1Which of the following firewall types operates by inspecting the state of active connections and using that information to determine which network packets to allow through?
A.Stateless Packet Filtering
B.Stateful Inspection
C.Circuit-Level Gateway
D.Packet Sniffer
Correct Answer: Stateful Inspection
Explanation:Stateful Inspection firewalls monitor the state of active connections and use this information to determine which network packets to allow through, unlike stateless filters that examine packets in isolation.
Incorrect! Try again.
2In the context of server hardening, what is the primary purpose of the Principle of Least Privilege?
A.Ensuring all users have root access to perform tasks efficiently
B.Granting users only the permissions necessary to perform their job functions
C.Encrypting all data at rest and in transit
D.Disabling all network ports on the server
Correct Answer: Granting users only the permissions necessary to perform their job functions
Explanation:The Principle of Least Privilege dictates that a subject should be given only those privileges needed for it to complete its task, minimizing the potential impact if an account is compromised.
Incorrect! Try again.
3Which security protocol is the standard for encrypted remote login sessions, replacing Telnet?
A.FTP
B.HTTP
C.SSH
D.SNMP
Correct Answer: SSH
Explanation:SSH (Secure Shell) provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server, primarily used for remote command-line login.
Incorrect! Try again.
4What is the primary function of an Intrusion Detection System (IDS)?
A.To block all incoming traffic from specific IP addresses
B.To monitor network or system activities for malicious activities or policy violations
C.To encrypt data stored on the hard drive
D.To route network traffic between different subnets
Correct Answer: To monitor network or system activities for malicious activities or policy violations
Explanation:An IDS monitors traffic and system logs to detect suspicious activity and alerts administrators. Unlike an IPS (Prevention System), a standard IDS primarily detects and alerts rather than actively blocking.
Incorrect! Try again.
5Which logical access control model assigns permissions based on the user's job function or title within an organization?
A.Discretionary Access Control (DAC)
B.Mandatory Access Control (MAC)
C.Role-Based Access Control (RBAC)
D.Rule-Based Access Control
Correct Answer: Role-Based Access Control (RBAC)
Explanation:RBAC assigns permissions to specific roles (e.g., 'Manager', 'Admin', 'Clerk') rather than directly to individual users, simplifying management in large organizations.
Incorrect! Try again.
6In the CIA Triad of information security, what does Integrity ensure?
A.Data is accessible only to authorized users
B.Data is available when needed
C.Data has not been altered or tampered with by unauthorized entities
D.Data is backed up regularly
Correct Answer: Data has not been altered or tampered with by unauthorized entities
Explanation:Integrity ensures the accuracy and completeness of data over its entire lifecycle, guaranteeing that it has not been modified in an unauthorized manner.
Incorrect! Try again.
7Which command is used in Linux to change the read, write, and execute permissions of a file, serving as a basic Logical Access Control method?
A.chown
B.chmod
C.grep
D.iptables
Correct Answer: chmod
Explanation:The chmod (change mode) command is used to set file permissions (read, write, execute) for the owner, group, and others in Unix-like operating systems.
Incorrect! Try again.
8What is a DMZ (Demilitarized Zone) in network security?
A.A physical sub-network that contains and exposes an organization's external-facing services to an untrusted network
B.A zone where no firewalls are active
C.The internal network segment with the highest security clearance
D.A virtual private network connection
Correct Answer: A physical sub-network that contains and exposes an organization's external-facing services to an untrusted network
Explanation:A DMZ acts as a buffer zone between the internal trusted network and the untrusted internet, hosting public-facing servers like web and email servers to protect the internal network.
Incorrect! Try again.
9Which of the following represents a Physical Security measure?
A.Configuring a firewall
B.Implementing a biometric fingerprint scanner at the server room door
C.Setting up VLANs
D.Installing an antivirus software
Correct Answer: Implementing a biometric fingerprint scanner at the server room door
Explanation:Biometric scanners control physical access to sensitive areas, which is a component of physical security, whereas firewalls and VLANs are logical/network controls.
Incorrect! Try again.
10The Bell-LaPadula model focuses primarily on which aspect of the CIA Triad?
A.Confidentiality
B.Integrity
C.Availability
D.Non-repudiation
Correct Answer: Confidentiality
Explanation:The Bell-LaPadula model is a state machine model used for enforcing access control in government and military applications. It focuses on Confidentiality using the 'No Read Up, No Write Down' rules.
