Network Security
Network Security
a) 2
b) 3
c) 4
d) 5
Answer: c
2 The field that covers a variety of computer networks, both public and private, that are used in
everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT
Answer: c
3. Network Security provides authentication and access control for resources.
a) True
b) False
Answer: d
5. Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint
Answer: a
Answer: a
Answer: c
Answer: a
9 Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
Answer: d
10. An algorithm in encryption is called _____________
a) Algorithm
b) Procedure
c) Cipher
d) Module
Answer: c
13. Which of the following is a programs that copy themselves throughout a computer or network?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
Ans : C
15. Which of the following malware do not replicate or reproduce through infection?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
Ans : B
18. Which malware enable administrative control, allowing an attacker to do almost anything on an
infected computer?
A. Rootkits
B. RATs
C. Botnets
D. Worms
Ans : B
19. Which malware are often the armies behind today's distributed denial-of-service (DDoS) attacks?
A. Botnets
B. botnetsSpyware
C. Trojans
D. Viruses
View Answer
Ans : A