بنك الاسئلة المجمع-الصف الثالث-شبكات وأمن المعلومات 2025
بنك الاسئلة المجمع-الصف الثالث-شبكات وأمن المعلومات 2025
الصف الثالث
                  2024 - 2025
                                   مدارس تكنولوجيا التطبيقية                                          المسار الفني
                                     فني شبكات و امن معلومات                                         Program Name
                                       طالب الصف الثالث                                              المستهدف من التقييم
                         Unit 17 : Introduction to Cybersecurity
                          Unit 18 : Advanced Cybersecurity -1
                            Unit 19 : Advanced Cybersecurity -2
                     Unit 20: Virtual Private Network and Mikrotik
                                                                                                        الوحدات التدريبية
                     Unit 21: Cloud and Virtualization Technology
                                Unit 22: Microsoft Azure-1
                                Unit 23: Microsoft Azure-2
                                  Unit24: Cisco Dev Net
                         Unit 17 : Introduction to Cybersecurity
                                                             Endpoint protection        TPK05
                   Describe key cybersecurity concepts including the CIA Triad          TPK20
                                 The basic IT security threads and its protection       TPK21
                    Cybersecurity threats and vulnerabilities and how to avoid it       TPK22
                          Unit 18 : Advanced Cybersecurity -1
The properties, structures, and components of a network.                                TPK19
The basic IT security threads and its protection                                        TPK21
Cybersecurity threats and vulnerabilities and how to avoid it                           TPK22
Different Routing Protocols and protocols used to exchange data on a network            TPK18
The Open System Interconnection (OSI) model and the TCP/IP suite.                       TPK16
                          Unit 19 : Advanced Cybersecurity -2
The Open System Interconnection (OSI) model and the TCP/IP                            TPK16
suite.
Different Routing Protocols and protocols used to exchange data                       TPK18
on a network
The properties, structures, and components of a network.                              TPK19
The basic IT security threads and its protection                                      TPK21                 المعارف
Cybersecurity threats and vulnerabilities and how to avoid it                         TPK22
                    Unit 20: Virtual Private Network and Mikrotik
The Open System Interconnection (OSI) model and the TCP/IP                            TPK16
suite.
Different Routing Protocols and protocols used to exchange data                       TPK18
on a network
The properties, structures, and components of a network.                              TPK19
The basic IT security threads and its protection                                      TPK21
Cybersecurity threats and vulnerabilities and how to avoid it                         TPK22
                     Unit 21: Cloud and Virtualization Technology
The importance of the backup process                                                    TPK03
Common business functions and how they relate to the needs of
                                                                                        TPK07
organizations
Concepts of redundancy and high availability                                            TPK17
virtualization and cloud computing                                                      TPK23
The benefits behind migration to the cloud                                              TPK24
             Lesson one      Lesson two        Lesson three             Lesson four             Lesson Five
  Unit 17     TPK22           TPK20              TPK20                    TPK21                   TPK21
              TPK05           TPK22                                       TPK05
             Lesson one       Lesson two       Lesson three             Lesson four             Lesson Five
              TPK 21           TPK19             TPK19                    TPK19                   TPK18
  Unit 18     TPK 22           TPK16             TPK16                    TPK22                   TPK19
                               TPK22             TPK21                                            TPK21
                                                                                                  TPK22
             Lesson one       Lesson two       Lesson three             Lesson four             Lesson Five
              TPK 21           TPK19             TPK19                    TPK19                   TPK18
  Unit 19     TPK 22           TPK16             TPK16                    TPK22                   TPK19
                               TPK22             TPK21                                            TPK21
                                                                                                  TPK22
             Lesson one       Lesson two       Lesson three             Lesson four             Lesson Five
              TPK 21           TPK19             TPK19                    TPK19                   TPK18
  Unit 20     TPK 22           TPK16             TPK16                    TPK22                   TPK19
                               TPK22             TPK21                                            TPK21
                                                                                                  TPK22
             Lesson one       Lesson two       Lesson three             Lesson four             Lesson Five
              TPK 03           TPK17             TPK 07                   TPK23                  TPK 07
  Unit 21
              TPK 07           TPK23             TPK24                    TPK24
                               TPK24
          Lesson one   Lesson two    Lesson three            Lesson four              Lesson Five
           TPK 15       TPK 24         TPK 24                 TPK 24                   TPK 24
Unit 23
           TPK 24       TPK 25         TPK 25                 TPK 25                   TPK 25
                        TPK26          TPK26                   TPK26                    TPK26
          Lesson one   Lesson two    Lesson three            Lesson four              Lesson Five
           TPK 18       TPK 18         TPK 18                  TPK18                   TPK 18
Unit 24
           TPK 23       TPK 23         TPK 23                  TPK23                   TPK 23
                        TPK25          TPK25                                            TPK25
         a) Transactional data
         b) Intellectual property
     A) Cybercriminals
     B) Firefighters
     C) Artists
     D) Chefs
10   Which of the following best describes a passive attack?                           B
     A) Active Attack
     B) Passive Attack
     C) Insider Attack
     D) External Attack
12   Which type of attack involves someone within the organization                     C
     violating rules to harm the system?
