This section contains MCQ on Network security to test your basic knowledge on the topics. Each question is multiple choice type with a single answer. The section consists of 20 questions with multiple-choice options.
MCQ – Network Security – Section 1
1: Which of the following is correct in connection with the password policy?
- Usually, password length must be more than 8 characters
- Password must contain upper case, lower case, numbers, and special characters
- There should be different passwords for different login accounts.
- All of the above
ANSWER: D
2: DDoS stands for _______________.
- Distributed Denial of Service
- Distributed Disc operating Service
- Dynamic Denial of Service
- None of the above
ANSWER: A
3: Which of the following options doesn’t belong to the category of the hacker?
- White Hat Hackers
- Grey Hat Hackers
- Red Hat Hackers
- Black hat Hackers
ANSWER: C
4: Which of the following does not help to protect your computer from external threats?
- System Restore
- Internet Security
- Firewall
- Antivirus software
ANSWER: A
5: _____________ type of cyber attack is performed by hackers without the use of any computer software program.
- Cross-Site Scripting
- ARP Poisoning
- SQL Injection
- Social Engineering
ANSWER: D
6: This is a type of cyber attack that has a program running on your server to bypass the authorization.
- DoS
- Phishing
- Backdoor
- Sniffing
ANSWER: C
7: ECB in the context of digital cryptography stands for
- Electrical Circuit Board
- Electronic Code Book
- Electrical Code Book
- Electronic Circuit Book
ANSWER: B
8: Which of the following statements describe a type of Phishing attack?
- Sending someone an email that contains a malicious link by disguising to appear like an email from someone the person knows.
- Creating a fake website that appears to be identical to the real website and trick users to enter their login information
- Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.
- All of the above
ANSWER: D
9: Which of the following statement is true?
- All the website on the Internet is trustworthy
- If your email attachments look suspicious, do not open it
- Keep all the passwords the same for your different login accounts.
- Using a pirated software doesn’t compromise your system security
ANSWER: B
10: Which of the following is the oldest hacking techniques used by hackers to make free calls?
- Phishing
- Hashing
- Phreaking
- Cracking
ANSWER: C
11: The term “Cyberspace” was coined by ____________.
- William Gibson
- Andrew Tannenbaum
- Richard Stallman
- Scott Fahlman
ANSWER: A
12: Which one of the following techniques used by hackers to trick the users in order to disclose their username and passwords through fake websites?
- Social Engineering
- Cookie stealing
- Phishing
- Cyberstalking
ANSWER: C
13: ___________ is the first person who was responsible for distributing computer worms through the Internet.
- Richard Stallman
- Vladimir Levin
- Bill Landreth
- Robert T. Morris
ANSWER: D
14: __________ server is used to create a secure tunnel connection.
- Radius
- VPN
- Proxy
- DNS
ANSWER: B
15: When you access your net-banking account, you are also able to access your credit card details, check-ordering services, and a mortgage site without entering your credentials again. Which of the following services does this describe?
- SAML
- SSO
- Kerberos
- Multiple authentications
ANSWER: B
16: The encryption technique that uses one message to hide another message is called _____ .
- MDA
- Hashing
- Steganography
- None of the above
ANSWER: C
17: Which of the following is the process of investigating a computer system for any evidence about the event?
- Virus Scanning
- Security policy
- Evidence gathering
- Computer forensics
ANSWER: D
18: _______________ is the term used in computer security to protect your data from getting disclosed.
- Integrity
- Authentication
- Confidentiality
- Availability
ANSWER: C
19: ___________ is the term used in computer security to protect the data from being modified by the unauthorized user.
- Integrity
- Authentication
- Confidentiality
- Availability
ANSWER: A
20: _______________ is the term used in computer security that only the authorized users are allowed to access the information.
- Integrity
- Authentication
- Confidentiality
- Availability
ANSWER: D