Incorrect! Try again.
11Which firewall policy is considered the safest default stance for server security?
A.Default Allow (Accept all unless explicitly denied)
B.Default Deny (Drop all unless explicitly allowed)
C.Default Forward
D.Default Loopback
Correct Answer: Default Deny (Drop all unless explicitly allowed)
Explanation:A Default Deny policy ensures that only traffic specifically authorized is allowed to pass, significantly reducing the attack surface compared to a Default Allow policy.
Incorrect! Try again.
12What is the purpose of a VLAN (Virtual Local Area Network) in securing a network?
A.To increase the speed of the internet connection
B.To physically separate cables for different departments
C.To logically segment a network, reducing broadcast domains and isolating traffic
D.To act as a VPN for remote users
Correct Answer: To logically segment a network, reducing broadcast domains and isolating traffic
Explanation:VLANs allow network administrators to group hosts together even if they are not on the same network switch, improving security by isolating sensitive traffic from general traffic.
Incorrect! Try again.
13Which attack does fail2ban primarily help mitigate on a Linux server?
A.SQL Injection
B.Brute-force attacks on login services
C.Cross-Site Scripting (XSS)
D.Man-in-the-Middle attacks
Correct Answer: Brute-force attacks on login services
Explanation:fail2ban scans log files (like /var/log/auth.log) and bans IPs that show malicious signs, such as too many password failures, effectively mitigating brute-force attacks.
Incorrect! Try again.
14Which access control model relies on labels (e.g., Top Secret, Secret, Unclassified) assigned to subjects and objects?
A.Discretionary Access Control (DAC)
B.Role-Based Access Control (RBAC)
C.Mandatory Access Control (MAC)
D.Attribute-Based Access Control (ABAC)
Correct Answer: Mandatory Access Control (MAC)
Explanation:MAC uses security labels for information and clearance levels for users. The operating system constrains the ability of a subject to access or perform operations on an object based on these labels.
Incorrect! Try again.
15When configuring SSH for a hardened server, which of the following is a recommended practice?
A.Enable root login
B.Use the default port 22 without changes
C.Disable password authentication and use key-based authentication
D.Allow empty passwords
Correct Answer: Disable password authentication and use key-based authentication
Explanation:Using SSH keys is significantly more secure than passwords, which can be guessed or brute-forced. Disabling password auth ensures only users with the private key can log in.
Incorrect! Try again.
16What is the primary goal of the Biba Integrity Model?
A.To prevent unauthorized disclosure of information
B.To prevent unauthorized modification of information
C.To ensure services are available 99.9% of the time
D.To encrypt data in transit
Correct Answer: To prevent unauthorized modification of information
Explanation:The Biba model focuses on Integrity. Its rules ('No Read Down, No Write Up') are designed to prevent data corruption by ensuring lower integrity subjects cannot write to higher integrity objects.
Incorrect! Try again.
17A HIDS (Host-based Intrusion Detection System) differs from a NIDS (Network-based IDS) because it:
A.Monitors traffic at the firewall level only
B.Is installed on individual servers to monitor internal logs and file integrity
C.Can only detect viruses
D.Runs on a dedicated appliance at the network perimeter
Correct Answer: Is installed on individual servers to monitor internal logs and file integrity
Explanation:HIDS runs on the host (server) itself, monitoring system files, log files, and kernel activity, whereas NIDS monitors network traffic packets traversing the network segment.
Incorrect! Try again.
18Which protocol is used to secure HTTP traffic using SSL/TLS?
A.SFTP
B.HTTPS
C.SSH
D.IPsec
Correct Answer: HTTPS
Explanation:HTTPS (HyperText Transfer Protocol Secure) uses SSL/TLS to encrypt communication between a web browser and a web server.
Incorrect! Try again.
19What is a Mantrap in the context of physical security?
A.A honeypot software designed to trap hackers
B.A small room with two doors where the first must close before the second opens
C.A firewall rule that captures specific packets
D.A type of biometric lock
Correct Answer: A small room with two doors where the first must close before the second opens
Explanation:A mantrap is a physical security control used to prevent tailgating. It consists of a small space with two interlocking doors; one must close and lock before the other can be opened.
Incorrect! Try again.
20Which of the following is an example of Discretionary Access Control (DAC)?