     a) Black Hat
     b) Gray Hat
     c) White Hat
     d) Suicide Hacker
16   Which type of malware locks your data and demands payment to                     C
     unlock it?
     a) Adware
     b) Spyware
     c) Ransomware
     d) Worm
17   Which type of malware can spread on its own without user                         C
     interaction?
     a) Virus
     b) Spyware
     c) Worm
     d) Scareware
18   Which of the following best describes an ethical hacker?                         B
Dear learner: Put "True" in front of the correct statement and "False" in front of
the incorrect statement.
 No                             Question                        Answer
 28 Information Security protects information only when           False
       it is stored digitally.
 29 Cyber threats include activities like hacking, malware,       True
       and phishing.
 30 Ethical Hacking is about exploiting security                  False
       weaknesses for personal gain.
 31 Network Security is concerned with protecting devices        FALSE
       like servers and smartphones.
 32 Personal data can only exist online                          FALSE
 33 Online identity includes your username and how you            True
       behave in online communities.
 34 Attackers may aim to damage the reputation of their           True
       target as one of their objectives.
 35 Once attackers know their goal, they use different tools      True
       and techniques to find and exploit weaknesses in
       computer systems or security policies.
 36 Active attacks do not interact with the system and only       False
       involve observing data.
     Question   Describe how Incident Response planning can minimize the impact of
                security incidents on an organization.
     Answer     Incident Response planning ensures that an organization is prepared to
53
                quickly and effectively handle security incidents. By having predefined
                procedures and roles, the organization can minimize downtime, reduce the
                impact on operations.
     Question   What is 'Big Data' and what has contributed to its rise?
     Answer     'Big Data' refers to extremely large data sets.
55              The rise of the Internet of Things (IoT), with many devices collecting and
                sharing data, has contributed to the increase in data volume, leading to the
                emergence of 'Big Data.'
     Question   Explain how the rise of the Internet of Things (IoT) has impacted the
                field of cybersecurity.
57   Answer     Each device as an IoT can be a potential target for cyber-attacks, making it
                more challenging to protect data and secure networks against unauthorized
                access.
     Question   Describe the difference between a Gray Hat hacker and a White Hat
                hacker.
     Answer     A Gray Hat hacker sometimes acts ethically like a White Hat but may also
62
                engage in illegal activities without malicious intent, whereas a White Hat
                hacker always works with permission and strictly follows legal guidelines to
                protect systems.
                              No   Answer
                              1    C
                              2    J
                              3    B
                              4    E
                              5    D
                              6    F
                              7    I
                              8    G
                              9    H
                              10   A
No Column A            No Column B
1  Script Kiddies      A Unskilled hackers who use tools
                          made by others
2     Hacktivists      B Promote political or social causes by
                          attacking websites
3     Gray Hats        C Act both defensively and offensively
                          at times
4     Black Hats       D Use their computing knowledge for
                          illegal purposes
                                    No     Answer
                                     1       A
                                     2       B
                                     3       C
                                     4       D
 No                             Question                                             Answer
 65   The process of making sure software is safe and cannot be                     Application
      easily attacked is known as __________ Security.
 66   ___________ involves finding and fixing security                                 Ethical
      weaknesses before bad hackers can exploit them.                                 Hacking
 67   _______identity refers to who you are in real life.                              Offline
 68   The Internet of Things (IoT) is a network of physical                           Internet
      objects connected to the _________.
 69   Attackers usually believe that the target system has                            Valuable
      something __________.
 70   Insider attacks happen when someone with ______ access                          special;
      inside the organization tries to harm the organization's                      information
      ______ or systems.
 No                           Question                                        Answer
 95   A firewall can only block traffic based on its source                    False
      and destination addresses.
 96   Virtual Private Networks (VPNs) can only be used by                      False
      employees in the office.
 97   Passive reconnaissance is more likely to alert the target                False
      than active reconnaissance.
 98   Active reconnaissance can sometimes crash old or                          True
      weak devices.
 99   Reconnaissance is only used in cybersecurity and has                     False
      no relation to military practices.
100   OSINT gathering relies on publicly available                              True
      information.
101   Recon-ng is a tool used to collect and analyze data                       True
      from online sources in OSINT.
102   OSINT gathering only requires special permissions                        False
      and secret methods to access information.
