Q31
Q31 An employee’s emails are flagged as spam when using S/MIME for email encryption. What might be the cause of this issue?
Invalid digital signature
Misconfigured S/MIME settings
Use of outdated SSL
TLS protocol not supported by recipient
Q32
Q32 What is the primary purpose of a firewall in network security?
To block all traffic
To filter incoming and outgoing traffic
To increase network speed
To provide encryption
Q33
Q33 Which type of attack floods a network with excessive traffic, making it unavailable to users?
Man-in-the-middle
Phishing
DoS
Ransomware
Q34
Q34 What is a key function of an Intrusion Detection System (IDS)?
Encrypting network data
Detecting unauthorized access
Blocking malicious traffic
Improving network performance
Q35
Q35 Which type of malware is specifically designed to take control of a network device without permission?
Worm
Adware
Spyware
Ransomware
Q36
Q36 What is the primary purpose of a Virtual Private Network (VPN)?
To provide encryption for email
To enable secure remote access
To increase bandwidth
To host web applications
Q37
Q37 Which of the following is the most secure method for securing wireless networks?
WEP
WPA
WPA2
None of the above
Q38
Q38 Which protocol is commonly used to securely access a remote computer over an unsecured network?
FTP
HTTP
SSH
Telnet
Q39
Q39 Which command can be used on Linux to view all active network connections?
netstat -a
ipconfig /all
ifconfig
ping -c
Q40
Q40 Which tool is commonly used to perform a vulnerability scan on a network?
Wireshark
Nessus
Nmap
Metasploit
Q41
Q41 Which command-line tool can be used to analyze network packets in real-time?
netstat
Wireshark
ping
tcpdump
Q42
Q42 A network administrator detects unauthorized access attempts from an internal IP address. What is the immediate action they should take?
Disable the firewall
Ignore the activity
Investigate and isolate the IP
Change the network password
Q43
Q43 A network experiences repeated outages during peak business hours. What could be the most likely cause?
Outdated firewall
Weak encryption
Bandwidth overload
DNS misconfiguration
Q44
Q44 An employee reports that they are unable to access a secure company network using the VPN. What could be the reason?
Incorrect VPN credentials
Firewall block
Weak encryption
Misconfigured network interface
Q45
Q45 What is the purpose of input validation in application security?
To enhance user experience
To prevent SQL injections
To increase speed
To improve design
Q46
Q46 Which of the following is a common method used to ensure the security of web applications?
CAPTCHA
Data mining
Packet sniffing
Spam filters
Q47
Q47 What is the role of OWASP (Open Web Application Security Project) in application security?
Creating viruses
Providing application security guidelines
Selling security software
Developing firewalls
Q48
Q48 Which of the following is considered a key security risk in web applications, according to OWASP’s Top 10?
Broken access control
Overly complex design
Slow performance
Insufficient testing
Q49
Q49 What is Cross-Site Scripting (XSS) in application security?
Sending spam messages
Injecting malicious scripts into a web page
Bypassing a firewall
Encrypting sensitive data
Q50
Q50 What is the difference between authentication and authorization in application security?
Authentication verifies identity, authorization grants access
Authentication grants access, authorization verifies identity
They are the same
Authorization happens first
Q51
Q51 Which of the following is a critical risk in mobile application security?
Encryption
Buffer overflow
Phishing
Data leakage
Q52
Q52 Which Python library is commonly used for securing Flask web applications from Cross-Site Scripting (XSS)?
re
flask_security
html5lib
escape
Q53
Q53 Which command in Linux can be used to check the permissions of a file to ensure secure access control?
chmod
ls -l
cat
mv
Q54
Q54 How do you protect an application from SQL injection attacks in PHP using prepared statements?
By using raw SQL queries
By using exec() function
By using prepared statements
By disabling database connections
Q55
Q55 In Java, which library is typically used to implement encryption and decryption functions for securing sensitive data?
java.util
javax.crypto
java.sql
java.io
Q56
Q56 A developer notices that an application crashes when provided with large input data. What could be the reason for this issue?
Weak encryption
Buffer overflow
Incorrect authentication
SQL injection
Q57
Q57 A user is experiencing slow response times in a web application after logging in. What might be the cause?
Incorrect password
Denial-of-service attack
Improper session handling
Cross-site scripting
Q58
Q58 A vulnerability scan reveals that an application is leaking sensitive data through error messages. What is the most appropriate solution?
Disable logging
Sanitize error messages
Increase encryption
Close the application
Q59
Q59 What is the main role of an antivirus program in operating system security?
To speed up the system
To prevent malware
To compress files
To improve system updates
Q60
Q60 Which of the following is a common security measure to protect operating systems from unauthorized access?
Using a strong password
Disabling file compression
Enabling automatic updates
Using default usernames