Unit 2 - Practice Quiz

INT242

1 Which component of the AAA framework is responsible for verifying the identity of a user or system?

A. Authorization
B. Accounting
C. Authentication
D. Auditing

2 In the context of Multi-Factor Authentication (MFA), a fingerprint scan falls under which category?

A. Something you know
B. Something you have
C. Something you are
D. Something you do

3 Which Access Control model assigns permissions based on security labels (e.g., Top Secret, Confidential) attached to subjects and objects?

A. Discretionary Access Control (DAC)
B. Mandatory Access Control (MAC)
C. Role-Based Access Control (RBAC)
D. Attribute-Based Access Control (ABAC)

4 In a Discretionary Access Control (DAC) system, who is responsible for determining access rights to an object?

A. The Security Administrator
B. The Operating System
C. The Data Owner
D. The Chief Information Security Officer

5 Which protocol is an open standard for token-based authentication and authorization, often used to allow websites to access information from other websites without sharing passwords?

A. LDAP
B. OAuth 2.0
C. RADIUS
D. TACACS+

6 What is the primary function of a De-Militarized Zone (DMZ) in enterprise network architecture?

A. To encrypt all internal traffic
B. To host internal databases securely
C. To expose public-facing services while isolating the internal network
D. To prevent Denial of Service attacks

7 Which of the following is considered a 'Type 2' error in biometric authentication?

A. False Rejection Rate (FRR)
B. False Acceptance Rate (FAR)
C. Crossover Error Rate (CER)
D. Processing Error Rate (PER)

8 Which network security appliance primarily focuses on inspecting traffic at Layer 7 (Application Layer) to protect web servers from attacks like SQL injection and XSS?

A. Stateful Firewall
B. Packet Filtering Router
C. Web Application Firewall (WAF)
D. VPN Concentrator

9 What is the mathematical concept often used to calculate the entropy of a password, where is the length and is the size of the character set?

A.
B.
C.
D.

10 Which Identity Management process ensures that a user's access rights are removed immediately upon termination of employment?

A. Provisioning
B. Deprovisioning
C. Federation
D. Attestation

11 In the context of Role-Based Access Control (RBAC), permissions are assigned to:

A. Users directly
B. Groups based on location
C. Roles, which are then assigned to users
D. Attributes of the data

12 Which network segmentation technique allows grouping hosts logically regardless of their physical location on the network?

A. Subnetting
B. VLAN (Virtual Local Area Network)
C. NAT (Network Address Translation)
D. VPN (Virtual Private Network)

13 Which protocol is widely used for directory services to query and modify items in directory service providers like Active Directory?

A. SAML
B. Kerberos
C. LDAP
D. SNMP

14 What distinguishes a Stateful Inspection Firewall from a Packet Filtering Firewall?

A. It only looks at the header of the packet.
B. It tracks the operating state and context of active network connections.
C. It operates exclusively at Layer 7.
D. It cannot block UDP traffic.

15 Which Single Sign-On (SSO) standard is XML-based and typically used for exchanging authentication and authorization data between an Identity Provider (IdP) and a Service Provider (SP)?

A. OpenID Connect
B. OAuth
C. SAML (Security Assertion Markup Language)
D. RADIUS

16 In a 'Zero Trust' network architecture, the core principle is:

A. Trust but verify
B. Never trust, always verify
C. Trust internal traffic, verify external traffic
D. Verify only administrative access

17 Which cryptographic protocol uses Port 22 and provides a secure channel over an unsecured network, commonly used for remote command-line login?

A. Telnet
B. FTP
C. SSH (Secure Shell)
D. RDP

18 What is the primary difference between an IDS and an IPS?

A. IDS is hardware, IPS is software.
B. IDS detects and alerts, while IPS detects and actively blocks.
C. IPS is for internal networks, IDS is for external.
D. IDS encrypts data, IPS does not.

19 Which authentication protocol relies on a Key Distribution Center (KDC) and uses 'Tickets' to allow nodes to communicate over a non-secure network?

A. CHAP
B. Kerberos
C. PAP
D. NTLM

20 In Attribute-Based Access Control (ABAC), access decisions are based on:

A. Only the user's role
B. Only the security clearance level
C. Attributes of the user, resource, action, and environment
D. The physical port the user connects to

21 What is a 'Honeypot' in network security?

A. A high-value database containing passwords
B. A decoy system designed to attract and study attackers
C. A software tool for cracking passwords
D. A type of firewall configuration

22 When utilizing IPsec for a VPN, which mode encapsulates the entire original IP packet (header and payload) into a new IP packet?

A. Transport Mode
B. Tunnel Mode
C. Bridge Mode
D. Switch Mode

23 Which of the following describes the 'Principle of Least Privilege'?

A. Users should have the highest level of access needed to prevent workflow blockages.
B. Users should be granted only the minimum access necessary to perform their job functions.
C. All users should have administrator rights on their local machines.
D. Access is determined by the length of employment.

24 Which network appliance consolidates multiple security functions (Firewall, AV, IDS/IPS, VPN, etc.) into a single hardware device?