103   Geolocation tools in OSINT can help track phone                           True
      numbers, public records, or geolocation tags.
104   DNSRecon is a tool used in Kali Linux to gather DNS                       True
      information.
105   Social media information shared by people online                         False
      cannot be used for social engineering attacks.
No                       Question                                           Answer
106 A System that checks network traffic to find                             IDS
    potential threats but does not block the
    traffic is called ______.
107 A __________ server helps to filter traffic and                           Proxy
    can block unsafe websites.
                                           No Answer
                                           1    B
                                           2    A
                                           3    C
                                           4    D
Dear learner: Put "True" in front of the correct statement and "False" in front of
the incorrect statement.
 No                            Question                         Answer
 119 Information Security protects information only when         False
       it is stored digitally.
 120 Firewalls alone are sufficient to protect a network         False
       from all types of cyber attacks.
 121 Policies and procedures are unnecessary if a company        False
       has strong technological security measures.
 122 Every employee must follow the cybersecurity policies       TRUE
       set by the company.
 123 A Code of Conduct provides guidelines for behavior          TRUE
       that all employees must follow.
 124 External audits are only performed by the                   False
       organization's own employees.
 125 An action that is legal can still be considered unethical   TRUE
       in cybersecurity.
       No Column A           No Column B
       1  Password           A Explains how long the company
          Policy                keeps information
       2  Data Retention     B Shows how the company tracks
          Policy                physical and digital items
       3  Monitoring         C Sets rules for password length and
          Policy                strength
       4  Asset              D Explains how the company watches
          Management            over employee actions
          Policy
                                         No   Answer
                                         1    C
                                         2    A
                                         3    D
                                         4    B
      Question   Name two methods that can be used to ensure the integrity of
127              information.
      Answer     Using hash functions and checksums
      Question   Name two trusted groups that help companies with best practices in
                 cybersecurity.
129
      Answer     NIST (National Institute of Standards and Technology) and ISO
                 (International Organization for Standardization)
      Question   Explain why using best practices from groups like NIST or ISO benefits
                 a company's cybersecurity policy.
131   Answer     Because it ensures the company follows trusted and widely accepted
                 standards, which improves security, helps meet legal requirements, and
                 builds trust with customers.
Dear learner: Put "True" in front of the correct statement and "False" in front of
the incorrect statement.
  No                          Question                           Answer
 149 Cryptography only protects websites but not personal         False
       data.
 150 Modern encryption is very difficult to break.                True
 151 In symmetric encryption, different keys are used for         False
       encryption and decryption.
 152 Asymmetric encryption is also known as public-key           TRUE
       encryption.
 153 DES is now considered a strong encryption method             False
       suitable for modern technology.
 154 In public key (asymmetric) encryption, the same key is      FALSE
       used for both encryption and decryption.
 155 A message digest function is also known as a one-way        TRUE
       hash function.
 156 SHA-1 is still considered safe for new security             FALSE
       applications today.
 No                    Question                                         Answer
 157 In cryptography, the original readable text is               plaintext, ciphertext
     called ________, and the secret code is called
     ________.
 158 In asymmetric encryption, the ______ key is                      public, private
     shared with everyone, while the ______ key is
     kept secret.
 159 AES uses key sizes of 128, 192, or ______ bits,                          256
     making it more secure than DES.
      Question   What is the primary difference between transport mode and tunnel
                 mode in IPsec?
169   Answer     In transport mode, only the payload is encrypted while the original IP header
                 is visible. In tunnel mode, both the payload and the original IP header are
                 encrypted.
 No Question                                                                                   Answer
 171 What is the main purpose of a firewall?                                                     B
     a) To improve the speed of the internet
     b) To control the flow of data between networks
     c) To block all incoming data
     d) To store data for future use
 172 What could be a potential weakness of a firewall, despite its                                  B
     strong design?
     a) It can block all traffic, even legitimate ones
     b) It only controls data flow and might not protect against all
     types of attacks
     c) It is faster than routers
     d) It allows unrestricted access to the internal network
 173 Which type of firewall does not remember the status of previous                                B
     connections and is called "stateless"?
     a) Stateful Firewall
     b) Packet Filtering Firewall
     c) Next-Generation Firewall
     d) Application Firewall
 174 Which of the following is NOT a feature of Next-Generation                                     D
     Firewalls (NGFW)?
     a) Application visibility and control
     b) URL filtering
     c) Stateful connection tracking
     d) Storing URLs for future inspection
 175 Which of the following best describes the role of a DMZ in a                                   B
     network?
     a) It blocks all access to the public network
     b) It serves as a middle layer where certain public access is
     allowed but doesn’t directly expose the private network
     c) It allows all public network traffic into the private network
     d) It is completely secure like the private network
No Question                                                                             Answer
176 A firewall can control what information enters and leaves your                      True
    internal network.
