Xirius-NetworkSecurityampManagementNetworkMonitoringandManagementTools8-CSC215.pdf

Course: CSC215 • Xirius AI

1. Which type of firewall provides both traditional filtering and advanced features like deep packet inspection and application-level control?

2. What is the main threat that phishing attacks aim to exploit?

3. What is the significance of ensuring high uptime and availability in network services?

4. Why is monitoring packet loss especially critical for Nigerian banks' online platforms?

5. Which is an example of an anomaly-based detection alert?

6. How do Nigerian fintech companies use Zero Trust Architecture effectively?

7. What is a common example of a phishing attack?

8. What kind of attack is brute-force login attempts, and which tool can help prevent it?

9. In Nigerian universities, how is NetFlow used during online exams?

10. In the context of IoT security monitoring, what is a key concern that must be addressed?

11. What is the main advantage of using NetFlow or sFlow protocols in network monitoring?

12. What is the primary purpose of SIEM platforms in network security?

13. Why is high uptime and availability critical for Nigerian banks’ ATM and online services?

14. What is the main focus of performance management in network monitoring?

15. What role do NetFlow and sFlow protocols play in network monitoring?

16. How can packet loss affect network performance?

17. How does anomaly-based detection differ from signature-based detection in IDS/IPS systems?

18. What is the main advantage of anomaly-based detection in IDS/IPS systems?

19. What does the FCAPS model stand for in network management?

20. Which type of malware disguises itself as legitimate software to trick users?

21. What is the purpose of log analyzers in network security monitoring?

22. What is the primary goal of fault management?

23. What is the main function of Syslog in network monitoring?

24. What does packet loss typically cause in a network?

25. In the context of network security, what does the Zero Trust Architecture emphasize?

26. Why do Nigerian universities monitor their Wi-Fi network performance?

27. Why is monitoring CPU and memory utilization important for network devices?

28. How do Nigerian smart city projects benefit from IoT security monitoring?

29. Which tool is used for monitoring bandwidth usage and device health using SNMP and packet sniffing?

30. What role do proxy firewalls play in network security?

31. What is the primary purpose of a SIEM platform in network security?

32. What capability do Next-Generation Firewalls provide beyond traditional firewalls?

33. How does security management enhance network protection?

34. What is the fundamental principle behind Zero Trust Architecture in network security?

35. In the context of Nigerian banks, how are log analyzers used?

36. What role does the FCAPS model play in network management?

37. What is a common delivery method for phishing attacks?

38. How do Intrusion Prevention Systems (IPS) differ from Intrusion Detection Systems (IDS)?

39. What is an example of continuous verification in Zero Trust Architecture?

40. What is the key difference between a worm and a virus in malware classification?

41. Why is configuration management critical in network management?

42. What does accounting management track in network systems?

43. Which of the following is NOT a type of firewall mentioned?

44. Which of the following best describes the function of an Intrusion Prevention System (IPS)?

45. How do Nigerian ISPs use network traffic analyzers?

46. Which of the following is NOT part of the CIA Triad in network security?

47. Why is configuration management important in network security?

48. How do Nigerian ISPs utilize network traffic analyzers?

49. What is a major weakness of signature-based detection in IDS systems?

50. Which tool would most likely be used to capture and inspect detailed network protocol data for troubleshooting?