NFAT M.Tech Cybersecurity:Set -1 | NFAT Mock Test
1. What is the primary function of the Address Resolution Protocol (ARP) cache?
A) Stores domain name to IP mappings
B) Encrypts data packets
C) Maps IP addresses to MAC addresses
D) Assigns dynamic IP addresses
2. Which attack exploits vulnerabilities in the Data Link Layer?
A) SQL Injection
B) ARP Spoofing
C) DDoS Attack
D) Phishing
3. What is the purpose of the Border Gateway Protocol (BGP)?
A) Routes traffic between autonomous systems
B) Encrypts network traffic
C) Manages local network connections
D) Resolves domain names
4. Which security protocol operates at the Transport Layer?
A) IPsec
B) HTTP
C) FTP
D) TLS
5. What is the main purpose of VLANs in a LAN?
A) Increases physical network range
B) Segments network traffic for security
C) Reduces network speed
D) Connects multiple WANs
6. Which encryption algorithm is commonly used in HTTPS?
A) DES
B) MD5
C) AES
D) SHA-1
7. Which protocol is used for secure remote access to a server?
A) SSH
B) Telnet
C) FTP
D) SNMP
8. What is the purpose of a DMZ in network security?
A) Encrypts all incoming traffic
B) Routes packets between networks
C) Assigns dynamic IPs
D) Isolates public-facing servers
9. Which type of attack involves overwhelming a server with traffic?
A) Man-in-the-Middle
B) DDoS
C) SQL Injection
D) Cross-Site Scripting
10. What is the port number for SSH?
A) 21
B) 80
C) 22
D) 443
11. Which protocol is used for network management?
A) SNMP
B) FTP
C) HTTP
D) SMTP
12. What is the purpose of NAT (Network Address Translation)?
A) Encrypts network traffic
B) Maps private IPs to public IPs
C) Resolves domain names
D) Routes packets within a LAN
13. Which device can act as a load balancer?
A) Switch
B) Hub
C) Router
D) Access Point
14. Which protocol is used for secure email retrieval?
A) SMTP
B) POP3
C) FTP
D) IMAPS
15. What is the default subnet mask for a Class B IPv4 address?
A) 255.255.0.0
B) 255.0.0.0
C) 255.255.255.0
D) 255.255.255.255
16. Which attack intercepts communication between two parties?
A) DDoS
B) Man-in-the-Middle
C) Brute Force
D) Phishing
17. What is the purpose of the Spanning Tree Protocol (STP)?
A) Encrypts data packets
B) Assigns dynamic IPs
C) Prevents network loops
D) Routes traffic between networks
18. Which protocol is used for real-time voice communication?
A) HTTP
B) FTP
C) SMTP
D) VoIP
19. What is the port number for HTTPS?
A) 443
B) 80
C) 21
D) 25
20. Which security measure uses a digital certificate?
A) Firewall
B) SSL/TLS
C) NAT
D) VLAN
21. Which protocol is used for time synchronization?
A) FTP
B) HTTP
C) NTP
D) SMTP
22. What is the purpose of a honeypot in cybersecurity?
A) Routes traffic
B) Encrypts data
C) Assigns IPs
D) Detects and analyzes attacks
23. Which protocol is used for dynamic routing?
A) RIP
B) HTTP
C) FTP
D) DNS
24. What is the default subnet mask for a Class C IPv4 address?
A) 255.255.0.0
B) 255.255.255.0
C) 255.0.0.0
D) 255.255.255.255
25. Which attack involves injecting malicious code into a website?
A) DDoS
B) Phishing
C) Cross-Site Scripting
D) ARP Spoofing
26. Which protocol is used for secure remote desktop access?
A) FTP
B) HTTP
C) SMTP
D) RDP
27. What is the purpose of IPsec?
A) Secures IP communications
B) Resolves domain names
C) Assigns dynamic IPs
D) Manages sessions
28. Which technology is used for high-speed WAN connections?
A) Bluetooth
B) MPLS
C) NFC
D) USB
29. What is the port number for SNMP?
A) 22
B) 80
C) 161
D) 443
30. Which security measure involves splitting a network into zones?
A) Encryption
B) NAT
C) Firewall
D) Segmentation
31. Which protocol is used for video conferencing?
A) SIP
B) FTP
C) SMTP
D) DNS
32. What is the purpose of a WAF (Web Application Firewall)?
A) Routes traffic
B) Protects web applications
C) Assigns IPs
D) Encrypts data
33. Which attack targets vulnerabilities in database queries?
