1. What is the primary purpose of a firewall in a network security
infrastructure?
A. To serve as a web server
B. To monitor outbound traffic
C. To filter incoming and outgoing network traffic
D. To provide a user interface for network resources
Answer: C. To filter incoming and outgoing network traffic
Rationale: A firewall is designed to prevent unauthorized access to or
from a private network by filtering incoming and outgoing traffic based on
an applied rule set.
2. Which of the following is a common indicator of a phishing attempt?
A. An email from a known colleague asking for a meeting
B. A public Wi-Fi network requiring no password
C. An unsolicited email requesting sensitive information
D. Regular system updates from the IT department
Answer: C. An unsolicited email requesting sensitive information
Rationale: Phishing attacks often involve unsolicited emails that attempt
to trick individuals into revealing sensitive information such as passwords
or credit card numbers.
3. In the context of cybersecurity, what does the term 'white hat' refer to?
A. A malicious hacker
B. A cybersecurity professional who practices ethical hacking
C. A type of malware
D. A security vulnerability
Answer: B. A cybersecurity professional who practices ethical hacking
Rationale: 'White hat' refers to ethical hackers who use their skills to
help organizations improve their security posture by identifying
vulnerabilities before they can be exploited by malicious actors.
4. What is the main difference between a virus and a worm?
A. A virus is self-replicating, while a worm is not
B. A worm is self-replicating, while a virus is not
C. A virus causes harm to the system, while a worm does not
D. A worm requires user interaction to spread, while a virus does not
Answer: B. A worm is self-replicating, while a virus is not
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |