Home » Network Security MCQ Questions with Answer

Network Security MCQ Questions with Answer

In this Network Security Multiple Choice Questions (MCQ) with Answer, you will find all the relevant topics of Network Security subject. We have covered most of the topics like Device Configuration, Network Administration, Network Design, Wireless Networking and more. It will help you to prepare for exams, interviews, contest and online test or quizzes. Multiple sets of questions based on various topics are available in this Network Security MCQ. You can practice these MCQs 1 by 1 to enhance your current skills and network security knowledge.

Network Security MCQ Questions and Answers:

Below are the multiple choice questions for Network Security, designed to assess your knowledge and understanding of the various techniques and technologies used to secure computer networks and protect against cyber threats.

Q1. What do load balancers use to determine if a host is operational?

  1. Logixn
  2. Request count
  3. Health checking
  4. Time To Live (TTL)

3. Health checking


Q2. What is meant by the word “stateful” with respect to firewalls?

  1. The firewall tracks what country requests are from.
  2. Only packets matching an active connection are allowed through.
  3. Only packets that are addressed to the internal server are allowed through.
  4. The firewall keeps a list of all addresses to prevent spoofing of an internal IP address.

2. Only packets matching an active connection are allowed through.


Q3. Flood guard functionality might protect against which of the following attacks?

  1. Smurf attack
  2. Address spoofing
  3. Brute force
  4. SQL injection

1. Smurf attack


Q4. When building an access control list under an explicit deny approach, where would you place a “deny all” statement?

  1. At the beginning of the ACL entries
  2. Before any ACLs entries dealing with HTTP traffic
  3. At the end of the ACL entries
  4. On the ingress filter

3. At the end of the ACL entries


Q5. You’ve been asked to help configure a router that is used to connect a remote branch office to your corporate headquarters. The router will need to be managed remotely from the corporate headquarters. Which of the following protocols would you recommend be used to manage the remote router?

  1. HTTP
  2. Telnet
  3. SSH
  4. SNMP
You May Also Like :   CISSP MCQ Questions with Answer

3. SSH


Q6. You are enabling port security on a switch that handles connections for your company’s customer help desk. Company policy prohibits employees from connecting personal devices to the corporate network. To help ensure that only corporate computer systems are connected, what type of port security would you select?

  1. Static method
  2. Dynamic learning
  3. Sticky method
  4. LIFO method

1. Static method


Q7. A company adopting an Infrastructure as a Service (IaaS) model would typically:

  1. Own the infrastructure equipment
  2. Be responsible for housing and maintaining equipment
  3. Only support networking infrastructure
  4. Pay on a per-use basis

4. Pay on a per-use basis


Q8. An organization wanting to create a restricted-access, Internet-accessible resource for processing sensitive data might consider using:

  1. Software as a Service
  2. A private cloud
  3. A public cloud
  4. A community cloud

2. A private cloud


Q9. What does LEAP do?

  1. Modernizes Wi-Fi with a new encryption cipher
  2. Provides TLS support for Wi-Fi authentication under Windows
  3. Provides a lightweight mutual authentication protocol for clients and uses dynamic WEP keys
  4. Forces Cisco devices to use WPA2

3. Provides a lightweight mutual authentication protocol for clients and uses dynamic WEP keys


Q10. What is a threat to VPN over open wireless?

  1. Hackers can sniff all the VPN packets and decrypt them.
  2. The user must connect to the open wireless before starting VPN, allowing an attacker a potential window of time to compromise the machine.
  3. A certificate could be faked, allowing access into the corporate server.
  4. All of the above.

2. The user must connect to the open wireless before starting VPN, allowing an attacker a potential window of time to compromise the machine.


Network Security MCQ Quiz and Online Test:

These Network Security MCQ practice sets gives you the feeling of reality and a clue to the questions asked in the actual Network Security related exams. When you solve these MCQ questions practically, you come across many difficulties that give you an opportunity to improve.

4.4/5 - (13 votes)
Scroll to Top