This Organisation is Managed by A Team of NFSU Alumni;
Stay away from Fraudster

NFAT M.Tech Cybersecurity:Set -1 | NFAT Mock Test

NFAT M.Tech Cybersecurity:Set -1 | NFAT Mock Test

1. What is the primary function of the Address Resolution Protocol (ARP) cache?

A) Stores domain name to IP mappings
B) Encrypts data packets
C) Maps IP addresses to MAC addresses
D) Assigns dynamic IP addresses

2. Which attack exploits vulnerabilities in the Data Link Layer?

A) SQL Injection
B) ARP Spoofing
C) DDoS Attack
D) Phishing

3. What is the purpose of the Border Gateway Protocol (BGP)?

A) Routes traffic between autonomous systems
B) Encrypts network traffic
C) Manages local network connections
D) Resolves domain names

4. Which security protocol operates at the Transport Layer?

A) IPsec
B) HTTP
C) FTP
D) TLS

5. What is the main purpose of VLANs in a LAN?

A) Increases physical network range
B) Segments network traffic for security
C) Reduces network speed
D) Connects multiple WANs

6. Which encryption algorithm is commonly used in HTTPS?

A) DES
B) MD5
C) AES
D) SHA-1

7. Which protocol is used for secure remote access to a server?

A) SSH
B) Telnet
C) FTP
D) SNMP

8. What is the purpose of a DMZ in network security?

A) Encrypts all incoming traffic
B) Routes packets between networks
C) Assigns dynamic IPs
D) Isolates public-facing servers

9. Which type of attack involves overwhelming a server with traffic?

A) Man-in-the-Middle
B) DDoS
C) SQL Injection
D) Cross-Site Scripting

10. What is the port number for SSH?

A) 21
B) 80
C) 22
D) 443

11. Which protocol is used for network management?

A) SNMP
B) FTP
C) HTTP
D) SMTP

12. What is the purpose of NAT (Network Address Translation)?

A) Encrypts network traffic
B) Maps private IPs to public IPs
C) Resolves domain names
D) Routes packets within a LAN

13. Which device can act as a load balancer?

A) Switch
B) Hub
C) Router
D) Access Point

14. Which protocol is used for secure email retrieval?

A) SMTP
B) POP3
C) FTP
D) IMAPS

15. What is the default subnet mask for a Class B IPv4 address?

A) 255.255.0.0
B) 255.0.0.0
C) 255.255.255.0
D) 255.255.255.255

16. Which attack intercepts communication between two parties?

A) DDoS
B) Man-in-the-Middle
C) Brute Force
D) Phishing

17. What is the purpose of the Spanning Tree Protocol (STP)?

A) Encrypts data packets
B) Assigns dynamic IPs
C) Prevents network loops
D) Routes traffic between networks

18. Which protocol is used for real-time voice communication?

A) HTTP
B) FTP
C) SMTP
D) VoIP

19. What is the port number for HTTPS?

A) 443
B) 80
C) 21
D) 25

20. Which security measure uses a digital certificate?

A) Firewall
B) SSL/TLS
C) NAT
D) VLAN

21. Which protocol is used for time synchronization?

A) FTP
B) HTTP
C) NTP
D) SMTP

22. What is the purpose of a honeypot in cybersecurity?

A) Routes traffic
B) Encrypts data
C) Assigns IPs
D) Detects and analyzes attacks

23. Which protocol is used for dynamic routing?

A) RIP
B) HTTP
C) FTP
D) DNS

24. What is the default subnet mask for a Class C IPv4 address?

A) 255.255.0.0
B) 255.255.255.0
C) 255.0.0.0
D) 255.255.255.255

25. Which attack involves injecting malicious code into a website?

A) DDoS
B) Phishing
C) Cross-Site Scripting
D) ARP Spoofing

26. Which protocol is used for secure remote desktop access?

A) FTP
B) HTTP
C) SMTP
D) RDP

27. What is the purpose of IPsec?

A) Secures IP communications
B) Resolves domain names
C) Assigns dynamic IPs
D) Manages sessions

