Unit 3 - Practice Quiz

INT249

1 Which of the following firewall types operates by inspecting the state of active connections and using that information to determine which network packets to allow through?

A. Stateless Packet Filtering
B. Stateful Inspection
C. Circuit-Level Gateway
D. Packet Sniffer

2 In the context of server hardening, what is the primary purpose of the Principle of Least Privilege?

A. Ensuring all users have root access to perform tasks efficiently
B. Granting users only the permissions necessary to perform their job functions
C. Encrypting all data at rest and in transit
D. Disabling all network ports on the server

3 Which security protocol is the standard for encrypted remote login sessions, replacing Telnet?

A. FTP
B. HTTP
C. SSH
D. SNMP

4 What is the primary function of an Intrusion Detection System (IDS)?

A. To block all incoming traffic from specific IP addresses
B. To monitor network or system activities for malicious activities or policy violations
C. To encrypt data stored on the hard drive
D. To route network traffic between different subnets

5 Which logical access control model assigns permissions based on the user's job function or title within an organization?

A. Discretionary Access Control (DAC)
B. Mandatory Access Control (MAC)
C. Role-Based Access Control (RBAC)
D. Rule-Based Access Control

6 In the CIA Triad of information security, what does Integrity ensure?

A. Data is accessible only to authorized users
B. Data is available when needed
C. Data has not been altered or tampered with by unauthorized entities
D. Data is backed up regularly

7 Which command is used in Linux to change the read, write, and execute permissions of a file, serving as a basic Logical Access Control method?

A. chown
B. chmod
C. grep
D. iptables

8 What is a DMZ (Demilitarized Zone) in network security?

A. A physical sub-network that contains and exposes an organization's external-facing services to an untrusted network
B. A zone where no firewalls are active
C. The internal network segment with the highest security clearance
D. A virtual private network connection

9 Which of the following represents a Physical Security measure?

A. Configuring a firewall
B. Implementing a biometric fingerprint scanner at the server room door
C. Setting up VLANs
D. Installing an antivirus software

10 The Bell-LaPadula model focuses primarily on which aspect of the CIA Triad?

A. Confidentiality
B. Integrity
C. Availability
D. Non-repudiation

11 Which firewall policy is considered the safest default stance for server security?

A. Default Allow (Accept all unless explicitly denied)
B. Default Deny (Drop all unless explicitly allowed)
C. Default Forward
D. Default Loopback

12 What is the purpose of a VLAN (Virtual Local Area Network) in securing a network?

A. To increase the speed of the internet connection
B. To physically separate cables for different departments
C. To logically segment a network, reducing broadcast domains and isolating traffic
D. To act as a VPN for remote users

13 Which attack does fail2ban primarily help mitigate on a Linux server?

A. SQL Injection
B. Brute-force attacks on login services
C. Cross-Site Scripting (XSS)
D. Man-in-the-Middle attacks

14 Which access control model relies on labels (e.g., Top Secret, Secret, Unclassified) assigned to subjects and objects?

A. Discretionary Access Control (DAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Attribute-Based Access Control (ABAC)

15 When configuring SSH for a hardened server, which of the following is a recommended practice?

A. Enable root login
B. Use the default port 22 without changes
C. Disable password authentication and use key-based authentication
D. Allow empty passwords

16 What is the primary goal of the Biba Integrity Model?

A. To prevent unauthorized disclosure of information
B. To prevent unauthorized modification of information
C. To ensure services are available 99.9% of the time
D. To encrypt data in transit

17 A HIDS (Host-based Intrusion Detection System) differs from a NIDS (Network-based IDS) because it:

A. Monitors traffic at the firewall level only
B. Is installed on individual servers to monitor internal logs and file integrity
C. Can only detect viruses
D. Runs on a dedicated appliance at the network perimeter

18 Which protocol is used to secure HTTP traffic using SSL/TLS?

A. SFTP
B. HTTPS
C. SSH
D. IPsec

19 What is a Mantrap in the context of physical security?

A. A honeypot software designed to trap hackers
B. A small room with two doors where the first must close before the second opens
C. A firewall rule that captures specific packets
D. A type of biometric lock

20 Which of the following is an example of Discretionary Access Control (DAC)?

A. A user setting 'Read' permission for their colleague on a file they own
B. The system administrator assigning a 'Manager' role to a user
C. The OS denying access because the user lacks 'Top Secret' clearance
D. A firewall blocking traffic based on IP address

21 Which IPsec mode encrypts the entire original IP packet and wraps it in a new IP packet?

A. Transport Mode
B. Tunnel Mode
C. Stateful Mode
D. Promiscuous Mode

22 To secure data in transit between a server and a client, which mathematical concept serves as the foundation for Public Key Infrastructure (PKI)?

