Exame in English Exam Questionnaire Examination Questionnaire Question 1: What is the purpose of encryption? Protect against network threats Ensure data confidentiality Monitor network traffic Question 2: What does IDS mean in relation to network security? Secure Network Interface Intrusion Detection System Advanced Firewall System Question 3: What is a brute force attack? A wireless network attack An attempt to guess a password A phishing attack Question 4: What is the purpose of the information security policy? Monitor network traffic Establish guidelines to protect sensitive information Perform penetration testing Question 5: Which of the following is a symmetric encryption technique? RSA AES ECC Question 6: Which of the following is not a threat detection technique? IDS (Intrusion Detection System) Firewall Antivirus Question 7: What is a DDoS (Distributed Denial of Service) attack? An attack that tries to guess passwords An attack that overloads a server with fake traffic A phishing attack Question 8: Which of the following is an example of asymmetric encryption? AES RSA DES Question 9: What is a social engineering attack? An attack that exploits software vulnerabilities An attack that takes advantage of hardware flaws An attack that manipulates people to obtain confidential information Question 10: What is the purpose of an information security policy? Increase network speed Establish guidelines to protect information and systems Provide unlimited access to all users Question 11: Which of the following is a public key cryptography technique? AES RSA DES Question 12: What does VPN mean in terms of network security? Virtual Private Network Vast Public Network Virtual Public Network Question 13: What is the main purpose of a firewall? Monitor network traffic Prevent unauthorized network access Encrypt network communications Question 14: What is the main difference between symmetric and asymmetric encryption? Symmetric encryption uses a single key while asymmetric encryption uses two keys Symmetric encryption is more secure than asymmetric encryption Asymmetric encryption is faster than symmetric encryption Question 15: What is a phishing attack? An attack that exploits software vulnerabilities An attack that takes advantage of hardware flaws An attack that aims to trick people into obtaining confidential information Question 16: Which of the following actions is not recommended in network security? Maintain strong and unique passwords Share passwords with coworkers Regularly update software Question 17: What is a denial of service (DoS) attack? An attack that exploits software vulnerabilities An attack that aims to overload a system or network to make it inaccessible An attack that takes advantage of hardware flaws Question 18: What is a next generation firewall (NGFW)? A firewall that only works on mobile networks A firewall that combines traditional firewall features with advanced security functions A firewall that is no longer used in network security Question 19: What is a SQL injection attack? An attack that takes advantage of hardware flaws An attack that exploits software vulnerabilities An attack that manipulates database queries to obtain unauthorized information Question 20: What is the main purpose of a penetration test (pentest)? Monitor network traffic Assess the security of a system or network by identifying vulnerabilities Encrypt network communications Question 21: What is the main function of an IDS (Intrusion Detection System)? Encrypt network traffic Monitor and identify suspicious network activity Speed up network speed Question 22: What is the main purpose of data encryption? Hide important information Reduce network speed Protect confidential information by making it unreadable to unauthorized persons Question 23: What is a brute force attack? An attack that repeatedly tries to guess a password until it finds the correct one An attack that sends fake emails to obtain confidential information An attack that exploits software vulnerabilities Question 24: What is a reverse engineering attack? An attack that involves the creation of new technologies An attack that aims to discover information about existing systems and software An attack that attempts to trick people into obtaining sensitive information Question 25: How important is two-factor authentication (2FA) in security? Not important in network security Makes account access more secure by requiring two forms of authentication Makes access slower and more complex Question 26: What is a strong password policy? A policy that requires passwords to be short and simple A policy that allows passwords that contain only numbers A policy that requires long, complex, and different passwords for each account Question 27: What is a ransomware attack? An attack that aims to make the system faster An attack that seeks to obtain confidential user information An attack that encrypts system files and demands a ransom to decrypt them Question 28: What is a spear phishing attack? An attack that uses spears as weapons An attack that focuses on a specific individual or organization using personalized information An attack that sends thousands of emails to different targets Question 29: What is an SSL certificate? A certificate that allows access to social media sites A certificate that verifies the identity of a website and secures communication between the browser and the server A password certificate for accessing online accounts Question 30: What is a social engineering attack? An attack that uses engineers to improve network security An attack that is based on the psychological manipulation of individuals to obtain confidential information An attack that uses engineers to create new security systems Question 31: What is the main function of a WAF (Web Application Firewall)? Monitor web server temperature Protect web applications against threats and attacks Encrypt all web transactions Question 32: What is a hash algorithm in cryptography? An algorithm that creates random passwords An algorithm that verifies the authenticity of SSL certificates An algorithm that transforms data into a fixed-length string of characters Question 33: What is a social engineering attack? An attack that uses engineers to improve network security An attack that relies on the psychological manipulation of individuals to obtain confidential information An attack that uses engineers to create new security systems Question 34: What is the main function of a WAF (Web Application Firewall)? Monitor web server temperature Protect web applications against threats and attacks Encrypt all web transactions Question 35: What is a hash algorithm in cryptography? An algorithm that creates random passwords An algorithm that verifies the authenticity of SSL certificates An algorithm that transforms data into a fixed-length string of characters Question 36: What is two-factor authentication (2FA)? An authentication method that uses two different passwords An authentication method that requires two forms of verification to access an account An authentication method that uses biometrics to access an account Question 37: What is a denial of service (DDoS) attack? An attack that denies access to the local network An attack that denies access to a website or service by overloading it with malicious traffic An attack that denies access to the cloud Question 38: What is an application firewall (WAF)? A firewall that protects only mobile applications A firewall that protects web applications only A firewall that protects against all types of network attacks Question 39: What is a social engineering attack? An attack that uses engineers to improve network security An attack that relies on the psychological manipulation of individuals to obtain confidential information An attack that uses engineers to create new security systems Question 40: What is the main function of a WAF (Web Application Firewall)? Monitor web server temperature Protect web applications against threats and attacks Encrypt all web transactions Question 41: What is a hash algorithm in cryptography? An algorithm that creates random passwords An algorithm that verifies the authenticity of SSL certificates An algorithm that transforms data into a fixed-length string of characters Question 42: What does the acronym VPN mean in computer networks? Virtual Private Network Very Private Network Virtual Public Network Question 43: What is a phishing attack? An attack that consists of sending emails with malicious attachments An attack that attempts to trick recipients into obtaining sensitive information, such as passwords or financial information An attack that sends excessive traffic to a server to bring it down Question 44: What is a digital certificate? A file that stores digital music A file that verifies a website's identity and enables secure communications A file that stores user passwords Question 45: What is a brute force attack in network security? An attack that uses many computers to bring down a server An attack that attempts to guess passwords by trying all possible combinations An attack that disguises itself as a software update Question 46: What is an IDS (Intrusion Detection System)? An image editing software A system that detects and warns about possible network attacks A system that encrypts network communications Question 47: What is public key cryptography? An encryption method that uses a single key to encrypt and decrypt data An encryption method that uses different keys to encrypt and decrypt data An encryption method that does not use keys Question 48: What is the main function of a next-generation firewall (NGFW)? Block only malicious traffic Analyze and block traffic based on advanced policies, including applications and threats Increase network bandwidth Question 49: What is an SSL (Secure Sockets Layer) VPN? An encryption protocol for emails One An encryption protocol for emails An encryption protocol to secure web communications An authentication protocol for local networks Question 50: What is a SQL injection attack? An attack that sends spam messages An attack that attempts to insert malicious commands into SQL queries to manipulate a database An attack that attempts to flood a website with excessive traffic Time remaining: 50:00 Results: Score: 0 points Status: Awaiting shipment