ip b14
ip b14
ip b14
2. Which of the following is the network area that is provided by installing a firewall
and is accessible from both the Internet and the intranet but not accessible to the
intranet?
3. Which of the following is a mechanism that enables a Web server to store user
information in a browser in order to identify which PC is accessing the Web
server?
a) CGI b) Cookie c) SSL d) URL
1
M.S.T College Network & Security
7. Which of the following is the name of a malicious program that infects multiple
computers and simultaneously makes an attack, such as a DDoS attack, when a
command is received from an attacker who is in a remote location?
a) Bot b) Honey pot
c) Macro virus d) Worm
2
M.S.T College Network & Security
12. Which protocol is used to send a destination network unknown message back to
originating hosts?
A. TCP
B. ARP
C. ICMP
D. BootP
13. What is the main reason the OSI model was created?
A. To create a layered model larger than the DoD model.
B. So application developers can change only one layer's protocols at a time.
C. So different networks could communicate.
D. So Cisco could use the model.
14. What is the maximum data rate for the 802.11a standard?
A. 6Mbps
B. 11Mbps
C. 22Mbps
D. 54Mbps
3
M.S.T College Network & Security
19. Which of the following is the term that refers to the act of setting up a bogus Web page
imitating a bank, a credit card company, or other organization, and tricking a user with an
e-mail disguised as an official message from the financial organization or a public
organization in order to guide a user to the bogus Web page and steal personal
information such as the personal identification number and credit card number?
20. Which of the following is an appropriate term for an organized and highly skilled team
whose mission is to continuously monitor and improve an organization’s security posture
while preventing, detecting, analyzing, and responding to cybersecurity incidents,
utilizing both technology and well-defined processes and procedures?
a) Cybersecurity b) Incident Management Center (IMC)
c) Network Operations Center (NOC) d) Security Operations Center (SOC)
22. . What is the most secure way to mitigate the theft of corporate information from a
laptop that was left in a hotel room?
A. Set a BIOS password.
B. Encrypt the data on the hard drive.
C. Use a strong logon password to the operating system.
D. Back up everything on the laptop and store the backup in a safe place
4
M.S.T College Network & Security
23. Mr. X sends an e-mail to Mr. Y by using the Internet. The contents of the e-mail must be
kept confidential, so Mr. X uses public key cryptography to encrypt the e-mail. Which of
the following is the key that is used to encrypt the contents of the e-mail?
a) Mr. X ’s private key b) Mr. X ’s public key
c) Mr. Y ’s private key d) Mr. Y ’s public key
24. In a TCP/IP environment, which of the following is a standard for attaching image data to
an email?
a) JPEG b) MIME c) MPEG d) SMTP
25. When information security measures are classified into three (3) measures, namely,
technology measures, personnel measures, and physical measures, which of the
following is the appropriate example of physical measures?
A. In order to prevent unauthorized use of computers, biometric authentication is used in
the login authentication of computers.
B. In order to prevent unauthorized intrusion to a server from an external network, a
firewall is installed.
C. In order to prevent and detect frauds and operational errors by a security
administrator, multiple personnel are assigned to security administration and perform
mutual checks on each other’s work contents.
D. In order to check for unauthorized entry, a security zone is established and locked,
and the use of keys is managed.
26. When a smartphone is used, which of the following is the appropriate preventive
measure for shoulder surfing that is classified as social engineering?
A. Always using the latest OS
B. Turning off the position information function
C. Affixing a privacy filter on the screen
D. Attaching a strap to prevent fall and theft
27. There is a room that stores important information. Which of the following is the most
appropriate countermeasure for unauthorized entry to this room and unauthorized access
to the important information in the room?
A. The monitoring of entry and exit of the room and work that is performed in the
room with security staff and monitoring cameras.
B. The wearing of an entry pass in a place where other people cannot see it when in
the room.
C. The use of only electronic methods such as card authentication with no staffed desk
for entrance and exit control.
D. The informing of all employees of the existence of the room and the information
that it stores.
5
M.S.T College Network & Security
31. An IoT device with a vulnerability was used in large numbers by several
companies. One
(1) of the devices was infected with malware, and the infection spreads
to many other
IoT devices. On a certain date at a certain time, the many IoT devices
that were infected
with the malware attempted many connections to a certain website
simultaneously, and
this forced the service of the website to stop. Which of the following
attacks was made
against the website?
6
M.S.T College Network & Security
A. DDoS attack
B. Cross-site scripting
C. Dictionary attack
D. Social engineering
32. Which of the following is a term for software that encrypts files on a PC
in order to
make them unusable, and demands money or other valuables in
exchange for the
decryption key?
A. Keylogger
B. Ransomware
C. Rootkit
D. Worm
33. Which of the following is the technology that enables terminals
connected to a shared
network such as the Internet to be used as if they are connected to a
leased line by
ensuring security with encryption and authentication?
A. ADSL
B. ISDN
C. VPN
D. Wi-Fi
34. Which of the following is the unit of the data transmission speed
in a network?
A. bps
B. fps
C. ppm
D. rpm
7
M.S.T College Network & Security
37. Mr. A sent an e-mail to the three (3) people Mr. P, Mr. Q, and Mr.
R. He entered Mr. P’s
e-mail address in the To field, Mr. Q’s e-mail address in the CC field,
and Mr. R’s email address in the BCC field. Among the recipients of the
e-mail Mr. P, Mr. Q, and Mr.
R, which of the following lists contains all and only the people who can
know that the email with the same content is sent to all three (3)
people?
A. Mr. P, Mr. Q, Mr. R
B. Mr. P, Mr. R
C. Mr. Q, Mr. R
D. Mr. R
8
M.S.T College Network & Security
39. Which of the following is the appropriate description concerning the function of a
DNS?
A. It connects an IP address and a MAC address.
B. It connects an IP address and a domain name.
C. It uses the IP address and selects a packet transfer route.
D. It converts analog signals and digital signals to each other.
40. Which of the following mobile communication systems not only offers higher
communication speed than LTE, but also allows more devices to connect and has less
communication delay?
A. Block chain
B. MVNO
C. 8K
D. 5G