Top 20 Cyber Security Quiz Questions With Answers

Top 20 Cyber Security Quiz Questions With Answers

Welcome to our comprehensive guide on “Cyber Security,” where we delve into the crucial realm of safeguarding our digital world. In this blog, we aim to demystify the complexities of cybersecurity, making it accessible to all.

Whether you’re a novice navigating the online landscape or a seasoned professional looking to enhance your digital defenses, our blog has something for you. We’ll explore the fundamentals of cybersecurity, shedding light on common threats like phishing, malware, and data breaches.

So, let’s move on to the quiz questions with answers.

  1. Q1. Wen is a network engineer. He would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology is best to use?

    Select one:
    a. Network access control (NAC)
    b. Virtual LAN (VLAN)
    c. Virtual private network (VPN)
    d. Transport Layer Security (TLS)

  2. Q2. Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) Reference Model is she working?

    Select one:
    a. Application
    b. Presentation
    c. Session
    d. Physical

  3. Q3. True or False? A firewall can be used to segment a network.

    Select one:
    a. True
    b. False

  4. Q4. True or False? The Physical Layer of the Open Systems Interconnection (OSI) Reference Model must translate the binary ones and zeros of computer language into the language of the transport medium.

    Select one:
    a. True
    b. False

  5. Q5. True or False? A unified threat management (UTM) device can provide content inspection, where some or all network packet content is inspected to determine whether the packet should be allowed to pass.

    Select one:
    a. True
    b. False

  6. Q6. Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use?

    Select one:
    a. Network access control (NAC)
    b. Virtual LAN (VLAN)
    c. Virtual private network (VPN)
    d. A demilitarized zone (DMZ)

  7. Q7. Because network computers or devices may host several services, programs need a way to tell one service from another. To differentiate services running on a device, networking protocols use a(n) which is a short number that tells a receiving device where to send messages it receives.

    Select one:
    a. ping
    b. Internet Protocol (IP) address
    c. Media Access Control (MAC) address
    d. network port

  8. Q8. Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?

    Select one:
    a. Firewall
    b. Unified threat management (UTM)
    c. Router
    d. VPN concentrator

  9. Q9. Hakim is a network engineer. He is configuring a virtual private network (VPN) technology that is available only for computers running the Windows operating system. Which technology is it?

    Select one:
    a. Point-to-Point Tunneling Protocol (PPTP)
    b. Secure Socket Tunneling Protocol (SSTP)
    c. Internet Protocol Security (IPSec)
    d. OpenVPN

  10. Q10. True or False? To create the most secure network, configure the firewall to allow all messages except the ones that are explicitly denied.

    Select one:
    a. True
    b. False

  11. Q11. Miriam is a network administrator. She would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?

    Select one:
    a. Remote Authentication Dial-In User Service (RADIUS)
    b. Lightweight Extensible Authentication Protocol (LEAP)
    c. Captive portal
    d. Protected Extensible Authentication Protocol (PEAP)

  12. Q12. True or False? The Data Link Layer of the Open Systems Interconnection (OSI) Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).

    Select one:
    a. True
    b. False

  13. Q13. Carl recently joined a new organization. He noticed that the firewall technology used by the firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

    Select one:
    a. Packet filtering
    b. Application proxying
    c. Stateful inspection
    d. Network address translation

  14. Q14. Carrie is a network technician developing the Internet Protocol (IP) addressing roadmap for her company. While IP version 4 (IPv4) has been the standard for decades, IP version 6 (IPv6) can provide a much greater number of unique IP addresses. Which addressing system should she designate for primary use on her roadmap and why?

    Select one:
    a. IPv6 is rapidly replacing IPv4 worldwide. She should make IPv6 the primary addressing scheme in her roadmap.
    b. IPv6 is only slowly being adopted. She should make IPv4 the primary addressing scheme in her roadmap until IPv6 is more widely adopted.
    c. Few commercial businesses still use IPv4. She should feature IPv6 strongly in her roadmap rather than have her company fall behind technologically.
    d. There will be adequate IPv4 addresses available well into the future. She should make IPv4 the primary addressing scheme.

  15. Q15. Hajar is investigating a denial of service attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?

    Select one:
    a. Teardrop
    b. Land
    c. Smurf
    d. Cross-site scripting (XSS)

  16. Q16. What network port number is used for unencrypted web-based communication by default?

    Select one:
    a. 80
    b. 143
    c. 443
    d. 3389

  17. Q17. What type of firewall security feature limits the volume of traffic from individual hosts?

    Select one:
    a. Loop protection
    b. Network segmentation
    c. Stateful inspection
    d. Flood guard

  18. Q18. Arturo would like to connect a fibre channel storage device to systems over a standard data network. What protocol should he use?

    Select one:
    a. Internet Small Computer System Interface (iSCSI)
    b. Fibre Channel (FC)
    c. Fibre Channel over Ethernet (FCoE)
    d. Secure Shell (SSH)

  19. Q19. True or False? A border router can provide enhanced features to internal networks and help keep subnet traffic separate.

    Select one:
    a. True
    b. False

  20. Q20. True or False? Internet Protocol version 4 (IPv4) uses the Internet Control Message Protocol (ICMP) within a network to automatically assign an Internet Protocol (IP) address to each computer.

    Select one:
    a. True
    b. False

Answers: Cyber Security Quiz Questions

  1. b
  2. d
  3. a
  4. a
  5. a
  6. a
  7. d
  8. d
  9. b
  10. b
  11. c
  12. a
  13. b
  14. b
  15. c
  16. a
  17. d
  18. c
  19. b
  20. b