Question: Which of the following refers to controlling what resources a user is permitted to access after authentication?
Answer Choices: Authorization
Validation
Encryption
Identification
Answer: Authorization
Question: A firewall is used primarily to:
Answer Choices: Monitor traffic within a local system
Prevent unauthorized access to or from a private network
Encrypt sensitive data
Block spam emails
Answer: Prevent unauthorized access to or from a private network
Question: Which of the following adds a secure, encrypted connection over a less secure network, such as the Internet?
Answer Choices: Firewall
Virtual private network (VPN)
Intrusion detection system
Proxy server
Answer: Virtual private network (VPN)
Question: Which of the following is a network security technology that creates a secure tunnel for data to travel through an untrusted network?
Answer Choices: Proxy server
Virtual private network (VPN)
Firewall
IDS
Answer: Virtual private network (VPN)
Question: What is a distributed denial-of-service (DDoS) attack?
Answer Choices: An attack that uses stolen credentials
An attack that infects a system with malware
An attack that floods a system from multiple sources to make it unavailable
An attack that intercepts communication between two parties
Answer: An attack that floods a system from multiple sources to make it unavailable
Question: Which of the following is a common way attackers steal passwords?
Answer Choices: Social engineering
Phishing emails
Keyloggers
All of the above
Answer: All of the above
Question: Which of the following is an example of biometric authentication?
Answer Choices: Password
PIN
Fingerprint scan
Security token
Answer: Fingerprint scan
Question: Which of the following is considered the weakest form of authentication?
Answer Choices: Passwords
Biometrics
Security tokens
Multifactor authentication
Answer: Passwords
Question: Which of the following is designed to both detect and prevent malicious activities on a network?
Answer Choices: Firewall
Intrusion prevention system (IPS)
VPN
Proxy server
Answer: Intrusion prevention system (IPS)
Question: Which of the following is an example of multifactor authentication?
Answer Choices: Entering a username and password only
Using a fingerprint and a password
Using only a PIN code
Using only a token
Answer: Using a fingerprint and a password
Question: Which of the following is a type of authentication that requires two or more methods to verify a user’s identity?
Answer Choices: Multifactor authentication
Single sign-on
Password-only authentication
Token-based authentication
Answer: Multifactor authentication
Question: What is the main function of antivirus software?
Answer Choices: To block spam emails
To monitor employee activity
To detect and remove malicious software
To encrypt sensitive files
Answer: To detect and remove malicious software
Question: Which of the following is a security system that monitors network traffic for malicious activity and alerts administrators?
Answer Choices: Firewall
Intrusion detection system (IDS)
Antivirus software
VPN
Answer: Intrusion detection system (IDS)
Question: Which of the following is the process of verifying the identity of a user or system?
Answer Choices: Encryption
Authorization
Authentication
Validation
Answer: Authentication
Question: What is the process of encoding information so only authorized parties can read it?
Answer Choices: Decryption
Encryption
Authentication
Authorization
Answer: Encryption