Computer Fundamentals Multiple Choice Questions on “Network Security”.
1. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT
Answer: c
Clarification: Network security covers a variety of computer networks, both private and public. Everyday jobs like conducting transactions and communications among business and government agencies etc.
2. Network Security provides authentication and access control for resources.
a) True
b) False
Answer: a
Clarification: The statement is true. AFS is an example. It helps us protect vital information.
3. Which is not an objective of network security?
a) Identification
b) Authentication
c) Access control
d) Lock
Answer: d
Clarification: The Identification, Authentication and Access control are the objectives of network security. There is no such thing called lock.
4. Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint
Answer: a
Clarification: The answer is UserID. UserID is a part of identification. UserID can be a combination of username, user student number etc.
5. The process of verifying the identity of a user.
a) Authentication
b) Identification
c) Validation
d) Verification
Answer: a
Clarification: It is called an authentication. It is typically based on passwords, smart card, fingerprint, etc.
6. A concern of authentication that deals with user rights.
a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification
Answer: c
Clarification: Functional authorization is concerned with individual user rights. Authorization is the function of specifying access rights to resources related to information security.
7. CHAP stands for?
a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol
Answer: a
Clarification: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP: plaintext, memorized token. Protocol uses Telnet, HTTP.
8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
Answer: d
Clarification: Access control refers to the security features. Applications call access control to provide resources.
9. An algorithm in encryption is called _____________
a) Algorithm
b) Procedure
c) Cipher
d) Module
Answer: c
Clarification: An algorithm used in encryption is referred to as a cipher. cipher is an algorithm for performing encryption or decryption
10. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
Answer: a
Clarification: The text that gets transformed is called plain text. The algorithm used is called cipher.