Question: Which of the following refers to controlling what resources a user is permitted to access after authentication?

Answer Choices: Authorization

Validation

Encryption

Identification

Answer: Authorization

Question: A firewall is used primarily to:

Answer Choices: Monitor traffic within a local system

Prevent unauthorized access to or from a private network

Encrypt sensitive data

Block spam emails

Answer: Prevent unauthorized access to or from a private network

Question: Which of the following adds a secure, encrypted connection over a less secure network, such as the Internet?

Answer Choices: Firewall

Virtual private network (VPN)

Intrusion detection system

Proxy server

Answer: Virtual private network (VPN)

Question: Which of the following is a network security technology that creates a secure tunnel for data to travel through an untrusted network?

Answer Choices: Proxy server

Virtual private network (VPN)

Firewall

IDS

Answer: Virtual private network (VPN)

Question: What is a distributed denial-of-service (DDoS) attack?

Answer Choices: An attack that uses stolen credentials

An attack that infects a system with malware

An attack that floods a system from multiple sources to make it unavailable

An attack that intercepts communication between two parties

Answer: An attack that floods a system from multiple sources to make it unavailable

Question: Which of the following is a common way attackers steal passwords?

Answer Choices: Social engineering

Phishing emails

Keyloggers

All of the above

Answer: All of the above

Question: Which of the following is an example of biometric authentication?

Answer Choices: Password

PIN

Fingerprint scan

Security token

Answer: Fingerprint scan

Question: Which of the following is considered the weakest form of authentication?

Answer Choices: Passwords

Biometrics

Security tokens

Multifactor authentication

Answer: Passwords

Question: Which of the following is designed to both detect and prevent malicious activities on a network?

Answer Choices: Firewall

Intrusion prevention system (IPS)

VPN

Proxy server

Answer: Intrusion prevention system (IPS)

Question: Which of the following is an example of multifactor authentication?

Answer Choices: Entering a username and password only

Using a fingerprint and a password

Using only a PIN code

Using only a token

Answer: Using a fingerprint and a password

Question: Which of the following is a type of authentication that requires two or more methods to verify a user’s identity?

Answer Choices: Multifactor authentication

Single sign-on

Password-only authentication

Token-based authentication

Answer: Multifactor authentication

Question: What is the main function of antivirus software?

Answer Choices: To block spam emails

To monitor employee activity

To detect and remove malicious software

To encrypt sensitive files

Answer: To detect and remove malicious software

Question: Which of the following is a security system that monitors network traffic for malicious activity and alerts administrators?

Answer Choices: Firewall

Intrusion detection system (IDS)

Antivirus software

VPN

Answer: Intrusion detection system (IDS)

Question: Which of the following is the process of verifying the identity of a user or system?

Answer Choices: Encryption

Authorization

Authentication

Validation

Answer: Authentication

Question: What is the process of encoding information so only authorized parties can read it?

Answer Choices: Decryption

Encryption

Authentication

Authorization

Answer: Encryption