1) What is the main goal of a Denial of Service (DoS) attack? a) To steal passwords b) To make a system or service unavailable c) To encrypt files for ransom 2) Which attack uses many systems to overwhelm a target? a) Rootkit attack b) Distributed Denial of Service (DDoS) attack c) Brute-force attack 3) What is a common indicator of a backdoor attack? a) Unexpected user accounts with high privileges b) Slow internet speed c) Encrypted emails 4) Spoofing involves: a) Sending large amounts of traffic to a server b) Infecting files with viruses c) Faking a digital identity to deceive systems 5) Mathematical attacks mainly target: a) Operating systems b) Network routers c) Cryptographic algorithms 6) Brute force attacks are used to: a) Guess passwords by trying many combinations b) Spread malware automatically c) Modify system files invisibly 7) Worms differ from viruses because they: a) Spread automatically without user action b) Require host files to spread c) Are always harmless 8) Which of the following is NOT malware? a) Spyware b) Firewall c) Trojan 9) What does S/MIME do? a) Encrypts and digitally signs emails b) Filters spam messages c) Detects hoax emails 10) Spam filters are used to: a) Encrypt emails b) Block unwanted bulk messages c) Track email attachments 11) An “open mail relay” can be exploited to: a) Send spam through your server b) Protect emails from phishing c) Store email backups 12) What is the function of a site survey in wireless networking? a) Detect rogue access points and vulnerabilities b) Encrypt wireless traffic c) Improve network speed 13) What does MAC filtering do? a) Encrypts wireless data b) Allows only approved devices to connect c) Changes IP addresses automatically 14) What improvement did WPA introduce over WEP? a) TKIP for dynamic key changes b) Static encryption keys c) Better network range 15) Which wireless security standard uses AES encryption? a) WEP b) WPA2 c) WPA 16) Which device manages network traffic and provides firewall functions? a) Router b) Switch c) Access Point 17) Which transmission medium is most resistant to electromagnetic interference (EMI)? a) Copper cable b) Fibre optic cable c) Wireless signal 18) What is the main purpose of shielding in transmission media? a) To increase cable length b) To encrypt data c) To reduce interference and data leakage 19) Which access control method verifies identity using physical traits? a) Passwords b) Digital signatures c) Biometrics 20) In a hospital access control plan, what should doctors have compared to reception staff? a) Same access as all staff b) No access c) Full read/write access

Network Attacks & Security Practices

लीडरबोर्ड

दृश्य शैली

विकल्प

टेम्पलेट स्विच करें

ऑटो-सेव पुनःस्थापित करें: ?