177 Stateful firewalls operate only at Layers 3 and 4 of the OSI                        False
    model.
178 Next-Generation Firewalls (NGFW) can run antivirus software                         True
    to block harmful files.
179 The firewall always allows traffic from the public network into                     False
    the private network without any checks.
180 In a DMZ setup, anyone from the public network can access the                       False
    private network directly.
                                  No   Answer
                                  1    B
                                  2    A
                                  3    C
                                   No   Answer
                                   1    B
                                   2    C
                                   3    A
No Question                                                                              Answer
183 A firewall follows a set of rules called an ______________ that                      Access
    decides who can use or access network resources.                                     Control
                                                                                         Policy.
184 Firewalls are designed to be strong against attacks from the                         Internet
    ____________ or other networks.
185 A __________ firewall tracks the status of a connection and works at Stateful
    Layers 4 and 5 of the OSI model.
No Question                                                                              Answer
186 What is the main purpose of a vulnerability scan?                                    B
    a) To delete files from the system
    b) To identify weak points in a system that could be exploited
    c) To increase system speed
    d) To install antivirus software
 No Question                                                                                 Answer
 201 Which command provides the most insight into how port security                          C
     operates on an interface?
     A. show running-config
     B. show interface status
     C. show port-security interface
     D. show security-violations
 202 In the context of port security violation modes, what does a                            B
     "shutdown" action do?
     A. It automatically recovers.
     B. It must be manually shut down and enabled.
     C. It generates SNMP trap messages.
     D. It stops receiving but continues to send frames.
 204 Which command is used to automatically recover from an err-                             A
     disabled state caused by port security violations?
    A. recover port-security
    B. errdisable recovery interval seconds
    C. no shutdown
    D. errdisable recovery cause psecure-violation
207 What does the port security state "secure-up" indicate in the "protect" C
    mode?
    A. show port-security
    B. show secure-status
    C. show port-security interface <interfacename>
    D. show protect
209 How does the "protect" mode handle violation counters?                               A
      Question   What is the primary criterion for port security to identify devices?
218   Answer     Port security identifies devices based on the source MAC address of
                 Ethernet frames.
      Question   What are the default actions taken upon a security violation in port
                 security?
219
      Answer     The default actions include protect, restrict, or shutdown, depending on the
                 configuration.
      Question   What is the purpose of using the "sticky learn" feature in port security?
220   Answer     The "sticky learn" feature dynamically learns source MAC addresses and
                 adds them to the running configuration, making configuration easier.
      Dear learner: Put "True" in front of the correct statement and "False" in front of
      the incorrect statement.
No Question                                                                                     Answer
221 Port scanning alone can determine if a service on an open port is                           False
    vulnerable.
222 Leaving default passwords in place can create a vulnerability.                              True
223 A vulnerability scanner can sometimes show false positives.                                 True
224 OpenVAS and Nessus are tools used for port scanning, not vulnerability                      False
    scanning.
225 A False Negative in a scan is the least dangerous result because it                         False
    doesn’t show any problems.
226 Direct checks by a scanner are more reliable than connecting to a port                      True
    from far away.
227 A CVSS score of 10 indicates the least dangerous vulnerability.                             False
228 Using tools like Metasploit helps confirm if a vulnerability is actually                    True
    exploitable.
229 A CVSS score helps to understand both the ease of exploitation and the                      True
    potential damage of a vulnerability.
230 Port security allows an unlimited number of different source MAC                            False
    addresses on a port.
231 Port security identifies devices based on the source MAC address of                         True
    Ethernet frames.
 No Question                                                                                  Answer
 241 What does ARP stand for in networking?                                                   A
     A) Address Resolution Protocol
     B) Advanced Routing Protocol
     C) Application Registration Protocol
     D) Automatic Resource Protocol
 242 What is the main purpose of ARP in networking?                                           B
     A) Discovering IP addresses
     B) Discovering MAC addresses
     C) Discovering DNS addresses
     D) Discovering subnet masks
 243 Which technology allows a large number of private IP addresses to                        A
     be represented by a smaller number of public IP addresses?
     A. NAT
     B. NTP
     C. RFC 1631
     D. RFC 1918
 244 Which type of address is the public IP address of a NAT device?                          C
     A. outside global
     B. outside local
     C. inside global
     D. inside local
     E. outside public
     F. inside public
 245 What is the first step in the NAT configuration process?                                 A
A. 172.16.1.10
Dear learner: Put "True" in front of the correct statement and "False" in front of
the incorrect statement.
