Networking MCQ
Networking MCQ
4. Which of the following is independent malicious program that need not any host program?
A) Trap doors
B) Trojan horse
C) Virus
D) Worm
5. The .. is code that recognizes some special sequence of input or is triggered by being
run from a certain user ID of by unlikely sequence of events.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
6. The .. is code embedded in some legitimate program that is set to explode when
certain conditions are met.
A) Trap doors
B) Trojan horse
C) Logic Bomb
D) Virus
10. A .. is a program that can infect other programs by modifying them, the
modification includes a copy of the virus program, which can go on to infect other programs.
A) Worm
B) Virus
C) Zombie
D) Trap doors
Answers:
1. B) Integrity 6. C) Logic Bomb
2. A) Confidentiality 7. A) Trojan Horse
3. C) i, ii, iii and v only 8. C) Trojan Horses
4. D) Worm 9. C) True, True
5. A) Trap doors 10. B) Virus
1. When an attempt is to make a machine or network resource unavailable to its intended users,
the attack is called
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack
View Answer
Answer:a
Explanation:None.
2. The code segment that misuses its environment is called a
a) internal thief
b) trojan horse
c) code stacker
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
3. The internal code of any software that will set of a malicious function when specified
conditions are met, is called
a) logic bomb
b) trap door
c) code stacker
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
4. The pattern that can be used to identify a virus is known as
a) stealth
b) virus signature
c) armoured
d) multipartite
View Answer
Answer:b
Explanation:None.
5. Which one of the following is a process that uses the spawn mechanism to revage the system
performance?
a) worm
b) trojen
c) threat
d) virus
View Answer
Answer:a
Explanation:None.
6. What is a trap door in a program?
a) a security hole, inserted at programming time in the system for later use
b) a type of antivirus
c) security hole in a network
d) none of the mentioned
View Answer
Answer:a
Explanation:None.
7. Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
View Answer
Answer:b
Explanation:None.
8. File virus attaches itself to the
a) source file
b) object file
c) executable file
d) all of the mentioned
View Answer
Answer:c
Explanation:None.
9. Multipartite viruses attack on
a) files
b) boot sector
c) memory
d) all of the mentioned
View Answer
Answer:d
Explanation:None.
10. In asymmetric encryption
a) same key is used for encryption and decryption
b) different keys are used encryption and decryption
c) no key is required for encryption and decryption
d) none of the mentioned
View Answer
Answer:b
Explanation:None.
1) Which of the following are forms of malicious attack ?
a) Theft of information
b) Modification of data
c) Wiping of information
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
2) What are common security threats ?
a) File Shredding
b) File sharing and permission
c) File corrupting
d) File integrity
View Answer
Answer: b
Explanation: Sharing and associated permissions are usual exploits which can compromised the
system.
3) From the following, which is not a common file permission ?
a) Write
b) Execute
c) Stop
d) Read
View Answer
Answer: c
Explanation: None.
4) Which of the following is a good practice ?
a) Give full permission for remote transferring
b) Grant read only permission
c) Grant limited permission to specified account
d) Give both read and write permission but not execute.
View Answer
Answer: c
Explanation: limited access is a key method to circumvent unauthorized access and exploits.
5) What is not a good practice for user administration ?
a) Isolating a system after a compromise
b) Perform random auditing procedures
c) Granting privileges on a per host basis
d) Using telnet and FTP for remote access.
View Answer
Answer: d
Explanation: Telnet and FTP are not encrypted and can be compromised.
6) Which of the following is least secure method of authentication ?
a) Key card
b) fingerprint
c) retina pattern
d) Password
View Answer
Answer: d
Explanation: Passwords can be be compromised more easily than to replicate a physical thing
like key card, fingerprint or retina.
7) Which of the following is a strong password ?
a) 19thAugust88
b) Delhi88
c) P@assw0rd
d) !augustdelhi
View Answer
Answer: c
Explanation: It has a combination of Alphabet both capital and small along with number and
special character. Thus always use complex password with combination of all these.
8) Why is one time password safe ?
a) It is easy to generated
b) It cannot be shared
c) It is different for every access
d) It is a complex enctypted password
View Answer
Answer: c
Explanation: One time password is safe since it is generated per access and thus cannot be brute
forced or deduced.
9) What does Light Directory Access Protocol (LDAP) doesnt store ?
a) Users
b) Address
c) Passwords
d) Security Keys
View Answer
Answer: b
Explanation: None.
10) What is characteristic of RADIUS system ?
a) It is essential for centralized encryption and authentication
b) It works on Network layer to deny access to unauthorized people
c) It provides centralized authentication mechanism via network devices
d) Its a strong File access system.
View Answer
Answer: c
Explanation: None.
