30 TOP Network Security Multiple choice questions and answers

Below are the list of top 100 Network Security multiple choice questions and answers for freshers beginners and experienced pdf
1.  Which of the following is true regarding access lists applied to an interface?
2.  Which command would you use to apply an access list to a router interface?
3.  Which of the following is an example of a standard IP access list?
4.  You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
5.  You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
6.  What command will permit SMTP mail to only host 1.1.1.1?
7.  You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?
8.  What router command allows you to determine whether an IP access list is enabled on a particular interface?
9.  You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router?
10. You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?
11. You configure the following access list:
12. You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?
13. If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?
14. Which router command allows you to view the entire contents of all access lists?
15. Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?
16. Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list?
17. If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?
18. Which of the following series of commands will restrict Telnet access to the router?
19. Which of the following commands connect access list 110 inbound to interface ethernet?
20. What is the standard IANA port number used for requesting web pages?
21. A high profile company has been receiving a high volume of attacks on their website. The network administrator wants to be able to collect information on the attacker(s) so legal action can be taken. What should be implementated?
22. What Directive would you use to block access to certain domains if you are using Apache as a proxy server?
23. Wireless Application Protocol (WAP) has several layers. Which of the following is the security layer?
24. Why would you configure virtual hosting with a single daemon rather than multiple daemons?
25. Which of these is NOT a type of firewall?
26. Are "Secure" servers really secured?
27. As a security measure, you change the TCP port in FTP Site Properties to 19,960. Some users complain that they are unable to access the FTP site. What might be the cause of the problem?
28. One way to limit hostile sniffing on a LAN (Local Area Network) is by installing:
29. What does favicon.ico in a webserver’s log indicate?
30. What does “chmod 1777 ./” do?

0 comments: