MCQs on Network Security Basics | CCNA Certification MCQs

Introduction to Network Security Basics
Understanding network security is crucial for protecting data and infrastructure. This set of 40 MCQs covers topics such as Access Control Lists (ACLs), security devices like firewalls and IDS/IPS, and security protocols such as SSH and HTTPS. These questions are designed for certification-level knowledge.


1. Access Control Lists (ACLs)

  1. What is the primary purpose of an Access Control List (ACL) in networking?
    • a) To restrict traffic based on the source and destination IP
    • b) To filter network traffic based on protocols and ports
    • c) To manage access rights for network users
    • d) To configure routing paths in a network
  2. In which layer of the OSI model does an ACL operate?
    • a) Application layer
    • b) Transport layer
    • c) Network layer
    • d) Data link layer
  3. Which of the following statements is true about an Extended ACL?
    • a) It only filters traffic based on source IP address
    • b) It filters traffic based on both source and destination IP address, protocol, and port
    • c) It can only be applied to outgoing traffic
    • d) It is less granular than a Standard ACL
  4. Which of the following is the primary difference between a Standard ACL and an Extended ACL?
    • a) Standard ACLs filter traffic based on IP address, while Extended ACLs can also filter based on protocols and ports
    • b) Extended ACLs only apply to incoming traffic, whereas Standard ACLs apply to outgoing traffic
    • c) Standard ACLs are used for traffic encryption, whereas Extended ACLs are for access control
    • d) Extended ACLs provide more granular control over traffic than Standard ACLs
  5. How are ACLs typically applied in a router?
    • a) On the network interfaces to control inbound and outbound traffic
    • b) To control the flow of routing information
    • c) By assigning them to a network switch
    • d) On a centralized server for authentication purposes
  6. What is the default behavior of an ACL if no matching rule is found?
    • a) It allows the traffic
    • b) It denies the traffic
    • c) It logs the traffic
    • d) It redirects the traffic
  7. What does the term “wildcard mask” refer to when configuring ACLs?
    • a) It defines which bits in the IP address should be ignored when applying ACL rules
    • b) It specifies the allowable IP address range
    • c) It is used to convert an IP address into a subnet mask
    • d) It defines the port numbers allowed in ACL rules
  8. Which command is used to apply an ACL to an interface in Cisco IOS?
    • a) ip access-group
    • b) access-list apply
    • c) acl apply
    • d) ip filter-group
  9. What does the “permit” keyword in an ACL do?
    • a) Allows specific traffic to pass
    • b) Blocks specific traffic from passing
    • c) Denies traffic based on source address
    • d) Logs traffic
  10. How can an ACL be used to secure remote access to a network?
    • a) By denying access from unauthorized IP addresses
    • b) By encrypting traffic between endpoints
    • c) By implementing rate-limiting rules
    • d) By blocking all external traffic

2. Network Security Devices

  1. What is the main function of a firewall in a network?
    • a) To filter and monitor incoming and outgoing network traffic
    • b) To create secure tunnels for remote access
    • c) To encrypt sensitive data over the network
    • d) To prevent unauthorized devices from connecting to the network
  2. Which type of firewall inspects traffic at the application layer?
    • a) Packet-filtering firewall
    • b) Stateful inspection firewall
    • c) Proxy firewall
    • d) Next-generation firewall
  3. What is an IDS (Intrusion Detection System) primarily used for?
    • a) To detect and respond to network attacks
    • b) To block unauthorized access to a network
    • c) To monitor network traffic and prevent data leakage
    • d) To filter traffic based on protocols and ports
  4. What is the key difference between an IDS and an IPS?
    • a) An IDS only detects attacks, while an IPS can also prevent them
    • b) An IDS operates on the application layer, while an IPS operates on the network layer
    • c) An IDS is more expensive to deploy than an IPS
    • d) An IDS is typically hardware-based, while an IPS is software-based
  5. Which type of security device provides both intrusion detection and prevention capabilities?
    • a) Firewall
    • b) Next-generation firewall
    • c) IDS
    • d) IPS
  6. What is the role of a VPN (Virtual Private Network) in network security?
    • a) To encrypt data traffic between remote users and a central network
    • b) To provide access control to network devices
    • c) To monitor network traffic for security breaches
    • d) To filter traffic based on IP addresses
  7. Which VPN protocol provides the strongest encryption and is considered the most secure?
    • a) PPTP
    • b) L2TP
    • c) IPsec
    • d) SSL
  8. How does a next-generation firewall (NGFW) differ from traditional firewalls?
    • a) It can inspect encrypted traffic and integrate with threat intelligence feeds
    • b) It only inspects inbound traffic
    • c) It operates solely at the network layer
    • d) It is only used for remote access VPNs
  9. What is a proxy server used for in network security?
    • a) To filter web traffic and hide the client’s IP address
    • b) To encrypt all outbound traffic
    • c) To manage user authentication to the network
    • d) To route traffic between internal network segments
  10. What does an SSL/TLS VPN provide to a user?
    • a) Secure, encrypted access to a network over the internet
    • b) Monitoring of data packets for malicious activity
    • c) Filtering of traffic between internal network segments
    • d) Blocking of traffic from specific IP addresses