28. Which technology is used for high-speed WAN connections?

A) Bluetooth
B) MPLS
C) NFC
D) USB

29. What is the port number for SNMP?

A) 22
B) 80
C) 161
D) 443

30. Which security measure involves splitting a network into zones?

A) Encryption
B) NAT
C) Firewall
D) Segmentation

31. Which protocol is used for video conferencing?

A) SIP
B) FTP
C) SMTP
D) DNS

32. What is the purpose of a WAF (Web Application Firewall)?

A) Routes traffic
B) Protects web applications
C) Assigns IPs
D) Encrypts data

33. Which attack targets vulnerabilities in database queries?

A) DDoS
B) Phishing
C) SQL Injection
D) ARP Spoofing

34. What is the default subnet mask for a Class A IPv4 address?

A) 255.255.255.0
B) 255.255.0.0
C) 255.255.255.255
D) 255.0.0.0

35. Which protocol is used for multicast traffic?

A) IGMP
B) FTP
C) HTTP
D) SMTP

36. What is the purpose of a VPN tunnel?

A) Routes packets within a LAN
B) Creates a secure connection
C) Assigns dynamic IPs
D) Resolves domain names

37. Which technology is used for short-range wireless PANs?

A) WiMAX
B) Ethernet
C) Zigbee
D) MPLS

38. What is the port number for RDP?

A) 22
B) 80
C) 443
D) 3389

39. Which protocol is used for secure DNS queries?

A) DNSSEC
B) HTTP
C) FTP
D) SMTP

40. What is the purpose of a MAC address table?

A) Routes packets between networks
B) Maps MAC addresses to switch ports
C) Encrypts data packets
D) Assigns dynamic IPs

41. Which attack uses stolen credentials to gain access?

A) DDoS
B) Man-in-the-Middle
C) Credential Stuffing
D) SQL Injection

42. Which protocol is used for network time synchronization?

A) FTP
B) HTTP
C) SMTP
D) NTP

43. What is the purpose of a reverse proxy?

A) Distributes incoming traffic to servers
B) Assigns dynamic IPs
C) Encrypts outgoing traffic
D) Routes packets within a LAN

44. Which protocol is used for email submission with SSL/TLS?

A) IMAP
B) SMTPS
C) POP3
D) FTP

45. What is the purpose of a packet sniffer?

A) Encrypts network traffic
B) Assigns dynamic IPs
C) Captures network packets
D) Routes packets

46. Which technology is used for long-range wireless MANs?

A) Bluetooth
B) NFC
C) Zigbee
D) WiMAX

47. Which protocol is used for link-state routing?

A) OSPF
B) RIP
C) HTTP
D) FTP

48. What is the purpose of a sandbox in cybersecurity?

A) Routes traffic
B) Isolates and analyzes malware
C) Assigns IPs
D) Encrypts data

49. Which attack exploits trust in a website to steal data?

A) DDoS
B) ARP Spoofing
C) Cross-Site Request Forgery
D) SQL Injection

50. What is the port number for IMAPS?

A) 110
B) 143
C) 25
D) 993

51. Which protocol is used for secure file sharing?

A) SFTP
B) FTP
C) HTTP
D) SMTP

52. What is the purpose of a SIEM system?

A) Routes traffic
B) Monitors and analyzes security events
C) Assigns dynamic IPs
D) Encrypts data

53. Which protocol is used for distance-vector routing?

A) OSPF
B) BGP
C) RIP
D) HTTP

54. What is the port number for SMTPS?

A) 25
B) 110
C) 143
D) 587

55. Which technology is used for low-power IoT networks?

A) LoRaWAN
B) WiMAX
C) Ethernet
D) MPLS

56. What is the purpose of a proxy firewall?

A) Routes traffic
B) Filters traffic at the application layer
C) Assigns IPs
D) Encrypts data

