3.7.3 Network Security Quiz Answers | Module 3 Full 100% 2023

This is 3.7.3 Network Security Quiz Answers Full 100% in 2023 for Module 3: Network Support in the course Network Support and Security releases on SkillsForAll. All questions that have been answered are the best choice for practice to get 100%.

  1. What is the level of need for data integrity in an e-commerce organization?

    • low
    • mid
    • high
    • critical
      Explanation & Hints:

      The importance of data integrity varies based on how an organization uses the data:

      • Critical level of need: Data integrity might be a matter of life or death in a healthcare organization. For example, prescription information must be accurate. Therefore, all data is continuously validated, tested, and verified.
      • High need: In an e-commerce or analytics-based organization, transactions and customer accounts must be accurate. All data is validated and verified at frequent intervals.
      • Mid-level of need: Online sales and search engines collect data that has been publicly posted. Little verification is performed, and data is not completely trustworthy.
      • Low level of need: Blogs, forums, and personal pages on social media are powered by public opinion and open contribution. Data may not be verified at all, and there is a low level of trust in the content.
  2. Which three solutions are examples of logical access control? (Choose three.)

    • firewall
    • access control list
    • biometrics
    • fence
    • laptop lock
    • swipe card
      Explanation & Hints:

  3. Which host-based solution is installed on a device or server to monitor system calls and file system access to detect malicious requests?

    • host-based firewall
    • host intrusion detection system
    • host encryption
    • data loss prevention
      Explanation & Hints:

  4. What is the purpose of using the Windows BitLocker To Go tool?

    • to encrypt removable drives
    • to reformat removable drives
    • to manage partitions on removable drives
    • to manage safely inserting and removing of removable drives
      Explanation & Hints:

  5. Which Apple macOS security feature prevents the execution of malware through signature-based malware detection?

    • XProtect
    • MRT
    • Gatekeeper
    • Security-focured hardware
      Explanation & Hints:

  6. Which type of firewalls will inspect and filter network traffic based on OSI model Layer 3 and 4 information?

    • packet filtering
    • stateful firewall
    • application gateway firewall
    • next generation firewall
      Explanation & Hints:

  7. What is the benefit of using a stateful firewall in a network?

    • It can prevent application layer attacks because it examines the actual contents of the HTTP connection.
    • It analyzes traffic at OSI Layer 4 and Layer 5.
    • It filters IP traffic between bridged interfaces at OSI layer 7.
    • It strengthens packet filtering by providing more stringent control over security.
      Explanation & Hints:

      There are several benefits to using a stateful firewall in a network:

      • Stateful firewalls are often used as a primary means of defense by filtering unwanted, unnecessary, or undesirable traffic.
      • Stateful firewalls strengthen packet filtering by providing more stringent control over security.
      • Stateful firewalls improve performance over packet filters or proxy servers.
      • Stateful firewalls defend against spoofing and DoS attacks by determining whether packets belong to an existing connection or are from an unauthorized source.
      • Stateful firewalls provide more log information than packet-filtering firewalls.
  8. Which statement describes a TCP Wrappers host-based firewall?

    • It is a firewall that uses a profile-based approach to firewall functionality.
    • It is an application that allows Linux system administrators to configure network access rules that are part of the Linux kernel Netfilter modules.
    • It is a firewall application that uses a simple virtual machine in the Linux kernel.
    • It is a rule-based access control and logging system for Linux.
      Explanation & Hints:

  9. Which authentication method uses AES for encryption?

    • WEP
    • WPA
    • WPA2
    • WPA3-Enterprise
      Explanation & Hints:

  10. Which LAN authentication method is recommended for home or small office networks?

    • WPA Personal
    • WPA Enterprise
    • WPA2 Personal
    • WPA2 Enterprise
      Explanation & Hints:

  11. Which authentication method in WPA3 improves the onboarding process for IoT devices to join wireless network?

    • DPP
    • WPS
    • CCMP
    • EAP
      Explanation & Hints:

  12. What statement describes the principle of confidentiality in the CIA information security triad?

    • Authorized users must have uninterrupted access to important resources and data.
    • Data must be protected from unauthorized alteration.
    • Only authorized individuals, entities, or processes can access sensitive information.
    • Redundant services, gateways, and links must be implemented.
      Explanation & Hints:

  13. What statement describes the principle of integrity in the CIA information security triad?

    • Authorized users must have uninterrupted access to important resources and data.
    • Data must be protected from unauthorized alteration.
    • Only authorized individuals, entities, or processes can access sensitive information.
    • Redundant services, gateways, and links must be implemented.
      Explanation & Hints:

  14. Which is an example of a physical characteristic?

    • ear features
    • gestures
    • voice
    • gait
      Explanation & Hints:

      There are two types of biometric identifiers:

      • Physical characteristics: fingerprints, DNA, face, hands, retina, or ear features.
      • Behavioral characteristics: behavior patterns such as gestures, voice, gait, or typing rhythm.
  15. Which security principle applies to the first dimension of the cybersecurity cube of the CIA triad?

    • Accountability
    • Availability
    • Policy
    • Technology
      Explanation & Hints:

5 1 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments