Time Left: 00:00

HNS Exam: Managing Network Security

Instruction: Select the correct answer from the given choices. Each question carries 2 points.

1. What is the nominal duration of the module "Managing Network Security"?

2. What is the definition of "network security"?

3. What is a foundational element of any network security plan?

4. What is the purpose of an access control list (ACL)?

5. What is a network security system that grants or denies network access to traffic based on a set of rules?

6. How are network security threats classified?

7. Where do "external threats" to network security originate from?

8. What is an example of an "internal threat" to network security?

9. What is a Distributed Denial of Service (DDoS) attack?

10. Which social engineering technique involves an attacker sending a fraudulent message disguised as a legitimate source?

11. What is a "security policy"?

12. What does the "principle of least privilege" state?

13. In a Windows environment, where can file and folder permissions be managed?

14. Which command in Linux is used to change file and directory permissions?

15. What is the purpose of the `chown` command in Linux?

16. What is the function of a router?

17. What is a networking device that connects devices on a network by using packet switching?

18. What is a malicious software program that can replicate itself and spread to other computers?

19. What is a type of malicious software designed to collect and transmit a user\'s personal information without their knowledge?

20. What is the process of converting data into a code to prevent unauthorized access?

21. What are Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) used for?

22. What is the process of verifying the identity of a user or device?

23. Which of the following is a key practice for maintaining network security?

24. What should a strong password policy mandate?

25. What is the purpose of the `nslookup` command?