57. Which attack uses multiple compromised systems to attack a target?

A) Phishing
B) Man-in-the-Middle
C) Botnet
D) SQL Injection

58. Which protocol is used for secure VoIP communication?

A) HTTP
B) FTP
C) SMTP
D) SRTP

59. What is the purpose of a stateful firewall?

A) Tracks connection states
B) Assigns dynamic IPs
C) Resolves domain names
D) Routes packets

60. Which protocol is used for network redundancy?

A) HTTP
B) HSRP
C) FTP
D) DNS

61. Which attack involves guessing passwords repeatedly?

A) DDoS
B) Man-in-the-Middle
C) Brute Force
D) SQL Injection

62. What is the port number for POP3S?

A) 110
B) 143
C) 587
D) 995

63. Which protocol is used for secure web socket communication?

A) WSS
B) HTTP
C) FTP
D) SMTP

64. What is the purpose of an IDS (Intrusion Detection System)?

A) Routes traffic
B) Detects unauthorized access
C) Assigns IPs
D) Encrypts data

65. Which protocol is used for network address allocation?

A) HTTP
B) FTP
C) DHCP
D) DNS

66. What is the purpose of a zero-trust architecture?

A) Routes all traffic
B) Assigns dynamic IPs
C) Encrypts all data
D) Verifies all access requests

67. Which protocol is used for secure network management?

A) SNMPv3
B) SNMPv1
C) HTTP
D) FTP

68. What is the purpose of a VPN concentrator?

A) Routes traffic within a LAN
B) Manages multiple VPN connections
C) Assigns dynamic IPs
D) Resolves domain names

69. Which attack involves sending fake emails to steal data?

A) DDoS
B) Man-in-the-Middle
C) Phishing
D) SQL Injection

70. Which protocol is used for path-vector routing?

A) OSPF
B) RIP
C) HTTP
D) BGP

71. What is the purpose of a packet filter firewall?

A) Filters traffic based on rules
B) Assigns dynamic IPs
C) Resolves domain names
D) Routes packets

72. Which technology is used for high-speed LAN connections?

A) Bluetooth
B) Fiber Channel
C) NFC
D) Zigbee

73. Which protocol is used for secure remote access to network devices?

A) FTP
B) HTTP
C) SSH
D) SMTP

74. What is the purpose of a NAC (Network Access Control) system?

A) Routes traffic
B) Assigns dynamic IPs
C) Encrypts data
D) Controls device access

75. Which protocol is used for secure LDAP?

A) LDAPS
B) HTTP
C) FTP
D) SMTP

76. What is the purpose of a GRE tunnel?

A) Encrypts all traffic
B) Encapsulates packets for routing
C) Assigns dynamic IPs
D) Resolves domain names

77. Which attack involves flooding a network with ICMP packets?

A) Phishing
B) Man-in-the-Middle
C) Ping Flood
D) SQL Injection

78. Which protocol is used for secure database access?

A) HTTP
B) FTP
C) SMTP
D) TLS/SSL

79. What is the purpose of a content delivery network (CDN)?

A) Improves content delivery speed
B) Assigns dynamic IPs
C) Routes packets
D) Encrypts data

80. Which protocol is used for network monitoring?

A) FTP
B) NetFlow
C) HTTP
D) SMTP

81. Which attack exploits vulnerabilities in email protocols?

A) DDoS
B) Man-in-the-Middle
C) Email Spoofing
D) SQL Injection

82. What is the purpose of a VLAN trunk?

A) Encrypts traffic
B) Assigns IPs
C) Routes packets
D) Carries multiple VLAN traffic