A.A user setting 'Read' permission for their colleague on a file they own
B.The system administrator assigning a 'Manager' role to a user
C.The OS denying access because the user lacks 'Top Secret' clearance
D.A firewall blocking traffic based on IP address
Correct Answer: A user setting 'Read' permission for their colleague on a file they own
Explanation:In DAC, the data owner has the discretion to grant or deny access to others. Standard Unix/Windows file permissions are examples of DAC.
Incorrect! Try again.
21Which IPsec mode encrypts the entire original IP packet and wraps it in a new IP packet?
A.Transport Mode
B.Tunnel Mode
C.Stateful Mode
D.Promiscuous Mode
Correct Answer: Tunnel Mode
Explanation:Tunnel Mode encrypts the entire original packet (header and payload) and encapsulates it in a new IP packet, typically used for VPNs between gateways.
Incorrect! Try again.
22To secure data in transit between a server and a client, which mathematical concept serves as the foundation for Public Key Infrastructure (PKI)?
A.Symmetric Encryption
B.Asymmetric Encryption
C.Hashing
D.Bitwise Operations
Correct Answer: Asymmetric Encryption
Explanation:Asymmetric Encryption (using a public and private key pair) is the foundation of PKI/SSL/TLS, allowing secure key exchange and authentication.
Incorrect! Try again.
23What is the purpose of Network Address Translation (NAT) in a virtual network context?
A.To scan for viruses
B.To map private IP addresses to a public IP address
C.To encrypt data
D.To store log files
Correct Answer: To map private IP addresses to a public IP address
Explanation:NAT allows multiple devices on a private network to share a single public IP address, masking the internal network structure from the outside world.
Incorrect! Try again.
24Which of the following is considered a 'Strong' password policy requirement?
A.Minimum 4 characters, numbers only
B.Minimum 12 characters, mix of uppercase, lowercase, numbers, and symbols
C.No expiration date
D.Allowed reuse of the last 3 passwords
Correct Answer: Minimum 12 characters, mix of uppercase, lowercase, numbers, and symbols
Explanation:Strong passwords require complexity (character variety) and length to resist brute-force and rainbow table attacks.
Incorrect! Try again.
25The Clark-Wilson security model is primarily concerned with:
A.Military confidentiality
B.Commercial data integrity and separation of duties
C.Network availability
D.Physical access control
Correct Answer: Commercial data integrity and separation of duties
Explanation:Clark-Wilson focuses on integrity in commercial environments. It uses the concept of 'Well-formed Transactions' and 'Separation of Duties' to prevent fraud and errors.
Incorrect! Try again.
26What is a Honeypot?
A.A sweet-sounding alarm for IDS
B.A decoy system configured to be attractive to attackers to study their behavior
C.A password manager
D.A type of firewall for email
Correct Answer: A decoy system configured to be attractive to attackers to study their behavior
Explanation:A Honeypot is a trap set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. It mimics a target for hackers.
Incorrect! Try again.
27In firewall configuration, what does an Application Layer Gateway (Proxy) do?
A.Filters packets based solely on IP and Port
B.Inspects the payload of the packet to understand the application protocol (e.g., HTTP, FTP)
C.Routes traffic without inspection
D.Encrypts all traffic
Correct Answer: Inspects the payload of the packet to understand the application protocol (e.g., HTTP, FTP)
Explanation:Application Layer Firewalls (Proxies) operate at Layer 7 of the OSI model and can inspect the actual content of the traffic (e.g., blocking specific URLs or SQL injection commands).
Incorrect! Try again.
28Which tool is commonly used on Linux systems to configure the kernel's firewall (netfilter)?
A.Apache
B.iptables
C.MySQL
D.Postfix
Correct Answer: iptables
Explanation:iptables is the user-space utility program that allows a system administrator to configure the tables provided by the Linux kernel firewall.
Incorrect! Try again.
29What is the risk of leaving unused ports open on a server?
A.It slows down the server performance significantly
B.It increases the attack surface, providing more potential entry points for attackers
C.It causes IP conflicts
D.It drains the CMOS battery
Correct Answer: It increases the attack surface, providing more potential entry points for attackers
Explanation:Every open port represents a service listening for connections. If the service is unneeded or vulnerable, it provides an attack vector. Closing unused ports is a key hardening technique.
Incorrect! Try again.
30Which term describes the process of regularly applying updates to software and operating systems to fix security vulnerabilities?
