MCQ – Network Security

This section contains MCQ on Network security to test your basic knowledge on the topics.  Each question is multiple choice type with a single answer.  The section consists of 20 questions with multiple-choice options.

MCQ – Network Security – Section 1


1: Which of the following is correct in connection with the password policy?

  1. Usually, password length must be more than 8 characters
  2. Password must contain upper case, lower case, numbers, and special characters
  3. There should be different passwords for different login accounts.
  4. All of the above

ANSWER: D


2: DDoS stands for _______________.

  1. Distributed Denial of Service
  2. Distributed Disc operating Service
  3. Dynamic Denial of Service
  4. None of the above

ANSWER: A


3: Which of the following options doesn’t belong to the category of the hacker?

  1. White Hat Hackers
  2. Grey Hat Hackers
  3. Red Hat Hackers
  4. Black hat Hackers

ANSWER: C


4: Which of the following does not help to protect your computer from external threats?

  1. System Restore
  2. Internet Security
  3. Firewall
  4. Antivirus software

ANSWER: A


5: _____________ type of cyber  attack is performed by hackers without the use of any computer software program.

  1. Cross-Site Scripting
  2. ARP Poisoning
  3. SQL Injection
  4. Social Engineering 

ANSWER: D


6: This is a type of cyber attack that has a program running on your server to bypass the authorization.

  1. DoS
  2. Phishing
  3. Backdoor
  4. Sniffing

ANSWER: C


7: ECB in the context of  digital cryptography stands for

  1. Electrical Circuit Board
  2. Electronic Code Book
  3. Electrical Code Book
  4. Electronic Circuit Book

ANSWER: B


8: Which of the following statements describe a type of Phishing attack?

  1. Sending someone an email that contains a malicious link by disguising to appear like an email from someone the person knows.
  2. Creating a fake website that appears to be identical to the  real website and  trick users to enter  their login information
  3. Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.
  4. All of the above

ANSWER: D


9: Which of the following statement is true?

  1. All the website on the Internet is trustworthy
  2. If your email attachments look suspicious, do not open it
  3. Keep all the passwords the same for your different login accounts.
  4. Using a pirated software doesn’t compromise your system security

ANSWER: B


10: Which of the following is the oldest hacking techniques used by hackers to make free calls?

  1. Phishing
  2. Hashing
  3. Phreaking
  4. Cracking

ANSWER: C


11: The term “Cyberspace” was coined by ____________.

  1. William Gibson
  2. Andrew Tannenbaum
  3.  Richard Stallman
  4. Scott Fahlman

ANSWER: A


12: Which one of the following techniques used by hackers to trick the users in order to disclose their username and passwords through fake websites? 

  1. Social Engineering
  2. Cookie stealing
  3. Phishing
  4. Cyberstalking

ANSWER: C


13:  ___________ is the first person who was responsible for distributing computer worms through the Internet.

  1. Richard Stallman
  2. Vladimir Levin
  3. Bill Landreth
  4. Robert T. Morris

ANSWER: D


14: __________ server is used to create a secure tunnel connection.

  1. Radius
  2. VPN
  3. Proxy
  4. DNS

ANSWER: B


15: When you access your net-banking account, you are also able to access your credit card details, check-ordering services, and a mortgage site without entering your credentials again. Which of the following services does this describe?

  1. SAML
  2. SSO
  3. Kerberos
  4. Multiple authentications

ANSWER: B


16: The encryption technique that uses one message to hide another message is called _____ .

  1. MDA 
  2. Hashing
  3. Steganography
  4. None of the above

ANSWER: C


17: Which of the following is the process of investigating a computer system for any evidence about the event?

  1. Virus Scanning
  2. Security policy
  3. Evidence gathering
  4. Computer forensics

ANSWER: D


18: _______________ is the term used in computer security to protect your data from getting disclosed.

  1. Integrity 
  2. Authentication
  3. Confidentiality
  4. Availability

ANSWER: C


19: ___________ is the term used in computer security to protect the data from being modified by the unauthorized user.

  1. Integrity
  2. Authentication
  3. Confidentiality
  4. Availability

ANSWER: A


20: _______________ is the term used in computer security that only the authorized users are allowed to access the information.

  1. Integrity
  2. Authentication
  3. Confidentiality
  4. Availability

ANSWER: D


Recommended MCQ Quizzes

MCQ – CCNA 200-301 Practice Quiz

MCQ – Computer Networking

MCQ – Computer Hardware

MCQ – Computer Fundamentals