Which of the following best describes the purpose of a firewall in a network?
A firewall acts as a barrier between trusted and untrusted networks, controlling incoming and outgoing traffic.
Which protocol is commonly used to securely access a remote system?
SSH provides encrypted communication for remote login and command execution.
What does the principle of least privilege entail in network security?
It limits access rights for users to the minimum necessary to perform their job functions.
What is the main function of an Intrusion Detection System (IDS)?
IDS monitors network traffic for suspicious activity and known threats.
Which device is used to connect multiple networks together and direct traffic between them?
A router manages traffic between different networks, including forwarding data packets.
Why is it important to segment a network?
Segmentation limits the spread of attacks and improves performance and security by isolating network areas.
Loading Questions...
Which tool is commonly used for network traffic analysis?
Wireshark is a widely used tool for capturing and analyzing network packets.
Which of the following best describes a VPN?
A Virtual Private Network (VPN) creates a secure, encrypted tunnel over the internet.
Which method enhances security by verifying a user’s identity with more than one factor?
Multi-factor authentication (MFA) requires two or more verification methods to confirm identity.