250+ TOP MCQs on Network Security and Answers

Computer Fundamentals Multiple Choice Questions on “Network Security”.

1. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT

Answer: c
Clarification: Network security covers a variety of computer networks, both private and public. Everyday jobs like conducting transactions and communications among business and government agencies etc.

2. Network Security provides authentication and access control for resources.
a) True
b) False

Answer: a
Clarification: The statement is true. AFS is an example. It helps us protect vital information.

3. Which is not an objective of network security?
a) Identification
b) Authentication
c) Access control
d) Lock

Answer: d
Clarification: The Identification, Authentication and Access control are the objectives of network security. There is no such thing called lock.

4. Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint

Answer: a
Clarification: The answer is UserID. UserID is a part of identification. UserID can be a combination of username, user student number etc.

5. The process of verifying the identity of a user.
a) Authentication
b) Identification
c) Validation
d) Verification

Answer: a
Clarification: It is called an authentication. It is typically based on passwords, smart card, fingerprint, etc.

6. A concern of authentication that deals with user rights.
a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification

Answer: c
Clarification: Functional authorization is concerned with individual user rights. Authorization is the function of specifying access rights to resources related to information security.

7. CHAP stands for?
a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol

Answer: a
Clarification: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP: plaintext, memorized token. Protocol uses Telnet, HTTP.

8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control

Answer: d
Clarification: Access control refers to the security features. Applications call access control to provide resources.

9. An algorithm in encryption is called _____________
a) Algorithm
b) Procedure
c) Cipher
d) Module

Answer: c
Clarification: An algorithm used in encryption is referred to as a cipher. cipher is an algorithm for performing encryption or decryption

10. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text

Answer: a
Clarification: The text that gets transformed is called plain text. The algorithm used is called cipher.

Leave a Reply

Your email address will not be published. Required fields are marked *