A) DDoS
B) Phishing
C) SQL Injection
D) ARP Spoofing
34. What is the default subnet mask for a Class A IPv4 address?
A) 255.255.255.0
B) 255.255.0.0
C) 255.255.255.255
D) 255.0.0.0
35. Which protocol is used for multicast traffic?
A) IGMP
B) FTP
C) HTTP
D) SMTP
36. What is the purpose of a VPN tunnel?
A) Routes packets within a LAN
B) Creates a secure connection
C) Assigns dynamic IPs
D) Resolves domain names
37. Which technology is used for short-range wireless PANs?
A) WiMAX
B) Ethernet
C) Zigbee
D) MPLS
38. What is the port number for RDP?
A) 22
B) 80
C) 443
D) 3389
39. Which protocol is used for secure DNS queries?
A) DNSSEC
B) HTTP
C) FTP
D) SMTP
40. What is the purpose of a MAC address table?
A) Routes packets between networks
B) Maps MAC addresses to switch ports
C) Encrypts data packets
D) Assigns dynamic IPs
41. Which attack uses stolen credentials to gain access?
A) DDoS
B) Man-in-the-Middle
C) Credential Stuffing
D) SQL Injection
42. Which protocol is used for network time synchronization?
A) FTP
B) HTTP
C) SMTP
D) NTP
43. What is the purpose of a reverse proxy?
A) Distributes incoming traffic to servers
B) Assigns dynamic IPs
C) Encrypts outgoing traffic
D) Routes packets within a LAN
44. Which protocol is used for email submission with SSL/TLS?
A) IMAP
B) SMTPS
C) POP3
D) FTP
45. What is the purpose of a packet sniffer?
A) Encrypts network traffic
B) Assigns dynamic IPs
C) Captures network packets
D) Routes packets
46. Which technology is used for long-range wireless MANs?
A) Bluetooth
B) NFC
C) Zigbee
D) WiMAX
47. Which protocol is used for link-state routing?
A) OSPF
B) RIP
C) HTTP
D) FTP
48. What is the purpose of a sandbox in cybersecurity?
A) Routes traffic
B) Isolates and analyzes malware
C) Assigns IPs
D) Encrypts data
49. Which attack exploits trust in a website to steal data?
A) DDoS
B) ARP Spoofing
C) Cross-Site Request Forgery
D) SQL Injection
50. What is the port number for IMAPS?
A) 110
B) 143
C) 25
D) 993
51. Which protocol is used for secure file sharing?
A) SFTP
B) FTP
C) HTTP
D) SMTP
52. What is the purpose of a SIEM system?
A) Routes traffic
B) Monitors and analyzes security events
C) Assigns dynamic IPs
D) Encrypts data
53. Which protocol is used for distance-vector routing?
A) OSPF
B) BGP
C) RIP
D) HTTP
54. What is the port number for SMTPS?
A) 25
B) 110
C) 143
D) 587
55. Which technology is used for low-power IoT networks?
A) LoRaWAN
B) WiMAX
C) Ethernet
D) MPLS
56. What is the purpose of a proxy firewall?
A) Routes traffic
B) Filters traffic at the application layer
C) Assigns IPs
D) Encrypts data
57. Which attack uses multiple compromised systems to attack a target?
A) Phishing
B) Man-in-the-Middle
C) Botnet
D) SQL Injection
58. Which protocol is used for secure VoIP communication?
A) HTTP
B) FTP
C) SMTP
D) SRTP
59. What is the purpose of a stateful firewall?
A) Tracks connection states
B) Assigns dynamic IPs
C) Resolves domain names
D) Routes packets
60. Which protocol is used for network redundancy?
A) HTTP
B) HSRP
C) FTP
D) DNS
61. Which attack involves guessing passwords repeatedly?
A) DDoS
B) Man-in-the-Middle
C) Brute Force
D) SQL Injection
62. What is the port number for POP3S?
A) 110
B) 143
C) 587
D) 995
63. Which protocol is used for secure web socket communication?
A) WSS
B) HTTP
C) FTP
D) SMTP
64. What is the purpose of an IDS (Intrusion Detection System)?
A) Routes traffic
B) Detects unauthorized access
C) Assigns IPs
D) Encrypts data
65. Which protocol is used for network address allocation?
A) HTTP
B) FTP
C) DHCP
D) DNS
66. What is the purpose of a zero-trust architecture?
A) Routes all traffic
B) Assigns dynamic IPs
C) Encrypts all data
D) Verifies all access requests
67. Which protocol is used for secure network management?
A) SNMPv3
B) SNMPv1
C) HTTP
D) FTP
68. What is the purpose of a VPN concentrator?