11) Which happens first authorization or authentication ?
a) Authorization
b) Authentication
c) Both are same
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
12) What is characteristics of Authorization ?
a) RADIUS and RSA
b) 3 way handshaking with syn and fin.
c) Multilayered protection for securing resources
d) Deals with privileges and rights
View Answer
Answer: d
Explanation: None.
13) What forces the user to change password at first logon ?
a) Default behavior of OS
b) Part of AES encryption practice
c) Devices being accessed forces the user
d) Account administrator
View Answer
Answer: d
Explanation: Its administrators job to ensure that password of the user remains private and is
known only to user. But while making a new user account he assigns a random general password
to give it to user. Thus even administrator cannot access a particular users account.
14) What is not a best practice for password policy ?
a) Deciding maximum age of password
b) Restriction on password reuse and history
c) Password encryption
d) Having change password every 2 years.
View Answer
Answer: d
Explanation: Old passwords are more vulnerable to being misplaced or compromised. Passwords
should be changed periodically to enhance security.
1. It is anti-virus software
2. It is just a program
3. It is virus program
4. None of the above
Q2. What is the name of the viruses that fool a user into downloading and/or executing them by
pretending to be useful applications?
1. Cracker
2. Worm
3. Trojan horses
4. Keylogger
1. Boot virus
2. Macro virus
3. File virus
4. Anti virus
1. Hardware
2. Software
3. FRIDAY 13
4. Command.Com
ANSWER: Command.Com
1. It is hardware
2. It is system software
3. It is a computer program
4. It is a windows tool
Q6. What kind of attempts is made by individuals to obtain confidential information from a
person by falsifying their identity?
1. Computer viruses
2. Spyware scams
3. Phishing scams
4. None of the above
View Answer / Hide Answer
1. Time
2. Bomb
3. Anti-virus
4. None of the above
ANSWER: Bomb
1. Brain
2. Mind
3. ELK cloner
4. None of the above.
ANSWER: Brain
Q10. What is the name of first computer virus?
1. The Famous
2. HARLIE
3. PARAM
4. Creeper
ANSWER: Creeper
Q11. The difference between a virus and a self-replicating program which is like a virus is that
rather than creating copies of itself on only one system it propagate through computer
1. Keylogger
2. Cracker
3. Worm
4. All of the above
ANSWER: Worm
1. It is a computer
2. It is a program code
3. It is a company name
4. It is an application
Previous
Next
Post your comment
Discussion
RE: Computer Virus - computer awareness questions -Brinda Mishra (03/07/15)
Correct answer is Phishing scams and not Computer Virus
What kind of attempts is made by individuals to obtain confidential information from a person
by falsifying their identity?
1. Computer viruses
2. Spyware scams
3. Phishing scams
4. None of the above
A) Cryptography
B) Cryptoanalysis
A) ciphertext
B) plaintext
C) secret-text
A) ciphertext
B) plaintext
C) secret-text
A) encryption
B) decryption
A) encryption
B) decryption
A) cipher
B) secret
C) key
A) cipher
B) secret
C) key
In a(n) ________ cipher, the same key is used by both the sender and
8 CORRECT
receiver.
A) symmetric-key
B) asymmetric-key
A) symmetric-key
B) asymmetric-key
A) symmetric-key
B) asymmetric-key
A) private
B) public
A) private
B) public
A) substitution
B) transposition
A) Substitution
B) Transposition
A) transposition
B) additive
C) shift
A) transposition
B) additive
C) shift
A) substitution
B) transposition
A) S-box
B) P-box
C) T-box
A) S-box
B) P-box
C) T-box
A) round
B) circle
C) square
A) symmetric-key
B) asymmetric-key
A) 14
B) 15
C) 16
A) 2
B) 3
C) 4
D) 5
24 INCORRECT DES uses a key generator to generate sixteen _______ round keys.
A) 32-bit
B) 48-bit
C) 54-bit
D) 42-bit
25 INCORRECT ________ DES was designed to increase the size of the DES key
A) Double
B) Triple
C) Quadruple
A) AEE
B) AED
C) AER
D) AES
27 CORRECT AES has _____ different configurations
A) two
B) three
C) four
D) five
A) block
B) stream
C) field
A) RSS
B) RAS
C) RSA
D) RAA
B) RSA
C) DES
D) AES
A) man-in-the-middle
B) ciphertext attack
C) plaintext attack
3. The following protocols and system are commonly used to provide various degrees of security
services in computer network.
i) IP filtering ii) Reverse Address Translation
iii) IP security Architecture (IPsec) iv) Firewalls v) Socks
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v
4. A firewall is installed at the point where the secure internal network and untrusted external
network meet which is also known as
A) Chock point
B) meeting point
C) firewall point
D) secure point
7. .. is used to carry traffic of one protocol over network that does not support
that protocol directly.
A) Tunneling
B) Transferring
C) Trafficking
D) Switching