Network Security multiple choice questions

Network Security MCQ Question

1).To protect the information from unwanted addition accidentally or intentionally by unauthorised user,________is needed

Network security

2).________is concerned bid preventing unauthorised disclosure of sensitive information.

Confidentiality

3)._______install preventing the modification of information by unauthorised user.

Integrity

4).________assures that is system authorised user have timely and inaccess to the information in the system and to the network.

Availability

5)._______is Deep protection of personnel, hardware, software, network and data from physical action and event and could cause serious loss or dimaag to an enterprise agency of institution.

Physical security

6).An_________attempt to alter system resources or effect their operations.

Active attack

7)._________ attack take place when one entity pretends to be a different entity

Masquerade

8).In________ attack,the sender or receiver can be any letter that he or she has send or received a message.

Repudiation

9)._________ attack is the distruption of an entire network either by disabling the network or by overloading it by messages so as to degrade performance.

Denial of Services(DoS)

10).A________ attack attempts to make use of information from the system but does not affect system resources.

passive 

11).________ is any criminal activity that involves a computer , networked device or a network.

Cybercrime

12).Ethical hacking is also know as _________.

White hat Hacking oe penetration Testing

13). _______ hacking is used to improve the security of the system and networks by fixing the vulnerability found while testing.

Ethical

14).Gaining access to a system that are not supposed to have access is considered as _________.

hacking

15).A________ is someone who breakes into the telephone network illigally ,  typically to make free long -distance phone callls or to tap phone lines.

Phyreak

16). _________ is a method used by identity thieves to capture information from a cardholder.

Skimming

17). _________ is act of  breaking into a computer system for politically or socially motivated purposes.

Hacktivism

18)._________ is the sending of unsolicited messages over bluetooth to bluetooth-enabled devices.

Bluejacking

19).__________ is the unauthorised access of information from a wireless device through a bluetooth connection.

Bluesnarfing

20).__________ is the use of an exploit to remove manufacture or carrier restrictions from a device such as an iPhone or iPad.

Jailbreaking

21).A________ attack is an attempt to crack a password or user or find a a hidden bay page or find the key used to encrypt message using a trial and error approach.

Brute force

22).________simply mean a particular interval of time.

Session

23).________is a way to maintain state data of a user.

Session tracking

24)._________is a security attack on a user session over a protect network.

Session hijacking.

25).________ is the conversion of data into a from called a ciphertext.

Data encryption

26)._________ help you to protect the privacy of your message document and sensitive file.

Encryption

27)._________ is the process of converting encrypted data back into its original form ,so it is easily understood.

Decryption

28). Encrypt algorithm used a single secret key to encrypt and decrypt data.

Symmetric key

29).DES stands for_________.

Data encryption standard

30).PGP stunts for__________.

Pretty good privacy

31).RSA stands for__________.

Rivest-Shamir-Adleman

32)._________algorithm is used to increase the security of email communication. 

Pretty good privacy

33). In________cryptography both the public and private key can encrypt a message.

RSA

34).In_________cryptography a user has a pair of cryptography key.

Public key or symmetric key

35)._________ is used to encrypt the plaintext and the_________is used to decrypt the ciphertext.

Public key, private key

36). A________is a mathematical function that convert a numeric input value into another compressed numerical value.

Hash function

37). Value returned by a hash function are called____________.

Message digest or simply has value

38)._________is 128 bit hash function.

Message digest

39).SSL stands for_________.

Secure socket layer

40).________provides security to the data that is transferred between web browser and server.

SSL(secure socket layer)

41).SSH stands for_________.

Secure Shell or secure socket shell

42).________ is widely used by a network administrator for managing system and application remotely.

SSH

43)._______is a variant of the standard web transfer protocol (http) that adds a layer of security on the data.

Hypertext transfer protocol secure (https)

44).DSA stands for_________.

Digital signature algorithm

45). A_________is a mathematical scheme for demonstrating ji authenticity of of a message or document.

Digital signature

46). Digital signatures employ a type of________cryptography.

Asymmetric

47).________encrypt and decrypt a block of the text at a time.

Block cipher

48).________encrypt and decrypt the text by talking the invite of the text at a time.

Stream cipher

49)._______is a software or computer program that connect itself to another software or computer program to harm computer system.

Virus

50).________ replicate itself to cause slow down the computer system.

Worms

51).________ is a destructive program that looks as a genuine application

Trojan Horse

 52).________software is a program or set of a program that are designed to prevent search for detect and remove software viruses and other malicious software like Trojan adware and more.

Antivirus

53).________is a sum that checks the validity of data.

Checksum

54).A________ is the process of using antivirus software to scan and identify virus in a computing device.

Virus scan

54).________detect threads by looking for specific commands or instructions that would not typically be found and application.

Zombie

55).A_________network is also now as a botnet.

Zombie

56)._________ is a type of malware that prevent users from accessing their system or personal file and demands ransom payment in order to regain access.

Ransomware

57). A__________ is a type of cyber security tool that is used to filter traffic on a network.

Firewall

58).__________ can be used to separate network nodes from external traffic source internal traffic source or even specify application.

Firewalls

59). The_________ firewall inspect the information such as the destination and organisation IP address packets type port number etc without opening up the packets to inspect its content.

Packet filtering

60)._________ gateway work by verifying the transmission control protocol (TCP).

Circuit level

61).__________firewall combine both packets inspection technology and TCP handshake verification to create a protection.

Stateful inspection

62)._________ firewalls operate at the application layer to filter incoming traffic between your network and the traffic source.

Proxy aur application level gateway

63). _________ firewalls use a physical appliance that act in a manner similar to a traffic router to intercept data packet and traffic request before they are connected to the network server.

Hardware

64). _________ firewalls include any type of revolt that is installed on a local device rather than a separate piece of hardware.

Software

65).________ can be used to restrict access to specific services.

Firewalls

66)._________ firewalls rules protect against outgoing traffic such as request to tu dangerous websites VPN (virtual private network) connection and email service.

Outbound

67)._________ firewall rules protect the network against incoming traffic from the internet or other network segments.

Inbound

68). In________, items not on the approved list are restricted for or Danied depending on your company needs.

Whitelisting

69). In_________ items not on the unapproved list can be used without any modification aur control.

Blacklisting








Comments

Post a Comment