPS (C) SFTP (D) SNMP 16. What is the primary purpose of a honeypot in network security? (A) To lure attackers and gather information about their methods (B) To provide additional storage space for sensitive data (C) To encrypt sensitive communications (D) To prevent denial-of-service attacks 17. Which of the following is a type of cryptographic hash function? (A) DES (B) MD5 (C) AES (D) RSA 18. What is the purpose of penetration testing? (A) To simulate cyberattacks against a system to identify vulnerabilities (B) To encrypt sensitive data on a network (C) To block unauthorized access to a network (D) To recover data after a cyberattack 19. Which security measure involves hiding internal IP addresses from external networks? (A) DMZ (B) NAT (C) VPN (D) VLAN 20. Which protocol is commonly used for securely transferring files over a network? (A) HTTP (B) FTP (C) SMTP (D) ICMP 21. Which of the following is a best practice for creating secure passwords? (A) Using common dictionary words (B) Sharing passwords with trusted colleagues (C) Using a combination of letters, numbers, and special characters (D) Writing passwords down on a sticky note attached to your monitor 22. What does ACL stand for in the context of network security? (A) Access Control List (B) Advanced Cryptographic Library (C) Application Control Layer (D) Automated Configuration List 23. Which type of attack involves an attacker masquerading as a legitimate entity to gain unauthorized access? (A) Spoofing (B) Phishing (C) DDoS (D) Ransomware 24. Which security measure is used to verify the integrity and authenticity of a message? (A) Hashing (B) Encryption (C) Compression (D) Encoding 25. What is the purpose of a biometric authentication system? (A) To secure email communications (B) To verify a user’s identity based on unique physical traits (C) To encrypt data during transmission (D) To block malicious websites 26. Which protocol is used to manage and monitor network devices? (A) SNMP (B) SMTP (C) SIP (D) SSH 27. Which cryptographic algorithm is widely used for secure email communication? (A) RSA (B) AES (C) SHA (D) MD5 28. What is the purpose of a certificate authority (CA) in network security? (A) To issue digital certificates that verify the identity of websites or individuals (B) To encrypt network traffic between clients and servers (C) To provide secure access to remote networks (D) To block spam emails 29. Which of the following is a characteristic of a zero-day exploit? (A) It is a vulnerability that has been known for a long time (B) It is a vulnerability that is exploited before a patch is available (C) It is a type of malware that spreads rapidly across a network (D) It is a method used in DDoS attacks 30. What is the purpose of network segmentation? (A) To reduce network latency (B) To isolate different parts of a network for security reasons (C) To compress data for faster transmission (D) To provide redundancy in case of network failures 31. Which of the following is an example of physical security in network protection? (A) Installing antivirus software (B) Implementing firewalls (C) Securing server rooms with biometric locks (D) Encrypting data transmissions 32. What is the main purpose of a SQL injection attack? (A) To intercept network traffic (B) To overload a server with requests (C) To manipulate a database through input fields (D) To spread malware across a network 33. Which cryptographic key is shared publicly in asymmetric encryption? (A) Private key (B) Secret key (C) Public key (D) Session key 34. What is the purpose of a proxy server in network security? (A) To filter network traffic and enforce security policies (B) To store encrypted passwords for user authentication (C) To scan email attachments for viruses (D) To encrypt data transmissions between client and server 35. Which of the following is a characteristic of a brute force attack? (A) It uses social engineering techniques to gain access (B) It exploits vulnerabilities in network protocols (C) It systematically tries all possible combinations of passwords (D) It targets specific individuals through phishing emails 36. Which protocol is commonly used for securely accessing remote servers? (A) FTP (B) SSH (C) Telnet (D) SNMP 37. What is the purpose of an intrusion detection system (IDS)? (A) To encrypt sensitive data (B) To detect and respond to unauthorized access attempts (C) To authenticate users on a network (D) To filter spam emails 38. Which of the following is a technique used to prevent buffer overflow attacks? (A) Firewall (B) Encryption (C) Input validation (D) VPN 39. Which type of malware is designed to track a user’s online activities without their consent? (A) Spyware (B) Worm (C) Trojan horse (D) Ransomware 40. What is the purpose of digital signatures in network security? (A) To encrypt sensitive data during transmission (B) To verify the integrity and authenticity of a message (C) To secure wireless networks (D) To block phishing emails