Unit 4 - Practice Quiz

INT242

1 What is the primary purpose of establishing a Network Security Baseline?

A. To monitor network traffic in real-time for zero-day attacks
B. To define a minimum standard of security configurations that all devices must meet
C. To automatically patch all software vulnerabilities without user intervention
D. To reverse engineer malware found on the network

2 Which of the following actions is a critical first step when hardening a network device according to standard security baselines?

A. Configuring dynamic routing protocols
B. Changing default factory credentials
C. Increasing the bandwidth limit
D. Enabling Telnet for remote administration

3 In the context of Network Security Capability Enhancement, what is the primary difference between an IDS and an IPS?

A. IDS encrypts traffic, while IPS decrypts traffic
B. IDS is strictly software, while IPS is strictly hardware
C. IDS passively monitors and alerts, while IPS can actively block malicious traffic
D. IDS protects endpoints, while IPS protects cloud storage

4 Which security capability involves dividing a network into smaller subnetworks to limit lateral movement of attackers?

A. Network Segmentation
B. Packet Sniffing
C. Port Mirroring
D. Load Balancing

5 When implementing Endpoint Security, which technology is specifically designed to detect, investigate, and remediate suspicious activities on hosts and endpoints?

A. VPN (Virtual Private Network)
B. EDR (Endpoint Detection and Response)
C. WAF (Web Application Firewall)
D. NAT (Network Address Translation)

6 What is the primary function of Data Loss Prevention (DLP) in an endpoint security context?

A. To prevent the hard drive from crashing
B. To prevent users from visiting social media sites
C. To identify, monitor, and protect sensitive data from leaving the endpoint unauthorizedly
D. To speed up data transfer rates between USB devices

7 Which of the following is a common technique used in Mobile Device Hardening to separate personal data from corporate data on a BYOD device?

A. Rooting
B. Containerization
C. Jailbreaking
D. Sideloading

8 In Mobile Device Management (MDM), what does the 'Remote Wipe' capability allow an administrator to do?

A. Delete all data on the device if it is lost or stolen
B. Clean the device screen remotely
C. Update the device's firmware automatically
D. Track the device's browser history

9 Which protocol is considered a secure baseline replacement for Telnet when managing network devices?

A. HTTP
B. FTP
C. SSH
D. SNMPv1

10 Which version of SNMP (Simple Network Management Protocol) should be used in a secure baseline to ensure message integrity and encryption?

A. SNMPv1
B. SNMPv2c
C. SNMPv3
D. SNMPv4

11 In Cloud Security Concepts, what does the 'Shared Responsibility Model' imply?

A. The cloud provider is responsible for all security aspects
B. The customer is responsible for physical security of the data center
C. Security obligations are divided between the cloud provider and the customer depending on the service model
D. Security is handled by a third-party auditor only

12 Which web application vulnerability involves an attacker injecting malicious scripts into content that is then served to other users?

A. SQL Injection (SQLi)
B. Cross-Site Scripting (XSS)
C. Buffer Overflow
D. Man-in-the-Middle (MitM)

13 What is the mathematical complexity roughly associated with a brute-force attack on a password of length using a character set of size ?

A.
B.
C.
D.

14 Which component is essential in a Zero Trust architecture regarding network security capability?

A. Implicit trust for internal users
B. Continuous verification and authentication
C. Single perimeter firewall
D. Static access controls

15 To harden a Windows endpoint, which feature should be enabled to prevent unauthorized applications from running?

A. AppLocker / Application Whitelisting
B. Remote Desktop Protocol (RDP)
C. Windows Media Player
D. File and Printer Sharing

16 Which of the following describes Geofencing in the context of Mobile Device Security?

A. Physically locking devices in a safe
B. Using GPS or RFID to define geographical boundaries where device features are enabled or disabled
C. Blocking IP addresses from foreign countries on a firewall
D. Encrypting data based on the time of day

17 Which HTTP header is a security baseline used to enforce the use of HTTPS and prevent protocol downgrade attacks?

A. Access-Control-Allow-Origin
B. Strict-Transport-Security (HSTS)
C. Content-Type
D. User-Agent

18 What is the primary risk associated with Sideloading apps on mobile devices?

A. It drains the battery faster
B. It bypasses official app store security vetting, potentially introducing malware
C. It requires root access which voids warranty
D. It decreases network speed

19 Which technology is used to create a secure, encrypted tunnel over a public network, enhancing network security for remote users?

A. DHCP
B. DNS
C. VPN
D. NTP

20 In the context of Web Application Security, what does SQL Injection target?

A. The web server's operating system
B. The backend database
C. The user's browser cache
D. The network firewall

21 Which endpoint security concept ensures that a device complies with health policies (patch level, antivirus status) before being allowed network access?

A. NAT (Network Address Translation)
B. NAC (Network Access Control)
C. DNS (Domain Name System)
D. ARP (Address Resolution Protocol)

22 What is the purpose of Full Disk Encryption (FDE) on an endpoint?

A. To encrypt network traffic
B. To prevent the OS from booting
C. To protect data at rest if the device is stolen
D. To hide the IP address

23 Which cloud service model involves the provider managing the infrastructure and the operating system, while the customer manages the applications and data?