A) Routes traffic within a LAN
B) Manages multiple VPN connections
C) Assigns dynamic IPs
D) Resolves domain names
69. Which attack involves sending fake emails to steal data?
A) DDoS
B) Man-in-the-Middle
C) Phishing
D) SQL Injection
70. Which protocol is used for path-vector routing?
A) OSPF
B) RIP
C) HTTP
D) BGP
71. What is the purpose of a packet filter firewall?
A) Filters traffic based on rules
B) Assigns dynamic IPs
C) Resolves domain names
D) Routes packets
72. Which technology is used for high-speed LAN connections?
A) Bluetooth
B) Fiber Channel
C) NFC
D) Zigbee
73. Which protocol is used for secure remote access to network devices?
A) FTP
B) HTTP
C) SSH
D) SMTP
74. What is the purpose of a NAC (Network Access Control) system?
A) Routes traffic
B) Assigns dynamic IPs
C) Encrypts data
D) Controls device access
75. Which protocol is used for secure LDAP?
A) LDAPS
B) HTTP
C) FTP
D) SMTP
76. What is the purpose of a GRE tunnel?
A) Encrypts all traffic
B) Encapsulates packets for routing
C) Assigns dynamic IPs
D) Resolves domain names
77. Which attack involves flooding a network with ICMP packets?
A) Phishing
B) Man-in-the-Middle
C) Ping Flood
D) SQL Injection
78. Which protocol is used for secure database access?
A) HTTP
B) FTP
C) SMTP
D) TLS/SSL
79. What is the purpose of a content delivery network (CDN)?
A) Improves content delivery speed
B) Assigns dynamic IPs
C) Routes packets
D) Encrypts data
80. Which protocol is used for network monitoring?
A) FTP
B) NetFlow
C) HTTP
D) SMTP
81. Which attack exploits vulnerabilities in email protocols?
A) DDoS
B) Man-in-the-Middle
C) Email Spoofing
D) SQL Injection
82. What is the purpose of a VLAN trunk?
A) Encrypts traffic
B) Assigns IPs
C) Routes packets
D) Carries multiple VLAN traffic
83. Which protocol is used for secure wireless communication?
A) WPA3
B) WEP
C) HTTP
D) FTP
84. What is the purpose of an IPS (Intrusion Prevention System)?
A) Routes traffic
B) Blocks unauthorized access
C) Assigns IPs
D) Encrypts data
85. Which protocol is used for secure tunneling?
A) HTTP
B) FTP
C) L2TP
D) SMTP
86. What is the purpose of a network tap?
A) Routes traffic
B) Assigns IPs
C) Encrypts data
D) Monitors network traffic
87. Which attack involves manipulating DNS responses?
A) DNS Spoofing
B) Phishing
C) DDoS
D) SQL Injection
88. Which protocol is used for secure authentication?
A) HTTP
B) Kerberos
C) FTP
D) SMTP
89. What is the purpose of a load balancer?
A) Encrypts traffic
B) Assigns IPs
C) Distributes network traffic
D) Resolves domain names
90. Which protocol is used for secure network file sharing?
A) HTTP
B) FTP
C) SMTP
D) SMB with encryption
91. Which attack involves flooding a server with SYN packets?
A) SYN Flood
B) Phishing
C) Man-in-the-Middle
D) SQL Injection
92. What is the purpose of a network bridge?
A) Routes traffic between networks
B) Connects multiple network segments
C) Assigns dynamic IPs
D) Encrypts data
93. Which protocol is used for secure multimedia streaming?
A) HTTP
B) FTP
C) RTSP with TLS
D) SMTP
94. What is the purpose of a network segment?
A) Routes traffic
B) Assigns IPs
C) Encrypts data
D) Isolates network traffic
95. Which protocol is used for secure remote management?
A) SSH
B) Telnet
C) HTTP
D) FTP
96. What is the purpose of a network gateway?
A) Assigns dynamic IPs
B) Connects different network protocols
C) Encrypts data
D) Monitors traffic
97. Which attack involves exploiting trust in a trusted entity?
A) DDoS
B) Man-in-the-Middle
C) Spoofing
D) SQL Injection
98. Which protocol is used for secure directory access?
A) HTTP
B) FTP
C) SMTP
D) LDAPS
99. What is the purpose of a network analyzer?
A) Captures and analyzes packets
B) Assigns dynamic IPs
C) Routes traffic
D) Encrypts data
100. Which protocol is used for secure cloud communication?
A) HTTP
B) TLS/SSL
C) FTP
D) SMTP
No comments:
Post a Comment