0% found this document useful (0 votes)
6 views3 pages

Network Security

The document consists of a series of multiple-choice questions and answers related to network security and malware. Key topics include the handshaking protocol phases, authentication processes, network security objectives, and various types of malware such as viruses, worms, and Trojans. It also covers specific terms like CHAP and RATs, along with their definitions and functions.

Uploaded by

laita nikam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views3 pages

Network Security

The document consists of a series of multiple-choice questions and answers related to network security and malware. Key topics include the handshaking protocol phases, authentication processes, network security objectives, and various types of malware such as viruses, worms, and Trojans. It also covers specific terms like CHAP and RATs, along with their definitions and functions.

Uploaded by

laita nikam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1. Number of phases in the handshaking protocol?

a) 2
b) 3
c) 4
d) 5
Answer: c

2 The field that covers a variety of computer networks, both public and private, that are used in
everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT

Answer: c
3. Network Security provides authentication and access control for resources.
a) True
b) False

4. Which is not an objective of network security?


a) Identification
b) Authentication
c) Access control
d) LockAnswer:

Answer: d
5. Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint

Answer: a

6. The process of verifying the identity of a user.


a) Authentication
b) Identification
c) Validation
d) Verification

Answer: a

7. A concern of authentication that deals with user rights.


a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification

Answer: c

8 CHAP stands for?


a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol

Answer: a
9 Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control

Answer: d
10. An algorithm in encryption is called _____________
a) Algorithm
b) Procedure
c) Cipher
d) Module

Answer: c

11. Which of the following are objectives of Malware?


A. Provide remote control for an attacker to use an infected machine.
B. Investigate the infected user’s local network.
C. Steal sensitive data.
D. All of the above
Ans : D

12. Malware is short form of ?


A. malicious hardware
B. malicious software
C. Both A and B
D None of these
Ans : B

13. Which of the following is a programs that copy themselves throughout a computer or network?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
Ans : C

14. Which is true about Worms ?


A. Self-replicating viruses that exploit security vulnerabilities to automatically spread themselves
across computers and networks.
B. Worms on existing programs and can only be activated when a user opens the program.
C. Worms vary and hide themselves in the operating system.
D. All of the above
Ans : A

15. Which of the following malware do not replicate or reproduce through infection?
A. Worms
B. Trojans
C. Viruses
D. Rootkits
Ans : B

16. RATs stands for?


A. Rootkits Administration Tools
B. Remote Access Tools
C. Remote Administration Tools
D. Remote Attack Tools
Ans : C
17. Which malware has Short for "robot network"?
A. ronets
B. botnets
C. botwork
D. rowork
Ans : B

18. Which malware enable administrative control, allowing an attacker to do almost anything on an
infected computer?
A. Rootkits
B. RATs
C. Botnets
D. Worms
Ans : B

19. Which malware are often the armies behind today's distributed denial-of-service (DDoS) attacks?
A. Botnets
B. botnetsSpyware
C. Trojans
D. Viruses
View Answer
Ans : A

20. What is true regarding Trojans?


A. Trojans will conduct whatever action they have been programmed to carry out
B. "Trojan" alludes to the mythological story of Greek soldiers hidden inside a wooden horse that was
given to the enemy city of Troy.
C. Trojans do not replicate or reproduce through infection.
D. All of the above
View Answer
Ans : D

You might also like