A. Symmetric Encryption
B. Asymmetric Encryption
C. Hashing
D. Bitwise Operations

23 What is the purpose of Network Address Translation (NAT) in a virtual network context?

A. To scan for viruses
B. To map private IP addresses to a public IP address
C. To encrypt data
D. To store log files

24 Which of the following is considered a 'Strong' password policy requirement?

A. Minimum 4 characters, numbers only
B. Minimum 12 characters, mix of uppercase, lowercase, numbers, and symbols
C. No expiration date
D. Allowed reuse of the last 3 passwords

25 The Clark-Wilson security model is primarily concerned with:

A. Military confidentiality
B. Commercial data integrity and separation of duties
C. Network availability
D. Physical access control

26 What is a Honeypot?

A. A sweet-sounding alarm for IDS
B. A decoy system configured to be attractive to attackers to study their behavior
C. A password manager
D. A type of firewall for email

27 In firewall configuration, what does an Application Layer Gateway (Proxy) do?

A. Filters packets based solely on IP and Port
B. Inspects the payload of the packet to understand the application protocol (e.g., HTTP, FTP)
C. Routes traffic without inspection
D. Encrypts all traffic

28 Which tool is commonly used on Linux systems to configure the kernel's firewall (netfilter)?

A. Apache
B. iptables
C. MySQL
D. Postfix

29 What is the risk of leaving unused ports open on a server?

A. It slows down the server performance significantly
B. It increases the attack surface, providing more potential entry points for attackers
C. It causes IP conflicts
D. It drains the CMOS battery

30 Which term describes the process of regularly applying updates to software and operating systems to fix security vulnerabilities?

A. Patch Management
B. Log Rotation
C. Port Forwarding
D. Defragmentation

31 In the context of IDS, what is a False Positive?

A. When an attack is missed by the system
B. When benign (harmless) traffic is flagged as a threat
C. When the system successfully blocks an attack
D. When the system fails to start

32 What is the main benefit of Network Segmentation?

A. It allows all users to access all data
B. It contains a security breach to a specific subnet, preventing lateral movement
C. It reduces the need for firewalls
D. It automatically updates server software

33 Which file transfer protocol should be used to ensure data is encrypted during upload/download?

A. TFTP
B. FTP
C. SFTP
D. Telnet

34 Which of the following describes a VPN (Virtual Private Network)?

A. A public network accessible by anyone
B. A secure tunnel established over a public network to connect remote users or sites
C. A physical cable connecting two servers
D. A virus protection software

35 In physical security, what is the purpose of a Faraday Cage?

A. To prevent fire from spreading
B. To block electromagnetic fields and prevent wireless signal leakage
C. To cool the server room
D. To detect motion in the room

36 Which command-line tool is often used to check which ports are currently listening on a server?

A. netstat
B. ping
C. traceroute
D. whoami

37 What is Banner Grabbing?

A. Taking a screenshot of the desktop
B. A technique used by attackers to determine the software and version running on a server
C. Physically stealing a server
D. Copying the login banner text

38 When implementing virtual networks, what is the function of a Hypervisor?

A. It acts as a physical router
B. It creates and runs virtual machines (VMs) and manages their access to physical hardware
C. It serves as a web browser
D. It is a type of malware

39 Which of the following is an Environmental Control for physical security?

A. Firewall Rules
B. HVAC systems maintaining optimal temperature and humidity
C. Password Complexity
D. Anti-malware software

40 In the context of Access Control Lists (ACLs), what does an Implicit Deny mean?

A. Users are denied if they don't have a password
B. If a condition is not explicitly met by an Allow rule, the request is automatically rejected
C. The system denies access only during the night
D. Administrators are denied access

41 What is Snort?

A. A popular open-source Network Intrusion Detection/Prevention System (NIDS/NIPS)
B. A password cracking tool
C. A Linux distribution
D. A physical lock mechanism

42 To prevent 'Man-in-the-Middle' attacks on a local network, which security feature can be implemented on switches?

A. DHCP Snooping and ARP Inspection
B. Disabling the power switch
C. Using Hubs instead of Switches
D. Open WiFi

43 What is the primary difference between Authentication and Authorization?

A. They are the same thing
B. Authentication verifies who you are; Authorization determines what you can do
C. Authentication determines permissions; Authorization verifies identity
D. Authentication is for physical entry; Authorization is for digital entry

44 Which algorithm is commonly used for ensuring Data Integrity via hashing?

A. RSA
B. AES
C. SHA-256
D. Diffie-Hellman

45 If a server is placed in a locked rack, which type of security is being implemented?

A. Logical Security
B. Physical Security
C. Network Security
D. Cyber Security

46 What is a Zero Day vulnerability?

A. A vulnerability that has been known for 0 days (just discovered) and has no patch
B. A vulnerability that is 0 days away from being fixed
C. A virus that deletes data in 0 days
D. A firewall rule

47 Which component of a virtual network allows VMs to communicate with each other on the same physical host without traffic leaving the host?

A. Virtual Switch (vSwitch)
B. Physical Router
C. External Modem
D. DNS Server

48 In the context of server hardening, what is Service Minimization?

A. Buying the smallest server possible
B. Running only the services and daemons absolutely necessary for the system's function
C. Minimizing the window size of applications
D. Reducing the internet speed

49 Which logical access control method uses Access Control Lists (ACLs) attached to specific objects?

A. Role-Based Access Control (RBAC)
B. Discretionary Access Control (DAC)
C. Mandatory Access Control (MAC)
D. Biometric Control

50 Why is logging critical for server security?

A. It increases disk space usage
B. It provides an audit trail to investigate incidents and detect anomalies
C. It speeds up the CPU
D. It automatically blocks hackers