Cyber-Security-Quiz-3

15+ Cyber Security Quiz Questions With Answer

Cyber security is a wide term that encompasses so many different aspects of the modern world. Computer security, network security, and data security are just a few things that are cyber security-related. Cyber security is the protection of digital devices and computers from malicious attacks and is a growing field. However, it is a field that requires many professionals that know how to keep the users safe and prevent them from putting themselves in a compromising position. If you want an in-depth understanding of cyber security, you need to know the quiz questions. In this blog, we will introduce cyber security quiz questions with answers.

Let’s get started with Cyber Security questions and answers.

A logical means of implementing an IPSec is in a firewall.

Select one:
True
False

One disadvantage of a packet filtering firewall is its simplicity.

Select one:
True
False

A _ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security.

Select one:
a. proxy
b. UTM
c. VPN
d. stateful inspection firewall

The countermeasure to tiny fragment attacks is to discard packets with an inside source address if the packet arrives on an external interface.

Select one:
True
False

__ looks for deviation from standards set forth in RFCs.

Select one:
a. Statistical anomaly
b. Protocol anomaly
c. Pattern matching
d. Traffic anomaly

The firewall may be a single computer system or a set of two or more systems that cooperate to perform the firewall function.

Select one:
True
False

An example of a circuit-level gateway implementation is the __ package.

Select one:
a. application-level
b. SOCKS
c. SMTP
d. stateful inspection

_ control determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.

Select one:
a. Behavior
b. User
c. Direction
d. Service

The _ attack is designed to circumvent filtering rules that depend on TCP header information.

Select one:
a. tiny fragment
b. address spoofing
c. source routing
d. bastion host

_ control controls how particular services are used.

Select one:
a. Service
b. Behavior
c. User
d. Direction

Typical for SOHO applications, a __ is a single router between internal and external networks with stateless or full packet filtering.

Select one:
a. single bastion T
b. double bastion inline
c. screening router
d. host-resident firewall

The primary role of the personal firewall is to deny unauthorized remote access to the computer.

Select one:
True
False

A DMZ is one of the internal firewalls protecting the bulk of the enterprise network.

Select one:
True
False

A packet filtering firewall is typically configured to filter packets going in both directions.

Select one:
True
False

Identified as a critical strong point in the network’s security, the ……….. serves as a platform for an application-level or circuit-level gateway.

Fill the blank with an appropriate answer

A …………. makes use of both signature and anomaly detection techniques to identify attacks.

Fill the blank with an appropriate answer

A ………. firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the spot.

Fill the blank with an appropriate answer

Answers

  1. True
  2. False
  3. c
  4. False
  5. b
  6. True
  7. b
  8. c
  9. a
  10. b
  11. c
  12. True
  13. False
  14. True
  15. bastion host
  16. intrusion prevention
  17. personal