3. Common Security Protocols

  1. What is the primary function of SSH (Secure Shell)?
    • a) To provide encrypted remote command-line access to a system
    • b) To secure network communications with public-key encryption
    • c) To filter traffic based on protocols
    • d) To authenticate users to a network
  2. Which security protocol is used for secure communication over HTTP?
    • a) TLS
    • b) IPsec
    • c) SSH
    • d) HTTPS
  3. What does the SNMPv3 (Simple Network Management Protocol version 3) protocol provide?
    • a) Secure management and monitoring of network devices
    • b) A method for encrypting network traffic
    • c) A secure method for VPN communication
    • d) A method for authenticating remote users
  4. How does HTTPS ensure secure communication over the internet?
    • a) By encrypting data between the client and server using SSL/TLS
    • b) By using a public key for data encryption
    • c) By using a private key for data encryption
    • d) By authenticating users with passwords
  5. Which of the following protocols is commonly used to secure email communication?
    • a) SMTP
    • b) IMAP
    • c) POP3
    • d) S/MIME
  6. Which protocol is used to secure FTP (File Transfer Protocol) for encrypted file transfers?
    • a) FTPS
    • b) SFTP
    • c) HTTPS
    • d) SSH
  7. What is the primary advantage of using SNMPv3 over earlier versions of SNMP?
    • a) Enhanced security with authentication and encryption
    • b) Faster data transfer rates
    • c) Ability to monitor larger networks
    • d) Better support for legacy devices
  8. What type of encryption is used in SSL/TLS to secure data in transit?
    • a) Symmetric encryption
    • b) Asymmetric encryption
    • c) Both symmetric and asymmetric encryption
    • d) Hashing
  9. Which of the following protocols is commonly used to establish a secure connection between two systems over a public network?
    • a) SSH
    • b) HTTP
    • c) FTP
    • d) Telnet
  10. What type of authentication does SSH use to verify the identity of a client and server?
    • a) Password-based authentication
    • b) Public key authentication
    • c) Two-factor authentication
    • d) Biometric authentication

4. Comparison of Security Protocols and Devices

  1. Which of the following is a key benefit of using a VPN?
    • a) It masks the user’s IP address and encrypts data traffic
    • b) It blocks malware from entering the network
    • c) It filters web traffic for specific sites
    • d) It provides user authentication for access control
  2. What is the primary advantage of using an IDS over a firewall?
    • a) IDS detects and alerts on malicious activity while firewalls block unauthorized traffic
    • b) IDS blocks malicious traffic automatically
    • c) IDS is used only for VPN communication
    • d) IDS filters traffic based on source and destination addresses
  3. Which of the following provides the most detailed inspection of network traffic for security purposes?
    • a) Deep packet inspection (DPI)
    • b) Packet filtering
    • c) Stateful inspection
    • d) Network address translation
  4. Which firewall type offers the best protection for application layer attacks?
    • a) Proxy firewall
    • b) Stateful firewall
    • c) Next-generation firewall
    • d) Packet-filtering firewall
  5. Which of the following is not a benefit of using HTTPS?
    • a) Provides data encryption between the browser and server
    • b) Verifies the identity of the server
    • c) Prevents man-in-the-middle attacks
    • d) Increases the speed of data transfer
  6. Which protocol is most commonly used to secure wireless network communication?
    • a) WEP
    • b) WPA2
    • c) SSL
    • d) IPsec
  7. How do firewalls help in controlling network access?
    • a) By filtering traffic based on predefined security rules
    • b) By encrypting all outgoing traffic
    • c) By assigning IP addresses to network devices
    • d) By monitoring user activity on the network
  8. Which of the following is a function of an Intrusion Prevention System (IPS)?
    • a) To detect and prevent attacks in real time
    • b) To log network activity for analysis
    • c) To provide a VPN connection
    • d) To scan for viruses on network devices
  9. Which encryption algorithm is commonly used in SSL/TLS to secure web traffic?
    • a) AES
    • b) RSA
    • c) SHA
    • d) DES
  10. Which of the following is an advantage of using an Extended ACL over a Standard ACL?
    • a) It offers more granular filtering options for network traffic
    • b) It is simpler to configure
    • c) It operates at a lower cost
    • d) It filters traffic only by IP address

Answer Key

QnoAnswer (Option with the text)
1b) To filter network traffic based on protocols and ports
2c) Network layer
3b) It filters traffic based on both source and destination IP address, protocol, and port
4a) Standard ACLs filter traffic based on IP address, while Extended ACLs can also filter based on protocols and ports
5a) On the network interfaces to control inbound and outbound traffic
6b) It denies the traffic
7a) It defines which bits in the IP address should be ignored when applying ACL rules
8a) ip access-group
9a) Allows specific traffic to pass
10a) By denying access from unauthorized IP addresses
11a) To filter and monitor incoming and outgoing network traffic
12c) Proxy firewall
13a) To detect and respond to network attacks
14a) An IDS only detects attacks, while an IPS can also prevent them
15b) Next-generation firewall
16a) To encrypt data traffic between remote users and a central network
17c) IPsec
18a) It can inspect encrypted traffic and integrate with threat intelligence feeds
19a) To filter web traffic and hide the client’s IP address
20a) Secure, encrypted access to a network over the internet
21a) To provide encrypted remote command-line access to a system
22d) HTTPS
23a) Secure management and monitoring of network devices
24a) By encrypting data between the client and server using SSL/TLS
25d) S/MIME
26a) FTPS
27a) Enhanced security with authentication and encryption
28c) Both symmetric and asymmetric encryption
29a) SSH
30b) Public key authentication
31a) It masks the user’s IP address and encrypts data traffic
32a) IDS detects and alerts on malicious activity while firewalls block unauthorized traffic
33a) Deep packet inspection (DPI)
34c) Next-generation firewall
35d) Increases the speed of data transfer
36b) WPA2
37a) By filtering traffic based on predefined security rules
38a) To detect and prevent attacks in real time
39b) RSA
40a) It offers more granular filtering options for network traffic

Use a Blank Sheet, Note your Answers and Finally tally with our answer at last. Give Yourself Score.

X
error: Content is protected !!
Scroll to Top