No Question                                                                              Answer
261 A host needs ARP before it completes the DHCP process.                               False
262 The "shutdown" action is the default response to a security violation                True
    in port security.
263 The "ip dhcp snooping trust" interface subcommand overrides the                      True
    default setting of not trusted.
264 The "ip dhcp snooping global" command is optional for configuring                    False
    DHCP Snooping.
265 DAI only works for devices using static IP addresses.                                False
266 Configuring rate limits for DHCP Snooping is optional.                               True
267 The "ip dhcp snooping limit rate" command sets a limit on DHCP                       True
    messages per second.
268 The "ip dhcp snooping vlan vlan-list" command is used to enable                      False
    DHCP Snooping on the switch globally.
269 DAI allows ARP messages that match the data in DHCP Snooping                         TRUE
    binding tables.
270 Port security can automatically learn and configure MAC addresses                    True
    using the sticky feature.
271 ARP is used to discover the MAC address associated with an IPv4                      True
    address.
272 DAI compares ARP messages on trusted ports to DHCP Snooping                          True
    binding tables.
273 Gratuitous ARP can be exploited by attackers to manipulate ARP                       True
    tables.
No Question                                                               Answer
274 How do AAA operations compare regarding user identification, user B
    services, and access control?
    A. Authorization provides access control, and authentication tracks
    user services
    B. Authentication identifies users, and accounting tracks user
    services
    C. Accounting tracks user services, and authentication provides
    access control
    D. Authorization identifies users, and authentication provides access
    control.
275 What is the difference between RADIUS and TACACS+?                    B
    A. RADIUS logs all commands that are entered by the administrator,
    but TACACS+ logs only start, stop, and interim commands.
    B. TACACS+ separates authentication and authorization, and
    RADIUS merges them.
    C. TACACS+ encrypts only password information, and RADIUS
    encrypts the entire payload.
    D. RADIUS is most appropriate for dial authentication, but
    TACACS+ can be used for multiple types of authentication.
      A.accounting
      B.accessibility
      C.authentication
      D.authorization
      Dear learner: Put "True" in front of the correct statement and "False" in front of
      the incorrect statement.
       No Question                                                                               Answer
       279 In the 802.1x protocol, the Client is responsible for authenticating                  False
           itself without any involvement from other components.
       280 RADIUS and TACACS are protocols used between the Client and                           False
           the Authenticator in the 802.1x protocol.
       281 The Authentication Server is responsible for authenticating the                       True
           Client in the 802.1x protocol.
       282 The Authenticator in the 802.1x protocol is responsible for directly                  False
           reading and validating the authentication information sent by the
           Client.
       283 The Authenticator is responsible for passing the authentication                       True
           information from the Client to the Authentication Server.
      Question   What protocols are used between the Authentication server and the
                 Authenticator?
285
      Answer     RADIUS and TACACS protocols facilitate communication between the
                 Authentication server and the Authenticator.
No     Question                                                                                   Answer
286    What is an operating system's primary function?                                              A
       A) To control hardware and manage resources
       B) To display graphics
       C) To enable internet access
       D) To create documents
287    Type-1 Hypervisor is also known as:                                                             B
       A) Hosted Hypervisor
       B) Bare Metal Hypervisor
       C) Virtual Hypervisor
       D) System Hypervisor
288    What is the primary function of a motherboard in a computer?                                    C
       A) To display images
       B) To store data
       C) To connect all components of the computer
       D) To cool the system
289    Which of the following is NOT a common operating system?                                        D
       A) Windows
       B) Mac OS X
       C) Linux
       D) Adobe
290    In computing, what does 'ROM' stand for?                                                        B
       A) Rapid Online Memory
       B) Read Only Memory
       C) Real-time Operating Memory
       D) Random Operational Memory
291    A key difference between Type-1 and Type-2 Hypervisors is:                                      A
       A) Type-1 runs on hardware, Type-2 on an OS
       B) Type-1 is for gaming, Type-2 for business
       C) Type-1 uses more resources, Type-2 less
       D) Type-1 is free, Type-2 is paid
292    What does the 'VM' in 'VM components' stand for?                                                C
       A) Variable Machine
       B) Virtual Memory
       C) Virtual Machine
                                               2025/2024 – بنك االسئلة المجمع – إطار فني الشبكات و أمن المعلومات
      D) Video Module
293   What role does the CPU play in a computer?                                                    B
      A) It enhances audio output
      B) It processes instructions and data
      C) It cools the system
      D) It stores long-term data
294   Which of the following is not a function of an operating system?                              C
      A) Managing hardware resources
      B) Running application software
      C) Designing graphics
      D) Controlling peripheral devices
295   A virtual machine is:                                                                         C
      A) A physical computer
      B) A type of computer virus
      C) A software-based emulation of a computer
      D) A new model of a CPU
296   Which of these is a benefit of virtual machines over physical                                 B
      machines?