A. Router
B. Switch
C. UTM (Unified Threat Management)
D. Load Balancer

25 In the context of Federated Identity Management, what is the role of the Identity Provider (IdP)?

A. To provide the service or resource the user wants to access
B. To manage the network infrastructure
C. To authenticate the user and issue security tokens
D. To act as a firewall

26 Which secure communication protocol creates a secure pipe between two distinct networks over the Internet?

A. VLAN
B. Site-to-Site VPN
C. WEP
D. Telnet

27 What is the main security risk associated with 'Split Tunneling' in a remote access VPN?

A. It slows down the connection speed significantly.
B. It prevents the user from accessing corporate resources.
C. It allows traffic destined for the internet to bypass the corporate firewall/VPN, potentially exposing the client.
D. It requires two different passwords.

28 Which authentication factor uses GPS or network triangulation to verify a user?

A. Something you know
B. Something you are
C. Somewhere you are
D. Something you have

29 Which of the following is an example of an 'Implicit Deny' policy in a firewall?

A. Rule 1: Allow HTTP; Rule 2: Allow SMTP; Rule 3: Deny All
B. Rule 1: Deny All; Rule 2: Allow HTTP
C. Rule 1: Allow All
D. Rule 1: Allow HTTP; Rule 2: Allow FTP

30 In 802.1X Port-Based Network Access Control, what is the role of the 'Supplicant'?

A. The authentication server (e.g., RADIUS)
B. The network switch or wireless access point
C. The device/user attempting to access the network
D. The database storing user credentials

31 Which attack involves an attacker trying a list of compromised username/password pairs against many different websites?

A. Brute Force
B. Dictionary Attack
C. Credential Stuffing
D. Rainbow Table Attack

32 Network Access Control (NAC) systems generally assess which of the following before granting network access?

A. The user's typing speed
B. The device's health/posture (OS patches, Antivirus status)
C. The internet bandwidth available
D. The physical weight of the device

33 Which protocol works at the Data Link Layer (Layer 2) to translate IP addresses into MAC addresses, and is vulnerable to 'Poisoning' attacks?

A. DNS
B. DHCP
C. ARP
D. ICMP

34 If a user has a password , and the system stores where is a hash function and is a random value, what is ?

A. The Pepper
B. The Salt
C. The Initialization Vector
D. The Key

35 Which secure communication protocol is the successor to SSL and is currently the standard for securing web traffic (HTTPS)?

A. TLS (Transport Layer Security)
B. SET (Secure Electronic Transaction)
C. PGP (Pretty Good Privacy)
D. WEP (Wired Equivalent Privacy)

36 In the context of Identity Management, what does 'SSO' stand for?

A. Secure Socket Option
B. Single Sign-On
C. Simple Service Object
D. Standard Security Organization

37 An 'Air Gap' is a security measure that involves:

A. Using wireless technology instead of cables
B. Physically isolating a secure network from unsecured networks (like the Internet)
C. Leaving a gap in the firewall rules for testing
D. Cooling server rooms with air conditioning

38 Which authentication protocol uses a Challenge-Handshake mechanism where the password is never sent over the network?

A. PAP (Password Authentication Protocol)
B. CHAP (Challenge-Handshake Authentication Protocol)
C. HTTP Basic Auth
D. Telnet

39 What is the primary purpose of a SIEM (Security Information and Event Management) system?

A. To block viruses on endpoints
B. To aggregate, correlate, and analyze log data from various sources
C. To route network traffic
D. To manage user passwords

40 Which network architecture concept involves placing internal servers (like database servers) in a zone that cannot be directly accessed from the Internet, usually behind the DMZ?

A. Public Zone
B. Trusted/Internal Zone
C. Guest Zone
D. Extranet

41 What is 'East-West' traffic in a data center context?

A. Traffic entering the data center from the internet
B. Traffic leaving the data center to the internet
C. Traffic moving laterally between servers within the data center
D. Traffic between the data center and a branch office

42 Which Identity Management standard builds on top of OAuth 2.0 to provide identity verification (authentication) alongside authorization?

A. SAML
B. OpenID Connect (OIDC)
C. LDAP
D. Kerberos

43 Which of the following is a physical security control that can support authentication?

A. Firewall
B. Smart Card
C. ACL
D. VLAN

44 In a Public Key Infrastructure (PKI), which entity issues and signs digital certificates?

A. Registration Authority (RA)
B. Certificate Authority (CA)
C. Validation Authority (VA)
D. The End User

45 Which firewall configuration creates a 'screened subnet' using two firewalls (one external, one internal)?

A. Bastion Host
B. Dual-homed gateway
C. DMZ (Demilitarized Zone)
D. Peer-to-Peer

46 The process of giving a user permission to do or have something is known as:

A. Identification
B. Authentication
C. Authorization
D. Accounting

47 Which VPN protocol is developed by Microsoft, uses TCP port 443, and tunnels PPP traffic through an SSL/TLS channel?

A. L2TP
B. PPTP
C. SSTP (Secure Socket Tunneling Protocol)
D. IKEv2

48 What is the main advantage of using a Jump Server (Jump Box)?

A. It increases internet speed.
B. It provides a single, hardened entry point for administrators to access sensitive internal zones.
C. It acts as a honeypot for attackers.
D. It distributes IP addresses.

49 In biometric systems, the Crossover Error Rate (CER) describes:

A. The point where False Acceptance Rate and False Rejection Rate are equal.
B. The speed at which the system processes data.
C. The maximum number of users the system can handle.
D. The failure rate of the hardware sensor.

50 Which network device operates at Layer 3 and makes forwarding decisions based on IP addresses?

A. Hub
B. Switch
C. Router
D. Repeater