250+ TOP MCQs on Network Security and Encryption and Answers

Computer Fundamentals Multiple Choice Questions on “Network Security and Encryption”.

1. The process of transforming plain text into unreadable text.
a) Decryption
b) Encryption
c) Network Security
d) Information Hiding

Answer: b
Clarification: Encryption is the process of transforming readable text i.e. plain text to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

2. An algorithm used in encryption is referred to as cipher.
a) True
b) False

Answer: a
Clarification: The statement is true. Cipher is the algorithm used in encryption. Encryption is making readable text as unreadable to keep it secured.

3. A process of making the encrypted text readable again.
a) Decryption
b) Encryption
c) Network Security
d) Information Hiding

Answer: a
Clarification: The reverse process is called decryption. It is the process of making the information readable again.

4. WTLS stands for?
a) Wireless Transport Security Layer
b) Wireless Transfer System Layer
c) Wireless Transfer Security Layer
d) Wireless Transport System Layer

Answer: a
Clarification: WTLS is Wireless Transport Security Layer. It provides security between the mobile device and the WAP gateway to internet.

5. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
a) WTLS
b) WEP
c) RSN
d) WP

Answer: b
Clarification: WEP stands for Wired Equivalent Privacy. WEP has been broken already in 2001. WEP protocol designed to make the security of wireless LAN as good as that of wired LAN.

6. A person who enjoys learning details about computers and how to enhance their capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller

Answer: b
Clarification: The person is called hacker. A person who enjoys learning the details of computer systems and how to stretch their capabilities is called hacker.

7. A program created by Farmer and Venema for auditing capability.
a) SAAS
b) SATAN
c) SAN
d) SAT

Answer: b
Clarification: SATAN is the Security analysis tool for auditing networks. It is created by farmer and venema.

8. A small program that changes the way a computer operates.
a) Worm
b) Trojan
c) Bomb
d) Virus

Answer: d
Clarification: The program is called virus. It alters the way that the computer operates. It often does damages like deleting and corrupting files and data.

9. A program that copies itself.
a) Worm
b) Virus
c) Trojan
d) Bomb

Answer: a
Clarification: A worm copies itself from one system to another over a network without the assistance of human.

10. An attack in which the site is not capable of answering valid request.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm

Answer: b
Clarification: The answer is Denial of service. In case of denial of service attacks, a computer site is bombarded with a lot of messages.

Leave a Reply

Your email address will not be published. Required fields are marked *