A.Patch Management
B.Log Rotation
C.Port Forwarding
D.Defragmentation
Correct Answer: Patch Management
Explanation:Patch Management involves acquiring, testing, and installing multiple patches (code changes) to an administered computer system to fix bugs and security holes.
Incorrect! Try again.
31In the context of IDS, what is a False Positive?
A.When an attack is missed by the system
B.When benign (harmless) traffic is flagged as a threat
C.When the system successfully blocks an attack
D.When the system fails to start
Correct Answer: When benign (harmless) traffic is flagged as a threat
Explanation:A False Positive occurs when the IDS incorrectly identifies legitimate activity as malicious, potentially leading to blocked legitimate traffic or alert fatigue.
Incorrect! Try again.
32What is the main benefit of Network Segmentation?
A.It allows all users to access all data
B.It contains a security breach to a specific subnet, preventing lateral movement
C.It reduces the need for firewalls
D.It automatically updates server software
Correct Answer: It contains a security breach to a specific subnet, preventing lateral movement
Explanation:Segmentation divides a network into smaller parts. If an attacker compromises one segment, they cannot easily access the rest of the network, limiting the 'blast radius' of the attack.
Incorrect! Try again.
33Which file transfer protocol should be used to ensure data is encrypted during upload/download?
A.TFTP
B.FTP
C.SFTP
D.Telnet
Correct Answer: SFTP
Explanation:SFTP (SSH File Transfer Protocol) uses SSH to encrypt both commands and data, whereas FTP sends credentials and data in cleartext.
Incorrect! Try again.
34Which of the following describes a VPN (Virtual Private Network)?
A.A public network accessible by anyone
B.A secure tunnel established over a public network to connect remote users or sites
C.A physical cable connecting two servers
D.A virus protection software
Correct Answer: A secure tunnel established over a public network to connect remote users or sites
Explanation:A VPN extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Incorrect! Try again.
35In physical security, what is the purpose of a Faraday Cage?
A.To prevent fire from spreading
B.To block electromagnetic fields and prevent wireless signal leakage
C.To cool the server room
D.To detect motion in the room
Correct Answer: To block electromagnetic fields and prevent wireless signal leakage
Explanation:A Faraday Cage is an enclosure used to block electromagnetic fields. In security, it prevents electronic eavesdropping or external signals from interfering with sensitive equipment.
Incorrect! Try again.
36Which command-line tool is often used to check which ports are currently listening on a server?
A.netstat
B.ping
C.traceroute
D.whoami
Correct Answer: netstat
Explanation:netstat (or the newer ss) displays network connections, routing tables, and interface statistics, showing which ports are in the LISTEN state.
Incorrect! Try again.
37What is Banner Grabbing?
A.Taking a screenshot of the desktop
B.A technique used by attackers to determine the software and version running on a server
C.Physically stealing a server
D.Copying the login banner text
Correct Answer: A technique used by attackers to determine the software and version running on a server
Explanation:Attackers connect to a port and look at the welcome message (banner) to identify the service version (e.g., 'Apache 2.4.1'). Administrators often disable or obfuscate banners to hide this info.
Incorrect! Try again.
38When implementing virtual networks, what is the function of a Hypervisor?
A.It acts as a physical router
B.It creates and runs virtual machines (VMs) and manages their access to physical hardware
C.It serves as a web browser
D.It is a type of malware
Correct Answer: It creates and runs virtual machines (VMs) and manages their access to physical hardware
Explanation:A Hypervisor (or VMM) sits between the hardware and the virtual machines, managing resource allocation and isolation between the VMs.
Incorrect! Try again.
39Which of the following is an Environmental Control for physical security?
A.Firewall Rules
B.HVAC systems maintaining optimal temperature and humidity
C.Password Complexity
D.Anti-malware software
Correct Answer: HVAC systems maintaining optimal temperature and humidity
Explanation:Environmental controls protect hardware from physical damage due to heat, humidity, or fire. HVAC systems are critical for maintaining server health.
Incorrect! Try again.
40In the context of Access Control Lists (ACLs), what does an Implicit Deny mean?
A.Users are denied if they don't have a password
B.If a condition is not explicitly met by an Allow rule, the request is automatically rejected
C.The system denies access only during the night
D.Administrators are denied access
Correct Answer: If a condition is not explicitly met by an Allow rule, the request is automatically rejected
Explanation:Most ACLs end with an implicit deny. If traffic or a user doesn't match any specific 'permit' rule, they are denied by default.