A. IaaS (Infrastructure as a Service)
B. PaaS (Platform as a Service)
C. SaaS (Software as a Service)
D. DaaS (Desktop as a Service)

24 What is a CASB (Cloud Access Security Broker)?

A. A firewall used specifically for databases
B. A software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure
C. A protocol used for encrypting email
D. A physical lock for server racks

25 In network security baselines, what is the concept of 'Disable Unnecessary Services'?

A. Turning off the internet at night
B. Disabling services, ports, and protocols that are not required for the system's function to reduce the attack surface
C. Removing the antivirus software to save memory
D. Disabling user accounts after 5 PM

26 Which of the following is a secure file transfer protocol baseline?

A. TFTP
B. FTP
C. SFTP
D. HTTP

27 What is Jailbreaking in the context of iOS mobile devices?

A. Removing restrictions imposed by the manufacturer to allow root access
B. Stealing the device from a secure facility
C. Breaking the screen physically
D. Cracking the passcode via brute force

28 Which web security concept protects against CSRF (Cross-Site Request Forgery)?

A. Using anti-forgery tokens (synchronizer token pattern)
B. Disabling JavaScript
C. Using MD5 hashing for passwords
D. Opening ports 80 and 443

29 In a secure network baseline, what is the role of an ACL (Access Control List) on a router?

A. To encrypt the routing table
B. To define rules that permit or deny traffic based on IP addresses and ports
C. To increase the speed of packet switching
D. To store user passwords

30 Which Endpoint Security mechanism relies on a database of known malware file hashes?

A. Heuristic analysis
B. Signature-based detection
C. Behavioral analysis
D. Sandboxing

31 What is the security advantage of using WPA3 over WPA2 in wireless network baselines?

A. It uses shorter passwords
B. It supports older hardware only
C. It provides stronger encryption (SAE) and protection against offline dictionary attacks
D. It removes the need for encryption

32 In application security, what is Input Validation?

A. Checking that the user has paid for the software
B. Verifying that data entered by a user meets expected formats and constraints before processing
C. Validating the hardware components of the server
D. Checking the network speed

33 What is the purpose of a DMZ (Demilitarized Zone) in network architecture?

A. To store all sensitive internal data
B. To host public-facing services (like web servers) while isolating them from the internal LAN
C. To bypass the firewall entirely
D. To connect to the dark web

34 Which term describes software that manages mobile devices, applications, and content from a central console?

A. UEM (Unified Endpoint Management)
B. BIOS
C. UEFI
D. Kernel

35 Why is Port Security used on network switches?

A. To physically lock the cables to the switch
B. To limit the number of MAC addresses allowed on a single port to prevent unauthorized device connection
C. To speed up the switching process
D. To encrypt data at the data link layer

36 Which protocol is the secure standard for email retrieval that supports encryption?

A. POP3 (Port 110)
B. IMAP (Port 143)
C. IMAPS (Port 993)
D. SMTP (Port 25)

37 Which tool is commonly used to aggregate logs from various network devices and endpoints to identify security incidents?

A. SIEM (Security Information and Event Management)
B. Antivirus
C. Load Balancer
D. Hypervisor

38 What represents the 'Principle of Least Privilege' when configuring endpoint user accounts?

A. Giving all users Administrator rights to reduce helpdesk calls
B. Granting users only the minimum access rights necessary to perform their job functions
C. Disabling all user accounts
D. Allowing users to install any software they want

39 In cloud security, what is a WAF (Web Application Firewall) designed to do?

A. Filter traffic based on MAC addresses
B. Protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet
C. Encrypt the database storage
D. Manage user identities in the cloud

40 If a firewall rule is defined as , what happens to a packet where and ?

A. It is allowed
B. It is denied (assuming implicit deny)
C. It is routed to the DMZ
D. It is encrypted

41 Which of the following is a risk of BYOD (Bring Your Own Device) policies?

A. Reduced hardware costs for the company
B. Commingling of corporate and personal data making data leakage more likely
C. Employees are more comfortable with their own devices
D. Faster technology upgrades

42 What is the purpose of Patch Management in endpoint security?

A. To physically repair broken cables
B. To apply updates to software and OS to fix known vulnerabilities
C. To manage the color scheme of the desktop
D. To monitor employee productivity

43 Which wireless security protocol is considered obsolete and easily cracked due to Initialization Vector (IV) collisions?

A. WPA2-AES
B. WPA3
C. WEP
D. WPA-TKIP

44 In a SaaS (Software as a Service) environment, who is responsible for patching the application software?

A. The Customer
B. The Cloud Provider
C. The Internet Service Provider (ISP)
D. The End User

45 Which application security testing method involves analyzing the source code without executing it?

A. DAST (Dynamic Application Security Testing)
B. SAST (Static Application Security Testing)
C. Penetration Testing
D. Fuzzing

46 What is MAM (Mobile Application Management) primarily focused on?

A. Controlling the entire device settings
B. Managing and securing specific corporate apps and data without controlling the whole device
C. Replacing the mobile OS
D. Tracking the user's location 24/7

47 Which network device capability hides internal IP addresses from the public internet?

A. Switching
B. NAT (Network Address Translation)
C. Repeater
D. Bridge

48 What does OWASP stand for?

A. Official Web Application Security Protocol
B. Open Web Application Security Project
C. Online Web Access Security Policy
D. Operational Wide Application System Protection

49 Which of the following is a Physical Security baseline for network equipment?

A. Disabling SSID broadcasting
B. Locking server rooms and wiring closets
C. Using strong passwords
D. Implementing a firewall

50 In the context of Host-Based Intrusion Prevention (HIPS), what is Heuristic Analysis?

A. Matching file hashes exactly
B. Scanning for code execution patterns and behaviors that indicate malware, even if the signature is unknown
C. Asking the user if a file is safe
D. Checking the file creation date