      A) Shorter life cycle
      B) Easier to move and copy
      C) Require personal contact to upgrade
      D) Bound to specific hardware
297   What is a hypervisor used for in virtualization?                                              B
      A) To connect physical machines
      B) To create and manage virtual machines
      C) To store data permanently
      D) To enhance graphic performance
298   What type of software is Microsoft Windows?                                                   B
      A) Application Software
      B) System Software
      C) Entertainment Software
      D) Educational Software
299   What is the main purpose of virtualization in computing?                                      B
      A) To increase hardware costs
      B) To create multiple virtual machines
      C) To replace physical hardware
      D) To slow down processing speeds
300   Which component is essential for a computer's operation?                                      C
      A) Keyboard
      B) Monitor
      C) Processor (CPU)
      Dear learner: Put "True" in front of the correct statement and "False" in front of
      the incorrect statement.
       No                          Question                                        Answer
       302 Virtualization is a modern concept that emerged in the                   False
           21st century.
       303 Virtualization helps in reducing hardware costs.                         True
       304 Private clouds are available for public use.                             False
       305 The cloud uses internet technologies for service                         True
           delivery.
       306 Cloud computing requires physical storage on every                       False
           user's computer.
       307 An operating system is necessary for a computer's                         True
           hardware to function.
       308 A virtual machine can run multiple operating systems                      True
           simultaneously.
       309 Virtual machines are difficult to move and copy.                         False
       310 Type-1 hypervisors are installed directly on hardware.                   True
      Question   How does a centralized dashboard like Cisco DNA Center improve
                 network troubleshooting?
352
      Answer     It provides real-time insights into network health and device statuses,
                 allowing administrators to identify and resolve issues more efficiently.
No Column A No Column B
                                No     Answer
                                1        B
                                2        D
                                3        A
                                4        C
No Column A No Column B
                                No     Answer
                                1        B
                                2        D
                                3        A
                                4        C
      Dear learner: Put "True" in front of the correct statement and "False" in front of
      the incorrect statement.
       No  Question                                                                             Answer
       364 SSH uses TCP port 22 by default.                                                     True
       365 Telnet is still widely used today for secure communications.                         False
       366 VTY lines allow multiple remote users to connect to a device at                      True
           the same time.
       367 The RSA key size of 2048 bits is recommended for strong                              True
           security when configuring SSH.
       368 Without setting a domain name, the RSA keys cannot be                                True
           generated properly because the device wouldn't have a complete
           FQDN.
      Question   Why is Telnet considered insecure, and what is the modern alternative
                 to Telnet for secure remote access?
369   Answer     Telnet is considered insecure because it sends data, including usernames and
                 passwords, in plain text, making it vulnerable to interception. The modern
                 alternative is SSH, which encrypts the communication.
      Question   What are VTY lines, and why are they important in configuring remote
370
                 access for a device?
      Question   Discuss how SSH provides security compared to Telnet. Include details
                 about the encryption mechanisms used by SSH.
      Answer     SSH provides security by encrypting all communication between the client
                 and server, ensuring that sensitive information like usernames, passwords,
372
                 and commands cannot be intercepted by attackers. SSH uses various
                 encryption techniques, such as symmetric encryption (AES), public-key
                 cryptography (RSA), and hashing (SHA), making it a far more secure option
                 than Telnet, which transmits data in plain text.
      Question   What is the purpose of RSA keys in SSH configuration, and why is key
                 size important?
373   Answer     RSA keys are used for encrypting, decrypting, and authenticating data in
                 SSH connections. Key size is important because larger keys provide stronger
                 security
      Question   Explain the role of the Fully Qualified Domain Name (FQDN) in
                 generating RSA keys for SSH.
374   Answer     The FQDN uniquely identifies the device and consists of the device's
                 hostname and domain name. When RSA keys are generated, the FQDN
                 labels the keys, ensuring they are uniquely
      Question   Describe the steps you would take to troubleshoot an SSH connection
                 failure between a computer and a remote device.
      Answer     First, verify that the remote device is powered on and connected to the
375
                 network. Check the IP address and port number used for the SSH
                 connection. Ensure SSH is enabled on the device and that the firewall is not
                 blocking the connection.
376
                                      Answer
      No SSH will not work on this router
      No Hostname is configured
      No Secret Keys are configured.
      No enable secret is configured.
