Skip to content
3D-LABS
We Are Engineers, Researchers, Designers, Developers and Consultants
Home
Services
Career
Contact
Investors
Home
Services
Career
Contact
Investors
Network Security
Quiz o Clock
What does the acronym "VPN" stand for in network security?
A. Virtual Personal Network
B.Virtual Public Network
C.Virtual Private Network
D. Virtual Private Network
Which protocol is primarily used for secure web browsing?
A. HTTP
B. FTP
C. SSH
D. HTTPS
What is the purpose of a firewall in a network?
A. To connect different networks together
B.To filter incoming and outgoing network traffic
C.To provide an IP address to each device
D. To encrypt data transmissions
Which of the following is an example of a network-based attack?
A. SQL Injection
B. Phishing
C. Man-in-the-Middle (MitM) Attack
D. Keylogging
What does the term "phishing" refer to in network security?
A. A type of malware that spreads through emails
B.An attack that tricks users into providing personal information
C. Unauthorized access to wireless networks
D. A method to block malicious websites
Which protocol is used to encrypt email messages?
A. SMTP
B. SSL/TLS
C.IMAP
D. POP3
What is the primary purpose of the Secure Shell (SSH) protocol?
A. To transfer files over the internet
B. To securely connect to a remote computer
C.To monitor network traffic
D. To send encrypted emails
What is a "Denial of Service" (DoS) attack?
A. An attack that denies access to a user account
B. An attack that aims to shut down a machine or network
C. An attack that steals data from a server
D. An attack that encrypts data and demands a ransom
What does "Two-Factor Authentication" (2FA) enhance?
A.Network performance
B. Data compression
C.User authentication security
D. Password complexity
Which type of malware is designed to replicate itself and spread to other devices?
A. Trojan
B. Ransomware
C. Worm
D.Worm
Score card
Take Retest
Done
Close