MCQ on Network security.
1. Network Security provides authentication and access control for resources.
a)True
b)False
Ans:
a
2.
Which is not an objective of network security?
a)
Identification
b)
Authentication
c)
Access control
d) Lock
Ans:
d
3.
The process of verifying the identity of a user.
a)
Authentication
b)
Identification
c)
Validation
d) Verification
Ans:
a
4.
The information that gets transformed in encryption is ____________
a)
Plain text
b)
Parallel text
c)
Encrypted text
d) Decrypted text
Ans:
a
5.
Network security consists of:
A.
Protection
B.
Detection
C.
Reaction
D. All of the above
Ans:
d
6.
Which of the following we should configure your systems and networks as
correctly as possible?
A.
Protection
B.
Detection
C.
Reaction
D. None of the above
Ans:
a
7.
The text that gets transformed using algorithm cipher is called?
A.
Complex text
B.
Transformed text
C.
Plain text
D.
Scalar text
Ans:
c
8.
Firewalls are often configured to block ___________
a)
UDP traffic
b)
TCP traffic
c)
Sensitive traffic
d) Best-effort traffic
Ans:
a
9.
In a network, If P is the only packet being transmitted and there was no
earlier transmission, which of the following delays could be zero?
a)
Propagation delay
b)
Queuing delay
c)
Transmission delay
d) Processing delay
Ans:
b
10.
According to the CIA Triad, which of the below-mentioned element is not
considered in the triad?
a)
Confidentiality
b)
Integrity
c)
Authenticity
d) Availability
Ans:
c
11.
This is the model designed for guiding the policies of Information security
within a company, firm, or organization. What is “this” referred to here?
a)
Confidentiality
b)
Non-repudiation
c)
CIA Triad
d) Authenticity
Ans:
c
12.
CIA triad is also known as ________
a)
NIC (Non-repudiation, Integrity, Confidentiality)
b)
AIC (Availability, Integrity, Confidentiality)
c)
AIN (Availability, Integrity, Non-repudiation)
d) AIC (Authenticity,
Integrity, Confidentiality)
Ans:
b
13.
When you use the word _____ it means you are protecting your data from getting
disclosed.
a)
Confidentiality
b)
Integrity
c)
Authentication
d) Availability
Ans:
a
14.
______ means the protection of data from modification by unknown users.
a)
Confidentiality
b)
Integrity
c)
Authentication
d) Non-repudiation
Ans:
b
15.
When integrity is lacking in a security system, _________ occurs.
a)
Database hacking
b)
Data deletion
c)
Data tampering
d) Data leakage
Ans:
c
16.
_______ of information means, only authorised users are capable of accessing
the information.
a)
Confidentiality
b)
Integrity
c)
Non-repudiation
d) Availability
Ans:
d
17.
Why these 4 elements (confidentiality, integrity, authenticity &
availability) are considered fundamental?
a)
They help understanding hacking better
b)
They are key elements to a security breach
c)
They help understands security and its components better
d) They help to
understand the cyber-crime better
Ans:
c
18.
This helps in identifying the origin of information and authentic user. This
referred to here as __________
a)
Confidentiality
b)
Integrity
c)
Authenticity
d) Availability
Ans: c
19.
Data ___________ is used to ensure confidentiality.
a)
Encryption
b)
Locking
c)
Deleting
d) Backup
Ans:
a
20.
One common way to maintain data availability is __________
a)
Data clustering
b)
Data backup
c)
Data recovery
d) Data Altering
Ans:
b