377
No    Question                                                                                 Answer
379   What is the first step an attacker usually takes when planning a                           B
      cyberattack?
      a) Installing malware
      b) Gathering information about the target
      c) Deleting files
      d) Hacking passwords
380   Which of the following is a characteristic of active reconnaissance?                          C
      a) It does not interact with the target
      b) It uses open-source intelligence
      c) It involves sending probes to the target
      d) It does not risk crashing weak devices
381   Which of the following is an example of passive reconnaissance?                               C
      a) Scanning for open ports
      b) Sending pings to test device response
                                             2025/2024 – بنك االسئلة المجمع – إطار فني الشبكات و أمن المعلومات
      c) Checking domain information through public databases
      d) Running malware analysis
382   What is the main difference between active and passive                                        C
      reconnaissance?
      a) Active reconnaissance only uses online tools
      b) Passive reconnaissance involves sending signals to the target
      c) Active reconnaissance interacts with the target, while passive does
      not
      d) Passive reconnaissance provides more accurate data than active
383   What does OSINT stand for?                                                                    B
      a) Online Security Intelligence Network
      b) Open-Source Intelligence
      c) Operational Security Information
      d) Open-Standard Internet Network
384   Which of the following is a common tool used for OSINT?                                       B
      a) Wireshark
      b) Shodan
      c) Metasploit
      d) Nmap
385   What type of information can be gathered in the "Domain                                       B
      Information" category of OSINT?
      a) Personal messages
      b) Domain names, IP addresses, subdomains, and DNS records
      c) Private emails
      d) Encrypted passwords
386   What is the purpose of DNS queries in an attacker’s reconnaissance                            B
      process?
      a) To find hidden files on a website
      b) To identify IP addresses associated with a target domain
      c) To delete data from a server
      d) To encrypt communication channels
387   What information does the command dig <domain> mx provide?                                    B
      a) The IP address of the domain
      b) The mail exchanger (MX) records of the domain
      c) The physical location of the domain owner
      d) The DNS security protocols in use
388   Which social media platform is commonly used by attackers to learn                            B
      about a company's employees and their roles?
      a) YouTube
      b) LinkedIn
      c) TikTok
      390. Match the following tool with its main function in information gathering
      No Column A                No Column B                                   Answer
      1 Nmap                     A Gathers DNS information for a domain
      2 DNSRecon                 B Provides ownership details of a domain
      3 Whois                    C Scans open ports and services on a
                                     target
                                       No   Answer
                                       1    C
                                       2    A
                                       3    B
                                  No      Answer
                                  1       C
                                  2       A
                                  3       B
                                  4       D
 392. Match the following SSH configuration steps with their correct descriptions
 No Column A                       No Column B                            Answer
 1 crypto key generate rsa         A Configures the domain name
                                        for RSA key generation
 2 ip domain-name                  B Sets up encrypted
      weschools.com                     authentication for SSH
 3 transport input ssh             C Generates the RSA keys
                                  No      Answer
                                  1       C
                                  2       A
                                  3       B
       No Question                                                                              Answer
       393 To secure remote access to a device using Telnet, you must                           username;
           configure a __________ and a __________.                                             password
       394 The command to disconnect inactive sessions after 5 minutes in a                     exec-
           Telnet session is __________.                                                        timeout 5
                                                                                                0
       395 The command to generate RSA keys on a device is __________.                          crypto
                                                                                                key
                                                                                                generate
                                                                                                rsa
      Question   Explain why attackers use both active and passive reconnaissance
                 techniques.
      Answer     Attackers use both techniques to gather as much information as possible
397
                 without alerting the target. Active reconnaissance provides direct responses
                 about system setup, while passive reconnaissance allows quiet data
                 collection.
      Question   What are some common tools and techniques used for passive
                 reconnaissance?
398
      Answer     Common tools include open-source intelligence (OSINT) tools and checking
                 domain information in public databases.
      Question   What kind of information can be found through a simple Google search
                 in OSINT gathering?
399   Answer     A simple Google search can uncover various public details about a person or
                 organization, such as names, addresses, social media profiles, and other
                 online activity.
      Question   Why might a company use the contact details of their domain provider
                 instead of their own information in a Whois record?
401
      Answer     To keep their information private and protect the identity of the actual
                 domain owner.
      Question   Explain the difference between DNS lookup and Whois lookup in
                 information gathering.
402   Answer     DNS lookup provides IP addresses and DNS records associated with a
                 domain, while Whois lookup reveals domain ownership, registration, and
                 administrative contact details.
       403. Match the following tool with its main function in information gathering
       No Column A                No Column B                                   Answer
       1 Nmap                     A Gathers DNS information for a domain
       2 DNSRecon                 B Provides ownership details of a domain
       3 Whois                    C Scans open ports and services on a
                                      target
                                           No   Answer
                                           1    C
                                           2    A
                                           3    B
 No                            Question                                              Answer
 404 The method of gathering information about a target                          Passive
     without directly interacting with it is called __________
     reconnaissance.
