Network Security Engineer Quiz Total 10 Questions Please enter your email: 1. How does a ‘honeypot’ enhance network security? By filtering spam and malicious email content By increasing the network’s bandwidth and speed By serving as a decoy to attract and study attacks By encrypting all data within the network 2. What steps should be taken to secure a network upon discovering an active ‘man-in-the-middle’ (MitM) attack? Ignore the attack as MitM attacks are difficult to prevent and focus on damage control Shut down the entire network to prevent further data interception Identify and isolate compromised channels, update encryption protocols, educate users, and strengthen controls Focus solely on legal action against the suspected attackers without taking technical measures 3. What role does ‘IPSec’ play in network security? Provides a secure channel for IP communications Monitors network traffic for malicious activities Manages IP addresses on a network Encrypts email communications 4. In what ways do ‘Advanced Persistent Threats’ (APT) pose a challenge to network security, and how can they be addressed? APTs can be completely prevented by using firewalls They primarily affect the physical security of network devices APTs are easily detected by standard antivirus software, posing little challenge Targeted, stealthy, and long-term presence; addressed with threat intelligence and monitoring 5. How does ‘Secure Socket Layer’ (SSL) and ‘Transport Layer Security’ (TLS) enhance web security? By encrypting data transmissions between browsers and servers SSL and TLS are outdated protocols that have been replaced by IPSec They scan and filter malicious content from web traffic By increasing the speed of web page loading 6. A network security scan reveals several vulnerabilities in the company’s web application. What is the most effective sequence of actions to remediate these vulnerabilities? Prioritize based on risk, patch or mitigate, review code, and implement regular training and scans Turn off the web application until a security expert can be consulted Patch all vulnerabilities at once during the next scheduled maintenance window Inform customers about the vulnerabilities and assure them that it’s under control 7. A company is planning to allow employees to use their personal devices for work purposes (BYOD). What security measures would you recommend to protect the network? Ban the use of personal devices altogether to avoid security risks Implement BYOD policy, VPNs, endpoint security, compliance requirements, and network segmentation Recommend that employees use personal email to reduce the load on corporate servers Only allow devices from certain manufacturers known for their security 8. How can network segmentation help in containing ransomware spread within an organization? Network segmentation has no impact on ransomware or its spread Ransomware cannot cross network segments due to encryption protocols Limits ransomware’s ability to propagate by dividing the network into controlled segments Segmentation increases the ransomware spread as it targets multiple segments individually 9. In what way do Advanced Persistent Threats (APTs) challenge conventional network defenses? Use sophisticated methods to remain undetected, challenging quick-reaction defenses APTs can be completely negated by frequent password changes They primarily affect physical network components, not software or data APTs are easily mitigated with standard antivirus software 10. What is the main function of a firewall in network security? To encrypt data transmissions over the internet To monitor and control network traffic based on security rules To physically secure network hardware from unauthorized access To increase the speed of network communications Loading … Question 1 of 10