1. What is the main purpose of encryption in telecommunications?
- A) To increase data transfer speed
- B) To ensure the privacy and confidentiality of data
- C) To reduce network congestion
- D) To provide network coverage
Answer: B) To ensure the privacy and confidentiality of data
2. Which of the following is a common method used to protect data integrity during transmission?
- A) Symmetric encryption
- B) Asymmetric encryption
- C) Hashing
- D) Data compression
Answer: C) Hashing
3. What is a common threat to telecommunications systems where attackers intercept and alter communications between two parties?
- A) Phishing
- B) Man-in-the-middle attack
- C) Denial of Service (DoS) attack
- D) Malware
Answer: B) Man-in-the-middle attack
4. Which of the following is a type of attack that disrupts a network’s availability by overwhelming it with excessive traffic?
- A) Phishing
- B) Distributed Denial of Service (DDoS)
- C) Malware
- D) Social engineering
Answer: B) Distributed Denial of Service (DDoS)
5. Which protocol is widely used to secure communication over the internet in telecommunication systems?
- A) FTP
- B) HTTP
- C) SSL/TLS
- D) SMTP
Answer: C) SSL/TLS
6. What is the purpose of a Virtual Private Network (VPN) in telecommunications?
- A) To increase the speed of data transmission
- B) To secure private communication over public networks
- C) To reduce latency
- D) To improve signal strength
Answer: B) To secure private communication over public networks
7. Which of the following is a form of authentication that involves something the user knows (like a password), something the user has (like a smart card), and something the user is (like a fingerprint)?
- A) Single-factor authentication
- B) Two-factor authentication
- C) Multi-factor authentication
- D) Biometric authentication
Answer: C) Multi-factor authentication
8. Which of the following is a vulnerability in wireless networks where attackers can eavesdrop on unencrypted communication?
- A) Eavesdropping
- B) Phishing
- C) Spoofing
- D) Social engineering
Answer: A) Eavesdropping
9. What does a firewall do in a telecommunication system?
- A) It prevents data loss during transmission
- B) It filters and blocks unauthorized network traffic
- C) It encrypts data
- D) It increases network bandwidth
Answer: B) It filters and blocks unauthorized network traffic
10. Which of the following is a type of malware that spreads through networks, often exploiting security vulnerabilities?
- A) Trojan
- B) Worm
- C) Spyware
- D) Ransomware
Answer: B) Worm
11. What does the term “spoofing” mean in the context of telecommunications security?
- A) Intercepting a network communication
- B) Impersonating another device or user to gain unauthorized access
- C) Denying access to a legitimate user
- D) Encrypting data to protect privacy
Answer: B) Impersonating another device or user to gain unauthorized access
12. Which of the following protocols is used to provide secure email communication in telecommunication systems?
- A) POP3
- B) IMAP
- C) SMTP
- D) PGP (Pretty Good Privacy)
Answer: D) PGP (Pretty Good Privacy)
13. What is the main objective of a Denial of Service (DoS) attack in a telecommunications network?
- A) To steal sensitive information
- B) To deny access to legitimate users by overwhelming the network
- C) To disrupt encrypted communications
- D) To perform unauthorized data modification
Answer: B) To deny access to legitimate users by overwhelming the network
14. Which of the following is an essential feature of a Secure Socket Layer (SSL) in telecommunications?
- A) It compresses data for faster transmission
- B) It ensures encryption of data during transmission
- C) It provides better data storage solutions
- D) It increases the range of wireless signals
Answer: B) It ensures encryption of data during transmission
15. Which type of cyber attack involves the use of fake emails or websites to deceive users into revealing personal information?
- A) Phishing
- B) Ransomware
- C) Malware
- D) Social Engineering
Answer: A) Phishing
16. What does the term “data breach” refer to in telecommunication security?
- A) Unauthorized access or disclosure of sensitive data
- B) Interception of data during transmission
- C) Loss of data due to system failure
- D) Unauthorized modification of data
Answer: A) Unauthorized access or disclosure of sensitive data
17. Which of the following is used to encrypt voice calls and secure communication in modern mobile networks?
- A) AES (Advanced Encryption Standard)
- B) WEP (Wired Equivalent Privacy)
- C) WPA2 (Wi-Fi Protected Access)
- D) IPsec (Internet Protocol Security)
Answer: A) AES (Advanced Encryption Standard)
18. What is the role of Digital Certificates in securing communication in telecommunication networks?
- A) They verify the identity of the sender or server
- B) They encrypt the data during transmission
- C) They increase the bandwidth of the network
- D) They improve the data transmission speed
Answer: A) They verify the identity of the sender or server
19. Which of the following is a type of encryption method where the same key is used for both encryption and decryption?
- A) Asymmetric encryption
- B) Symmetric encryption
- C) Hashing
- D) Digital signature
Answer: B) Symmetric encryption
20. Which of the following technologies is used to ensure the security of mobile devices and data transmitted over mobile networks?
- A) VPN
- B) Firewalls
- C) Mobile Device Management (MDM)
- D) Anti-virus software
Answer: C) Mobile Device Management (MDM)