Network Security multiple choice questions
Network Security MCQ Question
1).To protect the information from unwanted addition accidentally or intentionally by unauthorised user,________is needed
Network security
2).________is concerned bid preventing unauthorised disclosure of sensitive information.
Confidentiality
3)._______install preventing the modification of information by unauthorised user.
Integrity
4).________assures that is system authorised user have timely and inaccess to the information in the system and to the network.
Availability
5)._______is Deep protection of personnel, hardware, software, network and data from physical action and event and could cause serious loss or dimaag to an enterprise agency of institution.
Physical security
6).An_________attempt to alter system resources or effect their operations.
Active attack
7)._________ attack take place when one entity pretends to be a different entity
Masquerade
8).In________ attack,the sender or receiver can be any letter that he or she has send or received a message.
Repudiation
9)._________ attack is the distruption of an entire network either by disabling the network or by overloading it by messages so as to degrade performance.
Denial of Services(DoS)
10).A________ attack attempts to make use of information from the system but does not affect system resources.
passive
11).________ is any criminal activity that involves a computer , networked device or a network.
Cybercrime
12).Ethical hacking is also know as _________.
White hat Hacking oe penetration Testing
13). _______ hacking is used to improve the security of the system and networks by fixing the vulnerability found while testing.
Ethical
14).Gaining access to a system that are not supposed to have access is considered as _________.
hacking
15).A________ is someone who breakes into the telephone network illigally , typically to make free long -distance phone callls or to tap phone lines.
Phyreak
16). _________ is a method used by identity thieves to capture information from a cardholder.
Skimming
17). _________ is act of breaking into a computer system for politically or socially motivated purposes.
Hacktivism
18)._________ is the sending of unsolicited messages over bluetooth to bluetooth-enabled devices.
Bluejacking
19).__________ is the unauthorised access of information from a wireless device through a bluetooth connection.
Bluesnarfing
20).__________ is the use of an exploit to remove manufacture or carrier restrictions from a device such as an iPhone or iPad.
Jailbreaking
21).A________ attack is an attempt to crack a password or user or find a a hidden bay page or find the key used to encrypt message using a trial and error approach.
Brute force
22).________simply mean a particular interval of time.
Session
23).________is a way to maintain state data of a user.
Session tracking
24)._________is a security attack on a user session over a protect network.
Session hijacking.
25).________ is the conversion of data into a from called a ciphertext.
Data encryption
26)._________ help you to protect the privacy of your message document and sensitive file.
Encryption
27)._________ is the process of converting encrypted data back into its original form ,so it is easily understood.
Decryption
28). Encrypt algorithm used a single secret key to encrypt and decrypt data.
Symmetric key
29).DES stands for_________.
Data encryption standard
30).PGP stunts for__________.
Pretty good privacy
31).RSA stands for__________.
Rivest-Shamir-Adleman
32)._________algorithm is used to increase the security of email communication.
Pretty good privacy
33). In________cryptography both the public and private key can encrypt a message.
RSA
34).In_________cryptography a user has a pair of cryptography key.
Public key or symmetric key
35)._________ is used to encrypt the plaintext and the_________is used to decrypt the ciphertext.
Public key, private key
36). A________is a mathematical function that convert a numeric input value into another compressed numerical value.
Hash function
37). Value returned by a hash function are called____________.
Message digest or simply has value
38)._________is 128 bit hash function.
Message digest
39).SSL stands for_________.
Secure socket layer
40).________provides security to the data that is transferred between web browser and server.
SSL(secure socket layer)
41).SSH stands for_________.
Secure Shell or secure socket shell
42).________ is widely used by a network administrator for managing system and application remotely.
SSH
43)._______is a variant of the standard web transfer protocol (http) that adds a layer of security on the data.
Hypertext transfer protocol secure (https)
44).DSA stands for_________.
Digital signature algorithm
45). A_________is a mathematical scheme for demonstrating ji authenticity of of a message or document.
Digital signature
46). Digital signatures employ a type of________cryptography.
Asymmetric
47).________encrypt and decrypt a block of the text at a time.
Block cipher
48).________encrypt and decrypt the text by talking the invite of the text at a time.
Stream cipher
49)._______is a software or computer program that connect itself to another software or computer program to harm computer system.
Virus
50).________ replicate itself to cause slow down the computer system.
Worms
51).________ is a destructive program that looks as a genuine application
Trojan Horse
52).________software is a program or set of a program that are designed to prevent search for detect and remove software viruses and other malicious software like Trojan adware and more.
Antivirus
53).________is a sum that checks the validity of data.
Checksum
54).A________ is the process of using antivirus software to scan and identify virus in a computing device.
Virus scan
54).________detect threads by looking for specific commands or instructions that would not typically be found and application.
Zombie
55).A_________network is also now as a botnet.
Zombie
56)._________ is a type of malware that prevent users from accessing their system or personal file and demands ransom payment in order to regain access.
Ransomware
57). A__________ is a type of cyber security tool that is used to filter traffic on a network.
Firewall
58).__________ can be used to separate network nodes from external traffic source internal traffic source or even specify application.
Firewalls
59). The_________ firewall inspect the information such as the destination and organisation IP address packets type port number etc without opening up the packets to inspect its content.
Packet filtering
60)._________ gateway work by verifying the transmission control protocol (TCP).
Circuit level
61).__________firewall combine both packets inspection technology and TCP handshake verification to create a protection.
Stateful inspection
62)._________ firewalls operate at the application layer to filter incoming traffic between your network and the traffic source.
Proxy aur application level gateway
63). _________ firewalls use a physical appliance that act in a manner similar to a traffic router to intercept data packet and traffic request before they are connected to the network server.
Hardware
64). _________ firewalls include any type of revolt that is installed on a local device rather than a separate piece of hardware.
Software
65).________ can be used to restrict access to specific services.
Firewalls
66)._________ firewalls rules protect against outgoing traffic such as request to tu dangerous websites VPN (virtual private network) connection and email service.
Outbound
67)._________ firewall rules protect the network against incoming traffic from the internet or other network segments.
Inbound
68). In________, items not on the approved list are restricted for or Danied depending on your company needs.
Whitelisting
69). In_________ items not on the unapproved list can be used without any modification aur control.
Blacklisting
super
ReplyDeleteImpressive
ReplyDeleteImformtive