Computer Fundamentals Questions and Answers – Network Security and Encryption

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “Network Security and Encryption”.

1. WTLS stands for?
a) Wireless Transport Security Layer
b) Wireless Transfer System Layer
c) Wireless Transfer Security Layer
d) Wireless Transport System Layer
View Answer

Answer: a
Explanation: WTLS is Wireless Transport Security Layer. It provides security between the mobile device and the WAP gateway to internet.

2. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
a) WTLS
b) WEP
c) RSN
d) WP
View Answer

Answer: b
Explanation: WEP stands for Wired Equivalent Privacy. WEP has been broken already in 2001. WEP protocol designed to make the security of wireless LAN as good as that of wired LAN.

3. A person who enjoys learning details about computers and how to enhance their capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller
View Answer

Answer: b
Explanation: The person is called hacker. A person who enjoys learning the details of computer systems and how to stretch their capabilities is called hacker.
advertisement
advertisement

4. A program created by Farmer and Venema for auditing capability.
a) SAAS
b) SATAN
c) SAN
d) SAT
View Answer

Answer: b
Explanation: SATAN is the Security analysis tool for auditing networks. It is created by farmer and venema.

5. A small program that changes the way a computer operates.
a) Worm
b) Trojan
c) Bomb
d) Virus
View Answer

Answer: d
Explanation: The program is called virus. It alters the way that the computer operates. It often does damages like deleting and corrupting files and data.

6. A program that copies itself.
a) Worm
b) Virus
c) Trojan
d) Bomb
View Answer

Answer: a
Explanation: A worm copies itself from one system to another over a network without the assistance of human.

7. An attack in which the site is not capable of answering valid request.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer

Answer: b
Explanation: The answer is Denial of service. In case of denial of service attacks, a computer site is bombarded with a lot of messages.
advertisement

8. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification
View Answer

Answer: a
Explanation: The answer is auditing. It is done to keep an eye on wrong doings. Auditing can be used as a deterrent.

9. An indirect form of surveillance.
a) Honey pot
b) Logical
c) Security
d) Intrusion
View Answer

Answer: a
Explanation: Honey pot is an indirect form of surveillance. Network personnel create a trap, watching for unscrupulous acts.
advertisement

10. A malicious code hidden inside a seemingly harmless piece of code.
a) Worm
b) Bomb
c) Trojan Horse
d) Virus
View Answer

Answer: c
Explanation: The answer is Trojan horse. Trojan horse is a code that is present in a program that appears harmless.

11. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer

Answer: d
Explanation: The attack is a spoofing attack. It is when a user creates a packet that appears to be something else or from someone else.

13. A technique in which a program attacks a network by exploiting IP broadcast addressing operations.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer

Answer: a
Explanation: Smurfing is a technique in which a program attacks a network by exploiting IP broadcast addressing operations.

14. An attack in which the user receives unwanted amount of e-mails.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer

Answer: c
Explanation: In the case of denial of e-mail bombing, a user sends an excessive amount of unwanted e-mail to someone.

Sanfoundry Global Education & Learning Series – Computer Fundamentals.

To practice all areas of Computer Fundamentals, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.