Home » Network Security mcq questions with answer – Set 2

Network Security mcq questions with answer – Set 2

Important Instructions:

  • Total Number Of Questions : 10
  • Passing Marks : 7
  • Each Question Carry 1 Mark, No Negative Marking.
  • Do Not Refresh The Page.
  • This Is A FREE Online Test, DO NOT Pay Money To Anyone To Attend This Test.
  • Best Of Luck…

Results

-

#1. Which logs should be examined to determine if an intruder breached internal systems? (Choose all that apply).

Select all that apply:

#2. You find that the attack has come through the router and firewall to an unidentified desktop machine. You have the IP addresses but not the traffic content. What is likely your next step?

#3. From analyzing the network traffic, you have determined that the attack has compromised a desktop in the sales department and is now sending outbound spam e-mails. Which devices can be used to eliminate this traffic? (Choose all that apply).

Select all that apply:

#4. How would an intrusion detection system help you respond to this incident?

#5. Flood guard functionality might protect against which of the following attacks?

#6. When building an access control list under an explicit deny approach, where would you place a “deny all” statement?

#7. Which of the following protocols is not used in loop protection efforts?

#8. 802.1x defines the encapsulation of EAP. What is EAP?

#9. A management VLAN allows administrators to do which of the following?

#10. In ACLs, an implicit deny will apply to network traffic that:

CHECK ANSWER
Rate this post
You May Also Like :   Network Security mcq questions with answer - Set 5
Scroll to Top