 405 The act of gathering information about the enemy in the                     Reconnaissance
     military is like __________ in cybersecurity.
 406 The OSINT framework organizes various sources and                           categories
     methods for gathering data under different __________.
 407 An attacker may use tools like __________, host, and dig                    Nslookup
     to gather domain-related information.
 408 Creating a fake job posting to gather information about a                   social
     company’s technology setup is an example of a                               engineering
     __________ attack.
       No Question                                                                              Answer
       419 A UPS is primarily used to protect network devices from                              False
           unauthorized access.
       420 Video surveillance systems should be installed in critical areas like                True
           server rooms and data centers to monitor activity.
       421 Biometrics provide a higher level of security because they rely on                   True
           unique physical traits, such as fingerprints.
       422 A Layer 2 switch requires an IP address for remote management, but                   True
           it does not route traffic between networks.
       423 The command service password-encryption encrypts all passwords                       True
           stored on a Cisco device to enhance security.
       424 Privilege levels on Cisco devices range from 0 to 10, with 10 being                  False
           the highest level of access.
      Question   Why is it considered a security best practice to create a new VLAN for
                 switch management, such as VLAN 99, rather than using VLAN 1?
428
      Answer     VLAN 1 is the default VLAN on most switches, meaning all devices are
                 automatically part of it unless reconfigured. This makes it a common target
No Question                                                                            Answer
431 A critical benefit of using biometric security is that it reduces the              unauthorized
    risk of __________ by ensuring that only authorized personnel                      access
    can access secure areas.
432 Alarms can be set up to alert security teams via __________ or                     email alerts
    trigger loud sounds when a breach occurs.
433 To manage a Layer 2 switch remotely, you must assign it an IP                      Switch
    address through a __________.                                                      Virtual
                                                                                       Interface
                                                                                       (SVI)
No Question                                                                              Answer
434 What is the purpose of port scanning in a penetration test?                          B
    a) To delete data from the server
    b) To check which services are running on a system
    c) To increase network speed
    d) To protect the firewall
435 Which tool is commonly used to find devices and check their                          B
    security by scanning IP addresses and open ports?
    a) Wireshark
    b) Nmap
    c) nslookup
    d) DNSRecon
436 Which tool is used to capture and examine data traveling across a                    B
    network?
    a) Nmap
    b) Wireshark
    c) DNSRecon
    d) Nslookup
437 What happens when a device responds with an RST (reset) message                      B
    during an Nmap SYN scan?
    a) The port is open
    b) The port is closed
    c) The port is filtered
    d) The connection is completed
       No Question                                                                               Answer
       438 A firewall is used to protect servers by allowing only necessary                      True
           services to be visible.
       439 In a host discovery scan, ICMP messages are sent to check if a                        True
           device is online.
       440 Wireshark can be used for both learning about network security and                    True
           troubleshooting network issues.
       441 UDP scans require root privileges to execute on Nmap.                                 True
      Question   Explain the difference between active and filtered ports in an Nmap
                 scan.
442   Answer     An active (open) port responds to requests (like SYN/ACK), showing that
                 it’s ready to communicate, while a filtered port doesn’t respond, making it
                 unclear whether it's open or closed.
      Question   Describe one benefit and one risk of using Wireshark for network
                 sniffing.
      Answer        1. Benefit: Helps in troubleshooting network issues and understanding
443
                        network traffic.
                    2. Risk: If misused, it can capture sensitive data like passwords, leading
                        to privacy breaches.
                                          No   Answer
                                          1    C
                                          2    A
                                          3    B
       No Question                                                                              Answer
       445 In an Nmap SYN scan, if the response is a SYN/ACK, it means the                      Open
           port is __________.
       446 UDP scans are commonly used to check services such as                                DNS,
           __________, __________, or __________.                                               SNMP,
                                                                                                DHCP
      Question   What does a firewall do when data tries to leave or enter the internal
                 network?
447
      Answer     The firewall checks the data and decides whether it can pass through based
                 on its access control policy.
      Question   What happens when traffic from the public network tries to enter a
450              private network without permission?
      Answer     The firewall blocks it to protect the private network.
                                   No   Answer
                                   1    C
                                   2    A
                                   3    B
No Question                                                                        Answer
457 In a vulnerability scan, the scanner compares software it found                vulnerabilities
    to a list of known __________ to identify possible risks.
458 The __________ vulnerability scan method checks network                        passive
    traffic without directly interacting with the target system.
459 The best result in a vulnerability scan is a __________ because                True
    it means everything is safe.                                                   Negative
460 The best way to confirm if a vulnerability is real is to try to                exploit
    __________ it yourself.