Incorrect! Try again.
41What is Snort?
A.A popular open-source Network Intrusion Detection/Prevention System (NIDS/NIPS)
B.A password cracking tool
C.A Linux distribution
D.A physical lock mechanism
Correct Answer: A popular open-source Network Intrusion Detection/Prevention System (NIDS/NIPS)
Explanation:Snort is a widely used open-source IDS/IPS capable of performing real-time traffic analysis and packet logging on IP networks.
Incorrect! Try again.
42To prevent 'Man-in-the-Middle' attacks on a local network, which security feature can be implemented on switches?
A.DHCP Snooping and ARP Inspection
B.Disabling the power switch
C.Using Hubs instead of Switches
D.Open WiFi
Correct Answer: DHCP Snooping and ARP Inspection
Explanation:DHCP Snooping prevents rogue DHCP servers, and Dynamic ARP Inspection prevents ARP poisoning, both common techniques for Man-in-the-Middle attacks on LANs.
Incorrect! Try again.
43What is the primary difference between Authentication and Authorization?
A.They are the same thing
B.Authentication verifies who you are; Authorization determines what you can do
D.Authentication is for physical entry; Authorization is for digital entry
Correct Answer: Authentication verifies who you are; Authorization determines what you can do
Explanation:Authentication is the process of verifying identity (e.g., logging in). Authorization checks if the authenticated user has permission to access a specific resource.
Incorrect! Try again.
44Which algorithm is commonly used for ensuring Data Integrity via hashing?
A.RSA
B.AES
C.SHA-256
D.Diffie-Hellman
Correct Answer: SHA-256
Explanation:SHA-256 (Secure Hash Algorithm) is a cryptographic hash function. Hashing is used to verify integrity; if data changes, the hash changes completely. RSA/AES are for encryption.
Incorrect! Try again.
45If a server is placed in a locked rack, which type of security is being implemented?
A.Logical Security
B.Physical Security
C.Network Security
D.Cyber Security
Correct Answer: Physical Security
Explanation:Restricting access to the actual hardware via locks, racks, and rooms falls under the domain of Physical Security.
Incorrect! Try again.
46What is a Zero Day vulnerability?
A.A vulnerability that has been known for 0 days (just discovered) and has no patch
B.A vulnerability that is 0 days away from being fixed
C.A virus that deletes data in 0 days
D.A firewall rule
Correct Answer: A vulnerability that has been known for 0 days (just discovered) and has no patch
Explanation:A Zero Day exploit attacks a security flaw that the software vendor is unaware of or has not yet patched, making it highly dangerous.
Incorrect! Try again.
47Which component of a virtual network allows VMs to communicate with each other on the same physical host without traffic leaving the host?
A.Virtual Switch (vSwitch)
B.Physical Router
C.External Modem
D.DNS Server
Correct Answer: Virtual Switch (vSwitch)
Explanation:A vSwitch is a software program that allows one virtual machine to communicate with another within the same host, handling traffic internally.
Incorrect! Try again.
48In the context of server hardening, what is Service Minimization?
A.Buying the smallest server possible
B.Running only the services and daemons absolutely necessary for the system's function
C.Minimizing the window size of applications
D.Reducing the internet speed
Correct Answer: Running only the services and daemons absolutely necessary for the system's function
Explanation:Service minimization reduces the attack surface. If a service (like FTP or Telnet) isn't running, it cannot be exploited.
Incorrect! Try again.
49Which logical access control method uses Access Control Lists (ACLs) attached to specific objects?
A.Role-Based Access Control (RBAC)
B.Discretionary Access Control (DAC)
C.Mandatory Access Control (MAC)
D.Biometric Control
Correct Answer: Discretionary Access Control (DAC)
Explanation:DAC implementations (like Windows NTFS or standard Linux permissions) often use ACLs to list which users or groups have access to a specific object.
Incorrect! Try again.
50Why is logging critical for server security?
A.It increases disk space usage
B.It provides an audit trail to investigate incidents and detect anomalies
C.It speeds up the CPU
D.It automatically blocks hackers
Correct Answer: It provides an audit trail to investigate incidents and detect anomalies
Explanation:Logs provide the historical record of what happened on a system. Without logs, it is impossible to perform forensics or understand how a breach occurred.
Incorrect! Try again.
Give Feedback
Help us improve by sharing your thoughts or reporting issues.