83. Which protocol is used for secure wireless communication?

A) WPA3
B) WEP
C) HTTP
D) FTP

84. What is the purpose of an IPS (Intrusion Prevention System)?

A) Routes traffic
B) Blocks unauthorized access
C) Assigns IPs
D) Encrypts data

85. Which protocol is used for secure tunneling?

A) HTTP
B) FTP
C) L2TP
D) SMTP

86. What is the purpose of a network tap?

A) Routes traffic
B) Assigns IPs
C) Encrypts data
D) Monitors network traffic

87. Which attack involves manipulating DNS responses?

A) DNS Spoofing
B) Phishing
C) DDoS
D) SQL Injection

88. Which protocol is used for secure authentication?

A) HTTP
B) Kerberos
C) FTP
D) SMTP

89. What is the purpose of a load balancer?

A) Encrypts traffic
B) Assigns IPs
C) Distributes network traffic
D) Resolves domain names

90. Which protocol is used for secure network file sharing?

A) HTTP
B) FTP
C) SMTP
D) SMB with encryption

91. Which attack involves flooding a server with SYN packets?

A) SYN Flood
B) Phishing
C) Man-in-the-Middle
D) SQL Injection

92. What is the purpose of a network bridge?

A) Routes traffic between networks
B) Connects multiple network segments
C) Assigns dynamic IPs
D) Encrypts data

93. Which protocol is used for secure multimedia streaming?

A) HTTP
B) FTP
C) RTSP with TLS
D) SMTP

94. What is the purpose of a network segment?

A) Routes traffic
B) Assigns IPs
C) Encrypts data
D) Isolates network traffic

95. Which protocol is used for secure remote management?

A) SSH
B) Telnet
C) HTTP
D) FTP

96. What is the purpose of a network gateway?

A) Assigns dynamic IPs
B) Connects different network protocols
C) Encrypts data
D) Monitors traffic

97. Which attack involves exploiting trust in a trusted entity?

A) DDoS
B) Man-in-the-Middle
C) Spoofing
D) SQL Injection

98. Which protocol is used for secure directory access?

A) HTTP
B) FTP
C) SMTP
D) LDAPS

99. What is the purpose of a network analyzer?

A) Captures and analyzes packets
B) Assigns dynamic IPs
C) Routes traffic
D) Encrypts data

100. Which protocol is used for secure cloud communication?

A) HTTP
B) TLS/SSL
C) FTP
D) SMTP

Test Results

No comments:

Post a Comment

Transform Your Future
Choose the perfect course to accelerate your learning journey
Advance Batch
₹10,000
₹6100
39% OFF
🚀 Advance mentoring with Best Resources
Premium Study Materials & E-books
Advanced Practice Sheets & Solutions
Expert Guest Lectures
1-on-1 Personal Mentoring Sessions
5 Full-Length Mock Tests with Analysis
24/7 Doubt Resolution Support
Performance Analytics Dashboard
Enroll Now
37% OFF
Starter Batch
₹8,100
₹5,100
🔥 Perfect for Quick Start - Early Bird Pricing!
Curated Study Materials & Notes
Topic-wise Practice Questions
High-Yield Topics & Quick Revision
Group Mentoring & Study Sessions
3 Mock Tests with Solutions
Exam Strategy & Time Management
Weekly Progress Tracking
Have a coupon code?
Enroll Now
Registration Open
Foundation Batch
₹11,100
🚀 Build Your Future - Limited Seats Available!
Comprehensive Study Materials
Weekly Interactive Live Classes
Personal Academic Mentoring
5 Comprehensive Mock Tests
Free Access to All Club Events
Daily Doubt Resolution Sessions
Industry Expert Guest Lectures
Study Group & Peer Learning
Registration Open
Mock Test Series
₹3,500
₹1,999
43% OFF
🔥 Final Batch Alert - Limited Seats Available!
⚠️ Only 50 Seats Remaining
Latest 2025 Exam Pattern Coverage
Separate UG & PG Level Tests
Expert-Crafted Questions Bank
All India Ranking & Percentile
Advanced Time Management Tools
Detailed Performance Analytics
Register Now